Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

File checking and killing method, device and system

A file and killing technology, applied in the field of information security, can solve problems such as infection and uncontrollability, and achieve the effect of curbing the spread and speeding up the speed of killing.

Active Publication Date: 2015-04-22
BEIJING QIANXIN TECH
View PDF3 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the delay reporting scheme is adopted, the malicious files are released first, and then the malicious files are security detected, it may take at least 1 or 2 seconds in the middle, but this 1 or 2 seconds is enough for the malicious files to block nearby terminals. are infected, and so on, as long as there is a delay, there will be uncontrollable situations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File checking and killing method, device and system
  • File checking and killing method, device and system
  • File checking and killing method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0035] The embodiment of the present invention provides a method for securely scanning and killing files, which is a method on the cloud server side, such as figure 1 As shown, the method includes:

[0036] 101. The cloud server obtains the file to be detected uploaded by the client.

[0037] Wherein, the file to be detected is a file whose security has not been determined on the client side and whose operation has been released. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a file security checking and killing method, device and system, and relates to the information security technology. The file security checking and killing method, device and system mainly aim at effectively checking and killing rapidly-diffused vicious files. According to the main technical scheme, the method comprises the steps that a cloud server obtains a to-be-detected file uploaded by clients; security detection is carried out on the file; when it is detected that the file is a vicious file, file features of the vicious file are obtained, the detection result is returned back to the clients, and the file features are sent to all the clients within the preset range so that the clients receiving the file features can locally complete checking and killing of the vicious file. The clients receive the file features of the vicious file sent by the cloud server, the clients are located within the preset range, and the vicious file is locally checked and killed for the first time according to the file features. The file security checking and killing method, device and system are mainly used for the real-time file checking and killing process.

Description

technical field [0001] The invention relates to an information security technology, in particular to a method, device and system for checking and killing files. Background technique [0002] Real-time scanning for file security is different from scanning for file threats. For file threat scanning, after the file is scanned, the client can perform security processing on the file according to the file scanning result. This method of real-time scanning and killing of files is not feasible. For example, when a user needs to open a file, if the file is blocked and waits to detect whether there is a threat, and then allow it to open or block it, it will take a long time time, resulting in a very poor user experience. Therefore, in order to ensure the timeliness of file opening, at present, the method of delayed reporting is generally used to detect and kill the file in real time, that is, the file is allowed to be opened first, and then the file is uploaded to the cloud for threa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56H04L29/08
CPCG06F21/56G06F21/577H04L63/14
Inventor 汪圣平杨晓东
Owner BEIJING QIANXIN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products