Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Virus detection method and device for hijacking system preloading configuration

A virus detection and preloading technology, applied in the field of network security, can solve problems such as threats to user security, and achieve the effect of ensuring user security

Pending Publication Date: 2022-03-08
SUZHOU LANGCHAO INTELLIGENT TECH CO LTD
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The invention provides a virus detection method and device for hijacking system pre-loaded configuration, which is used to solve the problem that rootkit Trojans threaten user security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Virus detection method and device for hijacking system preloading configuration
  • Virus detection method and device for hijacking system preloading configuration

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] In order to clearly illustrate the technical features of this solution, the present invention will be described in detail below through specific implementation modes and in conjunction with the accompanying drawings. The following disclosure provides many different embodiments or examples for implementing different structures of the present invention. To simplify the disclosure of the present invention, components and arrangements of specific examples are described below. Furthermore, the present invention may repeat reference numerals and / or letters in different instances. This repetition is for the purpose of simplicity and clarity and does not in itself indicate a relationship between the various embodiments and / or arrangements discussed. It should be noted that components illustrated in the figures are not necessarily drawn to scale. Descriptions of well-known components and processing techniques and processes are omitted herein to avoid unnecessarily limiting the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a virus detection method and device for hijacking system preloading configuration. The method comprises the following steps: detecting real-time data of system preloading configuration information; comparing the real-time data with an initial value of system loading configuration, and judging whether the real-time data is changed or not; if the real-time data changes and the specific value of the real-time data cannot be obtained, the system preloading configuration is hijacked. According to the method, the real-time data of the system preloading configuration information is detected and compared with the initial value, when the configuration information is updated, the updated specific data is further obtained, and if the environment variable changes or the specific value of the configuration file cannot be obtained, it is detected that the system preloading configuration is hijacked. The virus threat can be accurately and quickly detected, and the user safety is ensured.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a virus detection method and device for hijacking system preload configuration. Background technique [0002] Rootkit Trojan horse virus is one of the most popular Trojan horse virus. It is widely used by hackers and viruses for its excellent performance in hiding files, ports, processes, and clearing traces. [0003] There are two main categories of rootkit Trojan horses, one is kernel-mode and the other is user-mode. The detection method of the rootkit Trojan horse in the kernel state has been widely concerned, but the detection and protection of the rootkit Trojan horse based on the user state have not been paid attention to, which seriously threatens the security of users. Contents of the invention [0004] The invention provides a virus detection method and device for hijacking system pre-loading configuration, which are used to solve the problem that rootkit Tr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/56
CPCG06F21/566
Inventor 张彬
Owner SUZHOU LANGCHAO INTELLIGENT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products