CN101276387A - 基于预定义健康运行环境的网络计算机防病毒系统 - Google Patents
基于预定义健康运行环境的网络计算机防病毒系统 Download PDFInfo
- Publication number
- CN101276387A CN101276387A CN 200810011407 CN200810011407A CN101276387A CN 101276387 A CN101276387 A CN 101276387A CN 200810011407 CN200810011407 CN 200810011407 CN 200810011407 A CN200810011407 A CN 200810011407A CN 101276387 A CN101276387 A CN 101276387A
- Authority
- CN
- China
- Prior art keywords
- running environment
- healthy
- software
- virus
- authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
Description
Claims (7)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200810011407 CN101276387A (zh) | 2008-05-15 | 2008-05-15 | 基于预定义健康运行环境的网络计算机防病毒系统 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200810011407 CN101276387A (zh) | 2008-05-15 | 2008-05-15 | 基于预定义健康运行环境的网络计算机防病毒系统 |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101276387A true CN101276387A (zh) | 2008-10-01 |
Family
ID=39995827
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 200810011407 Pending CN101276387A (zh) | 2008-05-15 | 2008-05-15 | 基于预定义健康运行环境的网络计算机防病毒系统 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101276387A (zh) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102195987A (zh) * | 2011-05-31 | 2011-09-21 | 成都七巧软件有限责任公司 | 一种基于软件产品库的分布式可信认证方法和系统 |
CN102419806A (zh) * | 2011-12-15 | 2012-04-18 | 武汉大学 | 一种虚拟机批量离线杀毒方法 |
CN105160244A (zh) * | 2012-09-19 | 2015-12-16 | 北京奇虎科技有限公司 | 一种文件处理方法和系统 |
-
2008
- 2008-05-15 CN CN 200810011407 patent/CN101276387A/zh active Pending
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102195987A (zh) * | 2011-05-31 | 2011-09-21 | 成都七巧软件有限责任公司 | 一种基于软件产品库的分布式可信认证方法和系统 |
CN102195987B (zh) * | 2011-05-31 | 2014-04-30 | 成都七巧软件有限责任公司 | 一种基于软件产品库的分布式可信认证方法和系统 |
CN102419806A (zh) * | 2011-12-15 | 2012-04-18 | 武汉大学 | 一种虚拟机批量离线杀毒方法 |
CN105160244A (zh) * | 2012-09-19 | 2015-12-16 | 北京奇虎科技有限公司 | 一种文件处理方法和系统 |
CN105160244B (zh) * | 2012-09-19 | 2019-02-22 | 北京奇安信科技有限公司 | 一种文件处理方法和系统 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kotov et al. | Anatomy of exploit kits: Preliminary analysis of exploit kits as software artefacts | |
US9886579B2 (en) | Method and system for proactive detection of malicious shared libraries via a remote reputation system | |
CN108768989A (zh) | 一种采用拟态技术的apt攻击防御方法、系统 | |
Ask et al. | Advanced persistent threat (APT) beyond the hype | |
Sharma et al. | Advanced Persistent Threats (APT): evolution, anatomy, attribution and countermeasures | |
Lewis | Raising the bar for cybersecurity | |
Marczak et al. | Champing at the cyberbit: Ethiopian dissidents targeted with new commercial spyware | |
Keong Ng et al. | VoterChoice: A ransomware detection honeypot with multiple voting framework | |
Prakash et al. | On the trustworthiness of memory analysis—an empirical study from the perspective of binary execution | |
Deng et al. | Lexical analysis for the webshell attacks | |
Zou et al. | An approach for detection of advanced persistent threat attacks | |
Reinhold et al. | Toward a Cyber Weapons Assessment Model—Assessment of the Technical Features of Malicious Software | |
Eom et al. | A framework of defense system for prevention of insider's malicious behaviors | |
Supriya et al. | Malware detection techniques: a survey | |
CN101276387A (zh) | 基于预定义健康运行环境的网络计算机防病毒系统 | |
Alsmadi | Cyber threat analysis | |
Davis et al. | A framework for programming and budgeting for cybersecurity | |
Bishnoi et al. | Comprehensive Assessment of Reverse Social Engineering to Understand Social Engineering Attacks | |
Ostler | Defensive cyber battle damage assessment through attack methodology modeling | |
Sun et al. | Classification of SQL injection attacks | |
Ramachandran et al. | Defence against crypto-ransomware families using dynamic binary instrumentation and DLL injection | |
Singhal | Analysis and Categorization of Drive-By Download Malware Using Sandboxing and Yara Ruleset | |
Deshpande et al. | Detection and Notification of Zero-Day attack to Prevent Cybercrime | |
Ahirao | Proactive technique for securing smart cities against malware attacks using static and dynamic analysis | |
Okul et al. | A review on cyber risk management |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
EE01 | Entry into force of recordation of patent licensing contract |
Assignee: Shenyang GeneralSoft Co.,Ltd. Assignor: Jin Kui Contract fulfillment period: 2009.6.1 to 2019.5.31 contract change Contract record no.: 2009210000181 Denomination of invention: Network computer anti-virus system based on predefined health operating environment License type: Exclusive license Record date: 2009.7.21 |
|
LIC | Patent licence contract for exploitation submitted for record |
Free format text: EXCLUSIVE LICENSE; TIME LIMIT OF IMPLEMENTING CONTACT: 2009.6.1 TO 2019.5.31; CHANGE OF CONTRACT Name of requester: SHENYANG GENERAL SOFT CO., LTD. Effective date: 20090721 |
|
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Open date: 20081001 |