Trojan horse scanning method and system
A scanning method and scanning system technology, applied in the direction of platform integrity maintenance, etc., can solve problems such as unusable implementation methods and lack of flexibility, and achieve the effects of avoiding excessive storage data, increasing scanning speed, and ensuring security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0067] figure 1 Shows the method flow of file scanning in an embodiment, including the following steps:
[0068] Step S110: Obtain the file to be scanned.
[0069] In this embodiment, after the scan engine of the virus-checking and killing software or the Trojan-killing software is turned on, the files to be scanned are obtained according to the user's operation of selecting the scanning range of the files on the checking and killing interface, and these files are regarded as files to be scanned. In the process of obtaining the files to be scanned, in order to make the file scanning easier to maintain during the running process, according to the operation of the user to select the scanning range of the file, the multiple files to be scanned are enumerated according to the set queue length to form a specific length of enumeration. Lift the queue to wait for scanning.
[0070] Step S130: Extract the attribute information of the files to be scanned one by one from the acquired files to...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap