File secure loading implementation method and apparatus

An implementation method and file technology, applied in the network field, can solve problems such as extended processing time, long download time, waste of resources, etc., and achieve the effect of shortening the time of elimination and cleaning, improving speed and efficiency, and reducing the possibility of

Active Publication Date: 2016-02-10
BEIJING QIHOO TECH CO LTD
View PDF6 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Currently, existing solutions for securely loading files usually perform a security check after the file is downloaded to ensure the security of the file. This solution requires a complete download of the file to be loaded. If the file to be loaded is relatively large , downloading takes a long time, and consumes mo

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File secure loading implementation method and apparatus
  • File secure loading implementation method and apparatus
  • File secure loading implementation method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0074] Embodiment 1 of the present invention provides a method for implementing secure file loading, the process of which is as follows figure 1 shown, including the following steps:

[0075] Since files in wmi format have a feature, they need to be encrypted as a whole and authorized, but in fact, the authorization information is usually in the file header or a certain position in the file, and when downloading the file, the download method is used to download the file. The completed part can be parsed without waiting for the entire download to be completed. Therefore, as long as the part containing the authorization information in the file to be loaded is downloaded, security verification can be performed.

[0076] Step S101: When the downloaded part of the file to be loaded contains specified content, parse out the authorization information from the downloaded part.

[0077] When the downloaded part of the file to be loaded includes the file header of the file to be loaded...

Embodiment 2

[0096] Embodiment 2 of the present invention provides a method for implementing secure file loading, the process of which is as follows figure 2 shown, including the following steps:

[0097] Step 201: When the downloaded part of the file to be loaded contains specified content, parse out the authorization information from the downloaded part.

[0098] Refer to step S101, which will not be repeated here.

[0099] Step S202: Permission verification is performed according to the parsed authorization information.

[0100] When the verification is passed, step S203 is executed; when the verification is not passed, step S206 is executed.

[0101] Refer to step S102, which will not be repeated here.

[0102] Step S203: Capture the internal content of the downloaded part.

[0103] After the above-mentioned security judgment based on the authorization information, since the file to be loaded is also in the process of downloading, it is also possible to go to the background to che...

Embodiment 3

[0115] Embodiment 3 of the present invention provides a method for implementing secure file loading, the process of which is as follows image 3 shown, including the following steps:

[0116] Step 301: When the downloaded part of the file to be loaded contains specified content, parse out the authorization information from the downloaded part.

[0117] Refer to step S101, which will not be repeated here.

[0118] Step S302: Permission verification is performed according to the parsed authorization information.

[0119] When the verification is passed, step S303 is executed; when the verification is not passed, step S308 is executed.

[0120] Refer to step S102, which will not be repeated here.

[0121] Step S303: Capture the internal content of the downloaded part.

[0122] Refer to step S203, which will not be repeated here.

[0123] Step S304: According to the captured internal content, diagnose whether the internal content of the file to be loaded is malicious content ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a file secure loading implementation method and apparatus. The method comprises: when a downloaded portion of a to-be-loaded file comprises a specified content, parsing authorization information from the downloaded portion; according to the authorization information, performing authority verification; when the verification is not passed, stopping downloading the to-be-loaded file; and when the verification is passed, continuing downloading the to-be-loaded file. According to file secure loading implementation method and apparatus provided by the present invention, unsafe to-be-loaded files can be found in time during a download process rather than after downloading is completed, so that the speed and efficiency of excluding the unsafe files are improved, a download volume is reduced, download traffic is saved, and waste of system resources is avoided.

Description

technical field [0001] The invention relates to the field of network technology, in particular to a method and device for realizing safe loading of files. Background technique [0002] There are many security problems in the process of loading files by the browser, for example, opening a video file, such as a Windows Management Instrumentation (wmi) file, through a video playback client. A pop-up window can be used to prompt the user that the file to be loaded is a locally protected file, and a uniform resource locator (UniformResoureLocator, URL) needs to be downloaded to obtain a playback license, and then the user clicks OK to view the file through an embedded browser (IE ) program to display the URL. And this embedded browser has a core, such as a higher operating system, this core is a compatible mode, there will be loopholes, causing security risks. [0003] There is already a Trojan horse that spreads through this vulnerability. For example, there is a U233 vulnerab...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/52
CPCG06F21/52G06F2221/033
Inventor 张皓秋
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products