Virus scanning and killing method and device

A technology for virus scanning and killing, virus files

Active Publication Date: 2014-08-27
北京鸿享技术服务有限公司
View PDF6 Cites 34 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This constantly resurrected Trojan hor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Virus scanning and killing method and device
  • Virus scanning and killing method and device
  • Virus scanning and killing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0073] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0074] Such as figure 1 As shown, it is a schematic flow chart of the virus detection and killing method provided in Embodiment 1 of the present invention. The method described in this embodiment can be used in a virus engine, for example, a mobile phone security guard, a mobile phone scanning and killing engine, etc., that is, the execution subj...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a virus scanning and killing method and a virus scanning and killing device, wherein the method comprises the following steps that after a boot or reboot triggering instruction is received, files in a boot partition are loaded in a read-only mode; whether the loaded files include virus files or not is detected; if the virus files are included, a preset program is called, and the files in the boot partition are reloaded in a writable mode; the virus files in the reloaded files are deleted; if processes corresponding to the virus files exist, the processes corresponding to the virus files are deleted. The technical scheme provided by the invention has the advantages that during boot or reboot of a mobile phone in each time, for the virus or rogue program written into the boot partition, both the loaded virus or rogue program files and the corresponding processes are deleted,, the reanimation of the virus or the rogue program after the boot or reboot is avoided, and the use safety of users is improved.

Description

technical field [0001] The invention relates to the field of computers, in particular to a method and device for checking and killing viruses. Background technique [0002] Android is an open source operating system based on Linux, mainly used in mobile terminals such as mobile phones, and there is no unified Chinese name yet. Android platform is composed of operating system, middleware, user interface and application software. Android application refers to application software under Android platform. [0003] With the popularity of Android smartphones, an industrial chain of malicious software targeting the Android system has gradually formed. These malicious software usually pretend to be normal application software or games to trick users into installing them. Once they enter the user's mobile phone, they will quietly customize SP services in the background or make premium calls to collect user bills, or collect user privacy, or steal user's online banking and third part...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56G06F21/51
CPCG06F21/568G06F21/575
Inventor 李常坤
Owner 北京鸿享技术服务有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products