Unlock instant, AI-driven research and patent intelligence for your innovation.

A data recovery method and device

A recovery method and data technology, applied in the computer field, can solve problems such as computer security risks, and achieve the effect of solving security risks

Active Publication Date: 2021-01-29
360 TECH GRP CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present application provides a data recovery method, which is used to solve the problem in the prior art that data infected by a computer virus will cause potential safety hazards in the computer
[0005] The embodiment of the present application also provides a data recovery device, which is used to solve the problem in the prior art that data infected by a computer virus will cause potential safety hazards in the computer

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data recovery method and device
  • A data recovery method and device
  • A data recovery method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0024] In order to solve the problem in the prior art that data infected by a computer virus will cause potential safety hazards in the computer, Embodiment 1 of the present application provides a data recovery method. The execution subject of the method may be, but not limited to, at least one of any terminal equipment capable of running an antivirus engine, such as a mobile phone, a tablet computer, and a personal computer (Personal Computer, PC). In addition, the subject of execution of the method may also be the antivirus engine itself.

[0025] For the convenience of description, the implementation of the method will be introduced below by taking the execution subject of the method as an antivirus engine as an example. It can be understood that the execution subject of the method is an antivirus engine, which is only an exemplary description, and should not be construed as a limitation of the method.

[0026] The schematic diagram of the implementation process of this me...

Embodiment 2

[0083] Embodiment 2 of the present application mainly introduces an application scheme of the above-mentioned method provided in Embodiment 1 of the present application in practice.

[0084] Before introducing the implementation of the solution in detail, a brief introduction to the implementation scenario of the solution is given:

[0085] The computer antivirus engine checks whether there is a script virus in the computer, and judges whether the script virus can infect data in the computer, and if the virus infects the data, restores the infected data.

[0086] Based on the above implementation scenarios, the data recovery process provided by Embodiment 2 is as follows: figure 2 shown, including the following steps:

[0087] Step 21: using the script code acquisition engine to obtain the code of the detected script in the computer;

[0088] Step 22: performing word analysis on the encoding of the detected script;

[0089] Step 23: According to the result of the word anal...

Embodiment 3

[0097] In order to solve the problem in the prior art that data infected by a computer virus will cause potential safety hazards in the computer, Embodiment 3 of the present application provides a data recovery device. The structural diagram of the data recovery device is as follows: image 3 As shown, it mainly includes the following functional units:

[0098] A set construction unit 31 is configured to perform word analysis on the code of the detected script, and according to the result of the word analysis, construct a combined coded script set of the detected script; the combined coded script set includes the detected script code corresponding to at least one script element;

[0099] The step determining unit 32 is used to virtually execute the script elements in the combined coded script set, and determine the steps of malicious script infection data in the combined coded script set according to the virtual execution process of the script elements;

[0100] The data res...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data recovery method. The data recovery method is used for solving the problem that in the prior art, a computer has potential safety hazards due to data infected by computer viruses. The method includes the steps that codes of a detected script are subjected to word analysis, and a composite code script set of the detected script is established according to the word analysis result; the composite code script set comprises at least one script element corresponding to the code of the detected script; the script elements in the composite code script set are virtually executed, and malicious script infected data in the composite code script set is determined according to the virtual executing process of the script elements; the malicious script infected data is recovered into original data before infection by malicious scripts according to the malicious script infected data. The invention further discloses a data recovery device.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a data recovery method and device. Background technique [0002] In the Internet age, computer viruses have greatly threatened the security of computers. Computer viruses are highly contagious, and computers may be infected by computer viruses at any time, and computer viruses are extremely destructive, which may lead to computer system paralysis and information leakage. [0003] When data in a computer system is infected by a computer virus, the infected data will generally be modified. For example, a computer virus may add malicious code to computer data, and a computer virus may also modify the computer registry. After the computer virus is removed by the antivirus software, the data infected by the computer virus may still pose a hidden danger to the security of the computer. Contents of the invention [0004] The embodiment of the present application provides...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56
CPCG06F21/568
Inventor 陈卓杨康唐海
Owner 360 TECH GRP CO LTD