CN108388803A - It is a kind of can place bogusware by system - Google Patents

It is a kind of can place bogusware by system Download PDF

Info

Publication number
CN108388803A
CN108388803A CN201810244361.9A CN201810244361A CN108388803A CN 108388803 A CN108388803 A CN 108388803A CN 201810244361 A CN201810244361 A CN 201810244361A CN 108388803 A CN108388803 A CN 108388803A
Authority
CN
China
Prior art keywords
module
virus
monitoring
bogusware
viral
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201810244361.9A
Other languages
Chinese (zh)
Inventor
张宙明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Shuang Mdt Infotech Ltd
Original Assignee
Suzhou Shuang Mdt Infotech Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Shuang Mdt Infotech Ltd filed Critical Suzhou Shuang Mdt Infotech Ltd
Priority to CN201810244361.9A priority Critical patent/CN108388803A/en
Publication of CN108388803A publication Critical patent/CN108388803A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses it is a kind of can place bogusware by system, including total processing module, Virus Info processing module, anti-viral detection module, viral data memory module, information conveyance module, monitoring module, information channel module and collection virus module.The beneficial effects of the invention are as follows:By the way that total processing module is connected anti-viral detection module, enable total processing module that virus collected by anti-viral detection module is carried out calculation processing, by the way that anti-viral detection module is connected collection virus module, the virus of collection virus module collection is detected by anti-viral detection module, by the way that information channel module is connected monitoring module, virus in information channel is monitored by monitoring module, by by monitoring module link information conveyor module so that the information that monitoring module is collected can be conveyed by information conveyance module.

Description

It is a kind of can place bogusware by system
Technical field
The present invention relates to a kind of system, specially it is a kind of can place bogusware by system.
Background technology
Computer virus is the code of destruction computer function or data that organizer is inserted into computer program, energy It influences computer to use, the one group of computer instruction or program code of energy self-replacation.Computer virus has propagated, hidden Covering property, infectivity, latency, excitability, expression power or destructiveness.The life cycle of computer virus:Development period → infection Phase → incubation period → stage of attack → discovery period → period of digestion → extinction phase.Computer virus is a program, one section of executable code. Just as biological virus, there is the biological virus features such as self-reproduction, mutual phase transmission and activating and regenerating.Computer virus has Unique replication capacity, they can quickly spread, and be often difficult to eradicate.They can be attached to itself various types of texts On part, as soon as when file is replicated or is transmitted to another user from a user, they spread together in company with file comes.
But it is existing place bogusware by system there is certain defect in design, existing placements is viral Software by system structure it is simple, transportational process cannot be measured in real time, it is produced when to be not easy to find out transport The problem of.
Invention content
The purpose of the present invention is that simple in order to solve above structure, cannot be measured in real time to transportational process, from And the problem that when being not easy to find out transport and provide it is a kind of can place bogusware by system.
The present invention is achieved through the following technical solutions above-mentioned purpose, it is a kind of can place bogusware by system, Including total processing module, Virus Info processing module, anti-viral detection module, viral data memory module, information conveyance module, prison Block, information channel module and collection virus module are touched in control;Total processing module connects the anti-viral detection module, the virus Detection module connects the collection virus module, and total processing module connects the Virus Info processing module, the virus The message processing module connection viral data memory module.
A kind of technical optimization scheme as the present invention:Virus data memory module connection described information channel mould Block.
A kind of technical optimization scheme as the present invention:Described information channel module connects the monitoring module.
A kind of technical optimization scheme as the present invention:The monitoring module connects described information conveyor module.
A kind of technical optimization scheme as the present invention:Total processing module connects the monitoring module.
The beneficial effects of the invention are as follows:By the way that total processing module is connected anti-viral detection module so that total processing module energy It is enough that virus collected by anti-viral detection module is subjected to calculation processing, by the way that anti-viral detection module is connected collection virus module, The virus of collection virus module collection is detected by anti-viral detection module, is supervised by connecting information channel module Control module so that the virus in information channel can be monitored by monitoring module, by by monitoring module link information Conveyor module so that the information that monitoring module is collected can be conveyed by information conveyance module.
Description of the drawings
Fig. 1 is overall structure of the present invention.
In figure:1, total processing module, 2, Virus Info processing module, 3, anti-viral detection module, 4, viral data store mould Block, 5, information conveyance module, 6, monitoring module, 7, information channel module, 8, collection virus module.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation describes, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
Refering to Figure 1, it is a kind of can place bogusware by system, including total processing module 1, Virus Info Block 6, information channel mould are touched in processing module 2, anti-viral detection module 3, viral data memory module 4, information conveyance module 5, monitoring Block 7 and collection virus module 8;Total processing module 1 connects anti-viral detection module 3, and anti-viral detection module 3 connects collection virus mould Block 8, total processing module 1 connect Virus Info processing module 2, and Virus Info processing module 2 connects viral data memory module 4.
4 link information channel module 7 of viral data memory module.
Information channel module 7 connects monitoring module 6.
6 link information conveyor module 5 of monitoring module.
Total processing module 1 connects monitoring module 6.
In the use of the present invention, first, by the way that total processing module is connected anti-viral detection module so that total processing module energy It is enough that virus collected by anti-viral detection module is subjected to calculation processing, by the way that anti-viral detection module is connected collection virus module, The virus of collection virus module collection is detected by anti-viral detection module, is supervised by connecting information channel module Control module so that the virus in information channel can be monitored by monitoring module, by by monitoring module link information Conveyor module so that the information that monitoring module is collected can be conveyed by information conveyance module.
It is obvious to a person skilled in the art that invention is not limited to the details of the above exemplary embodiments, Er Qie In the case of without departing substantially from spirit or essential attributes of the invention, the present invention can be realized in other specific forms.Therefore, no matter From the point of view of which point, the present embodiments are to be considered as illustrative and not restrictive, and the scope of the present invention is by appended power Profit requires rather than above description limits, it is intended that all by what is fallen within the meaning and scope of the equivalent requirements of the claims Variation is included within the present invention.Any reference signs in the claims should not be construed as limiting the involved claims.
In addition, it should be understood that although this specification is described in terms of embodiments, but not each embodiment is only wrapped Containing an independent technical solution, this description of the specification is merely for the sake of clarity, and those skilled in the art should It considers the specification as a whole, the technical solutions in the various embodiments may also be suitably combined, forms those skilled in the art The other embodiment being appreciated that.

Claims (5)

1. it is a kind of can place bogusware by system, including total processing module (1), Virus Info processing module (2), disease Block (6), information channel module (7) are touched in malicious detection module (3), viral data memory module (4), information conveyance module (5), monitoring With collection virus module (8);It is characterized in that:Total processing module (1) connects the anti-viral detection module (3), the disease Malicious detection module (3) connects the collection virus module (8), and total processing module (1) connects the Virus Info and handles mould Block (2), Virus Info processing module (2) the connection viral data memory module (4).
2. it is according to claim 1 it is a kind of can place bogusware by system, it is characterised in that:The virus number According to memory module (4) connection described information channel module (7).
3. it is according to claim 2 it is a kind of can place bogusware by system, it is characterised in that:Described information is logical Road module (7) connects the monitoring module (6).
4. it is according to claim 1 it is a kind of can place bogusware by system, it is characterised in that:The monitoring mould Block (6) connects described information conveyor module (5).
5. it is according to claim 1 it is a kind of can place bogusware by system, it is characterised in that:Total processing Module (1) connects the monitoring module (6).
CN201810244361.9A 2018-03-23 2018-03-23 It is a kind of can place bogusware by system Withdrawn CN108388803A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810244361.9A CN108388803A (en) 2018-03-23 2018-03-23 It is a kind of can place bogusware by system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810244361.9A CN108388803A (en) 2018-03-23 2018-03-23 It is a kind of can place bogusware by system

Publications (1)

Publication Number Publication Date
CN108388803A true CN108388803A (en) 2018-08-10

Family

ID=63067020

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810244361.9A Withdrawn CN108388803A (en) 2018-03-23 2018-03-23 It is a kind of can place bogusware by system

Country Status (1)

Country Link
CN (1) CN108388803A (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104504338A (en) * 2015-01-23 2015-04-08 北京瑞星信息技术有限公司 Method and device for identifying, acquiring and collecting virus propagation routes

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104504338A (en) * 2015-01-23 2015-04-08 北京瑞星信息技术有限公司 Method and device for identifying, acquiring and collecting virus propagation routes

Similar Documents

Publication Publication Date Title
Thurner et al. A network-based explanation of why most COVID-19 infection curves are linear
Bobay et al. Biological species in the viral world
Xu et al. A new feather type in a nonavian theropod and the early evolution of feathers
Palukaitis et al. Cucumoviruses.
CN104756097B (en) consistency protocol table
CN104838373B (en) For the devices, systems, and methods of multiple calculate node management based on single microcontroller
CN108829614A (en) Predictive reading in buffer storage
Sánchez-Pacheco et al. Median-joining network analysis of SARS-CoV-2 genomes is neither phylogenetic nor evolutionary
CN110442652A (en) A kind of across chain data processing method and device based on block chain
CN102571494B (en) Field programmable gate array-based (FPGA-based) intrusion detection system and method
CN109299164A (en) A kind of data query method, computer readable storage medium and terminal device
CN103309652A (en) Method and apparatus for initiating a collective operation in a parallel computer
US9824312B2 (en) Domain specific languages and complex event handling for mobile health machine intelligence systems
CN106155970A (en) Automatically hardware recovery method and automatically hardware recovery system
Liu et al. Natural language processing to ascertain two key variables from operative reports in ophthalmology
Kpozehouen et al. Using open-source intelligence to detect early signals of COVID-19 in China: descriptive study
Li et al. Duckcore: A fault-tolerant processor core architecture based on the risc-v isa
CN109165261A (en) Method of data synchronization, device, server and computer storage medium
CN108388803A (en) It is a kind of can place bogusware by system
Wang et al. Two-stage checkpoint based security monitoring and fault recovery architecture for embedded processor
Thuy et al. Identifying new resistance to cassava mosaic disease and validating markers for the CMD2 locus
CN108154033A (en) A kind of method, apparatus, electronic equipment and the storage medium of administrative vulnerability information
CN101771675B (en) Method and device for implementing feature matching of data packet
CN103957131A (en) Deep massage detection method based on finite automata
CN103927153B (en) A kind of method of system configuration, equipment and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20180810

WW01 Invention patent application withdrawn after publication