Relationship chain creation method, device, server, terminal, storage medium

A relationship chain and terminal technology, applied in the computer field, can solve problems such as incomplete relationship chain and difficult to eradicate viruses, and achieve the effect of improving protection ability and complete protection

Active Publication Date: 2022-02-22
TENCENT TECH (SHENZHEN) CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the process of virus detection and killing, the virus can fight against the anti-virus software and hide important behaviors, which may lead to an incomplete behavior relationship chain of the virus collected by the anti-virus software, making it difficult to eradicate the virus

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Relationship chain creation method, device, server, terminal, storage medium
  • Relationship chain creation method, device, server, terminal, storage medium
  • Relationship chain creation method, device, server, terminal, storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] In the embodiment of the present invention, the terminal may provide a user interface, and provide a virus killing / protection processing button in the user interface. Such as figure 1As shown in , the user can click this button to instruct the terminal to perform virus scanning / protection processing. When the terminal detects that the user clicks the button, it can perform file detection on the files in the terminal. If a suspicious file is found, the suspicious file will be used as the starting file for behavior relationship chain detection, so as to perform behavior relationship chain detection. In an embodiment, the suspicious file here may refer to a file detected by the terminal with specified file behavior data, and the specified file behavior data is used to record the specified behavior of the suspicious file, and the specified behavior may be: encrypting other files behavior, behavior that destroys other files, and so on. For example, if a file encrypts other...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the present invention discloses a method, device, server, and terminal for creating a relationship chain, wherein the method includes: determining the target file in the terminal, and the target file refers to: In the detection process, the terminal file of the associated file cannot be detected; according to the target file, the common terminal set is determined, and the common terminals in the common terminal set all include the target file; the common terminal in the common terminal set is carried out File detection, determining a common file associated with the target file in the common terminal; according to the common file, creating a behavioral relationship chain about the target file, and recording the target on the behavioral relationship chain A file node of the file and a file node of the common file. This embodiment can better create a virus behavior relationship chain.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to a relationship chain creation method, device, server, terminal, and storage medium. Background technique [0002] A computer virus is a code inserted into a computer program by the compiler to destroy computer functions or data, a set of computer instructions or program codes that can affect the use of a computer and can replicate itself. Computer viruses have the ability to reproduce, infect each other, activate regeneration, and replicate. Once a file in the computer is infected with a computer virus, as the file is copied or spread, the computer virus infected by the file will also spread. . [0003] At present, in order to ensure that the file resources in the computer are not damaged, antivirus software is usually selected to scan, kill or protect the files in the computer from viruses. However, in the process of virus detection and killing, the virus can fight a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57G06F21/56
CPCG06F21/56G06F21/57
Inventor 彭宁程虎沈江波
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products