Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Virus defense optimization method and device, storage medium and computer equipment

An optimization method and virus technology, applied in the field of network security, can solve problems such as the inability to quickly meet the needs of new computer virus defense and the failure of computer system defense

Pending Publication Date: 2021-03-30
QI AN XIN SECURITY TECH ZHUHAI CO LTD +1
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the present invention provides a virus defense optimization method, device, storage medium, and computer equipment. Antivirus tools cannot quickly meet the defense needs of new computer viruses, resulting in the failure of computer system defense

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0058] The embodiment of the present invention provides a method for optimizing virus defense, such as figure 1 As shown, the method includes:

[0059] 101. Determine whether the feature information in the target file matches the defense feature information in the preset defense feature database.

[0060] In the embodiment of the present invention, the target file is a virus and Trojan horse file to be defended. When the current sys...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a virus defense optimization method and device, a storage medium and computer equipment, relates to the technical field of network security, and mainly aims to solve the problem that a targeted searching and killing tool is written only after virus features are stored in a virus library in existing computer virus defense, the defense requirement of the novel computer viruscannot be quickly met, and the defense of the computer system fails. The method comprises the steps of judging whether feature information in a target file is matched with defense feature informationin a preset defense feature library or not, and determining the defense feature information in the preset defense feature library according to expected searching and killing and / or repairing of suspicious files under different defense scenes; and if the feature information is matched with the defense feature information, calling a defense operation bound with the defense feature information, and executing the defense operation. The invention is mainly used for optimizing virus defense.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a virus defense optimization method and device, a storage medium, and computer equipment. Background technique [0002] With the increasing emphasis on network security, computer viruses such as virus Trojan horses that can cause harm to network security have gradually come into people's sight. Wherein, for the computer virus defense such as virus Trojan horse, obtain virus Trojan horse sample, extract feature, and this feature is configured as detection feature in the virus database, sends to security software, in order to complete the killing of virus Trojan horse. [0003] At present, the existing defense against computer viruses is only through storing the virus characteristics in the virus database and writing targeted killing tools, which cannot quickly meet the defense needs of new computer viruses, resulting in the failure of computer system defense, and the tech...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/563G06F21/568
Inventor 万仁国
Owner QI AN XIN SECURITY TECH ZHUHAI CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products