Unlock instant, AI-driven research and patent intelligence for your innovation.

Systems and methods for processing electronic data

A technology for electronic data and processing methods, applied in transmission systems, electrical components, etc., and can solve problems such as large memory, system performance degradation, and consumption.

Active Publication Date: 2012-09-26
FORTINET
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Taking e-mail information as an example, the current method requires storing the entire packaged information (and also the entire e-mail message) in the cache area, which will consume a considerable amount of memory, resulting in a potential performance degradation of the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Systems and methods for processing electronic data
  • Systems and methods for processing electronic data
  • Systems and methods for processing electronic data

Examples

Experimental program
Comparison scheme
Effect test

other Embodiment approach

[0105] In other implementations, an object may also have one or more sub-objects. For example, in other implementations, the data object 606 itself can be another collection of objects such as multiple header objects, text objects, and data objects, and the multiple data objects can respectively represent some text data, picture data, or other types of data. Of course, sub-objects can also be a collection of other objects, such continuous recursive object coverage is usually called nesting. Objects with sub-objects allow data represented by objects to be classified into more categories, further refining information classification.

[0106] Next, the program distribution module 308 allocates one or more programs to the identified data block according to the identified data block represented by the object (step 408 ). Such as Figure 7A Shown is a program allocation table 700 obtained by using programs allocated by the program allocation module 308 according to some implement...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method of processing electronic data includes receiving electronic data, and scanning at least a portion of the electronic data against a first signature, wherein the first signature is not data-type dependent. A method of processing electronic data includes receiving electronic data to be scanned, identifying a portion of the electronic data, wherein the portion is represented as an object, and assigning one or more procedures to scan the portion based at least in part on the object. A system for processing electronic data includes an input for receiving electronic data, a processor configured for identifying one or more portions of the electronic data, each of the one or more portions represented as a typed object, and a buffer configured to store data associated with no more than oneobject at a time.

Description

technical field [0001] The present invention relates to a computer network and a computer system, in particular to an electronic data processing system and method for communication between computers or communication devices. Background technique [0002] The generation and dissemination of malicious software (Malware, Malicious Software) is a major problem faced by computer systems and computer networks. A computer virus is a form of malware that, in a computer network, is capable of attaching itself to other programs or a series of computer instructions, replicating itself and / or executing unsolicited content or malicious instructions. Other forms of malware include spyware, worms, and Trojan horse programs. Malware can be embedded in email attachments, in files downloaded from the Internet, and in Microsoft Office macros. The damage caused by a computer virus can range from mild interference with programs, such as pop-ups displaying unsolicited messages and images, makin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 魏少红
Owner FORTINET