Method for recovering data damaged by virus programe, apparatus and virus clearing method

A technology for data recovery device and virus program, which is applied in the direction of electrical digital data processing, computer security device, digital data processing components, etc. recovery to wait

Inactive Publication Date: 2007-03-28
姜志远
View PDF1 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Third, if the virus program uses a special infection technique to keep the size of the host and the entry point on the host file header unchanged, the existing anti-virus programs can only delete it, but cannot conduct in-depth analysis and the host program's entry point. recover
[0007] Visible, the removal method of existing computer virus program can't be restored to the severely damaged host program, or the severely damaged data when removing virus program, thereby makes the computer after removing virus program can't be restored to infected virus as much as possible. previous state of the program

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for recovering data damaged by virus programe, apparatus and virus clearing method
  • Method for recovering data damaged by virus programe, apparatus and virus clearing method
  • Method for recovering data damaged by virus programe, apparatus and virus clearing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The core idea of ​​the present invention is: according to the acquired destructive behavior operation steps of the virus program, establish the corresponding reverse behavior operation steps, and execute the reverse behavior operation steps, so as to realize the reverse operation of the virus program operation, and then realize the anti-virus Stripping of programs and recovery of data damaged by viruses.

[0051]Referring to FIG. 1 , it is a flow chart of steps of the method for recovering data damaged by virus programs according to the present invention, including the following steps.

[0052] Step s1, obtaining executable destructive behavior operation steps of the virus program;

[0053] A virus program, like any computer program, has a series of source codes that can complete specific operations. A collection of multiple such source codes can be regarded as a source code sequence block that completes a specific function or result, as shown in Figure 2 A typical vir...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The method includes steps: obtaining operation steps of executable destructive behavior of virus program; building operation steps of converse behavior corresponding to the operation steps of destructive behavior; executing the said operation steps of converse behavior to recover data. The invention also discloses method for eliminating virus program is in use for cleaning out program to be tested besides for recovering data. Comparing methods for cleaning out virus programs, the disclosed method uses different operation steps of converse behavior to recover data destructed by virus program. Thus, after cleaning out virus programs, the invention recovers computer to the state before it infected by virus program as far as possible.

Description

technical field [0001] The invention relates to a data recovery method and device damaged by a virus program and a method for clearing the virus program. Background technique [0002] The existing removal methods for harmful computer programs basically adopt a "one size fits all" approach. The following examples illustrate several specific steps for the application of this method: [0003] First, if a certain file in a computer system itself is the executable body of a virus program, that is, the file is a pure virus program, then when it is confirmed that the file is a virus program, the file is directly deleted. [0004] Second, if the virus program attaches itself to the host program, for example, to the tail of the host program (in this way, the host program will increase in size), and modifies the entry point of the host program to activate the virus program, then it needs to The anti-virus anti-virus program finds the insertion point where the virus program is attache...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F1/00G06F21/56
CPCG06F21/568G06F11/1446
Inventor 白杰鲁征宇李薇
Owner 姜志远
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products