CN1801033A - Computer virus checking and killing method based on data stream - Google Patents
Computer virus checking and killing method based on data stream Download PDFInfo
- Publication number
- CN1801033A CN1801033A CN 200510101378 CN200510101378A CN1801033A CN 1801033 A CN1801033 A CN 1801033A CN 200510101378 CN200510101378 CN 200510101378 CN 200510101378 A CN200510101378 A CN 200510101378A CN 1801033 A CN1801033 A CN 1801033A
- Authority
- CN
- China
- Prior art keywords
- virus
- killing
- file
- data stream
- checking
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 241000700605 Viruses Species 0.000 title claims abstract description 140
- 238000000034 method Methods 0.000 title claims abstract description 66
- 239000002574 poison Substances 0.000 claims description 16
- 231100000614 poison Toxicity 0.000 claims description 16
- 230000003612 virological effect Effects 0.000 claims description 11
- 238000000605 extraction Methods 0.000 claims 1
- 230000003467 diminishing effect Effects 0.000 abstract 5
- 230000003292 diminished effect Effects 0.000 abstract 1
- 239000000284 extract Substances 0.000 description 6
- 230000035772 mutation Effects 0.000 description 5
- 241000726445 Viroids Species 0.000 description 3
- 230000000840 anti-viral effect Effects 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 238000004458 analytical method Methods 0.000 description 2
- 238000012512 characterization method Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000001914 filtration Methods 0.000 description 2
- 230000002155 anti-virotic effect Effects 0.000 description 1
- 238000004883 computer application Methods 0.000 description 1
- 230000003203 everyday effect Effects 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
Landscapes
- Measuring Or Testing Involving Enzymes Or Micro-Organisms (AREA)
Abstract
Description
Claims (8)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2005101013781A CN100422900C (en) | 2005-11-17 | 2005-11-17 | Computer virus checking and killing method based on data stream |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2005101013781A CN100422900C (en) | 2005-11-17 | 2005-11-17 | Computer virus checking and killing method based on data stream |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1801033A true CN1801033A (en) | 2006-07-12 |
CN100422900C CN100422900C (en) | 2008-10-01 |
Family
ID=36811077
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB2005101013781A Active CN100422900C (en) | 2005-11-17 | 2005-11-17 | Computer virus checking and killing method based on data stream |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN100422900C (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102073815A (en) * | 2010-12-27 | 2011-05-25 | 奇瑞汽车股份有限公司 | Vehicle-mounted antivirus system and antivirus method |
CN101373502B (en) * | 2008-05-12 | 2012-06-20 | 公安部第三研究所 | Automatic analysis system of virus behavior based on Win32 platform |
CN102945342A (en) * | 2012-09-29 | 2013-02-27 | 北京奇虎科技有限公司 | Method, device and terminal equipment for progress identification |
CN101599947B (en) * | 2008-06-06 | 2014-04-23 | 盛趣信息技术(上海)有限公司 | Trojan horse virus scanning method based on WEB page |
CN111191233A (en) * | 2019-07-31 | 2020-05-22 | 腾讯科技(深圳)有限公司 | Macro virus processing method, macro virus processing device and storage medium |
CN112149115A (en) * | 2020-08-28 | 2020-12-29 | 杭州安恒信息技术股份有限公司 | Method and device for updating virus library, electronic device and storage medium |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6006329A (en) * | 1997-08-11 | 1999-12-21 | Symantec Corporation | Detection of computer viruses spanning multiple data streams |
CN1282083C (en) * | 2001-09-14 | 2006-10-25 | 北京瑞星科技股份有限公司 | Computer memory virus monitoring method and method for operation with virus |
CN1284089C (en) * | 2003-08-22 | 2006-11-08 | 童勤业 | Virus-preventive, software and hardware realizing method for structure-variable structure |
-
2005
- 2005-11-17 CN CNB2005101013781A patent/CN100422900C/en active Active
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101373502B (en) * | 2008-05-12 | 2012-06-20 | 公安部第三研究所 | Automatic analysis system of virus behavior based on Win32 platform |
CN101599947B (en) * | 2008-06-06 | 2014-04-23 | 盛趣信息技术(上海)有限公司 | Trojan horse virus scanning method based on WEB page |
CN102073815A (en) * | 2010-12-27 | 2011-05-25 | 奇瑞汽车股份有限公司 | Vehicle-mounted antivirus system and antivirus method |
CN102073815B (en) * | 2010-12-27 | 2013-11-20 | 奇瑞汽车股份有限公司 | Vehicle-mounted antivirus system and antivirus method |
CN102945342A (en) * | 2012-09-29 | 2013-02-27 | 北京奇虎科技有限公司 | Method, device and terminal equipment for progress identification |
CN102945342B (en) * | 2012-09-29 | 2015-08-05 | 北京奇虎科技有限公司 | Progress recognizing method, device and terminal device |
CN111191233A (en) * | 2019-07-31 | 2020-05-22 | 腾讯科技(深圳)有限公司 | Macro virus processing method, macro virus processing device and storage medium |
CN111191233B (en) * | 2019-07-31 | 2024-05-24 | 腾讯科技(深圳)有限公司 | Macro virus processing method, device and storage medium |
CN112149115A (en) * | 2020-08-28 | 2020-12-29 | 杭州安恒信息技术股份有限公司 | Method and device for updating virus library, electronic device and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN100422900C (en) | 2008-10-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9715588B2 (en) | Method of detecting a malware based on a white list | |
Bayer et al. | Scalable, behavior-based malware clustering. | |
CN101923617B (en) | Cloud-based sample database dynamic maintaining method | |
Bayer et al. | Improving the efficiency of dynamic malware analysis | |
CN1801033A (en) | Computer virus checking and killing method based on data stream | |
RU2607231C2 (en) | Fuzzy whitelisting anti-malware systems and methods | |
RU2580036C2 (en) | System and method of making flexible convolution for malware detection | |
Ackling et al. | Evolving patches for software repair | |
US8352484B1 (en) | Systems and methods for hashing executable files | |
US20110154495A1 (en) | Malware identification and scanning | |
US10191726B2 (en) | Biosequence-based approach to analyzing binaries | |
US11522885B1 (en) | System and method for information gain for malware detection | |
US11574054B2 (en) | System, method and apparatus for malicious software detection | |
US8473461B1 (en) | File infection removal by differential copy | |
CN109583201A (en) | The system and method for identifying malice intermediate language file | |
CN1178131C (en) | Modular system and method of updating application software in execution | |
Shi et al. | Quality-score guided error correction for short-read sequencing data using CUDA | |
CN1743990A (en) | Transplatform virus detecting and killing method | |
CN102982043A (en) | Processing method and device for portable execute (PE) files | |
EP2819054B1 (en) | Flexible fingerprint for detection of malware | |
CN103501294B (en) | The determining program whether method of malice | |
Mokhov et al. | File type analysis using signal processing techniques and machine learning vs. file unix utility for forensic analysis | |
RU101224U1 (en) | SYSTEM OF IDENTIFICATION AND MINIMIZATION OF RISK OF FALSE WORKS | |
CN103106366A (en) | Dynamic maintenance method of sample database based on cloud | |
RU2614561C1 (en) | System and method of similar files determining |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C56 | Change in the name or address of the patentee | ||
CP01 | Change in the name or title of a patent holder |
Address after: Jinshan computer Building No. 8 Jingshan Hill Road, Lane 519015 Lianshan Jida Zhuhai city in Guangdong Province Patentee after: Zhuhai Kingsoft Software Co.,Ltd. Address before: Jinshan computer Building No. 8 Jingshan Hill Road, Lane 519015 Lianshan Jida Zhuhai city in Guangdong Province Patentee before: Zhuhai Kingsoft Software Co.,Ltd. |
|
ASS | Succession or assignment of patent right |
Owner name: ZHUHAI JUNTIAN ELECTRONICS TECHNOLOGY CO., LTD. Free format text: FORMER OWNER: ZHUHAI KINGSOFT SOFTWARE CO., LTD. Effective date: 20110426 |
|
C41 | Transfer of patent application or patent right or utility model | ||
COR | Change of bibliographic data |
Free format text: CORRECT: ADDRESS; FROM: 519015 KINGSOFT COMPUTER BUILDING, NO. 8, LIANSHAN LANE, JINGSHAN ROAD, JIDA, ZHUHAI CITY, GUANGDONG PROVINCE TO: 519015 KINGSOFT COMPUTER BUILDING, NO. 8, LIANSHAN LANE, JINGSHAN ROAD, JIDA, ZHUHAI, GUANGDONG |
|
TR01 | Transfer of patent right |
Effective date of registration: 20110426 Address after: 519015 Guangdong Zhuhai, Jingshan Hill Road, Lane 8, Jinshan building computer Lianshan Patentee after: ZHUHAI JUNTIAN ELECTRONIC TECHNOLOGY Co.,Ltd. Address before: Jinshan computer Building No. 8 Jingshan Hill Road, Lane 519015 Lianshan Jida Zhuhai city in Guangdong Province Patentee before: Zhuhai Kingsoft Software Co.,Ltd. |
|
ASS | Succession or assignment of patent right |
Owner name: BEIKE INTERNET (BEIJING) SECURITY TECHNOLOGY CO., Free format text: FORMER OWNER: ZHUHAI JUNTIAN ELECTRONICS TECHNOLOGY CO., LTD. Effective date: 20140704 Owner name: BEIJING GOLDEN HILL NETWORK TECHNOLOGY CO., LTD. K Effective date: 20140704 |
|
C41 | Transfer of patent application or patent right or utility model | ||
COR | Change of bibliographic data |
Free format text: CORRECT: ADDRESS; FROM: 519015 ZHUHAI, GUANGDONG PROVINCE TO: 100041 SHIJINGSHAN, BEIJING |
|
TR01 | Transfer of patent right |
Effective date of registration: 20140704 Address after: 100041 Beijing, Shijingshan District Xing Xing street, building 30, No. 3, building 2, A-0071 Patentee after: SHELL INTERNET (BEIJING) SECURITY TECHNOLOGY Co.,Ltd. Patentee after: BEIJING KINGSOFT NETWORK TECHNOLOGY Co.,Ltd. Patentee after: BEIJING KINGSOFT INTERNET SECURITY SOFTWARE Co.,Ltd. Patentee after: CONEW NETWORK TECHNOLOGY (BEIJING) Co.,Ltd. Patentee after: ZHUHAI JUNTIAN ELECTRONIC TECHNOLOGY Co.,Ltd. Address before: Jinshan computer Building No. 8 Jingshan Hill Road, Lane 519015 Lianshan Jida Zhuhai city in Guangdong Province Patentee before: Zhuhai Juntian Electronic Technology Co.,Ltd. |
|
CP01 | Change in the name or title of a patent holder |
Address after: 100041 A-0071, 2nd floor, No. 3 Courtyard, 30 Shixing Street, Shijingshan District, Beijing Co-patentee after: Beijing Cheetah Network Technology Co.,Ltd. Patentee after: Beijing Cheetah Mobile Technology Co.,Ltd. Co-patentee after: BEIJING KINGSOFT INTERNET SECURITY SOFTWARE Co.,Ltd. Co-patentee after: CONEW NETWORK TECHNOLOGY (BEIJING) Co.,Ltd. Co-patentee after: ZHUHAI JUNTIAN ELECTRONIC TECHNOLOGY Co.,Ltd. Address before: 100041 A-0071, 2nd floor, No. 3 Courtyard, 30 Shixing Street, Shijingshan District, Beijing Co-patentee before: BEIJING KINGSOFT NETWORK TECHNOLOGY Co.,Ltd. Patentee before: SHELL INTERNET (BEIJING) SECURITY TECHNOLOGY Co.,Ltd. Co-patentee before: BEIJING KINGSOFT INTERNET SECURITY SOFTWARE Co.,Ltd. Co-patentee before: CONEW NETWORK TECHNOLOGY (BEIJING) Co.,Ltd. Co-patentee before: ZHUHAI JUNTIAN ELECTRONIC TECHNOLOGY Co.,Ltd. |
|
CP01 | Change in the name or title of a patent holder | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20181226 Address after: 519031 Room 105-53811, No. 6 Baohua Road, Hengqin New District, Zhuhai City, Guangdong Province Patentee after: Zhuhai Leopard Technology Co.,Ltd. Address before: 100041 A-0071, 2nd floor, No. 3 Courtyard, 30 Shixing Street, Shijingshan District, Beijing Co-patentee before: Beijing Cheetah Network Technology Co.,Ltd. Patentee before: Beijing Cheetah Mobile Technology Co.,Ltd. Co-patentee before: BEIJING KINGSOFT INTERNET SECURITY SOFTWARE Co.,Ltd. Co-patentee before: CONEW NETWORK TECHNOLOGY (BEIJING) Co.,Ltd. Co-patentee before: ZHUHAI JUNTIAN ELECTRONIC TECHNOLOGY Co.,Ltd. |