WO2006053488A1 - Procede pour faire fonctionner un anti-virus et ordinateur correspondant - Google Patents

Procede pour faire fonctionner un anti-virus et ordinateur correspondant Download PDF

Info

Publication number
WO2006053488A1
WO2006053488A1 PCT/CN2005/001922 CN2005001922W WO2006053488A1 WO 2006053488 A1 WO2006053488 A1 WO 2006053488A1 CN 2005001922 W CN2005001922 W CN 2005001922W WO 2006053488 A1 WO2006053488 A1 WO 2006053488A1
Authority
WO
WIPO (PCT)
Prior art keywords
virus
computer
module
killing
operating system
Prior art date
Application number
PCT/CN2005/001922
Other languages
English (en)
French (fr)
Inventor
Wanding Wang
Yahui Li
Original Assignee
Lenovo (Beijing) Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo (Beijing) Limited filed Critical Lenovo (Beijing) Limited
Publication of WO2006053488A1 publication Critical patent/WO2006053488A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/572Secure firmware programming, e.g. of basic input output system [BIOS]

Definitions

  • the invention relates to the field of killing computer viruses, in particular to a method for implementing killing viruses and a computer for implementing the method. Background technique
  • one of the present invention is to provide a method for killing a virus, which can also implement a virus killing operation when the computer cannot normally enter the operating system.
  • Another object of the present invention is to provide a computer for killing viruses which is capable of giving the user a clear operational prompt.
  • a method for killing a virus is provided.
  • An embedded system and an antivirus module are disposed in a host protection area (HPA) of a hard disk, and the method includes the steps of: a basic input/output system (BIOS) Performing a self-test; detecting an embedded system in the HPA area when detecting a signal to perform an anti-virus operation; the embedded system invoking the anti-virus module to perform a killing virus operation; and loading the operating system to start the computer.
  • the system security check module is preset in the HPA area of the hard disk, and the method further includes the step of: in the case that the virus killing operation ends and the virus is not detected, the embedded system calls the system security check.
  • Module check the computer system for security vulnerabilities; If there is a security hole in the computer system, perform security hardening according to the check result and then load the operating system to start the computer; if the computer system does not have security vulnerabilities, directly load the operating system to start the computer.
  • the system repair module is preset in the HPA area of the hard disk, and the method further includes the steps of: in the case that the computer system does not have a security vulnerability, the embedded system calls the system repair module, and operates The system repairs and then starts the computer.
  • the killing of the virus includes the following steps: killing the virus and determining whether to kill the virus; if the virus is not detected, updating the virus rule base, and then performing the killing operation again.
  • the method for updating the virus rule base includes: updating the virus rule base through the network, or updating the virus rule base by using a floppy disk or a mobile hard disk, or updating the virus rule base according to a specified directory in the hard disk, or adopting any combination of the above three The way to update the virus rule base.
  • the function calling module is preset in the HPA area of the hard disk, and the method for the BIOS to start the embedded system in the HPA area includes the following steps: after the BIOS self-test ends and detects the signal of performing the anti-virus operation, in the memory The specified location is used to start the parameters of the embedded system; the function calling module is called, and the function calling module detects the presence of the parameters of the embedded system in the specified location in the memory, and starts the embedded system in the HPA area.
  • the specified location in memory is the F000 segment in memory.
  • the method further includes: after the operating system detects the signal of performing the anti-virus operation, the anti-virus module in the operating system is started, and the anti-virus operation is performed.
  • a computer for killing a virus comprising: a function key for directly starting a killing function, the function key being connected to a module for identifying key information in a computer host.
  • the module for identifying the button information includes a module for identifying the button information in the BIOS and a module for identifying the button information in the operating system. '
  • the function keys for directly starting the anti-virus function are set on the host computer, or on the keyboard, or on the mouse, or on the display.
  • the invention sets an embedded system and an anti-virus module in the HPA area of the hard disk.
  • the BIOS self-test ends and detects the signal of performing the anti-virus operation
  • the embedded system in the HPA area is started, and the embedded system is adjusted.
  • Use the anti-virus module to perform a killing operation, and then load the operating system to start the computer.
  • the operation of killing the virus can be performed before the operating system is loaded, so that even if the virus that causes the computer to start normally is infected by an "oscillation wave", the system can perform the operation of killing the virus.
  • the anti-virus method described in the present invention does not depend on the operating system, it is possible to detect and kill viruses that cannot be detected under the operating system, and to detect and boot the system-guided virus, thereby achieving complete antivirus and avoiding Some viruses may shut down anti-virus software.
  • the application of the invention can also perform system security check, repair operations on the operating system, and further ensure the security of the computer.
  • the invention also provides a computer for realizing killing a virus, wherein the computer has a function key specially used for starting the killing and killing of the virus function.
  • the user can directly press the button. , to provide users with clear operational tips, to maximize the user's application.
  • FIG. 1 is a schematic diagram showing the principle of an embodiment of a computer for killing a virus
  • the figure shows a schematic diagram of a process of starting a computer by using the BIOS of the present invention
  • Figure 3 shows a flow chart of the anti-virus and repair operations performed by the embedded system in the H PA zone. detailed description
  • FIG. 1 is a schematic diagram showing the principle of an embodiment of a computer capable of killing viruses.
  • a function key 111 for directly starting the anti-virus function is added to the keyboard 110 of the computer, and the function key 111 is directly connected to the module 121 for identifying the button information in the computer host 120, so that the original host
  • the module 121 for identifying the button information can recognize the added function key 111 for directly starting the antivirus function.
  • the function key 111 and the module 121 for identifying the button information may be connected through a PS2 interface, or a USB interface, or a wireless interface, or a 1394 interface, or other interfaces, and the connection manner is not limited herein.
  • the module 121 for identifying the button information includes a module for identifying the button information in the BIOS and a module for identifying the button information in the operating system.
  • the key information from the function key 111 can be recognized regardless of whether the operating system can be loaded normally after the computer is turned on. In other words, when the user needs a computer to perform a virus killing operation, simply press this button directly, which is convenient for the user's application.
  • the function key 111 for directly starting the antivirus function in the above embodiment may also be Set on the keyboard, and set on the host, or mouse, or display. That is, the actual position of the function key 111 is not limited in the present invention as long as it is convenient for the user to use.
  • the module that recognizes the key information in the operating system detects the signal of performing the anti-virus operation, that is, the signal from the function key for directly starting the anti-virus function
  • the operating system directly calls itself.
  • the loaded anti-virus module performs anti-virus operations.
  • the specific implementation process is basically the same as the existing activation of the anti-virus module through the keyboard or the mouse, and the process of performing the anti-virus operation is basically the same. The only difference is that the anti-virus module is directly activated through the function key that has been set, instead of activating the anti-virus module through a keyboard or a mouse. .
  • the following describes the method of killing a virus when the operating system cannot be loaded normally after the computer is booted.
  • HPA Host Protected Area
  • BIOS basic input/output system
  • DOS DOS
  • the ordinary hard disk area for the user is divided into C disk, D disk...
  • the HPA area of the hard disk is divided into three areas, which are system backup areas for loading system backup files, and are used for loading and checking.
  • the anti-virus repair area of the anti-virus function embedded system, and the function call area for loading the function call module see Table 1.
  • the embedded system for performing the killing virus function is an embedded Linux system, which has the most basic operating system function, and can call the preset anti-virus module in the area, the system security check module, the system repair module, etc. functional module.
  • Step 201 to step 202 booting up, after the end of the BIOS self-test, detecting whether there is a signal for directly starting the anti-virus operation, that is, whether the function key for directly starting the anti-virus function is pressed, and if so, executing step 203, otherwise Go to step 204.
  • Step 203 Specify a location in the memory, such as a segment F000, and set a parameter for starting the embedded system.
  • Step 204 Call a function calling module in the HPA area, and the function calling module starts the embedded system parameter according to the specified location in the memory. To determine whether to start the embedded system, if there is, then start
  • the embedded system in the HPA zone performs a virus killing operation, and then loads the operating system to start the computer; otherwise, the operating system is directly loaded to start the computer.
  • Step 301 The embedded system in the HPA area invokes an anti-virus module in the area to perform a virus killing operation.
  • the anti-virus module can be a fast anti-virus module or a comprehensive fast anti-virus module. The difference between the two is that the check scope is different, and the time required to kill the virus is different.
  • step 302 it is determined whether the virus is detected or not. If yes, step 310 is performed; otherwise, step 303 is performed. Step 303, updating the virus rule base in the HPA area. In the specific implementation, you can update the virus rule base by using the floppy disk or the mobile hard disk, or update the virus rule base through the hard disk specified directory, or update the virus rule base through the network or update the virus rule base by any combination of the above three.
  • the method for updating the virus rule base by using a floppy disk or a mobile hard disk is: the embedded system reads the virus rule base in the floppy disk or the mobile hard disk, and implements the update of the virus rule base, and the virus rule base in the floppy disk or the mobile hard disk is the user from the one. Downloaded on a good computer.
  • This update method is suitable for all types of computers, but requires user involvement.
  • the implementation method of updating the virus rule base through the specified directory of the hard disk is: the embedded system directly reads the specified directory in the operating system, and implements updating the virus rule base.
  • the update method does not require user participation, but if the latest virus rule base is not stored in the specified directory in the system, the method cannot be updated by applying this method.
  • the method of updating the virus rule base through the network is: the embedded system directly searches the Internet for the latest virus rule base, and downloads and updates the virus rule base.
  • This update method does not require user involvement, nor does it need to worry about virus attack during the process of upgrading the virus's rule base, because there is no entry for virus intrusion in the embedded system, but the method must be preset globally.
  • Step 304 the antivirus module in the local area is called again to perform the operation of killing the virus.
  • step 305 it is determined whether the virus is detected and killed. If yes, step 310 is performed; otherwise, step 306 is performed.
  • step 306 the system security check module is invoked to perform a security check.
  • Step 307 Determine, according to the result of the security check, whether the system has a vulnerability, and if yes, perform step 308; otherwise, perform step 309.
  • Step 308 performing a security hardening operation, and then performing step 310.
  • the above implementation of the system security check module, the security check of the operating system and the repair of the system vulnerabilities are: Check the difference between the operating system and the critical application software patch and the patch version maintained on the background server, if found The patch version on the computer is not the latest version. Copy the latest patch installer to the default directory of the hard disk partition, and copy a shortcut in the boot group directory of the hard disk partition where the operating system is located, so that the shortcut points to the patch. Install the program, and then automatically restart the computer to enter the operating system, the system will automatically execute the shortcut to help users install patches.
  • the method of performing system security check is not limited to this, as long as the security hardening operation can be performed, and the vulnerability of the operating system can be repaired.
  • Step 309 start the system repair module, perform a repair operation on the entire operating system, and then perform step 310.
  • the above method for repairing the entire operating system is as follows: The system repair module is called by the embedded system, and the system repair file uses the system backup file in the HPA area to overwrite the files in the current system, thereby realizing the operation system repair.
  • step 310 restart the computer.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Stored Programmes (AREA)

Description

种实现查杀病毒的方法及实现该方法的计算机
技术领域
本发明涉及查杀计算机病毒技术领域, 特别是指一种实现查杀病毒的方法及 实现该方法的计算机。 背景技术
随着计算机的计算能力和存储能力持续提高, 网络传输速度的提高, 计算机 与周边设备之间信息交换方式的多样化, 网络应用的日益丰富, 人们对计算机的 依赖性不断增强, 对信息安全的需求也越来越高。 与此同时, 黑客的攻击手段也 在不断变化, 各种计算机病毒的杀伤力也越来越强。
现有的防病毒软件大多是运行在原有系统之上的,系统本身的脆弱性会大大 削弱这些方案的实际效果, 最典型的一个例子就是 Windows上的防病毒软件对有 些引导型病毒是无能为力的, 因为这种病毒会在杀毒引擎运行之前发作, 甚至可 能会关闭防病毒软件; 另外当 Windows遇到冲击波、 震荡波这类新型病毒攻击时 会反复重启, 导致防病毒软件根本无法正常升级到最新的病毒规则库, 从而无法 进行有效的杀毒操作; 再有, 有些病毒会在操作系统 (OS) 中争夺系统资源, 影 响杀毒软件的正常运行。 . 发明内容
有鉴于此, 本发明的一个自的在于提供一种查杀病毒的方法, 在计算机不能 正常进入操作系统时, 也能够实现查杀病毒的操作。
本发明的另一目的是提供一种查杀病毒的计算机, 该计算机能够给用户明确 的操作提示。
为达到上述目的,根据本发明的一个方面,提供一种査杀病毒的方法, 在硬盘的 主机保护区域 (HPA)设置有嵌入式系统以及杀毒模块, 该方法包括步骤: 基本输入 输出系统(BIOS)执行自检; 检测到执行杀毒操作的信号时, 启动 HPA区内的嵌入 式系统; 所述嵌入式系统调用杀毒模块执行查杀病毒操作; 和装载操作系统启动计算 机。 优选的是, 在硬盘的 HPA区内预置有系统安全检查模块, 所述方法进一步包括 步骤: 在查杀病毒操作结束且未査杀到病毒的情况下, 所述嵌入式系统调用系统安全 检查模块, 检査计算机系统是否存在安全漏洞; 如果计算机系统存在安全漏洞, 则根 据检查结果进行安全性加固后再装载操作系统启动计算机; 如果计算机系统不存在安 全漏洞, 直接装载操作系统启动计算机。
优选的是,在硬盘的 HPA区内预置有系统修复模块, 所述方法进一步包括步骤: 在检査到计算机系统不存在安全漏洞的情况下, 所述嵌入式系统调用系统修复模块, 对操作系统进行修复, 然后启动计算机。
优选的是, 查杀病毒操作包括以下步骤: 查杀病毒并判断是否查杀到病毒; 如果 没有查杀到病毒, 则更新病毒规则库, 然后再次执行査杀病毒操作。
优选的是, 更新病毒规则库的方式包括: 通过网络更新病毒规则库, 或应用软盘 或移动硬盘更新病毒规则库, 或根据硬盘中的指定目录更新病毒规则库, 或采用以上 三种任意组合的方式更新病毒规则库。
优选的是, 在硬盘的 HPA区内预置有功能调用模块, 所述 BIOS启动 HPA区内 的嵌入式系统的方法包括步骤: 在 BIOS 自检结束并检测到执行杀毒操作的信号后, 在内存中指定位置设置用于启动嵌入式系统的参数; 调用功能调用模块, 所述功能调 用模块检测到内存中指定位置存在启动嵌入式系统的参数后,启动 HPA区内的嵌入式 系统。
优选的是, 内存中指定位置为内存中的 F000段。
优选的是, 在计算机正常启动后需要执行杀毒操作时, 所述方法进一步包括: 操 作系统检测到执行杀毒操作的信号后, 启动操作系统内的杀毒模块, 执行査杀病毒操 作。
根据本发明的另一个方面,提供一种查杀病毒的计算机,包括: 用于直接启动杀 毒功能的功能键, 该功能键与计算机主机内用于识别按键信息的模块连接。
优选的是,识别按键信息的模块包括 BIOS内识别按键信息的模块和操作系统内 识别按键信息的模块。 '
优选的是, 用于直接启动杀毒功能的功能键设置在计算机的主机上, 或键盘 上, 或鼠标上, 或显示器上。
本发明在硬盘的 HPA区设置嵌入式系统以及杀毒模块, 当 BIOS自检结束, 检测到执行杀毒操作的信号后, 启动 HPA区内的嵌入式系统, 由该嵌入式系统调 用杀毒模块执行查杀病毒操作, 然后再装载操作系统启动计算机。 应用本发明, 在操作系统被装载前, 即可执行査杀病毒的操作, 因而即使被 "振荡波"这类使 计算机无法正常启动的病毒感染后, 系统仍能执行查杀病毒的操作。 由于使用本 发明所述的杀毒方法并不依赖于操作系统, 因而, 能够査杀出在操作系统下无法 查杀到的病毒, 以及查杀出系统引导型病毒, 从而实现彻底杀毒, 同时避免了某 些病毒关闭杀毒软件的可能。 另外, 应用本发明还可进行系统安全性检査, 对操 作系统进行修复等操作, 进一步保证了计算机的安全。
本发明还提供了一种实现查杀病毒的计算机, 在该计算机上有一个专门用于 启动查杀病毒功能的功能键, 当用户需要对计算机进行查杀病毒时, 直接按下此 键即可, 给用户提供了明确的操作提示, 最大限度地方便了用户的应用。 附图说明
图 1所示为实现査杀病毒的计算机的一个实施例的原理示意图;
图 所示为应用本发明的 BIOS启动计算机的流程示意图;
图 3所示为 H PA区内的嵌入式系统执行查杀病毒以及修复操作的流程图。 具体实施方式
下面结合附图进一歩详细地描述本发明的实施方式。
图 1所示为能够实现查杀病毒的计算机的一个实施例的原理示意图。在本实 施例中, 在计算机的键盘 110上增设一个用于直接启动杀毒功能的功能键 111, 该功能键 111与计算机主机 120内的用于识别按键信息的模块 121直接相连, 使 得主机内原有的用于识别按键信息的模块 121能够识别该增设的用于直接启动杀 毒功能的功能键 111。 其中, 功能键 111与用于识别按键信息的模块 121可以通 过 PS2接口, 或 USB接口, 或无线接口, 或 1394接口, 或其它接口相连, 在此 并不对连接方式加以限制。 上述识别按键信息的模块 121包括 BIOS内识别按键 信息的模块和操作系统内识别按键信息的模块。 这样, 无论计算机开机后是否能 够正常装载操作系统, 其都能识别来自该功能键 111的按键信息。 也就是说, 当 用户需要计算机执行査杀病毒操作时, 只需直接按下此键即可, 方便了用户的应 用。
当然, 对于上述实施例中的用于直接启动杀毒功能的功能键 111, 也可以不 设置在键盘上, 而设置在主机, 或鼠标, 或显示器上。 即对于该功能键 111 的实 际位置本发明并不限制, 只要方便用户使用即可。
当计算机开机启动并正常装载操作系统后, 如果操作系统内的识别按键信息 的模块检测到执行杀毒操作的信号, 即来自用于直接启动杀毒功能的功能键的信 号后, 操作系统直接调用自身已装载的杀毒模块, 执行杀毒操作。 其具体实现过 程与现有的通过键盘或鼠标激活杀毒模块, 执行杀毒操作的过程基本相同, 区别 仅在于是通过已设置的功能键来直接激活杀毒模块, 而不是通过键盘或鼠标来激 活杀毒模块。
下面具体说明当计算机开机启动后不能正常装载操作系统时, 实现查杀病毒 的方法。
首先, 预先在硬盘上创建一块主机保护区域(HPA: Host Protected Area)空 间, 将硬盘分为供用户使用的普通硬盘区和 HPA区, 通常情况下, 只有在基本输 入输出系统 (BIOS) 和 DOS环境下才能访问该 HPA区内的数据, 而一般的程序 是无法访问该区域的, 因此 HPA区域内的数据是安全的。其次, 将供用户使用的 普通硬盘区划分为 C盘、 D盘……,将硬盘的 HPA区内划分为三个区域, 分别为 用于装载系统备份文件的系统备份区, 用于装载执行査杀病毒功能的嵌入式系统 的杀毒修复区, 以及用于装载功能调用模块的功能调用区, 参见表 1。
杀母
系统 功能
C:\ D:\ … 修复
备份区 调用区
用户硬盘空间 ---HPA 分区硬盘空间
一 - -
1
其中, 上述执行查杀病毒功能的嵌入式系统为嵌入式的 Linux系统, 其具备 最基本的操作系统功能, 能够调用本区域内预设的杀毒模块,系统安'全检查模块、 系统修复模块等功能模块。
当计算机遇到类似 "振荡波"这样的病毒, 导致计算机不停地自动重启时, 用户只需在计算机重启后, 在 POST阶段内按下已设置的用于直接启动杀毒功能 的功能键即可。 具体杀毒过程如下:
图 2所示为应用本发明的 BIOS启动计算机的流程示意图。 步骤 201〜步骤 202, 开机启动, BIOS 自检结束后, 检测是否有直接启动杀 毒操作的信号, 即用于直接启动杀毒功能的功能键是否被按下, 如果是, 则执行 歩骤 203, 否则执行步骤 204。
步骤 203, 在内存中指定位置, 如 F000段, 设置启动嵌入式系统的参数; 步骤 204,调用 HPA区内的功能调用模块, 由该功能调用模块根据内存中指 定位置是否有启动嵌入式系统参数来判断是否启动嵌入式系统, 如果有, 则启动
HPA区内的嵌入式系统, 以执行查杀病毒操作, 之后, 再装载操作系统启动计算 机; 否则直接装载操作系统启动计算机。
HPA区内的嵌入式系统执行查杀病毒以及修复等操作如图 3所示。
步骤 301, HPA区内的嵌入式系统调用本区域内的杀毒模块,执行査杀病毒操作。 该杀毒模块可以是快速杀毒模块, 也可以是全面快速杀毒模块, 其两者的区别仅在于 检査范围不一样, 查杀病毒所需的时间不一样。
步骤 302, 判断是否査杀到病毒, 如果是, 则执行步骤 310, 否则执行步骤 303。 步骤 303, 更新本 HPA区域内的病毒规则库。 具体实现时, 可以通过应用软盘 或移动硬盘更新病毒规则库, 或通过硬盘指定目录更新病毒规则库, 或通过网络更新 病毒规则库或采用以上三种任意组合的方式更新病毒规则库。
使用软盘或移动硬盘更新病毒规则库的实现方法是:嵌入式系统读取软盘或移动 硬盘中的病毒规则库, 实现病毒规则库的更新, 该软盘或移动硬盘中的病毒规则库是 用户从一台完好的计算机上下载的。 该更新方法适用于各种类型的计算机, 但需要用 户的参与。
通过硬盘指定目录更新病毒规则库的实现方法是:嵌入式系统直接读取操作系统 中指定目录, 实现更新病毒规则库。 该更新方法不需要用户的参与, 但如果系统内的 指定目录下没有及时存储最新的病毒规则库, 则应用该方法不能实现更新病毒规则 库。
通过网络更新病毒规则库的实现方法是:嵌入式系统直接上网查找最新病毒规则 库, 下载并更新病毒规则库。该更新方法不需要用户的参与, 也不需要担心升级病毒' 规则库的过程中被病毒攻击, 因为在该嵌入式系统中不存在病毒入侵的入口, 但应用 该方法必须预置本机的全球唯一的 IPv6地址,以及厂家后台病毒规则升级库服务器的 IPv6地址。
步骤 304, 再次调用本区域内的杀毒模块, 以执行查杀病毒的操作。 步骤 305, 判断是否查杀到病毒, 如果是, 则执行歩骤 310, 否则执行步骤 306。 步骤 306, 调用系统安全检查模块, 执行安全检査。
步骤 307,根据安全检查的结果,判断系统是否有漏洞,如果有,则执行步骤 308, 否则执行步骤 309。
步骤 308, 进行安全加固操作, 然后执行步骤 310。
上述实现调用系统安全检查模块,对操作系统进行安全性检査以及对系统漏洞进 行修复的具体方法为: 检查操作系统和关键应用软件的补丁与后台服务器上维护的补 丁版本的差异, 如果发现本计算机中上的补丁版本不是最新版本, 则将最新的补丁安 装程序拷贝到硬盘普通分区的预定目录下, 并且在操作系统所在硬盘分区的启动组目 录下拷贝一个快捷方式, 使该快捷方式指向补丁安装程序, 然后自动重启计算机进入 到操作系统, 此时系统会自动执行该快捷方式, 帮用户安装补丁。其中, 对于从 HPA 区向操作系统中安装软件的方法, 已在本申请人提出的发明名称为 "操作系统启动过 程中自动安装软件的方法", 申请号为 "200410081162.9"的中国专利申请中给出详细 说明, 在此不再重复叙述。
当然, 进行系统安全性检查的方式并不限于此, 只要能够进行安全性加固操作, 修复操作系统的漏洞即可。
步骤 309,启动系统修复模块,对整个操作系统进行修复操作,然后执行步骤 310。 上述对整个操作系统进行修复的方法为: 由嵌入式系统调用系统修复模块, ·并由 该系统修复模块用 HPA区内的系统备份文件覆盖当前系统中的文件,从而实现操作系 统修复。
步骤 310, 重新启动计算机。
以上所述仅为本发明的较佳卖施例而已,并不用以限制本发明,凡在本发明的精 神和原则之内, 所作的任何修改、 等同替换、 改进等, 均应包含在本发明的保护范围 之内。

Claims

1.一种査杀病毒的方法, 在硬盘的主机保护区域(HPA) 设置有嵌入式系统以及 杀毒模块, 该方法包括步骤:
基本输入输出系统(BIOS)执行自检;
检测到执行杀毒操作的信号时, 启动 HPA区内的嵌入式系统;
所述嵌入式系统调用杀毒模块执行查杀病毒操作; 和
装载操作系统启动计算机。
2.根据权利要求 1所述的方法, 其中在硬盘的 HPA区内预置有系统安全检查模 块, 所述方法进一步包括步骤:
在査杀病毒操作结束且未查杀到病毒的情况下,所述嵌入式系统调用系统安全检 查模块, 检查计算机系统是否存在安全漏洞; 求
如果计算机系统存在安全漏洞,则根据捡查结果进行安全性加固后再装载操作系 统启动计算机;
如果计算机系统不存在安全漏洞, 直接装载操作系统启动计算机。
3.根据权利要求 1或 2所述的方法, 其中在硬盘的 HPA区内预置有系统修复模 块, 所述方法进一步包括步骤:
在检査到计算机系统不存在安全漏洞的情况下,所述嵌入式系统调用系统修复模 块, 对操作系统进行修复, 然后启动计算机。
-
4.根据权利要求 3所述的方法, 其中所述查杀病毒操作包括以下步骤: 查杀病毒 并判断是否查杀到病毒; 如果没有查杀到病毒, 贝 ϋ更新病毒规'则库, 然后再次执行查 杀病毒操作。
5.根据权利要求 4所述的方法, 其中所述更新病毒规则库的方式包括: 通过网络 更新病毒规则库, 或应用软盘或移动硬盘更新病毒规则库, 或根据硬盘中的指定目录 更新病毒规则库, 或采用以上三种任意组合的方式更新病毒规则库。
6.根据权利要求 1所述的方法, 其中在硬盘的 ΗΡΑ区内预置有功能调用模块, 所述 BIOS启动 HPA区内的嵌入式系统的方法包括步骤:
在 BIOS自检结束并检测到执行杀毒操作的信号后,在内存中指定位置设置用于 启动嵌入式系统的参数; 调用功能调用模块,所述功能调用模块检测到内存中指定位置存在启动嵌入式系 统的参数后, 启动 HPA区内的嵌入式系统。
7.根据权利要求 6所述的方法, 其中所述内存中指定位置为内存中的 F000段。
8.根据权利要求 1所述的方法, 其中在计算机正常启动后需要执行杀毒操作时, 所述方法进一歩包括: 操作系统检测到执行杀毒操作的信号后, 启动操作系统内的杀 毒模块, 执行查杀病毒操作。
9.一种査杀病毒的计算机, 包括: 用于直接启动杀毒功能的功能键, 该功能键与 计算机主机内用于识别按键信息的模块连接。
10.根据权利要求 9所述的计算机, 其特征在于, 所述识别按键信息的模块包括 BIOS内识别按键信息的模块和操作系统内识别按键信息的模块。
11.根据权利要求 9所述的计算机, 其特征在于, 所述用于直接启动杀毒功能的 功能键设置在计算机的主机上, 或键盘上, 或鼠标上, 或显示器上。
PCT/CN2005/001922 2004-11-18 2005-11-15 Procede pour faire fonctionner un anti-virus et ordinateur correspondant WO2006053488A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CNB2004100904568A CN100374969C (zh) 2004-11-18 2004-11-18 一种实现查杀病毒的方法及实现该方法的计算机
CN200410090456.8 2004-11-18

Publications (1)

Publication Number Publication Date
WO2006053488A1 true WO2006053488A1 (fr) 2006-05-26

Family

ID=36406825

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2005/001922 WO2006053488A1 (fr) 2004-11-18 2005-11-15 Procede pour faire fonctionner un anti-virus et ordinateur correspondant

Country Status (2)

Country Link
CN (1) CN100374969C (zh)
WO (1) WO2006053488A1 (zh)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106980786A (zh) * 2017-02-25 2017-07-25 深圳市赛亿科技开发有限公司 一种防止病毒和木马的计算机防御系统
CN111030981A (zh) * 2019-08-13 2020-04-17 北京安天网络安全技术有限公司 一种阻断恶意文件持续攻击的方法、系统及存储设备
CN112364350A (zh) * 2020-12-07 2021-02-12 河北建筑工程学院 一种信息处理程序以及记录装置

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101359356B (zh) * 2007-08-03 2010-08-25 联想(北京)有限公司 删除或隔离计算机病毒的方法及系统
CN100541509C (zh) * 2007-12-10 2009-09-16 上海北大方正科技电脑系统有限公司 一种查杀电脑病毒的方法
CN102902921B (zh) * 2012-09-18 2015-11-25 北京奇虎科技有限公司 一种检测和清除计算机病毒的方法和装置
CN110197071B (zh) * 2018-04-25 2023-05-16 腾讯科技(深圳)有限公司 引导区数据处理方法及装置、计算机存储介质、电子设备
CN110532768A (zh) * 2019-08-21 2019-12-03 东软医疗系统股份有限公司 系统安全加固方法及装置

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5826012A (en) * 1995-04-21 1998-10-20 Lettvin; Jonathan D. Boot-time anti-virus and maintenance facility
CN1403915A (zh) * 2001-09-10 2003-03-19 英业达股份有限公司 一种计算机防病毒方法及使用这种方法的计算机
CN1508697A (zh) * 2002-12-16 2004-06-30 联想(北京)有限公司 在硬盘上实现保护计算机操作系统的方法及其装置

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1173266C (zh) * 2000-01-11 2004-10-27 神达电脑股份有限公司 开机型病毒检测方法

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5826012A (en) * 1995-04-21 1998-10-20 Lettvin; Jonathan D. Boot-time anti-virus and maintenance facility
CN1403915A (zh) * 2001-09-10 2003-03-19 英业达股份有限公司 一种计算机防病毒方法及使用这种方法的计算机
CN1508697A (zh) * 2002-12-16 2004-06-30 联想(北京)有限公司 在硬盘上实现保护计算机操作系统的方法及其装置

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106980786A (zh) * 2017-02-25 2017-07-25 深圳市赛亿科技开发有限公司 一种防止病毒和木马的计算机防御系统
CN111030981A (zh) * 2019-08-13 2020-04-17 北京安天网络安全技术有限公司 一种阻断恶意文件持续攻击的方法、系统及存储设备
CN111030981B (zh) * 2019-08-13 2023-04-28 北京安天网络安全技术有限公司 一种阻断恶意文件持续攻击的方法、系统及存储设备
CN112364350A (zh) * 2020-12-07 2021-02-12 河北建筑工程学院 一种信息处理程序以及记录装置

Also Published As

Publication number Publication date
CN1779594A (zh) 2006-05-31
CN100374969C (zh) 2008-03-12

Similar Documents

Publication Publication Date Title
US20140115316A1 (en) Boot loading of secure operating system from external device
JP5095717B2 (ja) 目標の媒体上に縮小オペレーティングシステムイメージをインストールする方法、システム、プログラム及び前記方法を実施する命令を有するコンピュータ読み取り可能媒体
JP5512610B2 (ja) 非ファームウェアエージェントからメモリへのアクセスを許可または阻止する方法、システム、および機械可読記憶媒体
EP2729896B1 (en) Bios flash attack protection and notification
JP4664966B2 (ja) 協調型組込みエージェント
US8490189B2 (en) Using chipset-based protected firmware for host software tamper detection and protection
WO2006053488A1 (fr) Procede pour faire fonctionner un anti-virus et ordinateur correspondant
US7877809B1 (en) Secure automatable clean boot system
US20070113062A1 (en) Bootable computer system circumventing compromised instructions
US20100132042A1 (en) Method for upgrading antivirus software and terminal and system thereof
US7921461B1 (en) System and method for rootkit detection and cure
US20070094654A1 (en) Updating rescue software
US9684518B2 (en) Option read-only memory use
US10101928B2 (en) System and method for enhanced security and update of SMM to prevent malware injection
US10430589B2 (en) Dynamic firmware module loader in a trusted execution environment container
US9390275B1 (en) System and method for controlling hard drive data change
US8201253B1 (en) Performing security functions when a process is created
WO2007022687A1 (fr) Système et procédé de contrôle de sécurité de système d’exploitation
CN1797337B (zh) 计算机软件自动安装的方法
EP2729893A1 (en) Security method and apparatus
KR20040097852A (ko) 자체 업그레이드 기능을 갖는 클라이언트 컴퓨터 및 그 업그레이드 방법
JP2018036695A (ja) 情報処理監視装置、情報処理監視方法、監視プログラム、記録媒体及び情報処理装置
RU77472U1 (ru) Система обнаружения и лечения руткита
KR20150134171A (ko) 악성코드 탐지 장치 및 방법
CN102103675A (zh) 一种uefi下的杀毒方法、装置及计算机系统

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KN KP KR KZ LC LK LR LS LT LU LV LY MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU LV MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 05808229

Country of ref document: EP

Kind code of ref document: A1