Methods and devices of killing malicious programs

A malicious program, killing technology, applied in the computer field, can solve problems such as not fundamentally cleared, user troubles, and ROM virus with high authority

Active Publication Date: 2017-12-26
三六零数字安全科技集团有限公司
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These malicious applications will privately send text messages to customize SP services, secretly consume data while connecting to the Internet, and then bombard advertisements to interfere with users
This undoubtedly caused confusion for users
[0006] However, the inventor found that the ROM virus has higher permissions and has the same permission attributes as system files. The current anti-virus method can only clear its files in memory. After the terminal restarts, it will be decomposed from the boot.img again. Compress and release it into the memory. For example, killing the virus may display "Series60kinsSupport: ROM software cannot be deleted". At present, there is no effective way to fundamentally remove the virus.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Methods and devices of killing malicious programs
  • Methods and devices of killing malicious programs
  • Methods and devices of killing malicious programs

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0094] The embodiment of the present invention provides a method for checking and killing malicious programs. The method can thoroughly remove some stubborn malicious programs by reflashing the mobile terminal, and it can be implemented on the PC through antivirus software, first aid systems of the antivirus software, and the like.

[0095] Wherein, in some ways of checking and killing (such as a first aid kit), the malicious program can be selected to be immune-processed, but this method can only eliminate the malicious behavior of the malicious program, but does not remove the malicious program from the system, and the present invention The method provided by the embodiment can eliminate this stubborn malicious program.

[0096] figure 1 It is a flow chart of a method for checking and killing malicious programs provided by an embodiment of the present invention, and the method includes steps S102 to S106.

[0097] S102. Obtain a specified file in the terminal operating sys...

Embodiment 2

[0103] This embodiment is a specific application scenario of the first embodiment above. Through this embodiment, the method provided by the present invention can be described more clearly and specifically. In this embodiment, the malicious program in the mobile terminal is checked and killed by a toolbox installed in the PC (for example, it can be a first-aid kit, and after the mobile terminal accesses the PC, the first-aid kit automatically starts a corresponding killing program). Take this as an example.

[0104] figure 2 It is a flow chart of a specific method for checking and killing malicious programs provided by an embodiment of the present invention, and the method includes steps S201 to S206.

[0105] It should be noted that since the method provided in this embodiment needs to complete the removal of malicious programs by re-flashing the mobile terminal, it is necessary to connect the mobile terminal to a PC and execute the flow of the method.

[0106] Taking Andr...

Embodiment 3

[0236] Figure 7 It is a structural block diagram of a device for checking and killing malicious programs provided by an embodiment of the present invention. The device 700 includes:

[0237] A file obtaining module 710, adapted to obtain a specified file in the terminal operating system;

[0238] A program scanning module 720, adapted to scan whether the specified file includes preset malicious program features;

[0239] The operation execution module 730 is adapted to execute the operation of reflashing the system partition of the operating system when the specified file contains preset malicious program features;

[0240] Wherein, the specified file is stored in the system partition.

[0241] Optionally, the system partition is a BOOT partition, and the designated file is a system file compressed package stored in the BOOT partition.

[0242] Optionally, the file obtaining module 710 is adapted to obtain a specified file in the terminal operating system in the following...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a malware searching and killing method and device. The method includes: acquiring a specified file in a terminal operation system; scanning whether preset malware features are included in the specified file or not; when the preset malware features are included in the specified file, executing operation of refreshing a system partition of the operation system; the specified file is stored in the system partition. By the method and device, when the preset malware features are protected in the file of a mobile terminal, malware such as ROM (read only memory) viruses registered in the operation system partition can be cleared thoroughly by execution of the operation for refreshing the operation system partition, the problem that the malware such as the ROM viruses cannot be searched and killed thoroughly is solved, the malware can be prevented from charging, causing traffic, popping up various spam and stealing user privacy, security and the like of mobile payment of users is guaranteed, and the malware which cannot be searched and killed normally by the mobile terminal antivirus engine can be cleared thoroughly.

Description

technical field [0001] The invention relates to the field of computers, in particular to a method and device for checking and killing malicious programs. Background technique [0002] At present, mobile terminals are more and more widely used, and there are more and more malicious programs targeting mobile terminals, and it is becoming more and more difficult to remove. [0003] The Android operating system is a mainstream operating system for mobile terminals. Its system file boot.img is stored in the BOOT partition in the form of a compressed package. When the terminal starts, the system file is decompressed and released into the memory to complete the operating system. of loading. [0004] The ROM mentioned here refers to the system firmware of various mobile devices such as mobile phones and tablet computers. After the user unlocks the mobile phone, the system firmware of the device can be replaced. So there is the term "flash", which is actually writing a new ROM, tha...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56
CPCG06F21/56G06F21/568
Inventor 董清白彦庚李伟
Owner 三六零数字安全科技集团有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products