发明名称 CLOUD SECURITY-BASED FILE PROCESSING METHOD AND APPARATUS
摘要 The invention discloses a cloud security-based file processing method and apparatus. The method comprises: generating a signature identifier uniquely corresponding to an unknown program file downloaded locally according to signature related information of the unknown program file; sending a query request to a server end to query whether the unknown program file is a malicious program or not, wherein the query request carries the signature identifier of the unknown program file and a part or all of the file features of the unknown program file; and receiving a feedback message from the server end, and performing subsequent process on the unknown program file according to the feedback message, wherein the server end generates the feedback message according to the signature identifier and the file features. The invention solves the problem of breaking through the cloud killing by utilizing a Trojan in the prior art and at the same time can also reduce the time from discovering a malicious program to killing the malicious program, thereby accelerating the speed of fighting against a new malicious program, reducing the information storage amount of the server as well and in turn guaranteeing the security of a client program.
申请公布号 US2016119375(A1) 申请公布日期 2016.04.28
申请号 US201414896298 申请日期 2014.06.03
申请人 BEIJING QIHOO TECHNOLOGY COMPANY LIMITED ;QIZHI SOFTWARE BEIJING COMPANY LIMITED 发明人 KONG Qinglong;YAO Tong;ZHANG Bo;LIU Zhifeng;JIANG Aijun
分类号 H04L29/06;H04L29/08 主分类号 H04L29/06
代理机构 代理人
主权项 1. A cloud security-based file processing method comprising: generating a signature identifier uniquely corresponding to an unknown program file downloaded locally according to signature related information of the unknown program file; sending a query request to a server end to query whether the unknown program file is a malicious program or not, wherein the query request carries the signature identifier of the unknown program file and a part or all of the file features of the unknown program file; and receiving a feedback message from the server end, and performing subsequent process on the unknown program file according to the feedback message, wherein the server end generates the feedback message according to the signature identifier and the file features.
地址 Beijing CN