Unlock instant, AI-driven research and patent intelligence for your innovation.

A computer virus identification method and system based on cloud computing

A computer virus and identification method technology, which is applied in the transmission system, platform integrity maintenance, electrical components, etc., can solve the problems of reducing user experience, consuming large traffic, occupying terminals, etc., to reduce data processing pressure and save packet return traffic , Improve the effect of user experience

Active Publication Date: 2020-07-31
TENCENT TECH (SHENZHEN) CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The packet return stage refers to: after the cloud receives the request, it performs cloud detection on the samples corresponding to the sample information to determine whether the sample files contain viruses, and then returns the sample information of all samples and the corresponding cloud detection results to the terminal. The sample information and the cloud detection results correct the terminal detection results, that is, compare the terminal detection results corresponding to each sample with the cloud detection results, and check the terminal detection results when the terminal detection results are inconsistent with the cloud detection results. Obviously, this This method will occupy more computing resources of the terminal, affect the operating efficiency of the terminal, and may reduce the user experience
[0005] In addition, the cloud returns all the cloud detection results and sample information of all samples requested by the terminal to the terminal, and the returned content includes key information such as the file name, certificate, and file size corresponding to each sample, as well as the risk name and risk type of the file , risk level, virus ID, detailed description of the virus, etc. Since the sample information and cloud detection results of each sample contain a lot of content, and the number of software installed on the terminal is large (for example, there are hundreds of built-in software in mobile phones), it is necessary to The data uploaded to the cloud and received back from the cloud is relatively large, which will consume a large amount of traffic during the cloud scanning and killing process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A computer virus identification method and system based on cloud computing
  • A computer virus identification method and system based on cloud computing
  • A computer virus identification method and system based on cloud computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] See image 3 and Figure 4 , image 3 and Figure 4 A flow chart of an embodiment of the computer virus identification method based on cloud computing according to the present invention is shown. Described computer virus identification method based on cloud computing, comprises the steps:

[0038] S301. The cloud server receives the detection information uploaded by the terminal. The detection information includes sample information, sample ID and terminal detection result. The terminal detection result represents the virus identification result of the terminal's virus identification on the sample.

[0039] In this embodiment, the virus identification method runs on the cloud server and the terminal, and the terminal sends a request for virus identification using the cloud server (that is, a cloud scanning and killing request) to the cloud server through a wired connection or a wireless connection. Before sending a request to the cloud server, use the virus scanning...

Embodiment 2

[0052] Please refer to Figure 5 , Figure 5 A flow chart of another embodiment of a computer virus identification method based on cloud computing is shown. This embodiment describes the virus identification method running on the terminal, including:

[0053] S501. Obtain a sample to be detected and corresponding sample information, perform virus identification on the sample, and obtain a virus identification result.

[0054] In this embodiment, the user installs the antivirus engine on the terminal device in advance, and the terminal uses the antivirus engine to obtain the installation package of the application to be detected that has been installed or is about to be installed on the terminal device, and uses the installation package as a sample to extract sample information , and use the killing engine to identify the virus, and obtain the virus identification result.

[0055] Among them, the sample information includes information such as the installation package name, ...

Embodiment 3

[0066] Please refer to Figure 6 , Figure 6 A flow chart of another embodiment of a computer virus identification method based on cloud computing is shown. This embodiment describes a virus identification method running on a cloud server, including:

[0067] S601. Receive the detection information uploaded by the terminal, the detection information includes sample information, sample ID and terminal detection result, the sample ID is used to identify the sample, and the terminal detection result indicates that the terminal performs virus identification on the sample result.

[0068] Specifically, the sample ID is the unique identifier assigned by the terminal to the sample corresponding to the sample information. The sample information includes information such as the installation package name, certificate, file size, and MD5 code of the file; the terminal virus identification results include risk name, risk type, risk Level, virus ID, detailed description of the virus and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of computer security, in particular to a computer virus identification method and system based on cloud computing. The method comprises that the cloud server receives detection information uploaded by the terminal, the detection information includes sample information and a terminal detection result, and the terminal detection result represents the virus identification result obtained by the terminal performing virus identification on the sample; the cloud server corresponds to the sample information Virus detection is performed on the samples of the cloud to obtain the cloud detection results; the terminal detection results are compared with the cloud detection results to determine whether the terminal detection results are consistent with the cloud detection results. If the terminal detection results are consistent with the cloud detection results, the cloud The server does not return content to the terminal. The present invention compares the terminal detection results with the cloud detection results by the cloud, which reduces the data processing pressure of the terminal. traffic consumption.

Description

technical field [0001] The invention relates to the field of computer security, in particular to a computer virus identification method and system based on cloud computing. Background technique [0002] With the development of Internet technology, virus files are also increasingly rampant, becoming a major threat to computer hardware or user data. For example, Internet malicious programs can spread through the network and run on electronic devices connected to the network (such as smart phones, tablet computers, portable computers, desktop computers, etc.), thereby stealing user information, destroying user data, pushing advertisements or Fraudulent information, and may also affect the operation of electronic equipment, endangering the software and hardware security of electronic equipment. [0003] Existing virus scanning processes are generally divided into local scanning and killing and cloud scanning and killing. Local detection and killing is to run the detection and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08G06F21/55
CPCG06F21/55H04L67/5651
Inventor 詹勋昌程超
Owner TENCENT TECH (SHENZHEN) CO LTD