File tamper detecting and repairing method and system

A technology of tampering detection and file, which is applied in the field of computer security, and can solve problems such as inability to detect and repair user files

Active Publication Date: 2014-07-02
HARBIN ANTIY TECH
View PDF4 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This technology helps keep track everything on your computer's hard drive by creating regular databases with certain patterns based upon how well they work correctly. If there were any changes made during their execution (such as adding more data) these systems would automatically compare them against this database pattern before sending an alert message if someone suspects something has been done wrongdoing. Additionally, when comparing two versions of software, we use models like those from other companies to see what modifications have happened overtime. By learning about such things happening regularly, our monitoring tools help identify potential security threats quickly and accurately.

Problems solved by technology

The technical problem addressed by this patented solution relates to ensuring that sensitive data like documents can still remain secure when they were copied onto other devices without being discovered during copying process.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File tamper detecting and repairing method and system
  • File tamper detecting and repairing method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to enable those skilled in the art to better understand the technical solutions in the embodiments of the present invention, and to make the above-mentioned purposes, features and advantages of the present invention more obvious and easy to understand, the technical solutions in the present invention will be further detailed below in conjunction with the accompanying drawings illustrate.

[0036] The invention provides a method and system for file tampering detection and repair, which solves the problem that the existing file detection is only for system files, and cannot detect and repair files stored by users, and can prevent files from being modified by infectious viruses, etc. Real-time monitoring and repair.

[0037] The invention provides a method for detecting and repairing file tampering, such as figure 1 shown, including:

[0038] S101: scan the entire system of the current system, obtain all file HASH and file paths, and build a local HASH library; tha

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a file tamper detecting and repairing method and system. The method includes the steps of firstly, conducting scanning to obtain HASH values and file routes of all credible files in the system, and storing the HASH values and the file routes; secondly, monitoring all the files in the system, comparing all the files in the system with an HASH base, judging whether abnormal files or newly-added files exist or not, conducting matching according to a normal state rule base and a normal state model, if matching is successful according to the normal state model, adding rules of the matching result to the normal state rule base, and if matching fails, reminding a user to conduct processing. Through the method, the tampered files or the newly-added files in the system can be effectively identified; through the combination of the normal state rule base and the normal state model, files or catalogues which are changed in real time can be added to the normal state rule base in time, and self-learning of normal state rules is achieved, and user operation is reduced.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner HARBIN ANTIY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products