Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cloud computing-based scanning method and device

A scanning method and scanning device technology, applied in the computer field, can solve problems such as serious consequences caused by users, failure of local logical scanning and repair strategies, etc., and achieve the effect of precise scanning

Active Publication Date: 2015-04-01
SHENZHEN TENCENT COMP SYST CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the actual application of security software, such as scanning and repairing files, local logic is used. Most of these local logics are fixed, and most of the problems that can be solved are problems that have already occurred. However, when some unexpected risks occur , local logic scanning and repair strategies will fail, and in more serious cases, there may be serious consequences for users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud computing-based scanning method and device
  • Cloud computing-based scanning method and device
  • Cloud computing-based scanning method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0021] The method provided by the invention includes figure 1 The flow shown:

[0022] see figure 1 , figure 1 The flow chart of the method provided by the embodiment of the present invention. Such as figure 1 As shown, the process may include the following steps:

[0023] Step 101, when scanning for each scanning point, obtain the scanning configuration for the scanning point from the cloud.

[0024] As an embodiment of the present invention, in step 101, the acquiring the scan configuration for the scan point from the cloud may include: when the signature database has been synchronized from the cloud, finding the scan configuration of the scan point from the signature database; And when the feature library is not synchronized from the clou...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a cloud computing-based scanning method and a cloud computing-based scanning device. The method comprises the following steps of: when scanning aiming at each scanning point, acquiring scanning configuration aiming at the scanning point from a cloud end; acquiring scanning logic required to be used for scanning the scanning point from the scanning configuration; and when the acquired scanning logic is the scanning logic set by the cloud end, scanning the scanning point by using the scanning logic of the cloud end.

Description

technical field [0001] The invention relates to computer technology, in particular to a scanning method and device based on cloud computing. Background technique [0002] Security software is divided into anti-virus software, system tools and anti-rogue software, which is a program tool that can remove all known program codes that are harmful to computers such as viruses and Trojan horses. Some security software enters the system by adding drivers to the system and starts with the operating system. [0003] Currently, the main task of security software is to monitor and scan files in real time. Among them, the real-time monitoring method of security software varies from software to software. For example, some security software divides a part of the memory space to combine the data flowing through the memory in the computer with the virus database (including virus definitions) carried by the security software itself. ) to determine whether it is a virus. In addition, there ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56H04L29/08
Inventor 谢智璋郭凌
Owner SHENZHEN TENCENT COMP SYST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products