Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for processing virus-infected files

A file system and processing method technology, applied in the processing method and system field of virus-infected files, can solve problems such as incompatibility, affecting anti-virus efficiency, and low anti-virus efficiency, and achieve the effect of avoiding instability and improving anti-virus efficiency

Inactive Publication Date: 2015-11-25
BEIJING QIHOO TECH CO LTD +1
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Viruses in the prior art often lock the virus-infected file by occupying the file handle, setting the read-only attribute of the file, and making the file in a deleted state. The lock cannot be cracked by conventional means.
[0005] A kind of virus-killing method of prior art, enumerates all processes under the operating system, and enumerates the file handle that each process opens, finds the virus-infected file that adds exclusive lock by checking file handle; Virus-infected files with exclusive locks, but the enumeration of processes and file handles is time-consuming, and the anti-virus efficiency is not high
[0006] Another anti-virus method in the prior art uses some undisclosed methods to check and kill virus-infected files with kernel locks; however, the undisclosed methods are easily incompatible with other programs in the operating system, causing unstable problems such as blue screens in the operating system , thus affecting the antivirus efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for processing virus-infected files
  • Method and system for processing virus-infected files

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0077] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0078] In order to improve the reliability and stability of the operating system, some operating systems provide some file protection mechanisms. For example, the Windows operating system requires other threads not to read or write the file when a thread is operating a certain file, so the file can be locked, or the file can be exclusive, that is, always open The file is not closed until the operation is complete. The above lockin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a system for processing files affected by virus. The method comprises the following steps of: acquiring files which fail to read in a file system to be used as files to be processed; acquiring cluster distributed information of the files to be processed on a disk; reading data of the files to be processed from the disk according to the cluster distributed information; writing the read data in a temporary file; and analyzing the safety of the temporary file, and if the temporary file is unsafe, clearing the temporary file and the corresponding files to be processed. The step for acquiring the cluster distributed information of the files to be processed on the disk comprises the following substeps of: opening the files to be processed in read attribute to obtain corresponding handles; and acquiring the cluster distributed information, which corresponds to the handles, of the files to be processed on the disk based on a function of disk drive control codes of a driver interface function of equipment. By the method and the system, the efficiency of killing the virus can be improved.

Description

technical field [0001] The invention relates to the technical field of computer security, in particular to a processing method and system for virus-infected files. Background technique [0002] With the continuous development of computer technology, computers have become an indispensable partner for people no matter in daily life or work, and have brought a lot of convenience to people's work and life, but there is one The discordant factor, that is the computer virus. [0003] A computer virus refers to a set of computer instructions or program codes compiled or inserted into computer programs that destroy computer functions or data, affect computer use, and are capable of self-replication. Once infected with a virus, the computer usually shows that its files are added, deleted, changed names or attributes, and moved to other directories. These operations of viruses on computer files may cause normal programs to fail to run, computer operating systems to crash, and compute...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56
Inventor 谭合力
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products