Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method for checking and killing new computer virus using independent operation system

An operating system and virus technology, applied in the field of network communication technology, can solve problems such as the inability to upgrade the virus signature database, endanger the normal use of the user's computer, and hinder the normal connection of the network, etc., to achieve the effect of simplifying the process and improving efficiency

Inactive Publication Date: 2005-08-03
BEIJING HELP NOW
View PDF0 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the ways of virus transmission, intrusion methods, and camouflage methods are constantly changing. All anti-virus and anti-virus programs are relatively passive. New viruses are produced first, and methods of checking and killing viruses are born later. It is necessary to update the virus signature database frequently in order to check and kill the latest viruses, but there is still a gap because the virus is one step ahead in time, and the most convenient way to update and upgrade the virus signature database is to upgrade online through the Internet, but many Viruses, such as: worms, will hinder the normal connection of the network when they invade and attack, or shock wave viruses, will forcibly interrupt the network and shut down the system, making it impossible to upgrade the virus signature database. There are also some viruses, such as: five poisonous insects, When an attack occurs, the system process of well-known anti-virus software will be shut down first, and multiple program processes that protect each other will be started, and the program will be set as the highest priority program or bound to key system processes, etc. Yes, it is not uncommon for the anti-virus program under the Windows system platform to fail, thereby endangering the normal use of the user's computer.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for checking and killing new computer virus using independent operation system
  • Method for checking and killing new computer virus using independent operation system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0010] In the present, a new worm virus bypasses the traditional virus firewall (because the update of traditional antivirus software and the virus signature database always lags behind the development of the virus) and infects the user's computer with the attachment of the email, and is activated in the memory , frequently sending out a large amount of data, causing the user's computer system resources to be exhausted, and blocking the external network connection, making the user unable to visit the anti-virus software upgrade website after the virus is discovered, and unable to obtain the latest virus signature database or Designed to kill tools to stop the destruction and spread of viruses. Or because of the shock wave virus, exploiting Windows system vulnerabilities to attack and destroy the RPC service process, causing the user's computer to be forcibly shut down after 60 seconds after it is turned on, making the computer unusable. Or the five-drug insect virus, when infe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The computer virus checking and killing system includes independent operation system, virus checking and killing client terminal and remote updating server, and features that the virus checking and killing client terminal adopts the independent operation system as operation platform. The independent operation system is independent on the computer hard disc operation system, will not be infected by the Windows virus, and has independent identification, driving of the computer hardware, boosting the desk environment, network environment monitoring, log-on of Internet and operation of virus checking and killing client terminal. The virus checking and killing client terminal includes virus checking and killing module, virus characteristic library and first communication module. The remote updating server includes new virus characteristic library and the second communication module for communication to the first one and transferring the new virus characteristic library.

Description

technical field [0001] The present invention relates to independent operating system technology, antivirus technology, network communication technology Background of the invention [0002] While computer operating systems and application programs are constantly updated and upgraded, computer viruses are also constantly being refurbished. Viruses and Trojan horse programs that use new transmission channels, new concealment mechanisms, and new protection and camouflage techniques emerge in endlessly, especially in the era of rapid Internet popularization. A large number of viruses and Trojan horses abandon the original relatively slow file transmission method, and use the convenience of the network to quickly copy and spread. In addition, the Microsoft Windows operating system, which is commonly used in personal computers, has many loopholes in itself, such as system buffer overflow. , RPC service loopholes, etc., have opened the door for the spread and destruction of viruses ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F1/00H04L12/24
Inventor 张林
Owner BEIJING HELP NOW
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products