Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and terminal device for scanning files

A terminal device and file scanning technology, which is applied in the field of file scanning, can solve problems such as low scanning efficiency, affecting the response sensitivity of other programs, and incomplete removal of Trojan horses, so as to achieve the effect of improving efficiency

Active Publication Date: 2016-12-21
TENCENT TECH (SHENZHEN) CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the quick scan method only scans and detects files and programs in sensitive locations of the system, so when the Trojan horse hides in a non-sensitive location, or the Trojan horse releases malicious files in a sensitive location and a non-sensitive location, this scanning method There will be omissions, resulting in incomplete removal of Trojan horses; and the method of full scan will scan all files and programs on the system, and the number of scanned files will reach tens of thousands to hundreds of thousands, so the scanning time will be very long , and during this period, most of the system resources such as memory, disk I / O, CPU, etc. are occupied by the scanning program, seriously affecting the response sensitivity of other programs
[0005] Thereby, the scanning efficiency of existing scanning method is relatively low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and terminal device for scanning files
  • Method and terminal device for scanning files
  • Method and terminal device for scanning files

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The embodiments of the present invention will be described in detail below in conjunction with the drawings.

[0022] figure 1 It is a flowchart of a method for scanning a document provided by an embodiment of the present invention.

[0023] In this embodiment, before the terminal device starts scanning the system files and stored files on its hard disk, it needs to make a pre-judgment on the system files and stored files on the hard disk to determine the subsequent scanning process. In this embodiment, the terminal device may be a personal computer or a tablet computer or a mobile phone.

[0024] In this embodiment, in step S10, it is determined whether to perform a full scan through the pre-scan mode.

[0025] In this embodiment, the pre-scan mode is a mode for diagnosing the current system status on the terminal device through a predetermined determination strategy. The predetermined determination strategy includes: detecting sensitive locations on the system through an emp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a method for scanning files and a terminal device, so as to intelligently select a scanning mode of the system according to the security status of the system of the terminal device, thereby improving the scanning efficiency. The method in the embodiment of the present invention includes: judging whether to perform a full disk scan through the pre-scan mode; judging whether the user selects a deep scan when judging that the full disk scan is not required through the pre-scan mode; and performing a deep scan when judging that the user selects a deep scan.

Description

Technical field [0001] The present invention relates to the field of communication technology, and in particular to a method and terminal device for scanning files. Background technique [0002] In real life, in order to achieve the purpose of stealing user information and disrupting the normal operation of the system, Trojan horses usually choose some critical paths of the system to shelter. Most Trojan horses will also register themselves as self-starting programs and obtain them as soon as the system starts. Run the opportunity. However, some stubborn types of Trojan horse programs will not only release malicious files in key directories, they will even infect all programs on the system. As long as one infected program is not removed, the entire system will face the risk of being controlled by the Trojan horse again. . [0003] There are two most commonly used scanning methods. The first is fast scanning, which is the most widely used scanning method. This method scans and de...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56
CPCG06F21/566G06F21/56H04L63/145
Inventor 刘桂泽
Owner TENCENT TECH (SHENZHEN) CO LTD