Trojan horse scanning method and system

A scanning method and scanning system technology, applied in the direction of platform integrity maintenance, etc., can solve problems such as unusable implementation methods and lack of flexibility, and achieve the effects of avoiding excessive storage data, increasing scanning speed, and ensuring security

Active Publication Date: 2013-04-03
TENCENT TECH (SHENZHEN) CO LTD
View PDF5 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, this traditional implementation cannot be used in oth

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trojan horse scanning method and system
  • Trojan horse scanning method and system
  • Trojan horse scanning method and system

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0067] figure 1 Shows the method flow of file scanning in an embodiment, including the following steps:

[0068] Step S110: Obtain the file to be scanned.

[0069] In this embodiment, after the scan engine of the virus-checking and killing software or the Trojan-killing software is turned on, the files to be scanned are obtained according to the user's operation of selecting the scanning range of the files on the checking and killing interface, and these files are regarded as files to be scanned. In the process of obtaining the files to be scanned, in order to make the file scanning easier to maintain during the running process, according to the operation of the user to select the scanning range of the file, the multiple files to be scanned are enumerated according to the set queue length to form a specific length of enumeration. Lift the queue to wait for scanning.

[0070] Step S130: Extract the attribute information of the files to be scanned one by one from the acquired files to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a Trojan horse scanning method, which comprises the following steps of: obtaining files to be scanned; extracting the attribute information of the files to be scanned one by one from the obtained files to be scanned; and comparing the extracted attribute information with the stored attribute information, judging whether the attribute information of the files to be scanned is the same as the stored attribute information or not, if not, scanning the files to be scanned corresponding to the extracted attribute information. According to the Trojan horse scanning method and system, when the attribute information of the files to be scanned is different from the pre-stored attribute information, the files to be scanned are safely scanned so as to judge whether the files to be scanned is identified as a normal state or not, the files to be scanned with the attribute information same as the pre-stored attribute information is not safely scanned, and the probability that the files to be scanned with the attribute information same as the pre-stored attribute information is not amended is very high, therefore, the number of the files needing to be scanned is greatly reduced, the resource consumption is flexibly reduced, the security of the files is ensured, and the scanning speed of the files is improved.

Description

【Technical field】 [0001] The invention relates to data processing technology, in particular to a Trojan horse scanning method and system. 【Background technique】 [0002] In order to maintain system security, security scans of files are often implemented by running antivirus software to identify suspicious files that affect security. After completing a security scan, the user will conduct security scan again irregularly or periodically. [0003] Files judged to be normal in multiple security scans conducted by the user will still enter the next security scan together with other files that have changed. For example, anti-virus software runs on the computer and determines normal files through file feature recognition. and suspicious files, and the suspicious files have been processed; in the next run of the antivirus software, these normal files and files that have been added, modified, etc. in the computer will also be scanned. Each security scan is a complicated process tha...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56
Inventor 彭宁宋爱元
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products