Method and device for detecting file security

A technology for detecting files and files, which is applied in the Internet field, can solve problems such as time-consuming, slow identification speed, and large time consumption, and achieve the effects of improving identification efficiency, uploading speed, and improving accuracy

Inactive Publication Date: 2014-04-30
BEIJING QIHOO TECH CO LTD +1
View PDF5 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The traditional file security authentication method has the following problems: First, the entire file is uploaded. When the file is relatively large, it takes a lot of time to upload and takes up more resources.
Second, it takes a long time and low efficiency to analyze and identify all the data in the uploaded files
Third, only the data information in the uploaded files is identifie

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for detecting file security
  • Method and device for detecting file security
  • Method and device for detecting file security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0022] refer to figure 1 , shows a flow chart of a method for detecting file security in the first embodiment of the present invention. In this embodiment, the method for detecting file security may include:

[0023] Step 102, extract document features from the document to be detected, and determine the category of the extracted document features.

[0024] In this embodiment, the file to be detected is a file with an unknown secu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a device for detecting file security. The method includes extracting file features from files to be detected and determining the types of the extracted file features; determining artificial intelligent engine assessors according to the types of the file features and rating the file features by the aid of the determined assessors to acquire first rating results; comparing the first rating results to preset experience scores and determining security levels of the files to be detected. The method and the device have the advantage that problems of low speed and efficiency and poor accuracy of detection results of file security detecting procedures can be solved by the aid of the method and the device.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a method and device for detecting file security. Background technique [0002] At present, with the development of Internet technology, more and more virus files follow. Virus files are man-made special program codes, which have the following characteristics: self-replication ability, strong infectivity, and certain latency , specific trigger and very destructive. [0003] Traditional unknown file security authentication methods usually upload the entire file to the authentication server, and the authentication server analyzes and authenticates the data of the entire file to obtain the authentication result, thereby judging the security of the unknown file. [0004] The traditional file security identification method has the following problems: First, the entire file is uploaded. When the file is relatively large, it takes a lot of time to upload and takes up more resources...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56
CPCG06F21/562
Inventor 杨康王志超魏自立李振博
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products