Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A security protection method and system for linking terminal side and flow side

A security protection, terminal-side technology, applied in the field of information security, can solve the problems of blacklist database linkage, unable to fully meet the threat detection rate, unable to achieve real-time defense against unknown threats, etc., to maintain network environment security and improve the detection rate. Effect

Active Publication Date: 2020-04-24
BEIJING ANTIY NETWORK SAFETY TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Traditional anti-malware software mostly uses the blacklist mechanism to detect unknown threats, relying on simple signature scanning technology as the core technology, this detection mechanism can no longer achieve the purpose of real-time defense against unknown threats under the current network threat situation
At the same time, most of the existing blacklist mechanisms set up different blacklist databases according to different device terminals, and perform feature matching on different device terminals during threat detection, without linkage between blacklist databases, which makes some applications The detection rate of threats cannot be fully satisfied in the scenario

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security protection method and system for linking terminal side and flow side
  • A security protection method and system for linking terminal side and flow side
  • A security protection method and system for linking terminal side and flow side

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] In order to enable those skilled in the art to better understand the technical solutions in the embodiments of the present invention, and to make the above-mentioned objectives, features and advantages of the present invention more obvious and understandable, the technical solutions of the present invention will be further detailed in conjunction with the accompanying drawings. Description.

[0031] The present invention provides an embodiment of a security protection method linked to the terminal side and the flow side, such as figure 1 , figure 2 Shown, including:

[0032] S101: When a file enters the terminal side device, upload the file to the server for cloud checking and killing;

[0033] S102: Determine whether the file entering the terminal-side device is malicious, and if so, send the file characteristics to the flow-side device, otherwise release the file;

[0034] S103: The flow-side device receives the file feature sent by the server, and matches it with the data i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a terminal side and traffic side linked security protection method and system. In a process of performing security protection on in-network, the terminal side data and the traffic side data are combined to implement the dynamic complementary update of a terminal side blacklist library and a network side blacklist library, linked detection is performed on in-network files byusing the blacklist libraries subjected to the complementary update, and alarming and fixed-point clearing are performed on malicious files. According to the terminal side and traffic side linked security protection method and system provided by the invention, no matter the in-network files are located on the terminal side or the traffic side, as long as the features of the in-network files existin the blacklist library of any side, the in-network files can be accurately detected via the linked detection, thereby effectively improving the detection rate and maintaining the security of the network environment.

Description

Technical field [0001] The present invention relates to the technical field of information security, and in particular to a security protection method and system linked to a terminal side and a flow side. Background technique [0002] Nowadays, cyber threats have risen to the level of national strategy, and cyber attacks have also changed from malicious attacks aimed at the public with no clear purpose to advanced threat attacks aimed at launching information warfare with specific targets. Traditional anti-malware software mostly uses a blacklist mechanism to detect unknown threats, relying on simple signature scanning technology as the core technology. This detection mechanism cannot achieve the purpose of real-time defense against unknown threats under the current cyber threat situation. At the same time, most of the existing blacklist mechanisms set up different blacklist libraries based on different devices, and perform feature matching on different devices during threat dete...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/101H04L63/1416H04L63/20
Inventor 匡贺徐翰隆肖新光
Owner BEIJING ANTIY NETWORK SAFETY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products