CN104050413A - Method for data processing and terminal - Google Patents

Method for data processing and terminal Download PDF

Info

Publication number
CN104050413A
CN104050413A CN201310080227.7A CN201310080227A CN104050413A CN 104050413 A CN104050413 A CN 104050413A CN 201310080227 A CN201310080227 A CN 201310080227A CN 104050413 A CN104050413 A CN 104050413A
Authority
CN
China
Prior art keywords
data
process data
dangerous
scan
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310080227.7A
Other languages
Chinese (zh)
Inventor
李荣均
吴钟炜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201310080227.7A priority Critical patent/CN104050413A/en
Priority to PCT/CN2013/088621 priority patent/WO2014139295A1/en
Publication of CN104050413A publication Critical patent/CN104050413A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/568Computer malware detection or handling, e.g. anti-virus arrangements eliminating virus, restoring damaged files

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Virology (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a method for data processing. The method comprise the following steps: scanning process data after the state that the process data are started is monitored; clearing risk data once the risk data are scanned in the process data; taking original data, which correspond to data modified by the risk data, from a server, and replacing the data, modified by the risk data, with the original data. The embodiment of the invention also provides a corresponding terminal. According to the technical scheme adopted by the invention, as the data broken by the risk data can be restored after the risk data are cleared, and therefore, the safety performance of the system is improved.

Description

A kind of method of data processing and terminal
Technical field
The present invention relates to technical field of data processing, be specifically related to a kind of method and terminal of data processing.
Background technology
The security system of terminal has following several safeguard procedures at present:
The first safeguard procedures are: by download protect, file monitor mode carries out security of system protection.Although this safeguard procedures can stop viral invasion on source, but still have certain situation, cause viral wooden horse can invade subscriber set, for example: 1) new virus wooden horse is walked around the monitoring of antivirus software; 2) user behavior is selected this virus of letting pass; 3) user has suffered viral wooden horse after having closed antivirus software protection; 4) subscriber set has suffered viral wooden horse antivirus software has been installed again.
The second safeguard procedures are: by real-time protection, carry out security of system protection.But real-time protection is the mode that belongs to single-point defence, only can tackle the action of some danger, cannot be further processed risk, cannot clear up thoroughly and repair the damage that it causes to virus.
The third safeguard procedures are: by wooden horse killing, carry out security of system protection.Wooden horse killing, although can carry out deactivation to common viral wooden horse, processes the destruction that viral wooden horse causes, and needs user's manual triggers, and cannot find out the potential threat of parent cleaning machine of viral wooden horse.
The present inventor's discovery, several safety prevention measures of the prior art have deficiency, after cleaning virus, cannot repair the file being destroyed by the virus.
Summary of the invention
The embodiment of the present invention provides a kind of method of data processing, can after the dangerous data of cleaning, repair by the data of dangerous data corruption, and the safety that has improved system is energy.
First aspect present invention provides a kind of method of data processing, comprising:
After monitoring process data and being activated, scan described process data;
Once scan dangerous data in described process data, clear up described dangerous data;
From server end, transfer by raw data corresponding to the data of described dangerous data modification, by described raw data, replace by the data of described dangerous data modification.
In conjunction with first aspect, in the possible implementation of the first, described in monitor the step that process data is activated after, also comprise:
Obtain other process data that are associated with described process data;
Corresponding, described method also comprises:
Scan other process data that are associated with described process data;
Once scan dangerous data in other process data that are associated with described process data, clear up described dangerous data.
In conjunction with the possible implementation of first aspect the first, in the possible implementation of the second, described in monitor the step that process data is activated after, also comprise:
Record the information of described process data;
The described dangerous data of described cleaning, comprising:
By the information reporting of the information of described process data and described dangerous data, give described server, when receiving described process data that described server confirms and having the information of risk, again to described process data and with other process data that are associated of described process data, scan comprehensively;
When scanning described process data and also have other dangerous data with other process data that are associated of described process data, clear up all dangerous data that scan.
In conjunction with the possible implementation of first aspect the second, in the third possible implementation, before the step of all dangerous data that scan of described cleaning, also comprise:
All dangerous data that scan are reported to described server;
The all dangerous data that scan of described cleaning, comprising:
When knowing that by described server described all dangerous data that scan enter into force, and clear up all dangerous data that scan.
In conjunction with first aspect, first aspect the first to the third any one in may implementation, in the 4th kind of possible implementation, described method also comprises:
The information that shows cleaned dangerous data.
Second aspect present invention provides a kind of terminal, comprising:
Monitoring means, starts for monitoring process data;
Scanning element, for after monitoring process data at described monitoring means and being activated, scans described process data;
Cleaning unit, once for scanning the dangerous data of described process data when described scanning element, clear up described dangerous data;
Repair unit, for after the described dangerous data of described cleaning unit cleaning, from server end, transfer by raw data corresponding to the data of described dangerous data modification, by described raw data, replace by the data of described dangerous data modification.
In conjunction with second aspect, in the possible implementation of the first, described terminal also comprises:
Acquiring unit, for obtaining other process data that are associated with described process data;
Described scanning element, also for scan described acquiring unit that obtain with other process data that are associated described process data;
Described cleaning unit, once also retouch the dangerous data of other process data that are associated with described process data for sweeping described scanning element, clears up described dangerous data.
In conjunction with the possible implementation of second aspect the first, in the possible implementation of the second, described terminal also comprises:
Record cell, for recording the information of described process data;
Described cleaning unit comprises:
Report subelement, for giving described server by the information reporting of the information of the process data of described recording unit records and described dangerous data;
Receive subelement, for receiving the described process data of described server confirmation, have the information of risk;
Scanning subelement while there is the information of risk for receiving described process data when described reception subelement, scans to described process data and with other process data that are associated of described process data again comprehensively;
Cleaning subelement, when scanning described process data when described scanning subelement and also having other dangerous data with other process data that are associated of described process data, clears up all dangerous data that scan.
In conjunction with the possible implementation of second aspect the second, in the third possible implementation,
The described subelement that reports, also reports described server for the dangerous data that described scanning subelement is scanned;
Described cleaning subelement, also knows that by described server described all dangerous data that scan enter into force, and clear up all dangerous data that scan for working as.
In conjunction with second aspect, second aspect the first to the third any one in may implementation, in the 4th kind of possible implementation, described terminal also comprises:
Display unit, for showing the information of cleaned dangerous data.
The embodiment of the present invention scans described process data after adopting and monitoring process data and be activated; Once scan dangerous data in described process data, clear up described dangerous data; From server end, transfer by raw data corresponding to the data of described dangerous data modification, by described raw data, replace by the data of described dangerous data modification.With in prior art, clear up after virus, the data that are destroyed by the virus cannot be repaired and be compared, the method for the data processing that the embodiment of the present invention provides can be repaired by the data of dangerous data corruption after the dangerous data of cleaning, the safety that has improved system is energy.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme in the embodiment of the present invention, below the accompanying drawing of required use during embodiment is described is briefly described, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those skilled in the art, do not paying under the prerequisite of creative work, can also obtain according to these accompanying drawings other accompanying drawing.
Fig. 1 is an embodiment schematic diagram of method in the embodiment of the present invention;
Fig. 2 is an application scenarios embodiment schematic diagram in the embodiment of the present invention;
Fig. 3 is an embodiment schematic diagram of terminal in the embodiment of the present invention;
Fig. 4 is another embodiment schematic diagram of terminal in the embodiment of the present invention;
Fig. 5 is another embodiment schematic diagram of terminal in the embodiment of the present invention;
Fig. 6 is another embodiment schematic diagram of terminal in the embodiment of the present invention;
Fig. 7 is another embodiment schematic diagram of terminal in the embodiment of the present invention;
Fig. 8 is an embodiment schematic diagram of system in the embodiment of the present invention.
Embodiment
The embodiment of the present invention provides a kind of method of data processing, can after the dangerous data of cleaning, repair by the data of dangerous data corruption, and the safety that has improved system is energy.Below be elaborated respectively.
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is only the present invention's part embodiment, rather than whole embodiment.Embodiment based in the present invention, those skilled in the art, not making the every other embodiment obtaining under creative work prerequisite, belong to the scope of protection of the invention.
Consult Fig. 1, in the embodiment of the present invention, an embodiment of the method for data processing comprises;
101, after terminal monitoring is activated to process data, scan described process data.
In the embodiment of the present invention, process data can be QQ process data or other process data, if process data is QQ process data, when user logins QQ process, terminal detects QQ process and is activated so, just starts to scan QQ process data.
Once 102, terminal scans dangerous data in described process data, clear up described dangerous data.
Dangerous data in the embodiment of the present invention are virus or wooden horse data, as QQ Trojan for stealing numbers, at present the QQ Trojan for stealing numbers of main flow has four generations of Y9Y, QB robber, QB assassin, The New QB robber, the large class of QQ plunderer five, they steal user QQ account number and password by different modes, steal Q coin remaining sum, propagate pornographic information, utilize user's human connection to carry out advertisement and good friend is carried out to fraud.Once terminal detects the dangerous data of the process being activated, the dangerous data that cleaning detects immediately.
103, terminal is transferred by raw data corresponding to the data of described dangerous data modification from server end, by described raw data, replaces by the data of described dangerous data modification.
After dangerous data being detected, dangerous data can be judged and the raw data of process may be revised, therefore can transfer by raw data corresponding to the data of described dangerous data modification from server end, by described raw data, replace by the data of described dangerous data modification, thereby realize the reparation of data.
The embodiment of the present invention scans described process data after adopting and monitoring process data and be activated; Once scan dangerous data in described process data, clear up described dangerous data; From server end, transfer by raw data corresponding to the data of described dangerous data modification, by described raw data, replace by the data of described dangerous data modification.With in prior art, clear up after virus, the data that are destroyed by the virus cannot be repaired and be compared, the method for the data processing that the embodiment of the present invention provides can be repaired by the data of dangerous data corruption after the dangerous data of cleaning, the safety that has improved system is energy.
Alternatively, on the basis of embodiment corresponding to above-mentioned Fig. 1, in first optional embodiment of the method for the data processing that the embodiment of the present invention provides, described in monitor the step that process data is activated after, can also comprise:
Obtain other process data that are associated with described process data;
Corresponding, described method also comprises:
Scan other process data that are associated with described process data;
Once scan dangerous data in other process data that are associated with described process data, clear up described dangerous data.
In the embodiment of the present invention, the process data being activated may be a sub-process data, also may have parent process before, dangerous data in these subprocess data also may be present in parent process, therefore, can obtain other process data that are associated with described process data, and other process data of association are scanned, in scanning other process data that are associated also during dangerous data, dangerous data in other process data that are associated are cleared up in the lump, to avoid the dangerous data in parent process to threaten again other subprocess data.
Alternatively, on the basis of first optional embodiment corresponding to above-mentioned Fig. 1, in second optional embodiment of the method for the data processing that the embodiment of the present invention provides, described in monitor the step that process data is activated after, can also comprise:
Record the information of described process data;
The described dangerous data of described cleaning, comprising:
By the information reporting of the information of described process data and described dangerous data, give described server, when receiving described process data that described server confirms and having the information of risk, again to described process data and with other process data that are associated of described process data, scan comprehensively;
When scanning described process data and also have other dangerous data with other process data that are associated of described process data, clear up all dangerous data that scan.
In the embodiment of the present invention, the information of process data comprises process name, registration table path, process signature and monitoring identify label (Identity, the information such as ID), terminal by the information reporting of process data to server after, server can be confirmed the risk that described process data exists according to described progress information, if server confirms this process data and has risk, this risk situation can be notified to terminal, terminal can scan to described process data and with other process data that are associated of described process data comprehensively, when scanning described process data and also have other dangerous data with other process data that are associated of described process data, clear up all dangerous data that scan.
Alternatively, on the basis of second optional embodiment corresponding to above-mentioned Fig. 1, in the 3rd optional embodiment of the method for the data processing that the embodiment of the present invention provides, before the step of all dangerous data that scan of described cleaning, can also comprise:
All dangerous data that scan are reported to described server;
The all dangerous data that scan of described cleaning, comprising:
When knowing that by described server described all dangerous data that scan enter into force, and clear up all dangerous data that scan.
In the embodiment of the present invention, in order to confirm the accuracy of the dangerous data of cleaning, terminal reports described server by all dangerous data that scan, and after all dangerous data that scan of server check terminal to report enter into force, notification terminal is cleared up all dangerous data that scan.
Alternatively, in above-mentioned Fig. 1 and first to the 3rd optional embodiment corresponding to Fig. 1, on the basis of any one embodiment, the 4th the optional embodiment that the embodiment of the present invention provides can also comprise: the information that shows cleaned dangerous data.
In the embodiment of the present invention, terminal is cleared up after dangerous data, can show the information of cleaned dangerous data, to point out user all to clear up which virus or wooden horse.
For the ease of understanding, consult Fig. 2, the application scenarios of take is below example, and the process of planting the method for data processing in the embodiment of the present invention is described:
201, terminal monitoring is activated to QQ process data.
In the embodiment of the present invention, take QQ process as example, when QQ process is activated, terminal monitoring is activated to this QQ process data.
202, terminal is obtained other process data associated with QQ process data.
In step 201, monitoring the QQ process being activated may be a subprocess, and this subprocess can have other relevant parent processes, for dangerous data are cleaned out thoroughly, can obtain other process data associated with QQ process data.
203, terminal scanning QQ process data and other process data associated with QQ process data.
204, terminal, when finding that QQ process data and other process data associated with QQ process data exist risk, reports dangerous data to server.
Terminal reports the dangerous data that scan after server, and server can effectively be analyzed the danger coefficient of dangerous data and the risk that terminal is impacted.
205, terminal receives after the confirmation that has risk of server reply, the dangerous data that cleaning scans.
206, terminal, from server calls raw data, is repaired destroyed QQ process data.
In the embodiment of the present invention, the dangerous data relevant to this process data can be cleaned out completely, can repair in time by the data of dangerous data modification again, thus the security that has improved system.
Consult Fig. 3, an embodiment of the terminal that the embodiment of the present invention provides comprises:
Monitoring means 301, starts for monitoring process data;
Scanning element 302, for after monitoring process data at described monitoring means 301 and being activated, scans described process data;
Cleaning unit 303, once for scanning the dangerous data of described process data when described scanning element 302, clear up described dangerous data;
Repair unit 304, for after the described dangerous data of described cleaning unit 303 cleaning, from server end, transfer by raw data corresponding to the data of described dangerous data modification, by described raw data, replace by the data of described dangerous data modification.
In the embodiment of the present invention, monitoring means 301 monitoring process data start; Scanning element 302, after described monitoring means 301 monitors process data and is activated, scans described process data; Once described scanning element 302 is worked as in cleaning unit 303, scan dangerous data in described process data, clear up described dangerous data; Repair unit 304 after the described dangerous data of described cleaning unit 303 cleaning, from server end, transfer by raw data corresponding to the data of described dangerous data modification, by described raw data, replace by the data of described dangerous data modification.Compared with prior art, the terminal that the embodiment of the present invention provides, can effectively recover by the process data of dangerous data corruption, has improved the security performance of system.
On the basis of embodiment corresponding to above-mentioned Fig. 3, consult Fig. 4, another embodiment of the terminal that the embodiment of the present invention provides also comprises:
Acquiring unit 305, for obtaining other process data that are associated with described process data;
Described scanning element 302, also for scanning described acquiring unit 305 other process data that are associated with described process data that obtain;
Described cleaning unit 303, once also retouch the dangerous data of other process data that are associated with described process data for sweeping described scanning element 302, clears up described dangerous data.
On the basis of embodiment corresponding to above-mentioned Fig. 4, consult Fig. 5, another embodiment of the terminal that the embodiment of the present invention provides also comprises:
Record cell 306, for recording the information of described process data;
Described cleaning unit 303 comprises:
Report subelement 3031, for giving described server by the information of process data of described record cell 306 records and the information reporting of described dangerous data;
Receive subelement 3032, for receiving the described process data of described server confirmation, have the information of risk;
Scanning subelement 3033 while there is the information of risk for receiving described process data when described reception subelement 3032, scans to described process data and with other process data that are associated of described process data again comprehensively;
Cleaning subelement 3034, when scanning described process data when described scanning subelement 3033 and also having other dangerous data with other process data that are associated of described process data, clears up all dangerous data that scan.
On the basis of embodiment corresponding to above-mentioned Fig. 5, consult Fig. 6, in another embodiment of the terminal that the embodiment of the present invention provides,
The described subelement 3031 that reports, also reports described server for the dangerous data that described scanning subelement 3033 is scanned;
Described cleaning subelement 3034, also knows that by described server described all dangerous data that scan enter into force, and clear up all dangerous data that scan for working as.
On the basis of embodiment corresponding to above-mentioned Fig. 3, consult Fig. 7, another embodiment of the terminal that the embodiment of the present invention provides also comprises:
Display unit 307, for showing the information of cleaned dangerous data.
Consult Fig. 8, an embodiment of the data handling system that the embodiment of the present invention provides comprises: terminal 30 and server 40,
Terminal 30, for after monitoring process data and being activated, scans described process data; Once scan dangerous data in described process data, clear up described dangerous data; From server end, transfer by raw data corresponding to the data of described dangerous data modification, by described raw data, replace by the data of described dangerous data modification.
Server 40, for confirming the dangerous data of server and the raw data of process data being provided.
One of ordinary skill in the art will appreciate that all or part of step in the whole bag of tricks of above-described embodiment is to come the hardware that instruction is relevant to complete by program, this program can be stored in a computer-readable recording medium, and storage medium can comprise: ROM, RAM, disk or CD etc.
Method and the terminal of the data processing above embodiment of the present invention being provided are described in detail, applied specific case herein principle of the present invention and embodiment are set forth, the explanation of above embodiment is just for helping to understand method of the present invention and core concept thereof; , for one of ordinary skill in the art, according to thought of the present invention, all will change in specific embodiments and applications, in sum, this description should not be construed as limitation of the present invention meanwhile.

Claims (10)

1. a method for data processing, is characterized in that, comprising:
After monitoring process data and being activated, scan described process data;
Once scan dangerous data in described process data, clear up described dangerous data;
From server end, transfer by raw data corresponding to the data of described dangerous data modification, by described raw data, replace by the data of described dangerous data modification.
2. method according to claim 1, is characterized in that, described in monitor the step that process data is activated after, also comprise:
Obtain other process data that are associated with described process data;
Corresponding, described method also comprises:
Scan other process data that are associated with described process data;
Once scan dangerous data in other process data that are associated with described process data, clear up described dangerous data.
3. method according to claim 2, is characterized in that, described in monitor the step that process data is activated after, also comprise:
Record the information of described process data;
The described dangerous data of described cleaning, comprising:
By the information reporting of the information of described process data and described dangerous data, give described server, when receiving described process data that described server confirms and having the information of risk, again to described process data and with other process data that are associated of described process data, scan comprehensively;
When scanning described process data and also have other dangerous data with other process data that are associated of described process data, clear up all dangerous data that scan.
4. method according to claim 3, is characterized in that, before the step of all dangerous data that scan of described cleaning, also comprises:
All dangerous data that scan are reported to described server;
The all dangerous data that scan of described cleaning, comprising:
When knowing that by described server described all dangerous data that scan enter into force, and clear up all dangerous data that scan.
5. according to the method described in claim 1~4 any one, it is characterized in that, described method also comprises:
The information that shows cleaned dangerous data.
6. a terminal, is characterized in that, comprising:
Monitoring means, starts for monitoring process data;
Scanning element, for after monitoring process data at described monitoring means and being activated, scans described process data;
Cleaning unit, once for scanning the dangerous data of described process data when described scanning element, clear up described dangerous data;
Repair unit, for after the described dangerous data of described cleaning unit cleaning, from server end, transfer by raw data corresponding to the data of described dangerous data modification, by described raw data, replace by the data of described dangerous data modification.
7. terminal according to claim 6, is characterized in that, described terminal also comprises:
Acquiring unit, for obtaining other process data that are associated with described process data;
Described scanning element, also for scan described acquiring unit that obtain with other process data that are associated described process data;
Described cleaning unit, once also retouch the dangerous data of other process data that are associated with described process data for sweeping described scanning element, clears up described dangerous data.
8. terminal according to claim 7, is characterized in that, described terminal also comprises:
Record cell, for recording the information of described process data;
Described cleaning unit comprises:
Report subelement, for giving described server by the information reporting of the information of the process data of described recording unit records and described dangerous data;
Receive subelement, for receiving the described process data of described server confirmation, have the information of risk;
Scanning subelement while there is the information of risk for receiving described process data when described reception subelement, scans to described process data and with other process data that are associated of described process data again comprehensively;
Cleaning subelement, when scanning described process data when described scanning subelement and also having other dangerous data with other process data that are associated of described process data, clears up all dangerous data that scan.
9. terminal according to claim 8, is characterized in that,
The described subelement that reports, also reports described server for the dangerous data that described scanning subelement is scanned;
Described cleaning subelement, also knows that by described server described all dangerous data that scan enter into force, and clear up all dangerous data that scan for working as.
10. according to the terminal described in claim 6~9 any one, it is characterized in that, described terminal also comprises:
Display unit, for showing the information of cleaned dangerous data.
CN201310080227.7A 2013-03-13 2013-03-13 Method for data processing and terminal Pending CN104050413A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201310080227.7A CN104050413A (en) 2013-03-13 2013-03-13 Method for data processing and terminal
PCT/CN2013/088621 WO2014139295A1 (en) 2013-03-13 2013-12-05 Data processing method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310080227.7A CN104050413A (en) 2013-03-13 2013-03-13 Method for data processing and terminal

Publications (1)

Publication Number Publication Date
CN104050413A true CN104050413A (en) 2014-09-17

Family

ID=51503232

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310080227.7A Pending CN104050413A (en) 2013-03-13 2013-03-13 Method for data processing and terminal

Country Status (2)

Country Link
CN (1) CN104050413A (en)
WO (1) WO2014139295A1 (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101046836A (en) * 2006-03-29 2007-10-03 联想(北京)有限公司 System and method for removing ROOTKIT
CN101350052A (en) * 2007-10-15 2009-01-21 北京瑞星国际软件有限公司 Method and apparatus for discovering malignancy of computer program
CN101950336A (en) * 2010-08-18 2011-01-19 奇智软件(北京)有限公司 Method and device for removing malicious programs
CN102081722A (en) * 2011-01-04 2011-06-01 奇智软件(北京)有限公司 Method and device for protecting appointed application program
CN102473221A (en) * 2009-09-01 2012-05-23 株式会社日立制作所 Unauthorized process detection method and unauthorized process detection system
CN102629310A (en) * 2012-02-29 2012-08-08 卡巴斯基实验室封闭式股份公司 System and method for protecting computer system from being infringed by activities of malicious objects
CN102855181A (en) * 2011-07-01 2013-01-02 腾讯科技(深圳)有限公司 Software repairing method and system

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100490389C (en) * 2006-03-10 2009-05-20 四川大学 Tolerant invading method for network information system
CN102012982A (en) * 2010-11-17 2011-04-13 许丽涛 Method and device for protecting safe operation of intelligent device
CN102915422B (en) * 2012-06-21 2016-08-03 北京金山安全软件有限公司 computer security protection method, device and system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101046836A (en) * 2006-03-29 2007-10-03 联想(北京)有限公司 System and method for removing ROOTKIT
CN101350052A (en) * 2007-10-15 2009-01-21 北京瑞星国际软件有限公司 Method and apparatus for discovering malignancy of computer program
CN102473221A (en) * 2009-09-01 2012-05-23 株式会社日立制作所 Unauthorized process detection method and unauthorized process detection system
CN101950336A (en) * 2010-08-18 2011-01-19 奇智软件(北京)有限公司 Method and device for removing malicious programs
CN102081722A (en) * 2011-01-04 2011-06-01 奇智软件(北京)有限公司 Method and device for protecting appointed application program
CN102855181A (en) * 2011-07-01 2013-01-02 腾讯科技(深圳)有限公司 Software repairing method and system
CN102629310A (en) * 2012-02-29 2012-08-08 卡巴斯基实验室封闭式股份公司 System and method for protecting computer system from being infringed by activities of malicious objects

Also Published As

Publication number Publication date
WO2014139295A1 (en) 2014-09-18

Similar Documents

Publication Publication Date Title
Çetin et al. Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai.
US7269851B2 (en) Managing malware protection upon a computer network
CN110717183B (en) Virus checking and killing method, device, equipment and storage medium
US8196204B2 (en) Active computer system defense technology
US20160232349A1 (en) Mobile malware detection and user notification
CN105939311A (en) Method and device for determining network attack behavior
CN104781824A (en) Dynamic quarantining for malware detection
CN105653974B (en) A kind of document means of defence and device
Kaushik et al. Detection of attacks in an intrusion detection system
CN109784043A (en) Attack restoring method, device, electronic equipment and storage medium
CN109995727A (en) Penetration attack behavior active protection method, device, equipment and medium
CN110602135A (en) Network attack processing method and device and electronic equipment
CN110417709B (en) Early warning method for Lesso software attack, server and computer readable storage medium
CN107330331B (en) Method, device and system for identifying system with vulnerability
US20240031407A1 (en) Honeypot Network Management Based on Probabilistic Detection of Malicious Port Activity
US20080295153A1 (en) System and method for detection and communication of computer infection status in a networked environment
CN112583841B (en) Virtual machine safety protection method and system, electronic equipment and storage medium
CN113037774B (en) Security management method, device, equipment and machine readable storage medium
CN102915359B (en) File management method and device
CN115643041A (en) Vulnerability processing method, management equipment and gateway equipment
CN112751861A (en) Malicious mail detection method and system based on dense network and network big data
CN104050413A (en) Method for data processing and terminal
CN113986843A (en) Data risk early warning processing method and device and electronic equipment
CN112398784B (en) Method and device for defending vulnerability attack, storage medium and computer equipment
CN109255243B (en) Method, system, device and storage medium for repairing potential threats in terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20140917

RJ01 Rejection of invention patent application after publication