Method for providing file security information and security information processing system

A technology for security information and files, applied in the Internet field to reduce the time of file scanning

Inactive Publication Date: 2009-06-03
SHENZHEN THUNDER NETWORK TECH
View PDF0 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] And when a file is a compound file, the security inform

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for providing file security information and security information processing system
  • Method for providing file security information and security information processing system
  • Method for providing file security information and security information processing system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054]An embodiment of the present invention provides a method for downloading a file, which includes: when a user end initiates a file download, first submitting a Uniform Resource Locator (URL) to a server. The server looks up the content identification of the file corresponding to the URL in the mapping table according to the URL, then judges whether the file is a compound file according to the content identification, if not, obtains the security information of the file through the content identification, and if so, obtains the security information of the file from The content identifiers of the subfiles included in the file are obtained from the subfile mapping table, and the security information of all subfiles is obtained through the obtained content identifiers, and the files are downloaded according to the security information.

[0055] Such as figure 1 As shown, the embodiment of the present invention is a method for reporting security information, which specifically ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for downloading a file and a system thereof, and aim at solving the problem that security information provision is incomplete in the prior art. A method for providing the security information comprises the following steps: a server terminal receives a uniform resource locator submitted by a user terminal at file downloading, obtains a content identification of the file according to the uniform resource locator, then acquires the security information of the file according to the content identification, and finds out the security information of a subfile which is contained in a composite file according to the content identification when the file is the composite file, and finally provides the security information of the file and the security information of the subfile to the user terminal. The scheme provided by the invention can help a user to acquire the security information of all files before downloading the files.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a method for providing file security information and a security information processing system. Background technique [0002] At present, files available for download on the Internet include ordinary files and compound files. A compound file is also called a pan-compressed file, specifically referring to a large file formed by organizing several files together according to certain rules. In the process of organizing compound files, there may be a series of operations such as compression and reorganization. For example, compressed files, installation packages, etc., all belong to the compound file type. [0003] When a user is downloading a file, many server providers often pre-store information on whether the file is safe on the server. For example, for file A, the server stores the security information of A, and when the user requests the server to download file A, the ser...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00G06F17/30H04L29/06G06F21/51
Inventor 贾弘霏
Owner SHENZHEN THUNDER NETWORK TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products