Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A scanning method, device and system

A scanning method and a technology to be scanned are applied in the fields of scanning methods, devices and systems, which can solve problems such as cleaning, security dead spots, and inability to detect viruses, so as to improve user experience and avoid security dead spots.

Active Publication Date: 2022-03-15
亚信科技(成都)有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, when antivirus software is used to perform virus scanning on files encrypted by encryption software (that is, encrypted files), since the file flow through the kernel layer is from top to bottom, antivirus software can only perform virus scanning on the encrypted files. , so that when there is a virus in the plaintext file corresponding to the encrypted file, the antivirus software cannot detect and remove the virus, which will cause a security dead zone

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A scanning method, device and system
  • A scanning method, device and system
  • A scanning method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The scanning method, device and system provided by the embodiments of the present application will be described in detail below with reference to the accompanying drawings.

[0022] In the description of the present application, unless otherwise specified, " / " means "or", for example, A / B may mean A or B. The "and / or" in this article is just an association relationship describing associated objects, which means that there can be three relationships, for example, A and / or B, which can mean: A exists alone, A and B exist at the same time, and B exists alone These three situations. In addition, "at least one" means one or more, and "plurality" means two or more.

[0023] In addition, the terms "including" and "having" mentioned in the description of the present application and any variations thereof are intended to cover non-exclusive inclusion. For example, a process, method, system, product or device comprising a series of steps or units is not limited to the listed st...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application provides a scanning method, device and system, which relate to the technical field of security protection, and can correctly detect and remove viruses from encrypted files, thereby avoiding security dead ends. The method includes: calling a kernel mode interface to scan the files in the file collection to be scanned; determining at least one file in the file collection that does not detect a target object according to the scanning result of the file; calling the user mode interface to scan the at least a file.

Description

technical field [0001] The present application relates to the technical field of security protection, in particular to a scanning method, device and system. Background technique [0002] In order to avoid the problem of information leakage, important documents (such as red-headed documents, confidential documents, meeting minutes, drawings, technical documents, financial statements, business data, etc.) can be encrypted by encryption software. In the actual application of encryption software, in order to avoid conflicts between the encryption software and other third-party software to the greatest extent, the existing encryption software is usually located at the bottom layer of the kernel layer in the operating system, and in order to obtain more system events, antivirus software Usually also at the kernel level. In this way, when antivirus software is used to perform virus scanning on files encrypted by encryption software (that is, encrypted files), since the file flow t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56
CPCG06F21/562
Inventor 戚建飞刘军伟朱梦宇
Owner 亚信科技(成都)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products