Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

File protection method and device

A file and file name technology, applied in the computer field, can solve the problems of file corruption, undetectable virus, non-existence, etc.

Active Publication Date: 2018-04-03
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the prior art, the main means of defense against ransomware is traditional anti-virus software to detect and kill, but traditional anti-virus software has missed killing viruses, for example, some virus characteristics do not exist in anti-virus software, resulting in failure to detect these viruses
Therefore, the passive way of protecting files by using anti-virus software may cause viruses to damage files and bring losses to users.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File protection method and device
  • File protection method and device
  • File protection method and device

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0044] Such as figure 2 A flow chart of the file downloading method provided by the embodiment of the present invention is shown. See figure 2 , the method includes:

[0045] Step S110: When acquiring a first access command to a first file of a first preset file type, determine whether the access mode corresponding to the first access command is the first access mode.

[0046] The files in the system of the terminal device may have required operations for the user, or the files may be attacked by virus and ransomware. When the file is operated, the corresponding access instruction needs to be obtained.

[0047] In this embodiment of the present invention, files of the first preset file type that need to be protected may be stored in the terminal device. Specifically, a protected file with a preset extension can be set. For example, the preset extensions of the protected files can be 0, 1, 123, 1ST, 2, 3DM, 3DMF, DOC, DOCM, DOCX, xls, xlsx, PPT, PPTX and other important ...

no. 2 example

[0088] The second embodiment of the present invention provides a file protection device 200, please refer to Figure 6 , the file protection device 200 includes: an access mode judgment module 210 , a virtualization operation module 220 , a similarity judgment module 230 and an execution module 240 . Wherein, the access mode judging module 210 is configured to determine whether the access mode corresponding to the first access command is the first access mode when acquiring the first access command to the first file of the first preset file type; The virtualization operation module 220 is configured to perform a preset virtualization operation on the first copy file of the first file based on the first access instruction to obtain a second file when it is YES; the similarity judging module 230 It is used to judge whether the similarity between the first file and the second file is greater than a preset threshold; if yes, the execution module 240 is used to replace the first fi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a file protection method and device, and relates to the technical field of computers. The file protection method comprises the following steps of: when a first access instruction for a first file in a first preset file type is obtained, judging whether an access manner corresponding to the first access instruction is a first access manner or not; when the judging result is positive, carrying out a preset virtualization operation on a first copy file of the first file on the basis of the firs access instruction so as to obtain a second file; judging whether a similarity between the first file and the second file is greater than a preset threshold value or not; and when the similarity is greater than the preset threshold value, replacing the first file by the second file. Aiming at the manner of attacking files by ransomware, the file protection method is capable of defensing behaviors and features of the ransomware in an active manner, so as to prevent the ransomware from attacking the files in an encryption form and the like, and avoid the loss caused by virus attack.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to a file protection method and device. Background technique [0002] In the prior art, the main means of defense against ransomware is traditional anti-virus software to detect and kill, but traditional anti-virus software has missed killing viruses, for example, some virus characteristics do not exist in anti-virus software, resulting in failure to detect these viruses. Therefore, the passive way of protecting files by using antivirus software may cause viruses to damage files and bring losses to users. Contents of the invention [0003] In view of this, an embodiment of the present invention provides a file protection method and device to solve the above problems. [0004] In order to achieve the above object, the technical scheme adopted in the present invention is as follows: [0005] A file protection method, when obtaining a first access command for a first fil...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62
CPCG06F21/6209G06F2221/2107
Inventor 王俊杰范渊莫金友
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products