A data recovery method and device
A recovery method and data technology, applied in the computer field, can solve problems such as computer security risks, and achieve the effect of solving security risks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0024] In order to solve the problem in the prior art that data infected by a computer virus will cause potential safety hazards in the computer, Embodiment 1 of the present application provides a data recovery method. The execution subject of the method may be, but not limited to, at least one of any terminal equipment capable of running an antivirus engine, such as a mobile phone, a tablet computer, and a personal computer (Personal Computer, PC). In addition, the subject of execution of the method may also be the antivirus engine itself.
[0025] For the convenience of description, the implementation of the method will be introduced below by taking the execution subject of the method as an antivirus engine as an example. It can be understood that the execution subject of the method is an antivirus engine, which is only an exemplary description, and should not be construed as a limitation of the method.
[0026] The schematic diagram of the implementation process of this me...
Embodiment 2
[0083] Embodiment 2 of the present application mainly introduces an application scheme of the above-mentioned method provided in Embodiment 1 of the present application in practice.
[0084] Before introducing the implementation of the solution in detail, a brief introduction to the implementation scenario of the solution is given:
[0085] The computer antivirus engine checks whether there is a script virus in the computer, and judges whether the script virus can infect data in the computer, and if the virus infects the data, restores the infected data.
[0086] Based on the above implementation scenarios, the data recovery process provided by Embodiment 2 is as follows: figure 2 shown, including the following steps:
[0087] Step 21: using the script code acquisition engine to obtain the code of the detected script in the computer;
[0088] Step 22: performing word analysis on the encoding of the detected script;
[0089] Step 23: According to the result of the word anal...
Embodiment 3
[0097] In order to solve the problem in the prior art that data infected by a computer virus will cause potential safety hazards in the computer, Embodiment 3 of the present application provides a data recovery device. The structural diagram of the data recovery device is as follows: image 3 As shown, it mainly includes the following functional units:
[0098] A set construction unit 31 is configured to perform word analysis on the code of the detected script, and according to the result of the word analysis, construct a combined coded script set of the detected script; the combined coded script set includes the detected script code corresponding to at least one script element;
[0099] The step determining unit 32 is used to virtually execute the script elements in the combined coded script set, and determine the steps of malicious script infection data in the combined coded script set according to the virtual execution process of the script elements;
[0100] The data res...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


