Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Virus killing method and virus killing device for local area network

A virus detection and local area network technology, applied in the Internet field, can solve the problem of low virus detection and killing rate, and achieve the effect of rapid response, improving virus detection and killing rate, and rapid feedback

Inactive Publication Date: 2017-01-04
韦春
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to overcome the defects of the prior art, the present invention provides a virus detection and killing method and device for local area network, which can solve the problem of low virus detection and killing rate under the condition of isolated network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Virus killing method and virus killing device for local area network
  • Virus killing method and virus killing device for local area network
  • Virus killing method and virus killing device for local area network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0056] see figure 1 , the present invention provides a kind of virus checking and killing method for local area network, comprising:

[0057] S11. Obtain the installation package to be detected, and send a virus scanning request to the server, so that the server updates the virus signature database;

[0058] S12. Extracting feature data of the installation package;

[0059] S13. Upload the characteristic data to the server, so that the server can identify the virus on the characteristic data according to the updated virus characteristic database;

[0060] S14. Receive the virus identification result fed back by the server.

[0061] The installation package also includes a signature file;

[0062] The feature identification data of the extraction of the installation package specifically includes:

[0063] Identify the installation package;

[0064] A hash algorithm is used to calculate the hash value of the signature file as the feature identification data of the installat...

Embodiment 2

[0066] see figure 2 , the present invention also provides another virus checking and killing method for local area network, comprising:

[0067] S21. Receive a virus scanning request sent by the client;

[0068]S22. Obtain the virus signature set of the external network offline, the virus signature set includes the virus signatures of hot virus files in the current period, and update the virus signature library according to the virus signatures in the virus signature set;

[0069] S23. Receive the characteristic data of the installation package sent by the client;

[0070] S24. Perform virus identification on the feature data according to the updated virus feature database;

[0071] S25. Feedback the virus identification result to the server.

[0072] Specifically, updating the virus signature library according to the virus signatures in the virus signature set includes:

[0073] Empty the virus signatures in the virus signature database, and write the virus signatures in...

Embodiment 3

[0078] see image 3 , the present invention also provides a virus scanning and killing device for a local area network, which is used to implement the method described in the first embodiment above, and the device includes:

[0079] An acquisition unit 31, configured to acquire the installation package to be detected, and send a virus scanning request to the server, so that the server updates the virus signature database;

[0080] An extracting unit 32, configured to extract feature data of the installation package;

[0081] An uploading unit 33, configured to upload the feature data to the server, so that the server performs virus identification on the feature data according to the updated virus feature database;

[0082] The receiving unit 34 is configured to receive the virus identification result fed back by the server.

[0083] Specifically, the installation package also includes a signature file;

[0084] The extraction unit is specifically used for:

[0085] Identif...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of Internet technology, and particularly to a virus killing method and a virus killing device for a local area network. The virus killing method comprises the steps of acquiring a to-be-tested installation package, and transmitting a virus scanning request to a server so that the server updates a virus characteristic database; extracting characteristic data of the installation package; transmitting the characteristic data to the server so that the server performs virus identification on the characteristic data according to the updated virus characteristic database; and receiving a virus identification result which is fed back from the server. The virus killing method and the virus killing device have advantages of improving virus killing rate in an isolated network environment and improving virus killing efficiency.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a virus checking and killing method and device for a local area network. Background technique [0002] With the development of Internet technology, virus files are also increasingly rampant, becoming a major threat to computer hardware or user data. For example, Internet malicious programs can spread through the network and run on electronic devices connected to the network, thereby stealing user information, destroying user data, pushing advertisements or fraudulent information, and may also affect the operation of electronic devices and endanger electronic devices. The software and hardware security of the device. [0003] In the local area network, the terminal can perform cloud scanning and killing of local virus files through the local area network server (hereinafter referred to as the server). This detection and killing method needs to deploy a virus signature datab...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32G06F21/56
CPCH04L63/145G06F21/564H04L9/3242H04L9/3247H04L63/02H04L63/1416H04L63/1466
Inventor 韦春
Owner 韦春
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products