Home
Method and apparatus for automatically protecting a computer
Contents
1. S62 A record of a malicious file existing in the result set Obtaining the record 563 ofthe malicious file file name of the malicious file S64 corresponding program file being an executable file S65 Creating a start control rule Applying to the resource access control layer FIG6 U S Patent Oct 15 2013 Sheet 7 of 8 US 8 561 192 B2 S71 Obtaining the determination result accurate 72 A record of a malicious file Obtaining the 573 record of the malicious file file name of the malicious file S74 Creating an access control rule Applying to the resource access control layer U S Patent Oct 15 2013 Sheet 8 of 8 US 8 561 192 B2 p 101 Resource access rule control module 109 Automatic updating module Resource access scanning module Malicious behavior analyzing module Virus DNA recognition module FIG 8 US 8 561 192 B2 1 METHOD AND APPARATUS FOR AUTOMATICALLY PROTECTING A COMPUTER AGAINST A HARMFUL PROGRAM FIELD OF THE INVENTION The present invention relates to a method and apparatus for automatically protecting a computer against a harmful pro gram and more particularly to a method and apparatus for automatically protecting computers against harmful pro grams including such functions as resource access rule con trol resource access scanning malicious behavior an
2. the disadvan tage of lagging in the traditional signature scanning appears more and more serious thereby resulting in many viruses being unable to be detected in real time Once these real timely undetected viruses run computer resources will be completely exposed to computer viruses and be arbitrarily read or destroyed by them Furthermore as virus samples in the traditional signature scanning are usually required to be updated manually they can not be added timely and automati cally Such that the problem of lagging in traditional signa ture scanning is more serious In order to overcome the problem of lagging in the tradi tional signature scanning and prevent the running of com puter viruses from tampering or destroying sensitive resources there is a need for a new method and apparatus for automatically protecting computers against harmful pro grams SUMMARY An object of the present invention is to provide a computer automatic protection method capable of actively recognizing and killing unknown viruses in an accurate and timely man ner while protecting security of the computer real timely and actively by updating restriction rules without user s partici pation 20 25 30 35 40 45 50 55 60 65 2 In order to achieve this object the method in accordance with the present invention comprises restricting an object program from accessing some resources in a computer sys
3. in order to prevent the started process from performing further infringement behaviors If the user prevents this process from starting the procedure proceeds to step S34 in which the process is prevented from starting Then the procedure proceeds to step 33 in which the mali cious behavior analysis is performed next regardless of whether the user preventing this process from starting In step S33 the malicious behavior analysis processing of the third layer analyzes malicious behaviors for this file access to determine whether the object program may be a harmful program In step S33 in order to avoid false alarm the object program is also scanned and determined again as needed using the virus DNA recognition technology to determine whether the object program is harmful The object program is determined to be harmful only when both deter mination results are Yes If the determination result of step S33 is No the procedure ends Otherwise it is further determined whether the object program is required to be terminated and isolated step S35 and the object program is terminated and isolated as needed step S36 and then the procedure ends FIGS 4 and 5 illustrate flow charts ofa computer automatic protection method in accordance with the present invention when an object program attempts to access a registry and call a system key API function respectively As illustrated the processing procedures of FIGS 4 and 5 are similar t
4. tem based on predetermined resource access rules scanning computer resources accessed by the object program to deter mine whether the accessed computer resources are infected by the object program and analyzing malicious behaviors based on behavior characteristics of the object program to determine whether the object program is a harmful program The present invention also provides a computer automatic protection apparatus for implementing the above described method comprises a resource access rule control module for restricting an object program from accessing some resources in acomputer system based on predetermined resource access rules a resource access scanning module for scanning com puter resources accessed by the object program to determine whether the accessed computer resources is infected by the object program and a malicious behavior analyzing module configured to analyze malicious behaviors based on behavior characteristics of the object program to determine whether the object program is a harmful program BRIEF DESCRIPTION OF THE DRAWINGS The present invention will be described in detail in con junction with the accompanying drawings and specific embodiments where FIG 1 illustrates a schematic diagram of an architecture of a computer automatic protection method in accordance with the present invention FIG 2 illustrates a flow chart of a computer automatic protection method in accordance with an embodiment of the pr
5. a2 United States Patent US008561192B2 a0 Patent No US 8 561 192 B2 Ye 45 Date of Patent Oct 15 2013 54 METHOD AND APPARATUS FOR 56 References Cited AUTOMATICALLY PROTECTING A COMPUTER AGAINST A HARMFUL U S PATENT DOCUMENTS PROGRAM f 7 694 134 B2 4 2010 Witt et al 3k 75 Inventor Chao Ye Beijing CN ROUTINE ALS 62002 Kudo stal n vi 2004 0049693 Al 3 2004 Douglas 73 Assignees Beijing Rising Information Technology 2004 0193912 Al 9 2004 Li etal Co Ltd Beijing CN Beijing Rising 2006 0075494 Al 4 2006 Bertman et al International Software Co Ltd 2006 0136720 Al 6 2006 Armstrong etal wc 713 164 Belii 2007 0107052 Al 5 2007 Cangini et al jing CN Continued Notice Subject to any disclaimer the term of this patent is extended or adjusted under 35 FOREIGN PATENT DOCUMENTS U S C 154 b by 687 days CN 1409222 A 4 2003 21 Appl No 12 738 023 cN 15503304 theres Continued 22 PCT Filed Oct 15 2008 OTHER PUBLICATIONS 86 PCT No PCT CN2008 072694 International Search Report corresponding to International Applica 371 c 1 tion No PCT CN2008 072694 dated Jan 22 2009 2 4 Date Aug 13 2010 Continued GY ECT Ee won Primary Examiner Michael S McNally PCT Pub Date Apr 23 2009 74 Attorney Agent or Firm Jenkins Wilson Taylor amp Hunt P A 65 Prior Publication Data US 2010 0313269 Al Dec 9 2010 GD ABSTRACT The present invention discloses a method
6. alysis etc BACKGROUND The rapid development of computer and network technolo gies greatly facilitates information interaction However with the development of these technologies computer viruses are being evolved and updated continuously and become a seri ous threat to normal uses of computers Therefore how to protect a computer against viruses has become a focus of people s interest An important step for protecting computers against viruses is to recognize viruses before running the file which is usually called virus scanning therefore appropriate measures may be taken to protect computer systems from being infected by viruses A virus scanning method commonly adopted by prior anti virus software is signature matching method which uses signatures which are typically one or more segments of specific binary code stream extracted from virus samples to perform matching in the scanning files Since the signatures used in this method are extracted from the erupted or detected virus samples they are fixed signatures and usually lag behind viruses Thus such method can not work in real time monitoring and protection against those viruses in which the signatures are prone to change i e the viruses prone to mutate or new viruses i e the viruses from which the sig natures have not been extracted Particularly in recent years with an increasing number of viruses and the emergence and development of anti anti virus technologies
7. and apparatus for 30 Foreign Application Priority Data automatically protecting computers against harmful pro grams The method comprises restricting an object program Oct 15 2007 CN ES ERT ESAS T ETET 2007 1 0180317 from accessing some resources in a computer system based on predetermined resource access rules scanning computer 51 Int Cl resources accessed by the object program to determine GO6F 21 00 2013 01 whether the accessed computer resources are infected by the 52 U S Cl object program and analyzing malicious behaviors based on USPC aerieni ER 726 24 behavior characteristics of the object program to determine 58 Field of Classification Search whether the object program is a harmful program USPC varesierngaoue in aa a nnua 726 24 See application file for complete search history intercepting file access lt q Yes Preventing this fila access Terminating the and kiling the malicious program file End Eal 12 Claims 8 Drawing Sheets US 8 561 192 B2 Page 2 56 References Cited OTHER PUBLICATIONS U S PATENT DOCUMENTS International Search Report corresponding to International Applica tion No PCT CN2008 072699 dated Jan 22 2009 2007 0150956 Al 6 2007 Sharma et al i 2007 0209076 Al 9 2007 Porter et al International Search Report corresponding to International Applica 2010 0293615 Al 11 2010 Ye tion No PCT CN2008 072698 date
8. cessing is a traditional real time monitor which depends on virus scanning and recognizing technologies mainly for monitor ing resources accessed by an object program such as a file boot sector mail script etc For example the resource access scan processing scans and recognizes viruses with regard to the intercepted context e g file content boot sector content etc accessed by the object program to determine whether the content accessed by the object program is infected by viruses in the object program thus determining whether the object program is a harmful program Since the second layer structure adopts an accurate virus scanning and recognition method the determination result derived therefrom is reliable In addition in certain special cases the resource access scan processing may be omitted 20 25 30 35 40 45 50 55 60 65 4 For example when the object program only takes certain actions to attack the system the effect on a file may be not involved such that the resource access scan processing can be omitted Malicious Behavior Analysis Processing Malicious behavior analysis processing as the third layer structure determines whether the object program is harmful by monitoring the action ofthe object program on the basis of the two layers described above and based on the behavior performance i e behavior characteristics thereof For example when the object program implements self rep
9. d Feb 19 2009 2010 0306851 Al 12 2010 Zhou Office Action corresponding to U S Appl No 12 738 031 dated Mar 29 2012 POREIGN PATENT DOCUMENTS Office Action corresponding to U S Appl No 12 738 037 dated Apr CN 1581088 2 2005 122012 CN 1818823 8 2006 Office Action corresponding to U S Appl No 12 738 037 dated CN 1845120 10 2006 Aug 24 2012 CN 1885224 12 2006 Office Action corresponding to U S Appl No 12 738 031 dated EP 1630711 Al 3 2006 Aug 24 2012 WO WO 02 14987 2 2002 E Cui s hR di E P Appli WO WO 02 061510 3 2002 uropean Searc eport corresponding to European Patent Applica WO WO2009 049554 4 2009 tion No EP 1 630 711 dated Jan 3 2006 WO W0O2009 049555 4 2009 WO WO2009 049556 4 2009 cited by examiner U S Patent Oct 15 2013 Sheet 1 of 8 US 8 561 192 B2 Resource access rule control Resource access scan Malicious behavior analysis Create a new resource access rule based on the determination result FIG 1 U S Patent Oct 15 2013 Sheet 2 of 8 US 8 561 192 B2 Intercepting file access 21 Violating the file access rules 25 Performing the traditional monitoring processing he accessed object being a virus file Preventing this file access S26 Malicious program behavior analysis virus DNA recognition 27 Terminating and isolating 28 Yes No nen SAPOS Terminating the process and kil
10. d again as needed using the virus DNA recognition technology to determine whether the object program is harmful The object program is determined to be harmful only when both deter mination results are Yes If the determination result of step S26 is No the procedure ends Otherwise it is further determined whether the object program is required to be terminated and isolated step S27 and the object program is terminated and isolated as needed step S28 and then the procedure ends FIG 3 illustrates a flow chart of a computer automatic protection method in accordance with an embodiment of the present invention when an object program attempts to start a process As shown in FIG 3 after the object program that initiates a process starting action is intercepted in step S31 the resource access rule control processing of the first layer deter mines whether the process starting violates a process starting rule in resource access rules for example an unknown pro cess is prohibited from being started under a browser process If the file access violates the process starting rule the proce dure proceeds to step S32 in which it is further determined 0 a 5 40 45 50 55 65 6 whether this process creating is prevented step S34 other wise it proceeds to step S33 in which the malicious behavior analysis is performed next In step 32 the user is prompted whether to prevent this process from starting
11. es contained in a set of processes These files may be such files that correspond to one or more processes created by the malicious program or files released by the processes In this embodiment in order to reduce false alarm a corresponding new resource access rule is created for only an executable file i e an EXE file which exists in the determination result set Thus when it is determined that the result set includes the record of the malicious file in step S62 information of the malicious file such as file name is obtained from the record of the malicious file step S63 then it is determined whether the file is an EXE file step S64 If the determination result is Yes the procedure proceeds to step S65 in which a new rule is created Otherwise the procedure returns to step 62 in which it proceeds to obtain other malicious files in the result set In step S65 the associated resource access rule for example the content of which is any program being not allowed to start the program file is created based on infor mation of the extracted malicious EXE file and the newly created rule is added to the existing resource access rules to make it become effective step S66 Finally after the existing resource access rules are updated automatically the procedure returns to step S62 to proceed until corresponding resource access rules are created for all the malicious files in the result set In Case of the Accurate Determi
12. esent invention when an object program attempts to access a file FIG 3 illustrates a flow chart of a computer automatic protection method in accordance with an embodiment of the present invention when an object program attempts to start a process FIGS 4 and 5 illustrate flow charts ofa computer automatic protection method in accordance with the present invention when an object program attempts to access a registry and call a system key API function respectively FIG 6 illustrates an automatic updating procedure of resource access rules based on the inaccurate determination result FIG 7 illustrates an automatic updating procedure of resource access rules based on the accurate determination result and FIG 8 illustrates a block diagram of a device for automati cally protecting a computer against a harmful program in accordance with an embodiment of the present invention The like reference numbers refer to like or corresponding features or functions throughout DETAILED DESCRIPTION The embodiments of the present invention will be described in detail with reference to the accompanying draw ings FIG 1 illustrates a schematic diagram of an architecture of a computer automatic protection method in accordance with the present invention As shown in FIG 1 the computer automatic protection method in accordance with the present invention includes a three layer structure in total from top to bottom the first layer is resource acce
13. he starting of the program file may be generated as needed for the accurate determination result An automatic updating procedure of the resource access rules of the computer automatic protection method in accor dance with the present invention will be described in details for the two types of different determination results described above In Case of the Inaccurate Determination Result FIG 6 illustrates an automatic updating procedure of resource access rules based on the inaccurate determination result As shown in FIG 6 in step S61 after malicious behavior analysis determination is performed for the object program US 8 561 192 B2 7 the determination result is obtained to get a determination result set which is an inaccurate determination result When the determination result is obtained some of files which are determined to be malicious programs or files released by the malicious programs may have been killed during the afore mentioned resource scanning or malicious behavior analysis processing A corresponding rule is not needed to be created for such non existing files any more Therefore it is deter mined whether a record of a malicious file exists in the result set in the following step step S62 If it does not exist the procedure ends directly and no more rules will be added In general the malicious program determined by one deter mination result may be not just a program file but it may involve a number of fil
14. hile false alarm can be pre vented by means of the virus DNA recognition technology thereby decreasing false alarm rate The three layer structure of the computer automatic pro tection method in accordance with the present invention is described hereinabove in conjunction with FIG 1 Further more on the basis of the above three layer structure the present invention also comprises a procedure of automati cally updating resource access rules based on the determina tion result from the second layer and or the third layer In the automatic updating procedure a new resource access rule is created based on the determination result of the resource access scan processing and or malicious behavior analysis processing and it is automatically updated to resource access control layer The specific procedure of automatically updat ing the resource access rules will be described in detail below with reference to the figures In general the computer automatic protection method in accordance with the present invention will be automatically running in the system to monitor the running of programs in a real time manner However a usecase can perform virus scanning in a non real time manner by manually starting a scanning program It is possible that the manual scanning initiated by the user discovers virus files or files infected by viruses which have been disabled but not yet killed and then kills these files timely At this point the virus file
15. les found out by the manual scanning or the files infected by viruses from being accessed by any program 6 The method according to claim 1 wherein the step of analyzing the malicious behaviors further comprises if the step of analyzing the malicious behaviors determines that the object program is a harmful program analyzing the object program using a virus DNA recognition technology and determining that the object program is a harmful program when the object program is determined to be a harmful program by both the malicious behavior analysis and the virus DNA recognition technology 20 40 50 10 7 The method according to claim 1 wherein the predeter mined resource access rules include at least one of file access rules process start control rules registry access rules and system action rules 8 The method according to claim 7 wherein the step of restricting an object program from accessing some resources further comprises prompting the user to decide whether to prevent the access of the object program when it is determined that the object program have accessed the resources which are determined to be prohibited from being accessed in the resource access rules and proceeding to the step of analyzing the malicious behaviors after the object program is prevented according to user s decision 9 The method according to claim 8 further comprising proceeding to the step of scanning the computer re
16. lica tion and sets a global hook the object program is determined to be harmful Because the malicious behavior analysis makes the determination based on the behavior characteris tics it is able to recognize some unknown viruses However such analysis and determination have certain inaccuracies Preferably in order to avoid false alarm by the malicious behavior analysis a malicious behavior analysis technology may be combined with a virus DNA recognition technol ogy in the third layer structure The virus DNA recognition technology is a technology which extracts characteristic sequences of unknown viruses by adopting a specific charac teristic discovery method then compares them with known virus characteristics and finally finds the characteristic sequence with maximum similarity and greater than a specific threshold A file corresponding to the found characteristic sequence is determined to be harmful Specifically in the third layer structure after the analysis of malicious behaviors a malicious program which is determined by analyzing the malicious behaviors may be confirmed again as needed using the virus DNA recognition technology The object program is determined to be harmful only when both the determination result of the malicious behavior analysis and the determina tion result of the virus DNA recognition technology are harmful Thus unknown viruses can be discovered by the malicious behavior analysis w
17. ling the malicious program file End FIG 2 U S Patent Oct 15 2013 Sheet 3 of 8 US 8 561 192 B2 Intercepting process starting Fa 31 Violating the proces tarting control rules Yes Preventing the object program from starting Malicious program behavior analysis virus DNA recognition Yes 35 erminating and isolating 36 Yes y Terminating the process and killing the malicious program file End FIG3 U S Patent Oct 15 2013 Sheet 4 of 8 US 8 561 192 B2 Intercepting registry access iolating the registry access rules Yes No eventi NE No Preventing this registry access Malicious program behavior analysis virus DNA ecognition Yes Terminating aS Ne and isolating No Yes y Terminating and isolating the process End U S Patent Oct 15 2013 Sheet 5 of 8 US 8 561 192 B2 Intercepting system key API calling iolating system Yes action control Preventing this API calling alicious progre behavior analysis virus DNA ecognition erminating and isolating No Yes y Terminating the process and killing the malicious program file U S Patent Oct 15 2013 Sheet 6 of 8 US 8 561 192 B2 S61 Obtaining the determination _ result inaccurate
18. lity in automatically protecting the computer against a harmful program is improved In addition owing to the combination of the malicious behavior analysis with the virus DNA recognition technol ogy the virus DNA recognition technology is used for further confirmation when possible malicious behaviors occur such that unknown viruses can be discovered by the malicious behavior analysis while false alarm can be appro priately prevented by means of the virus DNA recognition technology and false alarm rate is decreased It should be understood by those skilled in the art that various modifications may be made to the method and appa ratus for automatically protecting computers against harmful programs disclosed in the present invention without departing from the content of the present invention Therefore the protection scope of the present invention should be defined by the content of the appended claims US 8 561 192 B2 9 What is claimed is 1 A method for automatically protecting a computer com prising restricting an object program from accessing some resources in a computer system based on predetermined resource access rules scanning computer resources accessed by the object pro gram to determine whether the accessed computer resources are infected by the object program analyzing malicious behaviors based on behavior charac teristics of the object program to determine whether the object program is a ha
19. nation Result FIG 7 illustrates an automatic updating procedure of resource access rules based on the accurate determination result i e the determination result of resource scanning and manual scanning The procedure shown in FIG 7 is similar to that in FIG 6 the difference is in that as the determination result after the scanning is accurate all the virus files determined in the determination result are required to be prohibited from being accessed when the rule is created For this end the step in FIG 6 in which it is determined whether the malicious file is an EXE file is omitted in the automatic updating procedure shown in FIG 7 while a corresponding resource access rule is created directly step S74 for each virus file step 72 In the example shown in FIG 7 the resource access rule created for the virus file is any program being not allowed to access the program file Therefore it protects any program from virus infection due to its access to the determined virus file FIG 6 may be referred for specific operations of steps S71 S73 and S75 in FIG 7 which are similar to the corresponding steps in FIG 6 and therefore the detail description thereof is omitted The computer automatic protection method in accordance with the present invention is described in details hereinabove in conjunction with the accompanying figures The method may be implemented by computer software computer hard ware or a combination there
20. o that of FIG 3 the only difference is that they trigger different resource access control rules such as a registry access rule and system key API function call rule and prevent different corresponding actions according to different operations that being attempted to start for example prevent registry access and prevent API calling For the same portion of FIGS 4 and 5 as FIG 3 it may refer to the specific description of FIG 3 and the detailed explanation thereof is omitted herein In the procedure described above many determination results may be obtained after the malicious behavior analysis determination resource access scanning or manual scanning are performed The determination results may be divided into two types based on the accuracy of the determination results 1 inaccurate determination result which includes the deter mination result from the malicious behavior analysis deter mination 2 accurate determination result which includes the determination result from the resource access scanning and manual scanning Different resource access rules corre sponding to different determination results may be generated For example a resource access rule that restricts the starting of a malicious program file may be generated for the inaccu rate determination result and a resource access rule that restricts the access to a virus file may be generated for the accurate determination result The resource access rule that restricts t
21. of FIG 8 illustrates a block diagram of a computer automatic protection device 100 in accordance with an embodiment of 0 40 45 55 60 65 8 the present invention where the same components as those in the conventional computer system are omitted in this figure As illustrated in FIG 8 the computer automatic protection device 100 includes a resource access rule control module 101 configured to restrict an object program from accessing some resources in a computer system based on predetermined resource access rules a resource access scanning module 103 configured to scan computer resources accessed by the object program to determine whether the accessed computer resources are infected by the object program a malicious behavior analyzing module 105 configured to analyze mali cious behaviors based on behavior characteristics of the object program to determine whether the object program is a harmful program and an automatic updating module 109 configured to create a new resource access rule based on the determination results of the resource access scanning and the malicious behavior analysis and add the new resource access rule to the existing resource access control layer to implement automatic update The malicious behavior analyzing module 105 may further include a virus DNA recognition module 1051 configured to determine the object program again using the virus DNA recognition technology after the object
22. pro gram is determined by the malicious behavior analyzing module 105 to be harmful The object program is determined to be harmful only when both determination result of the malicious behavior analyzing module 105 and the determi nation result of the virus DNA recognition module 1051 are harmful Beneficial Effect To sum up the method and apparatus for automatically protecting computers against harmful programs in accor dance with the present invention combines resource access control with resource access scanning and malicious behavior analysis to automatically protect computers against harmful programs using a three layer structure including the resource access control resource access scanning and malicious behavior analysis such that restriction priority of the resource access rule control layer timeliness and accuracy of the resource access scanning and fuzzy decision of the malicious behavior analysis can be fully utilized to solve the problem of lagging existing in the traditional signature scanning technologies Meanwhile the method and apparatus for automatically protecting computers against harmful programs in accor dance with the present invention also has a resource access rule automatic updating function and therefore may imple ment automatic adding of a resource access rule without user s participation As a result the difficulty in using the resource access rule control layer is decreased and the abi
23. revent this file access the procedure proceeds to step S23 If the user prevents this file access the procedure proceeds to step S24 in which this file access is prevented Then the procedure proceeds to step S26 in which the malicious behavior analysis is preformed next Ifit is determined that the file access rule is not violated in step S21 or it is determined that the current object program is not needed to be prevented from accessing in step S22 the object program is allowed to access e g the system file Then in step S23 the resource access scan processing of the second layer scans resources for the object accessed by the object program to determine whether the accessed object is infected by viruses in the object program When the determination result shows that the accessed object is infected the proce dure proceeds to step S25 in which the traditional monitoring processing is performed and then proceeds to step S26 When the determination result shows that the accessed object is not infected the procedure also proceeds to step S26 in which the malicious behavior analysis is performed next In step S26 the malicious behavior analysis processing analyzes malicious behaviors for this file access to determine whether the object program may be a harmful program In step 26 in order to avoid false alarm when the object pro gram is determined to be a harmful program by the malicious behavior analysis it is scanned and determine
24. rmful program creating a new resource access rule based on results of the scanning step the analyzing step or both wherein when the analyzing step determines that the object program is a harmful program the created new resource access rule includes instructions for disallowing a program file associated with the harmful object program from being started by any program and automatically adding the new resource access rule created to the predetermined resource access rules 2 The method according to claim 1 wherein the step of creating the new resource access rule comprises when the step of scanning the computer resources deter mines that the accessed computer resources are infected the created new resource access rule includes instruc tions for disallowing the infected computer resources from being accessed by any program 3 The method according to claim 1 wherein the program file associated with the harmful object program is an execut able program file 4 The method according to claim 1 further comprising performing by a user manual scanning to scan and kill virus files existing in the computer system and files infected by viruses and the step of creating the new resource access rule further comprises creating the new resource access rule based on the result of the manual scanning 5 The method according to claim 4 wherein the created new resource access rule comprises instructions for disallowing the virus fi
25. rule control process start control registry access rule control system action rule control etc may be summarized and generated based on analyzing numerous cases of infected users Specifically upon running the resource access rule control processing firstly intercepts a request ofan object program for accessing system resources and then determines based on the predetermined resource access rules whether the object program is to access resources which are determined by the predetermined resource access rules as resources required to be accessed and confirmed If the determination result is Yes then it is indicated that the current object program violates the resource access rules and may be a harmful program such as Trojan a virus etc and a query is required to check the legality of this resource access The resource access rule control processing may restrict a certain program before it accesses or executes a harmful program or may restrict an executed harmful program when the executed harmful program accesses sensitive resources Thus such resource access rule control processing is able to timely prevent the harmful program before it implements infringement thereby the purpose of resisting attack of unknown viruses is achieved Resource Access Scan Processing The second layer structure resource access scan process ing is further performed on the basis of the resource access rule control processing The resource access scan pro
26. s discovered by manual scanning may be accessed due to not being killed timely so the present invention also proposes a new resource access rule being created based on the determination result of manual scanning and the new resource access rule is auto matically updated to the resource access control layer US 8 561 192 B2 5 The structure and some functions of the computer auto matic protection method in accordance with the present invention are described above generally Various aspects of the present invention will be described separately in conjunc tion with specific embodiments FIG 2 illustrates a flow chart of a computer automatic protection method in accordance with an embodiment of the present invention when an object program attempts to access a file As shown in FIG 2 after the object program that initiates file access e g attempts access a system file is intercepted the resource access rule control processing of the first layer determines whether the file access violates a file access rule in the resource access rules in step S21 for example write access to important data files e g a host file of the system is prohibited If the file access violates the file access rule then the procedure proceeds to step S22 otherwise it proceeds to step S23 In step S22 the user is prompted whether to prevent this file access to prevent the object program from further infringing its accessed files If the user does not p
27. sources if the user decides not to prevent the object program 10 An apparatus comprising a processor wherein the processor is configured to restrict an object program from accessing some resources in a computer system based on predetermined resource access rules scan computer resources accessed by the object program to determine whether the accessed computer resources are infected by the object program and analyze malicious behaviors based on behavior character istics of the object program to determine whether the object program is a harmful program create a new resource access rule based on results of scan ning the computer resources analyzing the malicious behaviors or both wherein when the analyzing deter mines that the object program is a harmful program the created new resource access rule includes instructions for disallowing a program file associated with the harm ful object program from being started by any program and automatically add the created new resource access rule to the predetermined resource access rules 11 The apparatus according to claim 10 wherein when the scanning of the computer resources determines that the accessed computer resources are infected the created new resource access rule includes instructions for disallowing the infected computer resources from being accessed by any program 12 The apparatus according to claim 10 wherein the pro cessor is further configured to anal
28. ss rule control process ing the second layer is resource access scan processing and the third layer is malicious behavior analysis processing US 8 561 192 B2 3 Such three layer structure combines the malicious behavior analysis and the resource access control with the traditional virus scanning method such that a malicious program can be detected in an accurate and fleet manner and the running thereof can be prevented timely In the following specific functions and components of the three layer structure will be summarized respectively Resource Access Rule Control Processing Resource access rule control processing is the first layer structure which is the most basic section of the computer protection method in accordance with the present invention because the running of a program often starts from resource access for example it is necessary for an object program to access an object file for starting the corresponding process of the object file In order to prevent malicious programs from making an attack or transmitting viruses by the utilization of system resources e g by accessing a file or registry or calling a specific system API function some resource access rules are predetermined in the first layer structure These predeter mined resource access rules are used for preventing portions of important resources in the system from being illegally accessed These predetermined resource access rules includ ing file access
29. yze the object program using a virus DNA recogni tion technology after the object program is determined to be a harmful program by analyzing of the malicious behaviors wherein the object program is determined to be a harmful program only when the object program is determined to be a harmful program by both the analyzing of the malicious behaviors and the virus DNA recognition technology UNITED STATES PATENT AND TRADEMARK OFFICE CERTIFICATE OF CORRECTION PATENT NO 8 561 192 B2 Page lofi APPLICATION NO 12 738023 DATED October 15 2013 INVENTOR S Chao Ye It is certified that error appears in the above identified patent and that said Letters Patent is hereby corrected as shown below On title page item 73 Assignees replace Beijing Rising Information Technology Co Ltd Beijing CN Beijing Rising International Software Co Ltd Beijing CN with Beijing Rising Information Technology Co Ltd Beijing CN Signed and Sealed this Eighteenth Day of March 2014 VODs FO le Michelle K Lee Deputy Director of the United States Patent and Trademark Office
Download Pdf Manuals
Related Search
Related Contents
User Guide Quantum L200 User's Guide ETA Systems ETA-S20RT User's Manual Amer Networks SGD8 network switch Manual de instrucciones - Ortopedia Online || Chollo Ortopedia ÿþS o n y E r i c s s o n M o b i l e C o m m u n i c a t i o n s A B PocketMAX User Manual 48-678型 48-679型 取扱説明書 保証書付 ガスシステムエアコン Copyright © All rights reserved.
Failed to retrieve file