Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Macro-virus searching and killing method and system

A technology for virus detection and macro virus detection, applied in the field of macro virus detection and killing methods and systems, can solve the problems of high protection difficulty, affecting detection and killing efficiency, low detection and killing efficiency, etc., so as to improve the ability to resist macro viruses and comprehensively Virus killing effect, the effect of avoiding the spread of macro virus

Active Publication Date: 2013-09-11
BEIJING QIANXIN TECH
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] First, the macro virus is very easy to spread in the intranet, and it is difficult to protect
The circulation of office documents is one of the most common ways to transmit office data. Numerous office documents are transmitted from the superior to the grassroots in the form of a pyramid, and the grassroots interact with each other continuously. This flow of office documents is faithful Spread and replicate macro viruses rapidly, leaving IT administrators helpless
[0005] Second, macro viruses can destroy key data in the intranet, causing severe damage and large-scale loss of data in the intranet. It is difficult and time-consuming to restore
[0008] The current method to solve the macro virus in the enterprise is to deploy anti-virus tools on the intranet client. However, due to the extremely fast mutation of the macro virus, if you want to follow the speed of the macro virus mutation, you need to update it in a considerable process. The macro virus database is updated at a fast speed, which makes the macro virus database stored in the terminal become larger and bloated, which affects the efficiency of scanning and killing, and even affects the normal operation of the terminal system
In addition, if the terminal in the intranet cannot connect to the Internet, it can only connect to the management terminal to update the macro virus database, which is less efficient in killing and cannot quickly resist the variant macro virus

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Macro-virus searching and killing method and system
  • Macro-virus searching and killing method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0050] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough underst...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a macro-virus searching and killing method and system applied to an enterprise-edition virus searching and killing application program. The macro-virus searching and killing method comprises the steps of monitoring specific-type document opening operation through an enterprise-edition client-side, wherein specific-type documents include office software documents; intercepting a request for target document opening when the request is monitored and uploading a target document to the enterprise-edition client-side; judging whether the target document carries macro-virus or not through the enterprise-edition client-side; and sending a processing instruction to the enterprise-edition client-side according to a judgment result. By means of the macro-virus searching and killing method and system, macro-virus propagation inside an enterprise network can be effectively prevented.

Description

technical field [0001] The invention relates to the technical field of computer security, in particular to a macro virus checking and killing method and system. Background technique [0002] A macro virus is a set of one or more macros with virus characteristics specially developed by virus creators by taking advantage of the openness of Microsoft Office, that is, the BASIC programming interface provided in Office. This collection of virus macros will affect the use of computers, and can self-replicate and spread through DOC documents and DOT templates. Once the document infected with the macro virus is opened, its macro will be executed, and the macro virus will be activated, further transferred to the computer, and reside on the Normal template. From then on, all autosaved documents will be "infected" with this macro virus, and if another user opens the infected document, the macro virus will be transferred to his computer. [0003] With Microsoft's revision of Office97 ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/561G06F21/568G06F2221/033G06F21/56H04L63/1408H04L63/145G06F21/566H04L63/1425
Inventor 刘娇
Owner BEIJING QIANXIN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products