Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Computer virus recognition method and system based on cloud computing

A computer virus and identification method technology, applied in the field of computer security, can solve the problems of reducing user experience, consuming large traffic, occupying terminals, etc., and achieve the effect of reducing data processing pressure, reducing traffic consumption, and reducing adverse effects

Active Publication Date: 2018-02-13
TENCENT TECH (SHENZHEN) CO LTD
View PDF8 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The packet return stage refers to: after the cloud receives the request, it performs cloud detection on the samples corresponding to the sample information to determine whether the sample files contain viruses, and then returns the sample information of all samples and the corresponding cloud detection results to the terminal. The sample information and the cloud detection results correct the terminal detection results, that is, compare the terminal detection results corresponding to each sample with the cloud detection results, and check the terminal detection results when the terminal detection results are inconsistent with the cloud detection results. Obviously, this This method will occupy more computing resources of the terminal, affect the operating efficiency of the terminal, and may reduce the user experience
[0005] In addition, the cloud returns all the cloud detection results and sample information of all samples requested by the terminal to the terminal, and the returned content includes key information such as the file name, certificate, and file size corresponding to each sample, as well as the risk name and risk type of the file , risk level, virus ID, detailed description of the virus, etc. Since the sample information and cloud detection results of each sample contain a lot of content, and the number of software installed on the terminal is large (for example, there are hundreds of built-in software in mobile phones), it is necessary to The data uploaded to the cloud and received back from the cloud is relatively large, which will consume a large amount of traffic during the cloud scanning and killing process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer virus recognition method and system based on cloud computing
  • Computer virus recognition method and system based on cloud computing
  • Computer virus recognition method and system based on cloud computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] See image 3 and Figure 4 , image 3 and Figure 4 A flow chart of an embodiment of the computer virus identification method based on cloud computing according to the present invention is shown. Described computer virus identification method based on cloud computing, comprises the steps:

[0038] S301. The cloud server receives the detection information uploaded by the terminal. The detection information includes sample information, sample ID and terminal detection result. The terminal detection result represents the virus identification result of the terminal's virus identification on the sample.

[0039] In this embodiment, the virus identification method runs on the cloud server and the terminal, and the terminal sends a request for virus identification using the cloud server (that is, a cloud scanning and killing request) to the cloud server through a wired connection or a wireless connection. Before sending a request to the cloud server, use the virus scanning...

Embodiment 2

[0052] Please refer to Figure 5 , Figure 5 A flow chart of another embodiment of a computer virus identification method based on cloud computing is shown. This embodiment describes the virus identification method running on the terminal, including:

[0053] S501. Obtain a sample to be detected and corresponding sample information, perform virus identification on the sample, and obtain a virus identification result.

[0054] In this embodiment, the user installs the antivirus engine on the terminal device in advance, and the terminal uses the antivirus engine to obtain the installation package of the application to be detected that has been installed or is about to be installed on the terminal device, and uses the installation package as a sample to extract sample information , and use the killing engine to identify the virus, and obtain the virus identification result.

[0055] Among them, the sample information includes information such as the installation package name, ...

Embodiment 3

[0066] Please refer to Figure 6 , Figure 6 A flow chart of another embodiment of a computer virus identification method based on cloud computing is shown. This embodiment describes a virus identification method running on a cloud server, including:

[0067] S601. Receive the detection information uploaded by the terminal, the detection information includes sample information, sample ID and terminal detection result, the sample ID is used to identify the sample, and the terminal detection result indicates that the terminal performs virus identification on the sample result.

[0068] Specifically, the sample ID is the unique identifier assigned by the terminal to the sample corresponding to the sample information. The sample information includes information such as the installation package name, certificate, file size, and MD5 code of the file; the terminal virus identification results include risk name, risk type, risk Level, virus ID, detailed description of the virus and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of computer security, in particular to a computer virus recognition method and system based on cloud computing. The method comprises the steps that a cloud server receives detection information uploaded by a terminal, wherein the detection information comprises sample information and a terminal detection result, and the terminal detection result represents a virus recognition result obtained after the terminal conducts virus recognition on samples; the cloud server conducts virus detection on the samples corresponding to the sample information to obtain a cloud detection result; and the terminal detection result and the cloud detection result are compared to judge whether or not the terminal detection result and the cloud detection result are consistent,and if the terminal detection result and the cloud detection result are consistent, the cloud server does not return content to the terminal. According to the computer virus recognition method and system, the terminal detection result and the cloud detection result are compared by a cloud, and the data processing stress of the terminal is relieved; and meanwhile, only the necessary information occupying a little traffic is transmitted in the packet transmitting and returning stages, and the traffic consumption in the cloud killing process is reduced.

Description

technical field [0001] The invention relates to the field of computer security, in particular to a computer virus identification method and system based on cloud computing. Background technique [0002] With the development of Internet technology, virus files are also increasingly rampant, becoming a major threat to computer hardware or user data. For example, Internet malicious programs can spread through the network and run on electronic devices connected to the network (such as smart phones, tablet computers, portable computers, desktop computers, etc.), thereby stealing user information, destroying user data, pushing advertisements or Fraudulent information, and may also affect the operation of electronic equipment, endangering the software and hardware security of electronic equipment. [0003] Existing virus scanning processes are generally divided into local scanning and killing and cloud scanning and killing. Local detection and killing is to run the detection and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/08G06F21/55
CPCG06F21/55H04L67/5651
Inventor 詹勋昌程超
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products