Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network security processing method and device

A network security and processing method technology, applied in the field of network security processing methods and equipment, can solve problems such as low efficiency

Active Publication Date: 2018-03-27
ALIBABA GRP HLDG LTD
View PDF10 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this approach to network security also suffers from low efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security processing method and device
  • Network security processing method and device
  • Network security processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0108] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present invention. Rather, they are merely examples of devices and methods consistent with aspects of the invention.

[0109] It should be clear that the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0110] Terms used in the embodiments of the present invention are only for the purpose of desc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application provides a network security processing method and device. The network security processing method comprises the following steps: extracting the download path information from the mirrortraffic between a first client and a target cloud host; downloading a target file from the target cloud host according to the download path information; performing security detection on the target file, so as to confirm whether target file belongs to a non-secure target file or not; and marking the download path information as a non-secure object if the target file is a non-secure target file. The network security processing method can effectively prevent the client from being damaged by non-secure data.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a network security processing method and equipment. Background technique [0002] With the continuous development of the network, more and more users communicate through the network. However, while the network brings convenience to users, there are also certain risks. For example, virus programs have caused certain hidden dangers to network information security. [0003] The cloud platform is an important product of the computer network. This platform allows developers to put the written program in the "cloud" to run, or use the services provided in the "cloud". The target cloud host is an important part of the cloud platform. , to serve clients. [0004] In the prior art, the download path information corresponding to the non-secure data may be pre-stored in the local database of the client. When a client accesses the target cloud host to download data, the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/12H04L63/145H04L67/10H04L67/1095
Inventor 李治凯
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products