Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for defending against extortionist virus during standby time

A technology of standby time and blackmailers, applied in the field of information security, can solve the problems that documents cannot be decrypted, black and white lists are difficult to catch blackmailer programs, blackmailer virus research and development technology costs are low, and achieve effective protection methods

Inactive Publication Date: 2017-03-29
BEIJING ANTIY NETWORK SAFETY TECH CO LTD
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 2. The cost of blackmailer virus R&D technology is low, and it can be written by someone with a little knowledge of programming, which makes it difficult for traditional black and white list defenses to catch the latest blackmailer programs;
[0007] 4. The documents encrypted by the blackmailer virus cannot be decrypted at present, and most of them use 4096-bit encryption algorithm, so once the file is encrypted by the blackmailer virus, it can only be recovered by accepting the attacker’s blackmail conditions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for defending against extortionist virus during standby time
  • Method and system for defending against extortionist virus during standby time

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In order to enable those skilled in the art to better understand the technical solutions in the embodiments of the present invention, and to make the above-mentioned purposes, features and advantages of the present invention more obvious and easy to understand, the technical solutions in the present invention will be further detailed below in conjunction with the accompanying drawings illustrate.

[0035] The present invention provides an embodiment of a method for defending against blackmailer viruses during standby time, such as figure 1 shown, including:

[0036] S101: monitor the state of the operating system in real time, and determine whether the device enters the standby state;

[0037] S102: when the device enters the standby state, monitor the processes in the system in real time;

[0038] S103: judge whether there is a process of calling the encryption function, if so, then enter S104, otherwise return to S102; can judge whether there is a process of calling...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and a system for defending against extortionist virus during standby time. The method comprises the steps of firstly monitoring a device resource state in real time; when a device is detected to be in a standby state, monitoring courses in the system; judging whether a course for calling an encryption function exists and whether a course for changing a document type file state exists; if so, locking the corresponding courses, and searching and backing up a to-be-encrypted file or a file with the state to be changed; finally returning a list of backup files to a user; and recovering the corresponding files selectively based on a specific condition and a demand by the user. As the course for calling the encryption function and the course for trying to modify the document type file state are subjected to bidirectional monitoring, monitoring for risks possibly released by an extortionist becomes more comprehensive, and the method for defending against the extortionist virus during the standby time is more efficient and can reduce user loss to the lowest.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method and system for defending against blackmailer viruses during standby time. Background technique [0002] With the rapid development of computer technology, electronic documents have become an indispensable tool in our work and life, but document security has become a major threat to our daily life. The extortionist series of viruses take advantage of the weak security awareness of computer users and spread through USB flash drives, CD-ROMs, emails, etc. When releasing threats, they will encrypt documents and files in the computer, and extort electronic currency or even money from users. The behavior of the blackmailer virus is no different from that of traditional application software, and it is very difficult to distinguish it. Traditional antivirus software cannot effectively detect and kill it. [0003] The reasons why most anti-virus software cannot reco...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/56
CPCG06F21/566G06F21/568
Inventor 孙超徐翰隆肖新光
Owner BEIJING ANTIY NETWORK SAFETY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products