BR112014002425A2 - método, sistema, cliente e servidor para mapear arquivo - Google Patents

método, sistema, cliente e servidor para mapear arquivo

Info

Publication number
BR112014002425A2
BR112014002425A2 BR112014002425A BR112014002425A BR112014002425A2 BR 112014002425 A2 BR112014002425 A2 BR 112014002425A2 BR 112014002425 A BR112014002425 A BR 112014002425A BR 112014002425 A BR112014002425 A BR 112014002425A BR 112014002425 A2 BR112014002425 A2 BR 112014002425A2
Authority
BR
Brazil
Prior art keywords
file
attribute value
server end
server
mapping
Prior art date
Application number
BR112014002425A
Other languages
English (en)
Other versions
BR112014002425B1 (pt
Inventor
Liang Anwu
Mei Shuhui
Original Assignee
Tencent Tech Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Tech Shenzhen Co Ltd filed Critical Tencent Tech Shenzhen Co Ltd
Publication of BR112014002425A2 publication Critical patent/BR112014002425A2/pt
Publication of BR112014002425B1 publication Critical patent/BR112014002425B1/pt

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/567Computer malware detection or handling, e.g. anti-virus arrangements using dedicated hardware
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/564Static detection by virus signature recognition
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/565Static detection by checking file integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2139Recurrent verification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Virology (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

resumo patente de invenção: "método, sistema, cliente e servidor para mapear arquivo". a presente invenção refere-se a um método, um sistema, um cliente e um servidor para mapear um arquivo. o método compreende: enumerar arquivos a serem mapeados (s110); obter um valor de atributo de um arquivo a ser mapeado a partir dos arquivos enumerados um a um e transmitir o valor de atributo a uma extremidade servidora (s130); comparar o valor de atributo com códigos de recurso armazenados na extremidade servidora e adquirir um código de recurso consistente com o valor de atributo e uma categoria à qual o código de recurso pertence (s150); e formar uma correspondência entre um arquivo a ser mapeado, um valor de atributo e uma categoria de acordo com o código de recurso consistente com o valor de atributo e a categoria à qual o código de recurso pertence e registrar a correspondência em um resultado do primeiro mapeamento (s170). o método, o sistema, o cliente e o servidor para mapear um arquivo podem transmitir um valor de atributo de um arquivo a ser mapeado para a extremidade servidora e comparar o valor de atributo com códigos de recurso armazenados na extremidade servidora e categorias disso para implantar identificação de risco e segurança de arquivo. a extremidade servidora que avança em relação à limitação de armazenamento de cliente pode armazenar um grande número de códigos de recurso e a extremidade servidora pode atualizar os códigos de recurso rapidamente e em tempo, de modo que os códigos de recurso na extremidade servidora são abrangentes; desse modo aprimorando a eficiência de mapeamento de arquivo.
BR112014002425-1A 2011-08-04 2012-07-09 Método para varrer arquivos BR112014002425B1 (pt)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CN2011102227389A CN102915421B (zh) 2011-08-04 2011-08-04 文件的扫描方法及系统
CN201110222738.9 2011-08-04
PCT/CN2012/078387 WO2013017004A1 (zh) 2011-08-04 2012-07-09 文件的扫描方法、系统、客户端及服务器

Publications (2)

Publication Number Publication Date
BR112014002425A2 true BR112014002425A2 (pt) 2017-02-21
BR112014002425B1 BR112014002425B1 (pt) 2021-06-01

Family

ID=47613784

Family Applications (1)

Application Number Title Priority Date Filing Date
BR112014002425-1A BR112014002425B1 (pt) 2011-08-04 2012-07-09 Método para varrer arquivos

Country Status (6)

Country Link
US (1) US9069956B2 (pt)
EP (1) EP2741227B1 (pt)
CN (1) CN102915421B (pt)
BR (1) BR112014002425B1 (pt)
RU (1) RU2581560C2 (pt)
WO (1) WO2013017004A1 (pt)

Families Citing this family (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103248666A (zh) * 2012-02-14 2013-08-14 深圳市腾讯计算机系统有限公司 一种离线下载资源的系统、方法及装置
CN102799811B (zh) * 2012-06-26 2014-04-16 腾讯科技(深圳)有限公司 扫描方法和装置
CN103390130B (zh) * 2013-07-18 2017-04-05 北京奇虎科技有限公司 基于云安全的恶意程序查杀的方法、装置和服务器
CN103605743A (zh) * 2013-11-20 2014-02-26 中国科学院深圳先进技术研究院 一种移动终端空文件夹删除的方法及装置
WO2015128612A1 (en) 2014-02-28 2015-09-03 British Telecommunications Public Limited Company Malicious encrypted traffic inhibitor
US9383989B1 (en) 2014-06-16 2016-07-05 Symantec Corporation Systems and methods for updating applications
CN104268288B (zh) * 2014-10-21 2018-06-19 福州瑞芯微电子股份有限公司 一种基于ntfs的媒体库扫描方法及装置
EP3241140B1 (en) 2014-12-30 2021-08-18 British Telecommunications public limited company Malware detection in migrated virtual machines
WO2016107754A1 (en) * 2014-12-30 2016-07-07 British Telecommunications Public Limited Company Malware detection
US10075453B2 (en) * 2015-03-31 2018-09-11 Juniper Networks, Inc. Detecting suspicious files resident on a network
US10931689B2 (en) 2015-12-24 2021-02-23 British Telecommunications Public Limited Company Malicious network traffic identification
US10839077B2 (en) 2015-12-24 2020-11-17 British Telecommunications Public Limited Company Detecting malicious software
WO2017108575A1 (en) 2015-12-24 2017-06-29 British Telecommunications Public Limited Company Malicious software identification
EP3394783B1 (en) 2015-12-24 2020-09-30 British Telecommunications public limited company Malicious software identification
WO2017109129A1 (en) 2015-12-24 2017-06-29 British Telecommunications Public Limited Company Software security
EP3437290B1 (en) 2016-03-30 2020-08-26 British Telecommunications public limited company Detecting computer security threats
WO2017167545A1 (en) 2016-03-30 2017-10-05 British Telecommunications Public Limited Company Network traffic threat identification
EP3500970B8 (en) 2016-08-16 2021-09-22 British Telecommunications Public Limited Company Mitigating security attacks in virtualised computing environments
US11562076B2 (en) 2016-08-16 2023-01-24 British Telecommunications Public Limited Company Reconfigured virtual machine to mitigate attack
US10771483B2 (en) 2016-12-30 2020-09-08 British Telecommunications Public Limited Company Identifying an attacked computing device
EP3602999B1 (en) 2017-03-28 2021-05-19 British Telecommunications Public Limited Company Initialisation vector identification for encrypted malware traffic detection
CN108881120B (zh) 2017-05-12 2020-12-04 创新先进技术有限公司 一种基于区块链的数据处理方法及设备
EP3623980B1 (en) 2018-09-12 2021-04-28 British Telecommunications public limited company Ransomware encryption algorithm determination
EP3623982B1 (en) 2018-09-12 2021-05-19 British Telecommunications public limited company Ransomware remediation
ES2879907T3 (es) * 2018-12-28 2021-11-23 Advanced New Technologies Co Ltd Ejecución paralela de transacciones en una red de cadena de bloques basada en listas blancas de contratos inteligentes
CN111506747B (zh) * 2020-04-16 2023-09-08 Oppo(重庆)智能科技有限公司 文件解析方法、装置、电子设备及存储介质
CN112149115A (zh) * 2020-08-28 2020-12-29 杭州安恒信息技术股份有限公司 一种病毒库的更新方法、装置、电子装置和存储介质

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6021510A (en) * 1997-11-24 2000-02-01 Symantec Corporation Antivirus accelerator
US6931548B2 (en) * 2001-01-25 2005-08-16 Dell Products L.P. System and method for limiting use of a software program with another software program
US7062490B2 (en) * 2001-03-26 2006-06-13 Microsoft Corporation Serverless distributed file system
US6993132B2 (en) * 2002-12-03 2006-01-31 Matsushita Electric Industrial Co., Ltd. System and method for reducing fraud in a digital cable network
US7257842B2 (en) * 2003-07-21 2007-08-14 Mcafee, Inc. Pre-approval of computer files during a malware detection
US7475427B2 (en) * 2003-12-12 2009-01-06 International Business Machines Corporation Apparatus, methods and computer programs for identifying or managing vulnerabilities within a data processing network
EP1549012A1 (en) * 2003-12-24 2005-06-29 DataCenterTechnologies N.V. Method and system for identifying the content of files in a network
US7971257B2 (en) * 2006-08-03 2011-06-28 Symantec Corporation Obtaining network origins of potential software threats
CN101127061B (zh) 2006-08-16 2010-05-26 珠海金山软件股份有限公司 可进度预估的防治计算机病毒的装置及进度预估的方法
CN101039177A (zh) * 2007-04-27 2007-09-19 珠海金山软件股份有限公司 一种在线查毒的装置和方法
CN101621511A (zh) * 2009-06-09 2010-01-06 北京安天电子设备有限公司 一种多层次的无本地病毒库检测方法及系统
RU2420791C1 (ru) * 2009-10-01 2011-06-10 ЗАО "Лаборатория Касперского" Метод отнесения ранее неизвестного файла к коллекции файлов в зависимости от степени схожести
CN101795267B (zh) * 2009-12-30 2012-12-19 成都市华为赛门铁克科技有限公司 病毒检测方法、装置和网关设备
CN101827096B (zh) 2010-04-09 2012-09-05 潘燕辉 一种基于云计算的多用户协同安全防护系统和方法
CN101808102B (zh) 2010-04-23 2012-12-12 潘燕辉 一种基于云计算的操作记录追踪系统和方法
RU103201U1 (ru) * 2010-11-01 2011-03-27 Закрытое акционерное общество "Лаборатория Касперского" Система оптимизации использования ресурсов компьютера при антивирусной проверке
CN102024113B (zh) * 2010-12-22 2012-08-01 北京安天电子设备有限公司 快速检测恶意代码的方法和系统

Also Published As

Publication number Publication date
RU2014102898A (ru) 2015-09-10
EP2741227B1 (en) 2017-01-04
EP2741227A4 (en) 2015-07-22
US20140157408A1 (en) 2014-06-05
CN102915421A (zh) 2013-02-06
BR112014002425B1 (pt) 2021-06-01
US9069956B2 (en) 2015-06-30
EP2741227A1 (en) 2014-06-11
RU2581560C2 (ru) 2016-04-20
CN102915421B (zh) 2013-10-23
WO2013017004A1 (zh) 2013-02-07

Similar Documents

Publication Publication Date Title
BR112014002425A2 (pt) método, sistema, cliente e servidor para mapear arquivo
BR112015016122A2 (pt) métodos e sistemas para mapear ordens de reparo dentro de um banco de dados
BR112018072929A2 (pt) método e sistema para verificar a integridade de um software de computador e programa de software de computador
AU2019101570A4 (en) Data storage, data check, and data linkage method and apparatus
JP2015535115A5 (pt)
BR112020023410A2 (pt) Gerenciamento de objetos de dados para estruturas de dados com base em grafo
BR112018008742A8 (pt) ?método para autenticação biométrica, e, computador gerenciador de identidade?
BR112014007679A2 (pt) sistemas e métodos para a implementação de fluxo de trabalho médico
BR112019000353A2 (pt) método para o registro de uma transação de dados
BR112019007009A2 (pt) método e sistema para selecionar e transmitir conteúdo a um dispositivo de exibição de mídia
BR112015030417A8 (pt) Sistema de computador, método implementado por computador e sistema para resultados de busca de linguagem natural para consultas de intenção
BR112015017192A2 (pt) método, dispositivo e programa de computador para encapsular dados de mídia programada particionados
BR112015021754A2 (pt) sistemas e métodos de transação segura
BR112017011046A2 (pt) geração de sugestões de navega¬dor com base em dados de dispositvo da internet das coisas
BR112015020551A2 (pt) visualizações de entidade social em formulação de consulta
BR112013013905A2 (pt) método, sistema e cliente para implentação de grupo
BR112015001700A2 (pt) método, servidor e cliente para tecnologia push e visualização de tela de apresentação
BR112014014955A2 (pt) virtualização em criação e entrega de transmissão contínua adaptável
BR112013025032A2 (pt) dispositivo de rastreamento de pessoa, método de rastreamento de pessoa, e meio legível por computador não transitório que armazena programa de rastreamento de pessoa
BR112016007295A2 (pt) método, servidor, meio legível por computador e programa de computador de otimização de execução de consultas em um armazenamento de dados
BR112015023219A2 (pt) sistema de desenho de objeto assistido por computador, meio não transitório de armazenamento legível em computador e método de fabrico de objeto
BR112013006961A2 (pt) apresentando resultados de pesquisa social
ES2627330T3 (es) Uso de JAZ5a para mejorar la resistencia a la sequía en una planta
BR112017015956A2 (pt) método e aparelho para identificação e rastreio de unidade e recipiente
BR112017007201A2 (pt) buscas múltiplas e tarefas múltiplas em busca

Legal Events

Date Code Title Description
B06F Objections, documents and/or translations needed after an examination request according [chapter 6.6 patent gazette]
B06U Preliminary requirement: requests with searches performed by other patent offices: procedure suspended [chapter 6.21 patent gazette]
B09A Decision: intention to grant [chapter 9.1 patent gazette]
B16A Patent or certificate of addition of invention granted [chapter 16.1 patent gazette]

Free format text: PRAZO DE VALIDADE: 20 (VINTE) ANOS CONTADOS A PARTIR DE 09/07/2012, OBSERVADAS AS CONDICOES LEGAIS.