Ransomware protection method and device, electronic equipment and storage medium
A technology of electronic equipment and software, applied in the field of information security, can solve the problem of low ransomware protection ability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0058] figure 1 A schematic diagram of a ransomware protection process provided by an embodiment of the present invention, the process includes the following steps:
[0059] S101: If it is monitored that a process in the system modifies the file, record information about the modification operation performed by the process on the file in a modification operation file, and save the recording time of the information in the modification operation file.
[0060] The ransomware protection method provided by the embodiment of the present invention is applied to electronic equipment, and the electronic equipment can be a desktop computer, a portable computer, a smart phone, a tablet computer, a personal digital assistant (Personal Digital Assistant, PDA), a network side device, etc. System and electronic devices that store files that can be modified.
[0061] The operating systems installed on different electronic devices can be the same or different. For example, the operating syste...
Embodiment 2
[0079] In order to improve protection efficiency, on the basis of the above embodiments, in the embodiment of the present invention, after the process is determined to be a ransomware process, the method further includes:
[0080] Save the process as a ransomware process into a blacklist of ransomware processes;
[0081] Before recording information about the modification operation performed by the process on the file into the modification operation file, the method further includes:
[0082] Judging whether the information of the process is stored in the ransomware process blacklist;
[0083] If so, blocking the process from modifying the file;
[0084] If not, proceed to the next step.
[0085] If it is determined that a certain process is a ransomware process, the process is saved as a ransomware process in the blacklist of ransomware processes. When the blacklist of ransomware processes is saved in the electronic device, if there is a file modification operation by the ...
Embodiment 3
[0090] In order to further improve the protection capability, on the basis of the above-mentioned embodiments, in the embodiment of the present invention, the recording of the modification operation information performed by the process on the file in the modification operation file includes:
[0091] According to the type of the modification operation, the information of the modification operation corresponding to the type of the modification operation is recorded in the modification operation file.
[0092] The electronic device saves the information of the modification operation performed on the file by the saving process, and after the process is determined to be a ransomware process, the file modified by the process can be restored, which further improves the protection capability.
[0093] When the electronic device records the information of the modification operation performed by the process on the file, the recorded information can be the same or different for different...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


