Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Virus identification method and apparatus

An identification method and technology to be identified, applied in the computer field, can solve the problems of hash value change and inability to complete calibration work, etc.

Inactive Publication Date: 2018-05-01
SHENZHEN TCL NEW-TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the process of researching related technologies, the inventor found that the above-mentioned method has the following problems: any change in any field in part or all of the content of the file to be identified will cause the corresponding hash value to change. Change
In the case of a very large number of virus variants, it is almost impossible to complete the corresponding calibration work

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Virus identification method and apparatus
  • Virus identification method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] It should be understood that the specific embodiments described here are only used to explain the present disclosure, not to limit the present disclosure.

[0025] The embodiment of the first aspect of the present disclosure provides a virus identification method, which can be executed by a processor in an electronic device, see figure 1 , the method mainly includes the following processes:

[0026] Step S11, performing feature extraction on the preset key content in the mobile phone file to be identified; the preset key content includes file content that may hide malicious codes;

[0027] Those in the relevant technical fields all know that some malicious codes may be hidden in some specific files, and these files are often not detected by the system. For example, some malicious code may be hidden in the tail comment of the APP format file, or some malicious code may be disguised as an empty directory and empty file inside and / or outside META-INF. In the process of r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the present disclosure relate to a virus identification method and apparatus. In at least one embodiment of the present disclosure, preset key content in a to-be-identified file is first extracted, and hash operations are performed on the extracted content. For virus files with the same type, as long as the preset key content is the same, even if there are some difference in the content of other parts, the hash values corresponding to the virus files are the same. Thus, only by setting a virus value corresponding to the hash value can complete the identification of a type of virus files, so that the corresponding calibration work can be reduced.

Description

technical field [0001] The embodiments of the present disclosure relate to the field of computer technology, and in particular, to a virus identification method and device. Background technique [0002] The rapid development of computer and network technology has greatly promoted information exchange. However, at the same time, computer viruses are constantly evolving and updating along with the development of technology. From the initial prank games to today, computer viruses have seriously threatened people's normal use of computers. Thus, how to prevent virus attack has become a focus of attention. [0003] The way of virus identification in the prior art is generally to establish a corresponding virus database in advance, and compare the virus database, and identify the file that matches the virus in the virus database as a virus; or artificially set corresponding rules to meet the The corresponding rule identifies the file as a virus. During implementation, the corre...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/56
CPCG06F21/562
Inventor 李振逢邹赞
Owner SHENZHEN TCL NEW-TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products