Computer virus defense method

A computer virus and virus database technology, applied in the computer field to reduce user losses and improve the chance of self-solving problems

Inactive Publication Date: 2018-03-23
四川兴昌盛科技有限公司
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Aiming at the problem that the existing antivirus engine may produce more unpredictable viruses to carry out a large number of self-replication and update, which will bring considerable losses to users, the main purpose of the present invention is to provide a computer virus defense method, expect to solve the aforementioned problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0013] Embodiment one: a kind of computer virus defense method, comprises the following steps: S 1, preset security status monitoring database, set monitoring module to the data input port that enters computer system, this monitoring module records input data and transmits information Provide the security status monitoring database; S2. Set up the policy production module to check the security status monitoring database according to the existing virus database and generate corresponding defense strategies; S3. The user checks and adjusts the defense strategy according to the production, and the adjusted defense strategy Policy records and load in the newly established self-defined policy library; S4, set record learning module, associate the security state monitoring database with the self-defined policy library, record the self-defined strategy in the self-defined policy library, the security state monitoring database and the self-defined Define policy-related data; S5. When t...

Embodiment 2

[0016] Embodiment two: on the basis of embodiment one, in step S5, the number of times of warning users, the data type corresponding to the self-defining strategy, and the data content corresponding to the self-defining strategy are recorded. After the custom strategy is completed, upload and Existing virus database-related servers.

[0017] A large number of windows computer poisoning mainly comes from two directions, namely IE browser and USB flash drive and other mobile storage media. Due to its own problems, IE has many loopholes. Even if Microsoft patches are applied in time, the invasion of some malicious Internet horses cannot be avoided.

[0018] Anti-virus strategies can be divided into loose rules and strict rules, that is, restricting dangerous behaviors, allowing ordinary behaviors, and establishing a blacklist system. Restricting malicious programs; The program establishes a white list, only allows known programs to run, and imposes strict restrictions on unknown ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to computers, specifically a computer virus defense method. When the data is input into the computer system, the monitoring module starts to monitor and record the input data, and adjusts the defense strategy generated by the strategy production module in real time. Personality problems to be solved Formulate custom defense strategies or processing strategies, which can improve the chances of users to solve problems by themselves and reduce user losses.

Description

technical field [0001] The invention relates to computers, in particular to a computer virus defense method. Background technique [0002] A computer virus is data compiled or inserted into a computer program that destroys computer functions, which will affect the normal use of the computer and can replicate itself, usually in the form of a set of computer instructions or program codes. The antivirus engine is a set of technical mechanisms for judging whether the behavior of a specific program is a virus program (including suspicious programs). The anti-virus engine is the main part of the anti-virus software, which is a program for detecting and discovering viruses, and the virus database is a collection of features of the viruses that have been found. During the anti-virus process, the features in the virus database are used to compare all the programs or files in the machine, and the programs or files that meet these features are judged as viruses. Nowadays, there are g...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/565
Inventor 王勇
Owner 四川兴昌盛科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products