Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Computer virus experimental method of supporting multiuser concurrency conrol in large scale

A computer virus and experimental method technology, applied in the field of information security, can solve the problems that have not yet been discovered and cannot support large-scale multiple users to concurrently access teaching experiments, etc., and achieve the effect of good promotion prospects, good scalability and security.

Inactive Publication Date: 2006-04-19
SHANGHAI JIAO TONG UNIV
View PDF1 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method belongs to the category of killing viruses based on behavioral results, and is used to guide the design and development of anti-virus products. It does not involve the method of forcing computer viruses and their simulated living environments to adapt to experiments, and cannot support large-scale concurrent access teaching experiments for multiple users.
In further searches, no literature reports identical or similar to the subject of the present invention have been found

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer virus experimental method of supporting multiuser concurrency conrol in large scale
  • Computer virus experimental method of supporting multiuser concurrency conrol in large scale
  • Computer virus experimental method of supporting multiuser concurrency conrol in large scale

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The system based on this method is divided into four parts, the client running on the user's computer, the Web server, the mail server and the database server. The web server side provides unified identity authentication services for users, determines the types of services available to users and ensures that the number of users served by the experimental system does not exceed the limit value. Users query typical virus sample information through the Web server, download virus samples and special virus removal tools, run the virus locally and spread it within a limited range by the mail server in the system, and the database server stores user information and experimental results. The realization of the technical solution of the present invention is described in detail below in conjunction with accompanying drawing:

[0022] 1. User Management

[0023] Because it is necessary to support hundreds of people to participate in the experiment at the same time, the user manag...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The method includes following three aspects: (1) user management: when user is in logging in, checking userí»s ID and cipher identifies userí»s ID; restricting total number of logging in user in one time; assigning authorities in different levels for users divided into administrator level and general level; building induced environment for meeting to virus trigger mechanism; (2) visualization and operability for virus infection and clearing away virus; dynamic procedure for capturing infection of virus and clearing away virus by combination of capturing attributive information, memory format map of file, and registration table monitoring; (3) controllable propagation of virus: in range of LAN, simulating Internet environment of propagating virus, planning propagation path as well as safeguarding and controlling range of virus propagation. Features are: large scale, concentrative management, visual, operability and controllability.

Description

technical field [0001] The invention relates to a method in the technical field of information security, in particular to a computer virus experiment method supporting large-scale multi-user concurrent control. Background technique [0002] At present, computer viruses have become an important factor that reduces the efficiency of computer use. The development of computer virus from stand-alone type to network type has enhanced its destructiveness, and at the same time, the scope of influence has increased. Various computer virus prevention and control hardware systems usually use methods to protect the physical address of computer hardware and prohibit illegal read and write operations to prevent computer virus infection and damage; computer virus prevention software uses virus signature codes to query, correct key values ​​​​of virus code changes, etc. However, these software and hardware virus prevention systems do not show users the complete operating mechanism and anti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00H04L29/00G06F21/50
Inventor 杨树堂陈健宁陆松年张宁郝黎明
Owner SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products