Method and system for downloading executable file securely

A file execution and security technology, applied in transmission systems, security devices, electrical components, etc., can solve problems such as wasting download traffic, wasting user upload traffic, increasing mobile terminal GPRS traffic, etc., to achieve the effect of saving traffic and charges

Active Publication Date: 2010-12-22
ALIBABA (CHINA) CO LTD
View PDF3 Cites 45 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this "online virus inspection" can enable users to understand the security of the downloaded software before installing the software, help users discover "wolves in sheep's clothing" in time, and avoid losses caused by being tricked into installing; The method requires the user to upload the downloaded installation file to the service provider’s virus screening server, which not only consumes the download traffic, but also the user’s upload traffic. The online virus screening will also increase the GPRS traffic of the mobile terminal and reduce the execution time. File download and installation efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for downloading executable file securely
  • Method and system for downloading executable file securely
  • Method and system for downloading executable file securely

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0028] figure 2 A flow chart of a method for securely downloading an executable file according to Embodiment 1 of the present invention is shown.

[0029] Such as figure 2 As shown, when the wireless access client wishes to download a certain executable file from the target site, first, the client submits the download request of the executable file to the target site (step S201); the target site returns the download request according to the download request of the client. Data response (step S202); After receiving the download data response of the executable file, the client submits it to the security supervision server, requesting to scan data such as the submitted download URL (step S203), to determine the location of the executable file Security; the safety monitoring server downloads the corresponding executable file to the target site according to the download data response information submitted by the client (step S204); after the target site returns the corresponding...

Embodiment 2

[0039] Figure 5 A flow chart of a method for securely downloading an executable file according to Embodiment 2 of the present invention is shown. Such as Figure 5 As shown, in another embodiment of the present invention, if the client has downloaded the executable file, the client determines its MD5, SHA-1 and other feature codes (step S501) by scanning and analyzing the executable file; Then the URL and the characteristic code of downloading the executable file are submitted to the security monitoring server and request security analysis (step S502); after receiving the security analysis request submitted by the client and the relevant information of the executable file, the security monitoring server The relevant information such as the URL of executable file, feature code carries out security analysis, and analysis result is returned client (step S503); Client installs according to this analysis result or does not install the operation of this executable file (step S504)...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and a system for downloading an executable file securely. The method comprises the following steps that: a client makes a security analysis request on the executable file to a security supervision server; the security supervision server performs security analysis on the executable file by using a uniform resource locator (URL) and a feature code of the executable file to generate a security analysis result and returns the security analysis result to the client; and the client acquires security information of the executable file according to the security analysis result. By the method, a user can learn security threat and hidden danger of the file before downloading or installing the executable file so as to avoid risk in advance, and compared with the method that the downloaded software is securely scanned by mobile phone security software, the method of the invention avoids the downloading of the executable file with security danger and saves terminal traffic and cost.

Description

technical field [0001] The invention relates to the field of security defense for downloading files through a network, and more specifically, relates to a method and system for safely downloading executable files. Background technique [0002] With the progress of society and the development of technology, people increasingly use mobile terminals to access the Internet in a wireless manner to obtain information, including information browsing and file downloading. However, with the wide spread of network information, network security issues are becoming more and more severe, especially many executable files. Now viruses and Trojan horses not only steal passwords and account numbers to slow down the system, but also infect executable files and delete ghost backups. [0003] Especially for mobile terminals such as mobile phones, due to the limitation of hardware resources of the terminal itself, it is necessary to download many executable files in the process of accessing the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W12/00H04W12/06
Inventor 梁捷苏剑南
Owner ALIBABA (CHINA) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products