CN102982279A - Computer aided design virus infection prevention system and computer aided design virus infection prevention method - Google Patents

Computer aided design virus infection prevention system and computer aided design virus infection prevention method Download PDF

Info

Publication number
CN102982279A
CN102982279A CN2012104418987A CN201210441898A CN102982279A CN 102982279 A CN102982279 A CN 102982279A CN 2012104418987 A CN2012104418987 A CN 2012104418987A CN 201210441898 A CN201210441898 A CN 201210441898A CN 102982279 A CN102982279 A CN 102982279A
Authority
CN
China
Prior art keywords
script file
operation requests
information
operand
cad
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012104418987A
Other languages
Chinese (zh)
Other versions
CN102982279B (en
Inventor
禹建文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201210441898.7A priority Critical patent/CN102982279B/en
Publication of CN102982279A publication Critical patent/CN102982279A/en
Application granted granted Critical
Publication of CN102982279B publication Critical patent/CN102982279B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a computer aided design virus infection prevention system and a computer aided design virus infection prevention method. The system comprises a client side and a server side, wherein the client side comprises a control monitor, an interceptor, a detector, a judging device, a preventer, a sample transmitter and a recognition bank updater. Operating information comprises a request type of the operation request of a script file and a target directory of the operation request. Characteristics of the script file and corresponding legal information are saved in a script recognition bank. The server side comprises an analyzer, and a data updater, wherein the analyzer is configured to receive and analyze corresponding operands due to the fact that the client side fails to obtain the legal information of operands and the data updater is configured to generate refresh data of the script recognition bank according to the analysis result of the analyzer and transmit the refresh data of the script recognition bank to the client side. According to the computer aided design virus infection prevention system and the computer aided design virus infection prevention method, at least part of computer aided design (CAD) viruses can be prevented and particularly an infection to user computer equipment of CAD viruses which spread relying on the script file is avoided.

Description

The computer-aided design (CAD) virus infections prevents system and method
Technical field
The present invention relates to computer safety field, be specifically related to the computer-aided design (CAD) virus infections and prevent system and method.
Background technology
Along with popularizing of the development of computer technology and computer utility, computer utility is penetrated into the every field of people's productive life gradually, has improved to a great extent production efficiency, and is the facility of the every aspect of people's life more than having brought very.In numerous computer technologies was used, computer-aided design (CAD) (Computer Aided Design, CAD) technology was wherein a kind of.A kind of computer technology that CAD refers to utilize computing machine and graphics device thereof to help the designer to carry out design effort.Carry out industrial design, during the design efforts such as product design, can utilize computer software and hardware equipment making and object simulating, and external form of exhibiting product, structure, color etc.By using cad technique, can utilize computer equipment to carry out a large amount of calculating, analysis and comparison, the final decision optimal case.The various design informations that need in the design effort with produce, no matter be numeral, literal or figure, can both leave in the internal memory or external memory of computing machine, and can retrieve rapidly, the designer begins design with sketch usually, and the hard work that sketch is become shop drawing can be given computing machine and finish, and according to the design result that is automatically produced by computing machine, obtain fast final graphics, make the designer in time judge and to revise design.In a word, cad technique greatly facilitates each domain design personnel's design effort, has improved the work efficiency of the design efforts such as industrial design and product design.
Yet, being accompanied by cad technique and giving the popularizing of the application of design field, some also quietly occur for the rogue program of CAD software specially, as for the virus of CAD software etc.These rogue programs can infect the computing machine that CAD software is installed specially, and mostly have certain automatic spread mechanism, and along with the development of rogue program, its communication means also presents diversified trend, for example by copy drawing copy between mail, memory device, this type of rogue program is infected in the capital, has caused numerous users to infect case; Simultaneously, this type of rogue program is often take the fruit of labour of stealing the deviser as purpose, the user infected rear gently then design drawing be stolen, heavy then also may leak trade secret, bring immeasurable loss for company or unit.
Summary of the invention
In view of the above problems, the present invention has been proposed in order to provide the computer-aided design (CAD) virus infections that overcomes the problems referred to above or address the above problem at least in part to prevent system and method.
According to one aspect of the present invention, computer-aided design (CAD) virus infections prevention method is provided, comprising:
Script file operation requests to the CAD process is monitored;
When monitoring the CAD process and initiate described script file operation requests, tackle described script file operation requests;
Detect the operation information of described script file operation requests; Described operation information comprises: the request type of described script file operation requests and the target directory of operation requests;
Determine according to described operation information whether described script file operation requests is legal;
When definite described script file operation requests is illegal, stop the described script file operation requests of CAD process;
When the described request type comprises the read operation request, describedly determine according to described operation information whether described script file operation requests is legal, comprising:
Obtain the feature of the operand of described read operation request;
The feature of described operand is compared with the script file feature in the script identification storehouse of presetting, obtain the legitimacy information of described operand; Preserve script file feature and corresponding legitimacy information in the described script identification storehouse of presetting;
According to the legitimacy information of described operand, determine whether described script file operation requests is legal;
When the described request type comprises write operation requests, described method also comprises: read registration table, obtain the config directory information of third party's plug-in unit of user's config directory information of the installation directory information of CAD application program or CAD application program or CAD application program;
Describedly determine according to described operation information whether described script file operation requests is legal, comprising:
If the target directory of the operation requests of described write operation requests is the config directory of third party's plug-in unit of user's config directory of the installation directory of described CAD application program or CAD application program or CAD application program, determine that then described script file operation requests is illegal.
Optionally, also comprise:
If fail to obtain the legitimacy information of described operand through described comparison, then described operand analyzed;
According to analysis result, described script identification storehouse is upgraded, so that the script that loads after upgrading is identified the storehouse.
Optionally, the described feature of obtaining the operand of described read operation request comprises:
Obtain the uniqueness validation value of described operand;
Described feature with described operand is compared with the script file feature in the script identification storehouse of presetting, and obtains the legitimacy information of described operand, comprising:
The uniqueness validation value of described operand and the script file feature in the described script identification storehouse are compared, obtain the legitimacy information of described operand.
Optionally, described script identification storehouse comprises the white list of the legitimacy information of preserving script file feature and correspondence, and/or preserves the blacklist of the legitimacy information of script file feature and correspondence;
Described feature with described operand is compared with the script file feature in the script identification storehouse of presetting, and obtains the legitimacy information of described operand, comprising:
With feature and the described white list of described operand, and/or the described script file feature in the described blacklist compares, and obtains the relevant legitimacy information of described operand.
Optionally, also comprise:
If when determining that described script file operation requests is illegal, then described operand is deleted.
Optionally, also comprise:
Behind CAD process edit the registry, again read registration table, obtain the config directory information of third party's plug-in unit of user's config directory information of the installation directory information of CAD application program or CAD application program or CAD application program.
According to a further aspect in the invention, provide the computer-aided design (CAD) virus infections to prevent locking system, comprised the client and server end, wherein, described client comprises:
Watch-dog is configured to the script file operation requests of CAD process is monitored;
Blocker is configured to tackle described script file operation requests when monitoring the CAD process and initiate described script file operation requests;
Detecting device is configured to detect the operation information of described script file operation requests; Described operation information comprises: the request type of described script file operation requests and the target directory of operation requests;
Determining device is configured to determine according to the script identification storehouse of described operation information and client whether described script file operation requests is legal; Described script identification is preserved script file feature and corresponding legitimacy information in the storehouse;
Interceptor is configured to when definite described script file operation requests is illegal, stops the described script file operation requests of CAD process;
The sample transmitter, operand corresponding to operation requests that is configured to fail to obtain legitimacy information is sent to server end analysis;
Identification storehouse renovator, the script identification storehouse that is configured to send according to server upgrade the described script identification storehouse of Data Update client;
Described server end comprises:
Analyzer is configured to receive and analyze the respective operations object that client fails to obtain the legitimacy information of operand;
The Data Update device is configured to according to analysis result, generates more new data of described script identification storehouse, and with described script identification storehouse more new data be sent to client.
Optionally, the described request type comprises the read operation request;
Described determining device comprises:
Feature is obtained subelement, for the feature of the operand that obtains described read operation request;
The comparer unit is used for the feature of described operand is compared with the script file feature in the script identification storehouse of presetting, and obtains the legitimacy information of described operand; Preserve script file feature and corresponding legitimacy information in the described script identification storehouse of presetting;
Legitimacy is determined subelement, is used for the legitimacy information according to described operand, determines whether described script file operation requests is legal.
Optionally, described feature is obtained subelement, comprising:
The validation value acquiring unit is for the uniqueness validation value that obtains described operand;
Described comparer unit comprises:
The first comparer unit is used for the uniqueness validation value of described operand and the script file feature in described script identification storehouse are compared, and obtains the legitimacy information of described operand.
Optionally, described script identification storehouse comprises the white list of the legitimacy information of preserving script file feature and correspondence, and/or preserves the blacklist of the legitimacy information of script file feature and correspondence;
Described comparer unit comprises:
The second comparer unit is used for feature and described white list with described operand, and/or the described script file feature in the described blacklist compares, and obtains the legitimacy information that described operand is correlated with.
Optionally, also comprise:
Canceller is if when being used for determining that described script file operation requests is illegal, then delete described operand.
Optionally, the described request type comprises write operation requests;
Described system also comprises: the directory information acquiring unit, be used for reading registration table, and obtain the config directory information of third party's plug-in unit of user's config directory information of the installation directory information of CAD application program or CAD application program or CAD application program;
Described determining device specifically is used for:
If the target directory of the operation requests of described write operation requests is the config directory of third party's plug-in unit of user's config directory of the installation directory of described CAD application program or CAD application program or CAD application program, determine that then described script file operation requests is illegal.
Optionally, also comprise:
Directory information is recaptured and is got the unit, be used for behind CAD process edit the registry, again read registration table, obtain the config directory information of third party's plug-in unit of user's config directory information of the installation directory information of CAD application program or CAD application program or CAD application program.
Computer-aided design (CAD) virus infections according to the present invention prevents system and method, can monitor the script file operation requests of CAD process; When monitoring the CAD process and initiate described script file operation requests, tackle described script file operation requests; Then detect the operation information of described script file operation requests; And then can determine whether described script file operation requests is legal according to described operation information; When definite described script file operation requests is illegal, stop the described script file operation requests of CAD process.Can tackle the behavior of the accesses script file of CAD process by above step, and according to the request type of script file operation requests and the operation informations such as target directory of operation requests, effectively judge the legitimacy of script file operation requests, and then tackle being judged as illegal operation requests, solve thus CAD software and started, opening in the situation such as drawing file, can infect because of the script file of access malice the problem of CAD virus.Obtain at least part of CAD virus of prevention, particularly relied on the beneficial effect of the CAD virus infections user computer equipment of script file propagation.
Above-mentioned explanation only is the general introduction of technical solution of the present invention, for can clearer understanding technological means of the present invention, and can be implemented according to the content of instructions, and for above and other objects of the present invention, feature and advantage can be become apparent, below especially exemplified by the specific embodiment of the present invention.
Description of drawings
By reading hereinafter detailed description of the preferred embodiment, various other advantage and benefits will become cheer and bright for those of ordinary skills.Accompanying drawing only is used for the purpose of preferred implementation is shown, and does not think limitation of the present invention.And in whole accompanying drawing, represent identical parts with identical reference symbol.In the accompanying drawings:
Fig. 1 shows according to an embodiment of the invention computer-aided design (CAD) virus infections prevention method process flow diagram;
Fig. 2 shows the according to an embodiment of the invention anti-locking apparatus synoptic diagram of computer-aided design (CAD) virus infections;
And,
Fig. 3 shows according to an embodiment of the invention, and the computer-aided design (CAD) virus infections prevents system schematic.
Embodiment
Exemplary embodiment of the present disclosure is described below with reference to accompanying drawings in more detail.Although shown exemplary embodiment of the present disclosure in the accompanying drawing, yet should be appreciated that and to realize the disclosure and the embodiment that should do not set forth limits here with various forms.On the contrary, it is in order to understand the disclosure more thoroughly that these embodiment are provided, and can with the scope of the present disclosure complete convey to those skilled in the art.
At first need to prove, the inventor finds in realizing process of the present invention, number of C AD virus is for realizing the purpose of wide-scale distribution, in its communication process, utilized the Some features of CAD software self, for example, during the CAD software startup, can automatically perform the script file of some specific names and suffix name, and, when CAD software is opened drawing file, also can load and the script file of current drawing file with specific names and the suffix name of catalogue, comprise with acad, acet, scriptproinit, acad2008 etc. are file name, and with lsp, mnl, vlx, fas etc. are the file of suffix name, acad.lsp for example, acet.lsp etc., wherein for the CAD software of different editions, the title of script file may be slightly different, take 2008 editions of software AutoCAD as example, may load with current drawing file and comprise acad2008.lsp with the specific names of catalogue and the script file of suffix name, and acad2008doc.lsp etc., and 2004 editions of AutoCAD, corresponding script file may be acad2004.lsp, and acad2004doc.lsp etc., if have malicious code or virus in the script file that these CAD processes load, when loading these script files, CAD software will infect CAD virus.In addition, the CAD software of some infection CAD virus can be to specific catalogue, write the script file of preserving malicious code or CAD virus in saving contents such as drawing file, when saving contents, these drawing files are copied on other computer equipments, when drawing file wherein is opened, script file in the catalogue just has an opportunity to be loaded, thereby makes CAD virus reach the purpose of propagating.For the propagating characteristic of above-mentioned CAD virus, the embodiment of the invention has proposed computer-aided design (CAD) virus infections prevention method, sees also Fig. 1, and the computer-aided design (CAD) virus infections prevention method that the embodiment of the invention provides can may further comprise the steps:
S101: the script file operation requests to the CAD process is monitored;
At first, can monitor the script file operation requests of CAD process, the CAD process is to the operation requests of script file, can comprise the operation requests that reads script file, write the operation requests of script file, and the request etc. of rewriting script file, wherein, the operation requests of rewriting script file also can think to write operation requests a kind of of script file.When specific implementation is monitored the script file operation requests of CAD process, can realize by watchdog routine is installed in computer equipment, for example can by the driver that can realize monitoring function is installed in computer equipment, realize the script file operation requests of CAD process is monitored.
S102: when monitoring the CAD process and initiate described script file operation requests, tackle described script file operation requests;
Initiate the script file operation requests if monitor the CAD process, can tackle the script file operation requests that CAD initiates.Script file object corresponding to script file operation requests that the CAD process is initiated may be unsafe script file, if the CAD process has loaded unsafe script file, just might infect CAD virus; On the other hand, if CAD software has infected virus, behind the CAD process initiation, or under some trigger condition, such as when opening drawing file, having infected viral CAD software can be to some specific catalogue, such as the catalogue of CAD software installation directory, storage drawing file, the support catalogue that the user arranges etc., write program or the code of malice, with purposes such as realization transmitted virus.And when monitoring CAD process initiation script file operation requests, request is tackled, can reach and suspend CAD to the effect of the access of script file, in order to further take other measures.Specifically when the script file operation requests that interception CAD process is initiated, can realize by certain program is installed in computing machine, for example by being installed in computer equipment, realizes the driver that can realize the file access monitoring, driver by the file access monitoring, can monitor the operation behavior of file software process, the script file operation requests that comprises the initiation of CAD process is monitored, and then when CAD process access CAD script file, the script file operation requests of process being initiated prior to operating system is responded.
S103: the operation information that detects described script file operation requests; Described operation information comprises: the request type of described script file operation requests and the target directory of operation requests;
Can detect the operation information of CAD process to the operation requests of script file, during concrete the detection, can obtain the information that comprises in the script file operation requests detects as operation information, the target that detects can be the request type of script file operation requests, such as the CAD process to the read operation request to script file, and to write operation requests of script file etc., computing machine comprises read operation and write operation to the basic operation of file, other file operation all is to be derived by these two kinds of operations basically, for example to the modification of file, copy, rename etc. are to copy a file as example, be actually one and first file destination carried out read operation, then the data that read are written to the process of another position, therefore, can detect the request types such as read/write operation request to script file the CAD process.In addition, can also detect target directory corresponding to operation requests, for example, what detect that the CAD process reads is file in which catalogue, perhaps written document etc. in which catalogue.Certainly in actual applications, can also detect according to the operation information of reality to other script file operation requests, to realize obtaining to judge the purposes such as effective foundation of script file operation requests legitimacy.
S104: determine according to described operation information whether described script file operation requests is legal;
Viral to CAD by preamble, particularly rely on the analysis of the CAD Viral infection principle that script file propagates as can be known, the CAD process may be harmful to the access behavior of script file, computer equipment may infect CAD virus because of having accessed harmful script file, if for example the CAD process has loaded the malicious script file of specific names or suffix name automatically in opening the process of drawing file, just may infect CAD virus, the malicious script file of specific names or suffix name comprise when the CAD process in opening the process of drawing file, may automatically load with acad, acet, scriptproinit, acad2008 etc. are file name, and with lsp, mnl, vlx, fas etc. are the file of suffix name, acad.lsp for example, the script files such as acet.lsp, wherein for the CAD software of different editions, the title of script file may be slightly different, take 2008 editions of software AutoCAD as example, may load with current drawing file and comprise acad2008.lsp with the specific names of catalogue and the script file of suffix name, and acad2008doc.lsp etc., and 2004 editions of software AutoCAD, corresponding script file may be acad2004.lsp, and acad2004doc.lsp etc.; And for example, if the CAD process has initiated to write the operation requests of script to the catalogue that should not write script file, this behavior is likely a kind of virus behavior.So according to the request type that comprises the script file operation requests, and the catalogue at operand place etc. can determine at interior operation information whether the CAD process is legal to the operation requests of script file.During specific implementation, for different request types, legal method can be different to judge it, and the below is introduced respectively.
When the script file operation requests of CAD process initiation is the read operation request, can determine whether the script file operation requests is legal according to the catalogue at script file place corresponding to read operation request, for example the CAD process file of asking is if be positioned at the installation directory of CAD software, think that then this operation requests is legal, because generally speaking, be positioned at the script file under the CAD software installation directory, be the necessary supportive script file of CAD running software, it is legal that the request that the CAD process reads these script files can be defined as; And if the script file that the CAD process is asked is positioned at the catalogue of drawing file place catalogue or other users establishment, think that then this operation requests is illegal, this be because, the script file of the lower existence that creates drawing file catalogue or other user, it may be the script file of malice, for example the aforesaid script file that may automatically be loaded by the CAD process with the name of specific filename and suffix name when the CAD process loads these script files, may cause computer equipment to infect CAD virus.
In addition, in order further to verify the legitimacy of the script file that the CAD process loads when initiating the read operation request, can also obtain the feature of the operand of read operation request, the feature of operand is compared with the script file feature in the script identification storehouse of presetting, obtain the legitimacy information of operand, and according to the legitimacy information of operand, determine whether the script file operation requests is legal.If through comparison, the operand of operation requests is legal, can determines that then corresponding script file operation requests is legal, otherwise can determine that corresponding script file operation requests is illegal.Further, if fail to get access to the legitimacy information of operand through comparison, can also analyze operand, by analyzing the legitimacy of determining operand, and then according to analysis result, script is identified the storehouse upgrade, so that the script that loads after upgrading is identified the storehouse, and according to the information that the script after the renewal is identified in the storehouse legitimacy of operand is determined.The work of wherein analyzing can be unified to finish by server, server can be to by client upload, by the relevant script file of operand of failing to get access to legitimacy information is analyzed, determine its legitimacy, again its legitimacy information is sent to each client, so that client is upgraded script identification storehouse.
In order to improve by the feature of operand is compared with the script file feature in the script identification storehouse of presetting, obtain efficient and the accuracy of the legitimacy information of operand, when specific implementation, can obtain the uniqueness validation value of operand, again the uniqueness validation value of operand and the script file feature in the script identification storehouse are compared, and then obtain the legitimacy information of operand.The uniqueness validation value of operand, comprise the uniqueness that can embody the operand associated documents, can verify that it is different from the value of alternative document, the MD5 value of file for example, MD5(Message-Digest Algorithm5, message digest algorithm 5) is one of widely used hashing algorithm of computing machine (translating again digest algorithm, hash algorithm), at present generally existing MD5 realization of main flow programming language, can be used for authorization information or file integrality and consistance, here can be with the MD5 value of the file validation value as verification operation object uniqueness.By the uniqueness validation value of operand and the script file feature in the script file identification storehouse are compared, can improve efficient and the accuracy of comparison, thereby can improve efficient and the accuracy of the legitimacy information of obtaining operand.
In addition, by the feature of operand and the script file feature in the script identification storehouse of presetting are compared, obtain in the process of legitimacy information of operand, can also use black/white list strategy.Black/white list strategy is widely used technical tactic in the computer realm, the blacklist strategy is relative with the white list strategy, its realization mechanism may be summarized to be: cannot be accessed maybe and cannot pass through by what blacklist was put down in writing, then can not accessed maybe and can pass through by what blacklist was put down in writing, perhaps relevant file or operation further be analyzed and judged; White list mechanism is then just the opposite.When specifically using in embodiments of the present invention black/white list strategy, can identify at script the black/white list of the legitimacy information of preserving script file feature and correspondence in the storehouse, the feature of operand is being compared with the script file feature in the script identification storehouse of presetting, when obtaining the legitimacy information of operand, the feature of operand and the script file feature of black/white list can be compared, thereby obtain the relevant legitimacy information of operand.
For example when using the white list strategy, according to the definition of white list as can be known, preservation information comprises the feature of legal script file in the white list, can be after obtaining the feature of operand, legal script file feature in operand feature and the white list is compared, if the feature of operand appears in the legal script file feature of white list, determine that then the corresponding scripts file operation requests is legal, if the feature through the comparison operand does not appear in the legal script file feature of white list, determine that then the corresponding scripts file operation requests is suspicious operation requests.Again for example when using the blacklist strategy, definition according to blacklist, the information of preserving in the blacklist comprises the feature of illegal script file, can be after obtaining the feature of operand, the feature of operand and the illegal script file feature in the blacklist are compared, if the feature of operand appears in the illegal script file feature of blacklist, determine that then corresponding script file operation is illegal, if the feature of operand does not appear in the illegal script file feature of blacklist, determine that then corresponding script file operation requests is suspicious operation requests.Associated documents for the correspondence that is defined as suspicious operation requests can also be further analyzed, as relevant File Upload is analyzed relevant file to server and by server end, for example, can the querying server database safe class of file of storage, to determine the legitimacy of operation requests.
In actual applications, can also be combined with blacklist and white list, for example after obtaining the feature of operand, first the feature of operand and the legal script file feature in the white list are compared, if the feature of operand appears in the legal script file feature of white list, determine that then the corresponding scripts file operation requests is legal, if the feature through the comparison operand does not appear in the legal script file feature of white list, again the feature of operand and the illegal script file feature in the blacklist are compared, if the feature of operand appears in the illegal script file feature of blacklist, determine that then corresponding script file operation is illegal, if the feature of operand does not appear in the illegal script file feature of blacklist, can be further analyzed the relevant file of operand, such as File Upload that will be relevant to server, the safe class of the file by querying server database storage, and by server end relevant file is analyzed, determine its legitimacy, and then its legitimacy information sent to each client, so that client is upgraded the black/white list in the script identification storehouse.
When the script file operation requests of CAD process initiation is write operation requests, can determine whether the script file operation requests is legal according to the directory information that write operation requests writes script file, for example the CAD process asks to write the catalogue of script file if the installation directory information of CAD application program, or user's config directory information of CAD application program, or the config directory of third party's plug-in unit of CAD application program, think that then this operation requests is illegal, because generally speaking, be positioned at the script file under these catalogues, it is the necessary supportive script file of CAD running software, can automatically load these script files during the CAD process initiation, such as the support catalogue that the included user of user's config directory of CAD application program arranges, concrete example such as certain user configured catalogue:
C:\Documents?and?Settings\new\Application?Data\Autodesk\AutoCAD2004\R16.2\chs\support\,
And the CAD process generally can not write script file to these catalogues.The catalogues such as config directory of third party's plug-in unit of the installation directory information of above-mentioned CAD application program, user's config directory information of CAD application program and CAD application program; can obtain by the mode that reads registration table; because when CAD software was installed, the information of above-mentioned catalogue can be written in the registration table usually.As:
HKEY_CURRENT_USER\Software\Autodesk\AutoCAD\R16.2\ACAD-4001:804\Profiles\...\General;
HKLM\Software\Hongye\Fps\8.0\Fps-155;
HKLM\Software\Wow6432Node\Hongye\Fps\8.0\Fps-155;
HKLM\Software\Tangent\Tarch\6.0;
HKLM Software Tangent Tarch 6.5 etc., can be by reading the relevant key assignments of key in these registration tablies or the key assignments of sub-key, obtain the information of the catalogues such as config directory of third party's plug-in unit of user's config directory information of installation directory information, CAD application program of CAD application program and CAD application program.In addition, can also be behind CAD process edit the registry, again read registration table, obtain the information of the catalogues such as config directory of third party's plug-in unit of user's config directory information of the installation directory information of CAD application program or CAD application program or CAD application program, so that at some CAD software or its plug-in unit after it starts, when just above-mentioned directory information being write registration table, obtain more accurately above-mentioned directory information, as the foundation of judging the write operation requests legitimacy.
If when determining that the script file operation requests is illegal, can also further operate operand, be loaded to prevent virus document, perhaps be written into the propagation that other catalogues cause CAD virus.When operand is done further processing, can select operand is carried out deletion action, certainly in actual applications, can also isolate operand, namely temporarily forbid the access rights to operand, for example, forbid writing, revise, deletions etc. are until user or keeper etc. make a choice, such as by selections such as user or keepers object being deleted, or the operation such as recovery, prompting user is selected the processing modes such as processing means simultaneously.
S105: when definite described script file operation requests is illegal, stop the described script file operation requests of CAD process.
When having determined that the CAD process is illegal to the operation requests of script file, can stop described operation requests, preventing that computer system from having accessed the malicious script file because of the CAD process and having infected CAD virus, thereby reached the purpose that stops the CAD virus infections.After the script file operation requests that stops the CAD process, can also give the user with information indicating, associated script fileinfo such as the current prevention of mode prompting user by ejecting prompting frame, stop number of times of script file operation requests etc. for the user, known relevant information to make things convenient for the user.
As fully visible, the computer-aided design (CAD) virus infections prevention method of the embodiment of the invention can be monitored the script file operation requests of CAD process; When monitoring CAD process initiation script file operation requests, interception script file operation requests; Then the operation information of detection script file operation requests; And then can determine whether described script file operation requests is legal according to described operation information; When definite described script file operation requests is illegal, stop the described script file operation requests of CAD process.Can tackle the behavior of the accesses script file of CAD process by above step, and according to the request type of script file operation requests and the operation informations such as target directory of operation requests, effectively judge the legitimacy of script file operation requests, and then tackle being judged as illegal operation requests, solve thus CAD software and started, opening in the situation such as drawing file, can infect because of the script file of access malice the problem of CAD virus.
Corresponding with the computer-aided design (CAD) virus infections prevention method that the embodiment of the invention provides, the embodiment of the invention also provides the computer-aided design (CAD) virus infections to prevent locking apparatus, sees also Fig. 2, and this device can comprise:
Monitoring unit 201 is used for the script file operation requests of CAD process is monitored;
Interception unit 202 is used for tackling described script file operation requests when monitoring the CAD process and initiate described script file operation requests;
Detecting unit 203 is for detection of the operation information of described script file operation requests; Described operation information comprises: the request type of described script file operation requests and the target directory of operation requests;
Legitimacy determining unit 204 is used for determining according to described operation information whether described script file operation requests is legal;
Request stops unit 205, is used for stoping the described script file operation requests of CAD process when definite described script file operation requests is illegal.
Wherein, request type can comprise the read operation request;
Accordingly, legitimacy determining unit 204 can comprise:
Feature is obtained subelement, for the feature of the operand that obtains the read operation request;
The comparer unit is used for the feature of described operand is compared with the script file feature in the script identification storehouse of presetting, and obtains the legitimacy information of described operand; Preserve script file feature and corresponding legitimacy information in the described script identification storehouse of presetting;
And,
Legitimacy is determined subelement, is used for the legitimacy information according to described operand, determines whether described script file operation requests is legal.
Accordingly, the computer-aided design (CAD) virus infections is prevented locking apparatus, can also comprise:
Analytic unit is if for the legitimacy information of failing to obtain described operand through described comparison, then analyze described operand;
Identification storehouse updating block is used for according to analysis result, described script identification storehouse is upgraded, so that the script identification storehouse after the loading renewal.
Feature is obtained subelement, can comprise:
The validation value acquiring unit is for the uniqueness validation value that obtains described operand;
Accordingly, the comparer unit can comprise:
The first comparer unit is used for the uniqueness validation value of described operand and the script file feature in described script identification storehouse are compared, and obtains the legitimacy information of described operand.
Script identification storehouse can also comprise the white list of the legitimacy information of preserving script file feature and correspondence, and/or preserves the blacklist of the legitimacy information of script file feature and correspondence;
Accordingly, the comparer unit can comprise:
The second comparer unit is used for feature and described white list with described operand, and/or the described script file feature in the described blacklist compares, and obtains the legitimacy information that described operand is correlated with.
The computer-aided design (CAD) virus infections is prevented locking apparatus, can also comprise:
Delete cells is if when being used for determining that described script file operation requests is illegal, then delete described operand.
Request type can also comprise write operation requests;
Accordingly, the anti-locking apparatus of computer-aided design (CAD) virus infections can also comprise: the directory information acquiring unit, be used for reading registration table, obtain the config directory information of third party's plug-in unit of user's config directory information of the installation directory information of CAD application program or CAD application program or CAD application program;
Under this implementation, legitimacy determining unit 204 specifically can be used for:
If the target directory of the operation requests of write operation requests is the config directory of third party's plug-in unit of user's config directory of the installation directory of described CAD application program or CAD application program or CAD application program, determine that then described script file operation requests is illegal.
Accordingly, the computer-aided design (CAD) virus infections is prevented locking apparatus, can also comprise:
Directory information is recaptured and is got the unit, be used for behind CAD process edit the registry, again read registration table, obtain the config directory information of third party's plug-in unit of user's config directory information of the installation directory information of CAD application program or CAD application program or CAD application program.
See also Fig. 3, the embodiment of the invention also provides the computer-aided design (CAD) virus infections to prevent locking system, and this system can comprise client 310 and server end 320, and wherein, client 310 can comprise:
Watch-dog 311 is configured to the script file operation requests of CAD process is monitored; For example by 311 pairs of CAD processes of watch-dog to the read operation request of script file, write the operation requests of script file, and the operation requests etc. of rewriting script file is monitored.
Watch-dog 311 can be connected with blocker 312, when watch-dog 311 monitors the script file operation requests of CAD process, can send relevant data to blocker 312, blocker 312, be configured to when monitoring CAD process initiation script file operation requests interception script file operation requests;
Detecting device 313 is configured to the operation information of detection script file operation requests; Operation information wherein can include but not limited to: the request type of script file operation requests and the target directory of operation requests;
Determining device 314 is configured to determine according to the operation information of operation requests and the script identification storehouse of client whether the script file operation requests is legal; Wherein, preserve script file feature and corresponding legitimacy information in the script of the client identification storehouse; In actual applications, the operation information of operation requests can comprise the request type of operation requests, such as the operation requests such as reading or writing, can also comprise the information such as directory path at operation requests associated documents place.Can pass through these information, and identify script file feature and the corresponding legitimacy information of preserving in the storehouse in conjunction with the script of client, determine the legitimacy of script file operation requests.
Determining device can link to each other with interceptor 315, and interceptor 315 is configured to when definite script file operation requests is illegal, stops the script file operation requests of CAD process;
When client failed to obtain the legitimacy information of operand, this system can also comprise sample transmitter 316, and the respective operations object that sample transmitter 316 is configured to fail to obtain the legitimacy information of operand is sent to server end analysis;
Identification storehouse renovator 317, the script identification storehouse of Data Update client is upgraded in the script identification storehouse that is configured to send according to server;
In addition, server end 320 can comprise:
Analyzer 321 is configured to receive and analyze the respective operations object that client fails to obtain the legitimacy information of operand;
Data Update device 322 is configured to according to analysis result, and generation script identification storehouse is new data more, and with script identify the storehouse more new data be sent to client.
Wherein, the described request type comprises the read operation request, and then institute's determining device comprises:
Feature is obtained subelement, for the feature of the operand that obtains described read operation request;
The comparer unit is used for the feature of described operand is compared with the script file feature in the script identification storehouse of presetting, and obtains the legitimacy information of described operand; Preserve script file feature and corresponding legitimacy information in the described script identification storehouse of presetting;
Legitimacy is determined subelement, is used for the legitimacy information according to described operand, determines whether described script file operation requests is legal.
Wherein, described feature is obtained subelement, comprising:
The validation value acquiring unit is for the uniqueness validation value that obtains described operand;
Described comparer unit comprises:
The first comparer unit is used for the uniqueness validation value of described operand and the script file feature in described script identification storehouse are compared, and obtains the legitimacy information of described operand.
Randomly, described script identification storehouse comprises the white list of the legitimacy information of preserving script file feature and correspondence, and/or preserves the blacklist of the legitimacy information of script file feature and correspondence;
Described comparer unit comprises:
The second comparer unit is used for feature and described white list with described operand, and/or the described script file feature in the described blacklist compares, and obtains the legitimacy information that described operand is correlated with.
In addition, this system also comprises:
Canceller is if when being used for determining that described script file operation requests is illegal, then delete described operand.
Randomly, the described request type comprises write operation requests;
Described system also comprises: the directory information acquiring unit, be used for reading registration table, and obtain the config directory information of third party's plug-in unit of user's config directory information of the installation directory information of CAD application program or CAD application program or CAD application program;
Described determining device specifically is used for:
If the target directory of the operation requests of described write operation requests is the config directory of third party's plug-in unit of user's config directory of the installation directory of described CAD application program or CAD application program or CAD application program, determine that then described script file operation requests is illegal.
Randomly, this system also comprises:
Directory information is recaptured and is got the unit, be used for behind CAD process edit the registry, again read registration table, obtain the config directory information of third party's plug-in unit of user's config directory information of the installation directory information of CAD application program or CAD application program or CAD application program.
In sum, the computer-aided design (CAD) virus infections that provides by this aspect embodiment prevents system and method, can be according to the operation information of target directory of the request type that comprises the script file operation requests and operation requests etc., effectively judge the legitimacy of script file operation requests, and then tackle being judged as illegal operation requests, can stop at least part of CAD virus, the CAD virus infections subscriber computer that particularly relies on script file to propagate.
The application can be applied to computer system/server, and it can be with numerous other universal or special computingasystem environment or configuration operation.The example that is suitable for well-known computing system, environment and/or the configuration used with computer system/server includes but not limited to: personal computer system, server computer system, thin client, thick client computer, hand-held or laptop devices, the system based on microprocessor, set-top box, programmable consumer electronics, NetPC Network PC, Xiao type Ji calculate machine Xi Tong ﹑ large computer system and comprise the distributed cloud computing technology environment of above-mentioned any system, etc.
Computer system/server can be described under the general linguistic context of the computer system executable instruction (such as program module) of being carried out by computer system.Usually, program module can comprise routine, program, target program, assembly, logic, data structure etc., and they are carried out specific task or realize specific abstract data type.Computer system/server can be implemented in distributed cloud computing environment, and in the distributed cloud computing environment, task is by carrying out by the teleprocessing equipment of communication network link.In distributed cloud computing environment, program module can be positioned on the Local or Remote computing system storage medium that comprises memory device.
Intrinsic not relevant with any certain computer, virtual system or miscellaneous equipment with demonstration at this algorithm that provides.Various general-purpose systems also can be with using based on the teaching at this.According to top description, it is apparent constructing the desired structure of this type systematic.In addition, the present invention is not also for any certain programmed language.Should be understood that and to utilize various programming languages to realize content of the present invention described here, and the top description that language-specific is done is in order to disclose preferred forms of the present invention.
In the instructions that provides herein, a large amount of details have been described.Yet, can understand, embodiments of the invention can be put into practice in the situation of these details not having.In some instances, be not shown specifically known method, structure and technology, so that not fuzzy understanding of this description.
Similarly, be to be understood that, in order to simplify the disclosure and to help to understand one or more in each inventive aspect, in the description to exemplary embodiment of the present invention, each feature of the present invention is grouped together in single embodiment, figure or the description to it sometimes in the above.Yet the method for the disclosure should be construed to the following intention of reflection: namely the present invention for required protection requires the more feature of feature clearly put down in writing than institute in each claim.Or rather, as following claims reflected, inventive aspect was to be less than all features of the disclosed single embodiment in front.Therefore, follow claims of embodiment and incorporate clearly thus this embodiment into, wherein each claim itself is as independent embodiment of the present invention.
Those skilled in the art are appreciated that and can adaptively change and they are arranged in one or more equipment different from this embodiment the module in the equipment among the embodiment.Can be combined into a module or unit or assembly to the module among the embodiment or unit or assembly, and can be divided into a plurality of submodules or subelement or sub-component to them in addition.In such feature and/or process or unit at least some are mutually repelling, and can adopt any combination to disclosed all features in this instructions (comprising claim, summary and the accompanying drawing followed) and so all processes or the unit of disclosed any method or equipment make up.Unless in addition clearly statement, disclosed each feature can be by providing identical, being equal to or the alternative features of similar purpose replaces in this instructions (comprising claim, summary and the accompanying drawing followed).
In addition, those skilled in the art can understand, although embodiment more described herein comprise some feature rather than further feature included among other embodiment, the combination of the feature of different embodiment means and is within the scope of the present invention and forms different embodiment.For example, in the following claims, the one of any of embodiment required for protection can be used with array mode arbitrarily.
All parts embodiment of the present invention can realize with hardware, perhaps realizes with the software module of moving at one or more processor, and perhaps the combination with them realizes.It will be understood by those of skill in the art that and to use in practice microprocessor or digital signal processor (DSP) to realize that computer-aided design (CAD) virus infections according to the embodiment of the invention prevents some or all some or the repertoire of parts in the system and method.The present invention can also be embodied as be used to part or all equipment or the device program (for example, computer program and computer program) of carrying out method as described herein.Such realization program of the present invention can be stored on the computer-readable medium, perhaps can have the form of one or more signal.Such signal can be downloaded from internet website and obtain, and perhaps provides at carrier signal, perhaps provides with any other form.
It should be noted above-described embodiment the present invention will be described rather than limit the invention, and those skilled in the art can design alternative embodiment in the situation of the scope that does not break away from claims.In the claims, any reference symbol between bracket should be configured to limitations on claims.Word " comprises " not to be got rid of existence and is not listed in element or step in the claim.Being positioned at word " " before the element or " one " does not get rid of and has a plurality of such elements.The present invention can realize by means of the hardware that includes some different elements and by means of the computing machine of suitably programming.In having enumerated the unit claim of some devices, several in these devices can be to come imbody by same hardware branch.The use of word first, second and C grade does not represent any order.Can be title with these word explanations.

Claims (13)

1. computer-aided design (CAD) virus infections prevention method comprises:
Script file operation requests to the CAD process is monitored;
When monitoring the CAD process and initiate described script file operation requests, tackle described script file operation requests;
Detect the operation information of described script file operation requests; Described operation information comprises: the request type of described script file operation requests and the target directory of operation requests;
Determine according to described operation information whether described script file operation requests is legal;
When definite described script file operation requests is illegal, stop the described script file operation requests of CAD process;
When the described request type comprises the read operation request, describedly determine according to described operation information whether described script file operation requests is legal, comprising:
Obtain the feature of the operand of described read operation request;
The feature of described operand is compared with the script file feature in the script identification storehouse of presetting, obtain the legitimacy information of described operand; Preserve script file feature and corresponding legitimacy information in the described script identification storehouse of presetting;
According to the legitimacy information of described operand, determine whether described script file operation requests is legal;
When the described request type comprises write operation requests, described method also comprises: read registration table, obtain the config directory information of third party's plug-in unit of user's config directory information of the installation directory information of CAD application program or CAD application program or CAD application program;
Describedly determine according to described operation information whether described script file operation requests is legal, comprising:
If the target directory of the operation requests of described write operation requests is the config directory of third party's plug-in unit of user's config directory of the installation directory of described CAD application program or CAD application program or CAD application program, determine that then described script file operation requests is illegal.
2. the method for claim 1 also comprises:
If fail to obtain the legitimacy information of described operand through described comparison, then described operand analyzed;
According to analysis result, described script identification storehouse is upgraded, so that the script that loads after upgrading is identified the storehouse.
3. method as claimed in claim 1 or 2, the described feature of obtaining the operand of described read operation request comprises:
Obtain the uniqueness validation value of described operand;
Described feature with described operand is compared with the script file feature in the script identification storehouse of presetting, and obtains the legitimacy information of described operand, comprising:
The uniqueness validation value of described operand and the script file feature in the described script identification storehouse are compared, obtain the legitimacy information of described operand.
4. such as each described method in the claims 1 to 3, described script identification storehouse comprises the white list of the legitimacy information of preserving script file feature and correspondence, and/or preserves the blacklist of the legitimacy information of script file feature and correspondence;
Described feature with described operand is compared with the script file feature in the script identification storehouse of presetting, and obtains the legitimacy information of described operand, comprising:
With feature and the described white list of described operand, and/or the described script file feature in the described blacklist compares, and obtains the relevant legitimacy information of described operand.
5. such as each described method in the claim 1 to 4, also comprise:
If when determining that described script file operation requests is illegal, then described operand is deleted.
6. such as each described method in the claim 1 to 5, also comprise:
Behind CAD process edit the registry, again read registration table, obtain the config directory information of third party's plug-in unit of user's config directory information of the installation directory information of CAD application program or CAD application program or CAD application program.
7. the anti-locking system of computer-aided design (CAD) virus infections comprises the client and server end, and wherein, described client comprises:
Watch-dog is configured to the script file operation requests of CAD process is monitored;
Blocker is configured to tackle described script file operation requests when monitoring the CAD process and initiate described script file operation requests;
Detecting device is configured to detect the operation information of described script file operation requests; Described operation information comprises: the request type of described script file operation requests and the target directory of operation requests;
Determining device is configured to determine according to the script identification storehouse of described operation information and client whether described script file operation requests is legal; Described script identification is preserved script file feature and corresponding legitimacy information in the storehouse;
Interceptor is configured to when definite described script file operation requests is illegal, stops the described script file operation requests of CAD process;
The sample transmitter, operand corresponding to operation requests that is configured to fail to obtain legitimacy information is sent to server end analysis;
Identification storehouse renovator, the script identification storehouse that is configured to send according to server upgrade the described script identification storehouse of Data Update client;
Described server end comprises:
Analyzer is configured to receive and analyze the respective operations object that client fails to obtain the legitimacy information of operand;
The Data Update device is configured to according to analysis result, generates more new data of described script identification storehouse, and with described script identification storehouse more new data be sent to client.
8. system as claimed in claim 7, the described request type comprises the read operation request;
Institute's determining device comprises:
Feature is obtained subelement, for the feature of the operand that obtains described read operation request;
The comparer unit is used for the feature of described operand is compared with the script file feature in the script identification storehouse of presetting, and obtains the legitimacy information of described operand; Preserve script file feature and corresponding legitimacy information in the described script identification storehouse of presetting;
Legitimacy is determined subelement, is used for the legitimacy information according to described operand, determines whether described script file operation requests is legal.
9. system as claimed in claim 8, described feature is obtained subelement, comprising:
The validation value acquiring unit is for the uniqueness validation value that obtains described operand;
Described comparer unit comprises:
The first comparer unit is used for the uniqueness validation value of described operand and the script file feature in described script identification storehouse are compared, and obtains the legitimacy information of described operand.
10. system as claimed in claim 8, described script identification storehouse comprises the white list of preserving script file feature and corresponding legitimacy information, and/or preserves the blacklist of script file feature and corresponding legitimacy information;
Described comparer unit comprises:
The second comparer unit is used for feature and described white list with described operand, and/or the described script file feature in the described blacklist compares, and obtains the legitimacy information that described operand is correlated with.
11. system as claimed in claim 8 also comprises:
Canceller is if when being used for determining that described script file operation requests is illegal, then delete described operand.
12. system as claimed in claim 7, the described request type comprises write operation requests;
Described system also comprises: the directory information acquiring unit, be used for reading registration table, and obtain the config directory information of third party's plug-in unit of user's config directory information of the installation directory information of CAD application program or CAD application program or CAD application program;
Described determining device specifically is used for:
If the target directory of the operation requests of described write operation requests is the config directory of third party's plug-in unit of user's config directory of the installation directory of described CAD application program or CAD application program or CAD application program, determine that then described script file operation requests is illegal.
13. system as claimed in claim 12 also comprises:
Directory information is recaptured and is got the unit, be used for behind CAD process edit the registry, again read registration table, obtain the config directory information of third party's plug-in unit of user's config directory information of the installation directory information of CAD application program or CAD application program or CAD application program.
CN201210441898.7A 2012-11-07 2012-11-07 Computer-aided design viral infection prevents system and method Active CN102982279B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210441898.7A CN102982279B (en) 2012-11-07 2012-11-07 Computer-aided design viral infection prevents system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210441898.7A CN102982279B (en) 2012-11-07 2012-11-07 Computer-aided design viral infection prevents system and method

Publications (2)

Publication Number Publication Date
CN102982279A true CN102982279A (en) 2013-03-20
CN102982279B CN102982279B (en) 2016-06-29

Family

ID=47856283

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210441898.7A Active CN102982279B (en) 2012-11-07 2012-11-07 Computer-aided design viral infection prevents system and method

Country Status (1)

Country Link
CN (1) CN102982279B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105005722A (en) * 2015-06-26 2015-10-28 北京北信源软件股份有限公司 Access control method and apparatus for mobile storage device
CN106709334A (en) * 2015-11-17 2017-05-24 阿里巴巴集团控股有限公司 Method, device and system for detecting intrusive script files
CN107645480A (en) * 2016-07-22 2018-01-30 阿里巴巴集团控股有限公司 Data monitoring method and system, device
CN108038379A (en) * 2017-12-29 2018-05-15 北京长御科技有限公司 A kind of anti-method and system for extorting software attacks
CN111159701A (en) * 2019-12-25 2020-05-15 五八同城信息技术有限公司 Third-party page loading method and device, electronic equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003256370A (en) * 2002-02-26 2003-09-12 Fumiaki Yamazaki Security information distribution method and security information distribution server
US20050251862A1 (en) * 2002-09-12 2005-11-10 Jarmo Talvitie Security arrangement, method and apparatus for repelling computer viruses and isolating data
JP2006268167A (en) * 2005-03-22 2006-10-05 Nec Fielding Ltd Security system, security method, and its program
CN1924814A (en) * 2005-08-30 2007-03-07 国际商业机器公司 Control method of application program and apparatus therefor

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003256370A (en) * 2002-02-26 2003-09-12 Fumiaki Yamazaki Security information distribution method and security information distribution server
US20050251862A1 (en) * 2002-09-12 2005-11-10 Jarmo Talvitie Security arrangement, method and apparatus for repelling computer viruses and isolating data
JP2006268167A (en) * 2005-03-22 2006-10-05 Nec Fielding Ltd Security system, security method, and its program
CN1924814A (en) * 2005-08-30 2007-03-07 国际商业机器公司 Control method of application program and apparatus therefor

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105005722A (en) * 2015-06-26 2015-10-28 北京北信源软件股份有限公司 Access control method and apparatus for mobile storage device
CN106709334A (en) * 2015-11-17 2017-05-24 阿里巴巴集团控股有限公司 Method, device and system for detecting intrusive script files
CN107645480A (en) * 2016-07-22 2018-01-30 阿里巴巴集团控股有限公司 Data monitoring method and system, device
CN107645480B (en) * 2016-07-22 2021-04-30 阿里巴巴集团控股有限公司 Data monitoring method, system and device
CN108038379A (en) * 2017-12-29 2018-05-15 北京长御科技有限公司 A kind of anti-method and system for extorting software attacks
CN108038379B (en) * 2017-12-29 2020-06-23 北京长御科技有限公司 Method and system for preventing lasso software attack
CN111159701A (en) * 2019-12-25 2020-05-15 五八同城信息技术有限公司 Third-party page loading method and device, electronic equipment and storage medium
CN111159701B (en) * 2019-12-25 2023-09-29 五八同城信息技术有限公司 Third-party page loading method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN102982279B (en) 2016-06-29

Similar Documents

Publication Publication Date Title
US11244047B2 (en) Intelligent backup and versioning
US10291634B2 (en) System and method for determining summary events of an attack
US11455400B2 (en) Method, system, and storage medium for security of software components
US8612398B2 (en) Clean store for operating system and software recovery
US8479291B1 (en) Systems and methods for identifying polymorphic malware
US8266700B2 (en) Secure web application development environment
US11579985B2 (en) System and method of preventing malware reoccurrence when restoring a computing device using a backup image
US8561180B1 (en) Systems and methods for aiding in the elimination of false-positive malware detections within enterprises
US20150154398A1 (en) Optimizing virus scanning of files using file fingerprints
CN103281325A (en) Method and device for processing file based on cloud security
US10061921B1 (en) Methods and systems for detecting computer security threats
EP2663944B1 (en) Malware detection
US9906537B2 (en) System, method, and computer program product for conditionally performing an action based on an attribute
CN103390130A (en) Rogue program searching and killing method and device based on cloud security as well as server
CN103473501A (en) Malware tracking method based on cloud safety
CN102982279A (en) Computer aided design virus infection prevention system and computer aided design virus infection prevention method
CN104769598A (en) Systems and methods for detecting illegitimate applications
NL2027556B1 (en) Method and system for generating a list of indicators of compromise
US9003533B1 (en) Systems and methods for detecting malware
CN102982280B (en) Stop method and the device of computer aided design cad virus infections
WO2022147469A1 (en) Zero dwell time process library and script monitoring
Kaczmarek et al. Operating system security by integrity checking and recovery using write‐protected storage
CN109522683A (en) Software source tracing method, system, computer equipment and storage medium
US9569617B1 (en) Systems and methods for preventing false positive malware identification
CN105069357A (en) Vulnerability scanning method, cloud server and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220727

Address after: Room 801, 8th floor, No. 104, floors 1-19, building 2, yard 6, Jiuxianqiao Road, Chaoyang District, Beijing 100015

Patentee after: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Patentee before: Qizhi software (Beijing) Co.,Ltd.