Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network system, and semi-isolated network terminal virus searching and killing method and device

A virus detection and network terminal technology, applied in the field of data processing, can solve problems such as restrictions, user terminals cannot achieve cloud detection and killing, and cannot be directly connected to the public network, so as to avoid pressure, ensure real-time performance, and meet data real-time performance. the effect of the request

Active Publication Date: 2021-03-30
BEIJING QIANXIN TECH +1
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] For individual users, they can usually connect to the Internet at will to realize cloud scanning and killing. However, for enterprise users, the user's work computer will be in a semi-isolated network state and cannot be directly connected to the public network. In this case, the user terminal Unable to implement cloud scanning and killing through networking, therefore, cloud scanning and killing is restricted by the network environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network system, and semi-isolated network terminal virus searching and killing method and device
  • Network system, and semi-isolated network terminal virus searching and killing method and device
  • Network system, and semi-isolated network terminal virus searching and killing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] The embodiment of the present invention provides a half-isolated network terminal virus checking and killing method, the method is applied to the control center in the network system, wherein the network system also includes a number of clients, the clients are set on the semi-isolated network terminal, through this method, It can realize the virus detection and killing of semi-isolated network terminals, and at the same time can ensure the timeliness of the detection and killing results and the special control of the network environment of semi-isolated network terminals. Specifically, figure 1 The flowchart of the semi-isolated network terminal virus scanning and killing method provided by Embodiment 1 of the present invention, such as figure 1 As shown, the semi-isolated network terminal virus scanning and killing method provided in this embodiment includes the following steps S101 to S104.

[0036] Step S101: Receive a virus scanning and killing request sent by a cl...

Embodiment 2

[0057] Embodiment 2 of the present invention provides a preferred semi-isolated network terminal virus scanning and killing method. Part of the features and corresponding technical effects are the same as those in Embodiment 1 above. Reference may be made to Embodiment 1 above, which will not be repeated here. In this embodiment, every time the control center receives a virus scanning and killing request whose aging type is the second aging type, it compares it with the currently stored virus scanning and killing request to ensure that the stored virus scanning and killing requests are not repeated. Specifically, figure 2 The flow chart of the semi-isolated network terminal virus scanning and killing method provided by Embodiment 2 of the present invention, as figure 2 As shown, the semi-isolated network terminal virus scanning and killing method provided in this embodiment includes the following steps S201 to S208.

[0058] Step S201: Receive a virus scanning and killing re...

Embodiment 3

[0068] Embodiment 3 of the present invention provides a preferred semi-isolated network terminal virus scanning and killing method. Part of the features and corresponding technical effects are the same as those of Embodiment 1 above. Reference may be made to Embodiment 1 above, which will not be repeated here. In this embodiment, when the control center sends the sample security data corresponding to the virus scanning and killing request group to the terminal, it sends it based on the information of the terminal. On the one hand, compared with centrally delivering all sample security data to all clients, it can further reduce the pressure on the control center. specifically, image 3 The flow chart of the semi-isolated network terminal virus checking and killing method provided by Embodiment 3 of the present invention, such as image 3 As shown, the semi-isolated network terminal virus scanning and killing method provided by this embodiment includes the following steps S301 ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network system, a semi-isolated network terminal virus searching and killing method and device, computer equipment and a computer readable storage medium. The semi-isolated network terminal virus searching and killing method is applied to a control center and comprises the following steps: receiving a virus searching and killing request sent by a client; determining the aging type of the virus searching and killing request; when the aging type of the virus searching and killing request is a first aging type, sending the virus searching and killing request to the cloud,and sending sample safety data corresponding to the virus searching and killing request fed back by the cloud to the client; and when the aging type of the virus searching and killing request is a second aging type, de-duplicating a plurality of received virus searching and killing requests of the second aging type so as to obtain a virus searching and killing request group, sending the virus searching and killing request group to the cloud, and sending the sample safety data of the corresponding virus searching and killing request group fed back by the cloud to the client when a preset condition is met. According to the invention, cloud searching and killing of the semi-isolated network terminal are realized.

Description

technical field [0001] The invention relates to the technical field of data processing, in particular to a network system and a semi-isolated network terminal virus checking and killing method, device, computer equipment and computer-readable storage medium. Background technique [0002] Based on the virus detection and killing of the terminal local engine, the security definition of physical files can be realized through the local calculation of the terminal. In order to improve the security performance of the terminal, the existing technology further realizes the cloud detection and killing, that is, the terminal sends a detection and killing request to the cloud, the cloud performs virus detection and killing, and then feeds back the detection and killing results to the terminal. Based on cloud data storage, calculation, Analysis and other capabilities make the ability of cloud detection and killing better than that of local terminals. Therefore, through cloud detection a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/56
Inventor 王强谢冉江爱军李振博李常坤
Owner BEIJING QIANXIN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products