CN101989320B - Computer file processing method - Google Patents

Computer file processing method Download PDF

Info

Publication number
CN101989320B
CN101989320B CN201010504125XA CN201010504125A CN101989320B CN 101989320 B CN101989320 B CN 101989320B CN 201010504125X A CN201010504125X A CN 201010504125XA CN 201010504125 A CN201010504125 A CN 201010504125A CN 101989320 B CN101989320 B CN 101989320B
Authority
CN
China
Prior art keywords
electric signal
file
proportion
ratio
computer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201010504125XA
Other languages
Chinese (zh)
Other versions
CN101989320A (en
Inventor
李彬杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201010504125XA priority Critical patent/CN101989320B/en
Publication of CN101989320A publication Critical patent/CN101989320A/en
Application granted granted Critical
Publication of CN101989320B publication Critical patent/CN101989320B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention provides a computer file processing method which comprises the following steps: converting a first file to a first electrical signal; compressing the first electrical signal on a frequency domain according to proportion; filtering the first electrical signal after compression; expanding the electrical signal after filtering to a second electrical signal according to the proportion; and converting the second electrical signal to a second file. By adopting the method, the damaged computer files can be completely or partially recovered well, and the use of the method for recoveringthe files infected with computer virus and carrying out encryption and decryption on important files can greatly improve the security of the computer files.

Description

The computer documents disposal route
Technical field
The present invention relates to the computer documents disposal route.
Background technology
No matter be in daily productive life, still in commander's control of modern war, communication for intelligence, the effect of computer technology all is dispersed throughout each trickle corner, is bringing into play irreplaceable effect constantly.People generate, transmit, handle and storage information and data with computing machine, have not only saved the space, have improved efficient, file can be stored for a long time and can not be subjected to the influence of surrounding environment.When bringing benefit, how to prevent the existence of problem, especially computer virus that the destroyed people of also becoming of computer documents more and more are concerned about, brought uncertain threat for people's work and life.As far back as the end of the sixties, U.S. Rand Corporation just once submitted a report to U.S. Department of Defense, point out that computing machine is very important in the problem already of secure context, in decades ever since, in development constantly, gas defence, antivirus software that the company in how tame virus defense field sells also are applied in the computer system of each family expenses or specific use already always in the research of computer security technique.
Want defend against computer virus on the one hand, on the other hand, how after File Infection virus ruined file to be recovered also is very important problem, for there not being the suitably vital document of backup, recover if can compare accurately it, then may retrieve very big loss, reduce the infringement that virus is brought.
Computer virus of today is diversified, is difficult to find a kind of method of generally using all files that infected computer virus are identified and to be recovered.But different virus often has certain similarity again, starts with from this similarity, often can find the effective ways that the computer documents that has infected a certain viroid is recovered.One viroid (such as worm-type virus) is arranged by normal computer documents being invaded and destroying computer documents in p of E massive duplication data.For PI the apocrypha of this computer virus, can judge whether apocrypha has infected this viroid by judging the matching degree between apocrypha and the normal file.Whether infected this viroid since can identify computer documents, again its mode of infection there has been Preliminary study, if can have a kind ofly to judging the method that the file that infected this viroid recovers, must the harm that this viroid uses computing machine to bring to the mankind will be reduced greatly so.Meanwhile; may need to use different basis functions or basic signal to recover to different files; so; if can recover certain ruined file by specific method; we can utilize this " destruction " method to come the file that needs protection is encrypted equally; when not knowing specific file restoration methods (such as not knowing how to select basis function or fundamental frequency), then can't be decrypted file.In this case, a kind of like this computer documents disposal route can also can be used as a kind of encryption, decryption method of computer documents on the other hand as the restoration methods of the computer documents that has infected specific virus on the one hand.
Summary of the invention
The present invention has proposed a kind of computer documents disposal route just at the problems referred to above.
The present invention proposes a kind of computer documents disposal route, this method comprises described first file conversion is become first electric signal; On frequency domain, in proportion this first electric signal is compressed; First electric signal through overcompression is filtered; To expand to second electric signal in proportion through the electric signal that filters; And convert this second electric signal to second file.
Method by the present invention's proposition, earlier computer documents being carried out suitable compression filters again, can recover wholly or in part ruined computer documents well, this method is used for that file to infected by computer virus recovers and vital document is encrypted and decipher the security that can improve computer documents greatly.
Description of drawings
Fig. 1 is the process flow diagram according to computer documents disposal route of the present invention;
Fig. 2 is simulating signal synoptic diagram according to an embodiment of the present;
Fig. 3 is electric impulse signal synoptic diagram according to an embodiment of the present;
Fig. 4 is biological ripple signal schematic representation according to an embodiment of the present;
Embodiment
The process flow diagram of computer documents disposal route proposed by the invention has been shown among Fig. 1.
In step 110, described first file conversion is become first electric signal.
In this step, earlier first representation of file is become binary mode, this binary mode is modulated to forms first electric signal on the electric signal then.Wherein can change first electric signal by digital signal controller (DSC) device.
In step 120, on frequency domain, in proportion this first electric signal is compressed.
In this step, in compression, also in proportion the electric signal amplitude to be amplified, the ratio of wherein said amplification and the ratio of described compression are reciprocal each other.
Specifically, the effect of this step is under the constant situation of the region area between holding signal spectrum curve and the coordinate axis, makes the frequency of violent change more outstanding, so that select in the filtration step subsequently.Need to prove, the ratio difference of compression, therefore the part that filters out in filtration step subsequently will be different, in order to access the file of wanting after filtering, can carry out in advance setting to the ratio of described compression.
In one embodiment of the invention, by MedLab bio signal device electric signal is converted to biological ripple signal, thereby realizes the compression to electric signal.
In step 130, first electric signal through overcompression is filtered.
In the step of in proportion first electric signal through overcompression being filtered, will in first electric signal of overcompression, amplitude filter fully above the part of threshold value.Wherein, described threshold value can be fixed value, also can preestablish before each the filtration.
In step 140, will expand to second electric signal in proportion through the electric signal that filters.
In this step, the ratio of described expansion and the ratio of described compression are reciprocal each other, and in proportion the electric signal amplitude are dwindled, and described ratio of dwindling equals the ratio of described compression.This step is recovering step, will recover according to the process opposite with compression step through the electric signal that filters.
In step 150, convert this second electric signal to second file.
In this step, from described second electric signal, demodulate binary mode earlier, convert this binary mode to second file then.
In computer documents disposal route provided by the invention, can also may further comprise the steps: before described first file conversion is become first electric signal, by pre-defined rule source document is revised as first file.
In this step, at first source document is carried out " destruction ", the rule of destruction is predefined, by way of example, can the precalculated position predetermined field of adding in the binary mode of described source document destroy.
Can also recover the file after destroying according to above method by this pre-defined rule equally, if the ratio of described compression is selected suitably (relevant with pre-defined rule) with threshold value, just can will reduce fully through the file that destroys.By this method, can realize safety encipher (i.e. " destruction " step) and deciphering (being recovering step) to source document.
Come above method is carried out more careful description with a kind of specific embodiment below, following program is to have infected the partial code of the example procedure of log.exe mutation trojan horse:
{ all files on the traversal disk }
procedure?InfectFiles;
var
DriverList:string;
i,Len:Integer;
begin
ifGetACP=932then
IsJap:=True;
DriverList?:=GetDrives
Len:=Length(DriverList);
while?True?do
begin
for?i:=Len?downto?1?do
LoopFiles(DriverList+′:\′,′*.*′);
SendMail;
Sleep(1000*60*5);
end;
Wherein
IsJap:=True;
Len:=Length(DriverList);
while?True?do
LoopFiles(DriverList+′:\′,′*.*′);
SendMail;
Sleep(1000*60*5);
For infecting the problem statement that virus is brought.
Whole example partly is converted into binary code:
101000011100101101111110010011101011100011110010110010011101110110011011001011100011111010010001101101001110110011001011110011011101110100000101001111111111010101101011110110011011011101110010001010100101110101101011010101111011111111011001100100110011011001110110111111100001110001111001011100111111100111110110011111011010101101110111001011101011100101100110110010101010010101011010110101011110110001100001110001011000111100100111111111111110100000011011111110001110001111001011001110100101010011001001110101000010100101010100101011100110110011101001111010000101000110111111111001111011111110000111000111100101111111111010011101010110011011010001101010110110011011101110001010100101010110101101010111100011010001111001000100100110010101001011100110010110001111111111111111110101101011110110011011011111111111110001000010100010010001101001001100010110001111001001100101110011011001111000110100011110010001001001100101010010111001100111011011101111111000111100111110101011010101101110111001011101101111010111110101100010110101011100101111011000001100010110010100011010001111001000100100110010101001011010010101001100100111010100001010011110101001010111001100。
Can obtain simulating signal (as shown in Figure 2) by the DSC signal acquiring system, by electrical signal processing system above-mentioned signal is converted into electric impulse signal (as shown in Figure 3) again, be converted into biological ripple signal (as shown in Figure 4) by the MedLAB device again.
9-10Hz, 15Hz, 23-25Hz, 37-39Hz, 65-68Hz, 72-77Hz and 86-90Hz have exceeded specific threshold (being 0 in the present embodiment) as can be seen from Figure 4, so these values are filtered, calculate and can obtain by waveform, the corresponding simulating signal of the problems referred to above waveform is unusual place among Fig. 2 just, and namely 25,185,300,380,385,400,500 places.It is corresponding to statement
IsJap:=True;
Len:=Length(DriverList);
while?True?do
LoopFiles(DriverList+′:\′,′*.*′);
SendMail;
Sleep(1000*60*5)。
Successfully virus is filtered by above process.
Method by the present invention's proposition, earlier computer documents being carried out suitable compression filters again, can recover wholly or in part ruined computer documents well, this method is used for that file to infected by computer virus recovers and vital document is encrypted and decipher the security that can improve computer documents greatly.

Claims (4)

1. computer documents disposal route, this method comprises:
First file conversion is become first electric signal;
On frequency domain, in proportion this first electric signal is compressed;
First electric signal through overcompression is filtered;
To expand to second electric signal in proportion through the electric signal that filters; And
Convert this second electric signal to second file, wherein
Described first file conversion is being become in the step of first electric signal, earlier described first representation of file is being become binary mode, this binary mode is being modulated to forms first electric signal on the electric signal then;
In the step that this first electric signal is compressed, also in proportion the electric signal amplitude to be amplified, the ratio of wherein said amplification and the ratio of described compression are reciprocal each other;
In the step of in proportion first electric signal through overcompression being filtered, will in first electric signal of overcompression, amplitude filter fully above the part of threshold value;
To expand in proportion in the process of second electric signal through the electric signal that filters, the ratio of described expansion and the ratio of described compression are reciprocal each other, and in proportion the electric signal amplitude are dwindled, and described ratio of dwindling equals the ratio of described compression; And
This second electric signal is being converted in the step of second file, from described second electric signal, modulating binary mode earlier, converting this binary mode to second file then.
2. method according to claim 1, this method also are included in described first file conversion are become before first electric signal, by pre-defined rule source document are revised as first file.
3. method according to claim 2 is wherein determined ratio and/or the described threshold value of described compression, so that described second file is identical with described source document according to described pre-defined rule.
4. method according to claim 2, wherein said pre-defined rule are that the precalculated position in the binary mode of described source document adds predetermined field.
CN201010504125XA 2010-10-12 2010-10-12 Computer file processing method Expired - Fee Related CN101989320B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201010504125XA CN101989320B (en) 2010-10-12 2010-10-12 Computer file processing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010504125XA CN101989320B (en) 2010-10-12 2010-10-12 Computer file processing method

Publications (2)

Publication Number Publication Date
CN101989320A CN101989320A (en) 2011-03-23
CN101989320B true CN101989320B (en) 2013-09-25

Family

ID=43745852

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010504125XA Expired - Fee Related CN101989320B (en) 2010-10-12 2010-10-12 Computer file processing method

Country Status (1)

Country Link
CN (1) CN101989320B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105938535A (en) * 2015-09-18 2016-09-14 重庆邮电大学 Processing method for improving safety of computer files

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2039652C (en) * 1990-05-30 1996-12-24 Frank Zdybel, Jr. Hardcopy lossless data storage and communications for electronic document processing systems
GB2400933B (en) * 2003-04-25 2006-11-22 Messagelabs Ltd A method of, and system for, heuristically detecting viruses in executable code by detecting files which have been maliciously altered
CN100535916C (en) * 2006-04-14 2009-09-02 北京瑞星国际软件有限公司 Scanning system for virus and method therefor
CN100485703C (en) * 2006-10-11 2009-05-06 飞塔信息科技(北京)有限公司 Method and system for processing computer malicious code

Also Published As

Publication number Publication date
CN101989320A (en) 2011-03-23

Similar Documents

Publication Publication Date Title
KR101150415B1 (en) Method of managing for security universal serial bus, and program recording media for managing security universal serial bus
JP2005527873A (en) Virus detection system
Almousa et al. Api-based ransomware detection using machine learning-based threat detection models
KR101369251B1 (en) Apparatus, method, terminal and system for recovery protection of system files
Al-Anezi Generic packing detection using several complexity analysis for accurate malware detection
US8655844B1 (en) File version tracking via signature indices
US8474038B1 (en) Software inventory derivation
US8462948B2 (en) System and method for protecting data of mobile phone
CN105760789A (en) Protection method for encryption key in encrypted mobile solid-state disk
CN101989320B (en) Computer file processing method
Bansal A review on ransomware attack
US10949392B2 (en) Steganography obsfucation
CN112632536B (en) Memory loading method based on PE file transformation
CN104765986B (en) A kind of code protection and restoring method based on Steganography
KR101548211B1 (en) Encryption method for preventing reverse engineering
CN105335666A (en) Method for preventing electronic document from being leaked
US10503898B2 (en) Method for defending against malware
WO2017124179A1 (en) Automated updates for encrypted attached, network or cloud data storage systems
CN105938535A (en) Processing method for improving safety of computer files
US8701193B1 (en) Malware detection via signature indices
KR20100034330A (en) System and method for protecting personal information
KR20110014903A (en) File processing method and apparatus, signature generating method and apparatus, computer readable media storing program for method therefor
JP2011013428A (en) Information processing apparatus, code generation method, code verifying method, and program
CN106845169B (en) Jar package reinforcing method and system
Fan et al. A fingerprint-based audio authentication scheme using frequency domain statistical characteristic

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20130925

Termination date: 20191012

CF01 Termination of patent right due to non-payment of annual fee