Suspicious file processing method and processing system

A processing method and processing system technology, applied in the direction of platform integrity maintenance, etc., can solve problems such as poor user experience, users cannot directly process files, etc., and achieve the effect of good user experience

Active Publication Date: 2021-10-29
BEIJING ANTIY NETWORK SAFETY TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the sandbox is a virtual system environment, it takes a certain amount of time to transfer files to the sandbox, wait for the analysis results after running, and then output the results to the local. During this period, users cannot directly process files, and the user experience is poor.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Suspicious file processing method and processing system
  • Suspicious file processing method and processing system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0026] The present invention is described below in conjunction with accompanying drawing.

[0027] figure 1 It is a flow chart of a suspicious file processing method according to an embodiment of the present invention. like figure 1 As shown, the processing method of the suspicious file of the embodiment of the present invention comprises the following steps:

[0028] S1: Upload the suspicious file to the analysis device, so that the analysis device can open the suspicious file in a restricted environment, and feed back the content of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a suspicious file processing method and processing system, wherein the suspicious file processing method includes: uploading the suspicious file to an analysis device, so that the analysis device can open the suspicious file in a restricted environment, and The content of the suspicious file is fed back to the user in a preset format; the content fed back by the analysis device is received so that the user can judge whether the suspicious file is safe. The present invention has the following advantages: by uploading the suspicious file to the external device, the external device will open it in a limited environment in a preset format, and then feed it back to the user, so that the user's operation will not be interrupted when the external device opens the suspicious file, and the user experience is good .

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a suspicious file processing method and processing system. Background technique [0002] Sandboxie (sandbox) is a virtual system program that allows a browser or other programs to be run in a sandbox environment, so that the changes produced by the operation can be deleted later. The sandbox creates an independent operating environment similar to a sandbox, and the programs running inside it cannot have a permanent impact on the hard disk. It is an isolated virtual environment that can be used to test untrusted applications or surf the web. [0003] The classic sandbox system generally intercepts system calls, monitors program behavior, and then controls and restricts the program's use of computer resources according to user-defined policies, such as rewriting the registry, reading and writing disks, and so on. [0004] The working principle of the sandbox: through...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/53
CPCG06F21/53
Inventor 李丹韩文奇王小丰肖新光
Owner BEIJING ANTIY NETWORK SAFETY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products