Supercharge Your Innovation With Domain-Expert AI Agents!

Cloud security downloading method

A cloud security server, security technology, applied in the field of computer security

Inactive Publication Date: 2012-05-23
BEIJING QIHOO TECH CO LTD +1
View PDF4 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] It can be seen that the current solution can only scan the downloaded files, and for those virus or Trojan files that need to consume a lot of network resources to download, it is possible to find and delete them only after the download command is executed.
But it can't do anything about the content that's being downloaded.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud security downloading method
  • Cloud security downloading method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] Since companies have different understandings of "cloud", the "cloud security" we finally see is still very different. Among them, foreign anti-virus software is mainly used to mark the processes in the user's computer through the server group on the Internet. Any files marked as trusted will no longer participate in the daily scanning, thus greatly improving the running speed of the daily scanning . And this design is similar to the "white list" we are familiar with.

[0018] In comparison with domestic anti-virus software, each user client will become a member of the "cloud security". They monitor the abnormal behavior of the software in the network and automatically send it to the server for analysis. After processing, distribute the virus or Trojan processing program to each client, so that any computer with anti-virus software can detect and kill the new virus in a short time.

[0019] However, in many cases, users may not have antivirus software with cloud function, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a cloud security downloading method. Information interaction between a download terminal and a cloud-end server by an Internet comprises the following steps that: the download terminal obtains an URL (Uniform Resource Locator) address of a download file of a user; the URL address of the download file is compared with a risk list of a cloud security server; and the download terminal prompts a comparing result to the user.

Description

Technical field [0001] The invention relates to the field of computer security, in particular to a secure download method. technical background [0002] The current anti-virus software's determination of viruses is nothing more than two modes, namely traditional "feature database" scanning and active defense based on behavioral judgments. Most of the other technologies, including heuristic virus detection and virtual machine detection and killing, can be regarded as refinements or branches of these two models. Among them, "feature library scanning" has the least false positives, but one of its fatal problems is serious lag. Especially in the current situation where Trojan horse variants are increasing exponentially, the situation of missed killing and missed detection is very serious. As a behavior judgment mode, active defense is mainly to determine Trojan horses through file behavior. Therefore, the biggest advantage of this mode is that it can abandon the feature library and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06
CPCH04L67/06H04L29/08117H04L63/145H04L63/14H04L67/02H04L29/0809
Inventor 齐向东赵晨曦
Owner BEIJING QIHOO TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More