Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Virus detection method and device

A virus detection and virus technology, applied in computer security devices, instruments, electrical digital data processing, etc., can solve problems such as being susceptible to interference, not proposing a solution, and being unable to confirm whether a file contains a virus, etc., and achieve the effect of accurate identification

Active Publication Date: 2014-12-31
BEIJING CHEETAH MOBILE TECH CO LTD +4
View PDF7 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method is susceptible to interference. For example, after the virus file is encrypted, packed, code obfuscated and other interference means, this method cannot confirm whether the file contains a virus.
[0004] Aiming at the problems of virus identification in the static processing method in related technologies, no effective solution has been proposed yet

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Virus detection method and device
  • Virus detection method and device
  • Virus detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present invention will be described in detail below with reference to the accompanying drawings and examples.

[0024] The following embodiments can be applied to computers, such as PCs. It can also be applied to mobile terminals using intelligent operating systems at present, and is not limited thereto. There is no special requirement for the operating system of the computer or mobile terminal, as long as the information of the application programming interface (Application Programming Interface, API for short) called by the code, program, or file can be obtained. For example, the following embodiments can be applied to a Windows operating system.

[0025] This embodiment provides a virus detection method, figure 1 It is a flow chart of the virus detection method according to the embodiment of the pr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a virus detection method and device. The virus detection method comprises the following steps: acquiring information of calling an application programming interface when a detected file runs; determining functions called by the detected file and the sequence of the called functions according to the information; and determining whether a virus exists in the defected file according to the called functions and the sequence of the called functions. According to the virus detection method and device, the problem that the process of identifying the virus according to the static information of the file is easily interfered is solved, and thus the virus can be identified more completely and accurately.

Description

technical field [0001] The invention relates to the field of computer security, in particular to a virus detection method and device. Background technique [0002] The security of computers (for example, personal computers, referred to as PCs) has always been the focus of attention of users. At present, viruses are more and more harmful to PCs and users, and virus technology is also developing towards a more and more hidden trend, such as "ghost "Shadow" virus, so that many users' PCs have been poisoned but the users do not know it. After the "ghost" virus runs successfully, no abnormality can be found in the process and the system startup add-ons. This is because the virus resides in the boot area of ​​the PC, and the operation of the virus is prior to the operation of the operating system. Even if the disk is formatted and the system is reinstalled, the virus cannot be completely removed. Therefore, the prevention of "ghost" virus should be carried out before it writes i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/566G06F2221/033
Inventor 焦国强陈勇张楠
Owner BEIJING CHEETAH MOBILE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products