CN101039177A - Apparatus and method for on-line searching virus - Google Patents
Apparatus and method for on-line searching virus Download PDFInfo
- Publication number
- CN101039177A CN101039177A CN 200710027735 CN200710027735A CN101039177A CN 101039177 A CN101039177 A CN 101039177A CN 200710027735 CN200710027735 CN 200710027735 CN 200710027735 A CN200710027735 A CN 200710027735A CN 101039177 A CN101039177 A CN 101039177A
- Authority
- CN
- China
- Prior art keywords
- program module
- look
- virus
- file
- check value
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Information Transfer Between Computers (AREA)
Abstract
The invention relates to an on-line killing virus device and method based on the network. An on-line killing virus device is used for the user's terminal and the server terminal through the checking and killing for the local computer system of the network. The invention is characterized in that the user's terminal contains a user's terminal program module, and the server terminal contains a server terminal program module. Among these, the user's terminal program module uploads the document waiting for checking virus or a calibration valve of the virus document, and receives the checking result returned from the server terminal program module; the server terminal program terminal checks and kills the virus for the virus documents according to the information from the calibration valve checking the virus document or using virus engine, and returns the checking result to the user's terminal program module. The invention makes the on-line killing virus deploy simply without installing a big volume virus library at the user's terminal and without updating the virus data at the user's terminal, which provides with a quick checking virus service.
Description
Technical field
The present invention relates to field of computer technology, particularly a kind of online antivirus apparatus and method based on the Internet.
Background technology
The online poison of looking into is a kind of antivirus techniques based on Internet service because it need not the client special client is installed, therefore have dispose simple and easy, the characteristics easily of upgrading.Present onlinely look into malicious technology and all be based on the ActiveX technology, the ActiveX control that is about to online antivirus is placed in the middle of the webpage, in the time of this webpage of user capture, browser can be downloaded this ActiveX control automatically and arrive this locality with the associated documents resource that needs, and can call this ActiveX control carries out virus to local computing system killing by browser then.As shown in Figure 1, be the online schematic diagram of looking into malicious technology at present, we notice, look in the malicious flow process at this, look into the poison operation and are actually that local antivirus engine finishes by downloading to ActiveX.Therefore, identical with the antivirus software of standalone version is, this online method of looking into poison remains by being installed in virus base in the custom system and antivirus engine and realizes checking and killing virus.Because the quantity of computer virus is increased sharply on the Internet at present, the virus base data of various antivirus softwares have all had bigger growth.At present the antivirus software virus base volume of main flow generally at 5M to about the 10M.Therefore at present this online looking into downloaded the virus base overlong time in the malicious technology ubiquity installation process, and the bigger problem of the data volume upgrading virus base time.Consider the network connection state that China is present, above-mentioned defective has seriously influenced the online user experience of looking into malicious program use.
Summary of the invention
The objective of the invention is to, a kind of novel online method of looking into poison is provided, and this method need not at the huge virus base of client installation volume, also need not in the client up-to-date viral data that upgrade in time, under identical network connection state, can provide and look into the poison service more fast.
Another object of the present invention is, a kind of novel online device of looking into poison is provided, and is used to realize the above-mentioned online malicious method of looking into.
The objective of the invention is to be achieved through the following technical solutions:
A kind of online method of looking into poison is used for client terminal and server end and by the Internet local computing system is carried out the killing of virus, it is characterized in that, described client terminal includes client program module, described Server Side Include has the serve end program module, and it comprises the steps
Described client program module is uploaded the check value of waiting to look into malicious file or waiting to look into malicious file to described serve end program module, and accepts the Query Result that described server module is returned;
Described serve end program module is inquired about this according to this check value and is waited to look into the information of malicious file or call antivirus engine and this is waited to look into malicious file look into poison, and returns Query Result to described client program module.
Particularly, when customer requirements was looked into the poison operation to a file, described client program module was obtained this file of waiting to look into poison from the local file system of described client terminal, and obtains the check value that this waits to look into malicious file;
Described client program module is inquired about file type and other information that this waits to look into malicious file by this check value to described serve end program module;
Described serve end program module is retrieved this check value in described server end database,
Exist if find this check value, then described server module is returned this check value corresponding file type and other information to described client program module;
If this check value does not exist, then described server module requires described client program module that this is waited to look into malicious file and uploads to described server end, and uses the antivirus engine that is installed in described server end to look into the poison operation;
If wait to look into discovery virus in the malicious file at this, then described server module will be looked into malicious result and return to described client program module, and add this to described server end database and look into malicious file corresponding check value, file type and virus name;
If waiting to look at this is not found to be virus in malicious file, then described server module is waited to look into malicious file with this and is designated as " the unknown ", and this result is returned to described client program module.
A kind of online device of looking into poison is used for client terminal and server end and by the Internet local computing system is carried out the killing of virus, it is characterized in that, described client terminal includes client program module, described Server Side Include has the serve end program module, wherein
Described client program module is uploaded the check value of waiting to look into malicious file or waiting to look into malicious file to described serve end program module, and accepts the Query Result that described server module is returned;
Described serve end program module is inquired about this according to this check value and is waited to look into the information of malicious file or call antivirus engine and this is waited to look into malicious file look into poison, and returns Query Result to described client program module.
The present invention is by being installed in the client program module of described client terminal, and be installed in mutual between the serve end program module of described server end, make to need not when online antivirus at the huge virus base of client installation volume, also need not to upgrade in time in client, that client terminal is disposed is simple for up-to-date viral data; Under identical network connection state, can provide and look into the poison service more fast.In addition, be convenient to the online antivirus service provider and in time obtain the most current virus sample; Also be convenient to other products integrated.
Description of drawings
Fig. 1 is the present online schematic diagram of looking into malicious technology;
Fig. 2 is an online structured flowchart of looking into malicious device provided by the invention;
Fig. 3 is an online flow chart of looking into malicious method provided by the invention.
Embodiment
As shown in Figure 2, a kind of online device of looking into poison, be used for client terminal 1 and local computing system carried out the killing of virus by the Internet with server end 2, described client terminal 1 includes client program module 11 and local file system 12, described client program module 11 can be an executable file, also can be the ActiveX control that calls by Web browser, the perhaps control of other routine calls; Described server end 2 includes serve end program module 21, antivirus engine 22, database 23, wherein,
Described client program module 11 is used for
From the local file system 12 of described client terminal 1, obtain and wait to look into malicious file 121, and obtain the check value that this waits to look into malicious file 121;
Inquire about file type and other information that this waits to look into malicious file 121 by this check value to described serve end program module; And accept Query Result;
Under the requirement of described serve end program module 21, upload this to described server end 2 and wait to look into malicious file 121; And accept Query Result;
Described serve end program module 21 is used for
Fileinfo with known comprises check value, whether belongs to virus, and the database 23 of described server end 2 is preserved and be recorded in to viral species (if this document is the words of virus);
In the database 23 of described server end 2, retrieve the check value of described client program module 11 inquiries, and return this check value corresponding file type and other information to described client program module 11;
Require described client program module 11 will wait to look into malicious file 121 and upload to described server end 2, and use the antivirus engine 22 that is installed in described server end 2 to look into the poison operation;
If wait to look in the malicious file 121 at this and to find virus, described server module 21 is added this to the database 23 of described server end 2 and is waited to look into malicious file 121 corresponding check values, file type and virus name;
If waiting to look in the malicious file 121 at this is not found to be virus, then described server module 21 is waited to look into malicious file 121 with this and is designated as " the unknown ", and this result is returned to described client program module 11.
As following table one and table two, (applicant uses the Md5 value among the present invention to store the check value of all known files in described database 23, be Message-Digest Algorithm 5, the Chinese name Message-Digest Algorithm 5, it is a kind of hash algorithm that is used to guarantee the complete unanimity of message transmission, usefulness as an example is so that understand) and classification and other information of these files.
Table one
Md5: | bcd9776fb92a6f0900c4bb4cf3986317 |
Type: | Wooden horse |
The virus name: | Win32.PSWTroj.QQPass.96899 |
Expression Md5 value is a trojan horse for the file of bcd9776fb92a6f0900c4bb4cf3986317, its virus Win32.PSWTroj.QQPass.96899 by name.
Table two
Md5: | 86F1895AE8C5E8B17D99ECE768A70732 |
Type: | Normal file |
The virus name: |
Expression expression Md5 value is a normal file for the file of 86F1895AE8C5E8B17D99ECE768A70732.
Described client terminal 1 also comprises local caches 13, and described client program module 11 has the query caching function.Promptly worked as the information of a file after described server end 1 was inquired about once, described client program module 11 is stored in described local caches 13 with this Query Result, in following this file of less important inquiry, described client program module 11 can directly obtain the result from described local caches 13.For the information that guarantees file can upgrade in time, the data in the described local caches 13 all are provided with overtime attribute.After the result cache record of a file surpassed certain hour, this cache information had just lost efficacy; Next time, described client program module 11 just no longer read this cache information, but directly inquires about to described server end 1, and upgrades this cache information with the result of inquiry when again this file being looked into poison.
In the present invention, described serve end program module 21 can also be designated as " the unknown " this being waited to look into malicious file, when this result is returned to described client program module 11, and this is waited to look into malicious file submit to virus analysis person and make artificial treatment.After manual analysis is finished, if normal file, with check value, file type and other information updatings of this document of obtaining in the database 23 of described server end 2; If find virus, virus analysis person also will extract the condition code of virus and upgrade the antivirus engine virus base of described server end 2.Like this, this waits to look into that malicious file is submitted once more looks into poison time when next time, just has this in the described database 23 and waits to have looked into the relevant information of malicious file.
As shown in Figure 3, a kind of online method of looking into poison is used for client terminal and server end and by the Internet local computing system is carried out the killing of virus, when customer requirements is looked into the poison operation to a file,
Described client program module 11 is obtained this and is waited to look into malicious file 121 from the local file system 12 of described client terminal 1, and obtains the check value that this waits to look into malicious file 121;
This waits to look into file type and other information of malicious file 121 to described client program module 11 to described serve end program module 21 inquiries by this check value;
Described serve end program module 21 is retrieved this check value in the database 23 of described server end 2,
Exist if find this check value, then described server module 21 is returned this check value corresponding file type and other information to described client program module 11;
If this check value does not exist, then described server module 21 requires described client program module 11 that this is waited to look into malicious file 121 and uploads to described server end 2, and uses the antivirus engine 22 that is installed in described server end 2 to look into the poison operation;
If wait to look into discovery virus in the malicious file at this, then described server module 21 will be looked into malicious result and return to described client program module 11, and add this to the database 23 of described server end 2 and look into malicious file 121 corresponding check values, file type and virus name;
If waiting to look in the malicious file 121 at this is not found to be virus, then described server module 21 is waited to look into malicious file with this and is designated as " the unknown ", and this result is returned to described client program module 11.Simultaneously, this being waited to look into malicious file submits to virus analysis person and makes artificial treatment; After manual analysis is finished, if normal file, with check value, file type and other information updatings of this document of obtaining in the database 23 of described server end 2; If find virus, virus analysis person also will extract the condition code of virus and upgrade the antivirus engine virus base of described server end 2.
Above disclosed embodiment can not think qualification that the present invention's scope required for protection is made; for the person of an ordinary skill in the technical field; that some obtain without creative work, based on the simple change that the present invention design is done, still should not take off the scope of protection of the invention.
Claims (9)
1, a kind of online device of looking into poison is used for client terminal and server end and by the Internet local computing system is carried out the killing of virus, it is characterized in that, described client terminal includes client program module, described Server Side Include has the serve end program module, wherein
Described client program module is uploaded the check value of waiting to look into malicious file or waiting to look into malicious file to described serve end program module, and accepts the Query Result that described server module is returned;
Described serve end program module is inquired about this according to this check value and is waited to look into the information of malicious file or call antivirus engine and this is waited to look into malicious file look into poison, and returns Query Result to described client program module.
2, a kind of online device of looking into poison according to claim 1 is characterized in that described client program module is obtained the file of waiting to look into poison from the local file system of described client terminal, and obtains the check value that this waits to look into malicious file; Inquire about file type and other information that this waits to look into malicious file by this check value to described serve end program module; And accept the Query Result that described server module is returned.
3, a kind of online device of looking into poison according to claim 2 is characterized in that, when described server module does not retrieve this check value, uploads this to described server end and wait to look into malicious file under the requirement of described serve end program module; And accept the Query Result that described server module is returned.
4, a kind of online device of looking into poison according to claim 1, it is characterized in that, described serve end program module is retrieved the check value of described client program module inquiry in the database of the described server end of preserving and record the known fileinfo that comprises check value, and returns this check value corresponding file type and other information to described client program module.
5, a kind of online device of looking into poison according to claim 4, it is characterized in that, when described server module does not retrieve this check value, described serve end program module requires described client program module will wait to look into malicious file and uploads to described server end, and uses the antivirus engine that is installed in described server end to look into the poison operation;
If wait to look into discovery virus in the malicious file, add this to described server end database and wait to look into malicious file corresponding check value, file type and virus name, and this result is returned to described client program module at this;
If waiting to look at this is not found to be virus in malicious file, then described server module is waited to look into malicious file with this and is designated as " the unknown ", and this result is returned to described client program module.
6, a kind of online device of looking into poison according to claim 5 is characterized in that, described serve end program module can also wait that looking into malicious file submits to virus analysis person and make artificial treatment with what be designated as " the unknown "; And analysis result is updated in the database and/or antivirus engine virus base of described server end.
7, a kind of online method of looking into poison is used for client terminal and server end and by the Internet local computing system is carried out the killing of virus, it is characterized in that, described client terminal includes client program module, described Server Side Include has the serve end program module, and it comprises the steps
Described client program module is uploaded the check value of waiting to look into malicious file or waiting to look into malicious file to described serve end program module, and accepts the Query Result that described server module is returned;
Described serve end program module is inquired about this according to this check value and is waited to look into the information of malicious file or call antivirus engine and this is waited to look into malicious file look into poison, and returns Query Result to described client program module.
8, a kind of online method of looking into poison according to claim 7, it is characterized in that, when customer requirements is looked into the poison operation to a file, described client program module is obtained this file of waiting to look into poison from the local file system of described client terminal, and obtains the check value that this waits to look into malicious file;
Described client program module is inquired about file type and other information that this waits to look into malicious file by this check value to described serve end program module;
Described serve end program module is retrieved this check value in described server end database,
Exist if find this check value, then described server module is returned this check value corresponding file type and other information to described client program module;
If this check value does not exist, then described server module requires described client program module that this is waited to look into malicious file and uploads to described server end, and uses the antivirus engine that is installed in described server end to look into the poison operation;
If wait to look into discovery virus in the malicious file at this, then described server module will be looked into malicious result and return to described client program module, and add this to described server end database and look into malicious file corresponding check value, file type and virus name;
If waiting to look at this is not found to be virus in malicious file, then described server module is waited to look into malicious file with this and is designated as " the unknown ", and this result is returned to described client program module.
9, a kind of online method of looking into poison according to claim 8 is characterized in that, described serve end program module can also wait that looking into malicious file submits to virus analysis person and make artificial treatment with what be designated as " the unknown "; And analysis result is updated in the database and/or antivirus engine virus base of described server end.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200710027735 CN101039177A (en) | 2007-04-27 | 2007-04-27 | Apparatus and method for on-line searching virus |
JP2008115669A JP4773475B2 (en) | 2007-04-27 | 2008-04-25 | Online virus scanning apparatus and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200710027735 CN101039177A (en) | 2007-04-27 | 2007-04-27 | Apparatus and method for on-line searching virus |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101039177A true CN101039177A (en) | 2007-09-19 |
Family
ID=38889840
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 200710027735 Pending CN101039177A (en) | 2007-04-27 | 2007-04-27 | Apparatus and method for on-line searching virus |
Country Status (2)
Country | Link |
---|---|
JP (1) | JP4773475B2 (en) |
CN (1) | CN101039177A (en) |
Cited By (28)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101388056B (en) * | 2008-10-20 | 2010-06-02 | 成都市华为赛门铁克科技有限公司 | Method, system and apparatus for preventing worm |
CN101808102A (en) * | 2010-04-23 | 2010-08-18 | 潘燕辉 | Operating record tracing system and method based on cloud computing |
CN101827096A (en) * | 2010-04-09 | 2010-09-08 | 潘燕辉 | Cloud computing-based multi-user collaborative safety protection system and method |
CN101923617A (en) * | 2010-08-18 | 2010-12-22 | 奇智软件(北京)有限公司 | Cloud-based sample database dynamic maintaining method |
CN102073815A (en) * | 2010-12-27 | 2011-05-25 | 奇瑞汽车股份有限公司 | Vehicle-mounted antivirus system and antivirus method |
CN102081714A (en) * | 2011-01-25 | 2011-06-01 | 潘燕辉 | Cloud antivirus method based on server feedback |
CN102222184A (en) * | 2011-05-17 | 2011-10-19 | 中兴通讯股份有限公司 | Method and system for killing mobile terminal viruses |
CN102377753A (en) * | 2010-08-19 | 2012-03-14 | 腾讯科技(深圳)有限公司 | System information identification method, device and system |
CN101859349B (en) * | 2009-04-13 | 2012-05-09 | 珠海金山软件有限公司 | File screening system and file screening method for searching and killing malicious programs |
CN102542207A (en) * | 2010-12-07 | 2012-07-04 | 微软公司 | Antimalware protection of virtual machines |
CN102750463A (en) * | 2011-12-16 | 2012-10-24 | 北京安天电子设备有限公司 | System and method for improving file rescanning speed |
CN102904874A (en) * | 2012-08-23 | 2013-01-30 | 珠海市君天电子科技有限公司 | Method for conducting cross-server data validity verification |
CN102915421A (en) * | 2011-08-04 | 2013-02-06 | 腾讯科技(深圳)有限公司 | Method and system for scanning files |
CN102945348A (en) * | 2012-10-19 | 2013-02-27 | 北京奇虎科技有限公司 | Method and device for collecting file information |
CN103064894A (en) * | 2012-12-14 | 2013-04-24 | 北京思特奇信息技术股份有限公司 | Method and device for querying retrieval contents in browser |
CN103106366A (en) * | 2010-08-18 | 2013-05-15 | 北京奇虎科技有限公司 | Dynamic maintenance method of sample database based on cloud |
CN103164653A (en) * | 2011-12-13 | 2013-06-19 | 三星电子株式会社 | Apparatus and method for analyzing malware in data analysis system |
CN103294955A (en) * | 2013-06-28 | 2013-09-11 | 北京奇虎科技有限公司 | Macro-virus searching and killing method and system |
CN103369003A (en) * | 2012-03-30 | 2013-10-23 | 网秦无限(北京)科技有限公司 | A method and a system for scanning redundancy files in a mobile device by using cloud computing |
CN103425927A (en) * | 2012-05-16 | 2013-12-04 | 腾讯科技(深圳)有限公司 | Device and method for removing viruses of computer documents |
WO2014032608A1 (en) * | 2012-09-03 | 2014-03-06 | Tencent Technology (Shenzhen) Company Limited | Method and apparatus for uploading files |
CN103886257A (en) * | 2012-12-21 | 2014-06-25 | 珠海市君天电子科技有限公司 | Automatic proofreading method and automatic proofreading system for antivirus engines |
CN106203102A (en) * | 2015-05-06 | 2016-12-07 | 北京金山安全管理系统技术有限公司 | A kind of checking and killing virus method and device of the whole network terminal |
CN106682508A (en) * | 2016-06-17 | 2017-05-17 | 腾讯科技(深圳)有限公司 | Method and device for searching and killing viruses |
US10353566B2 (en) | 2011-09-09 | 2019-07-16 | Microsoft Technology Licensing, Llc | Semantic zoom animations |
CN110771190A (en) * | 2017-06-22 | 2020-02-07 | 森特里克斯信息安全技术有限公司 | Controlling access to data |
CN111191232A (en) * | 2019-06-28 | 2020-05-22 | 腾讯科技(深圳)有限公司 | Method, device and storage medium for virus searching and killing |
CN111400714A (en) * | 2020-04-16 | 2020-07-10 | Oppo广东移动通信有限公司 | Virus detection method, device, equipment and storage medium |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2471716A (en) * | 2009-07-10 | 2011-01-12 | F Secure Oyj | Anti-virus scan management using intermediate results |
EP3722954B1 (en) | 2013-06-24 | 2023-09-06 | Cylance Inc. | Automated system for generative multimodel multiclass classification and similarity analysis using machine learning |
WO2015162985A1 (en) * | 2014-04-25 | 2015-10-29 | 株式会社セキュアブレイン | Illicit activity sensing network system and illicit activity sensing method |
CN104318159A (en) * | 2014-10-24 | 2015-01-28 | 北京奇虎科技有限公司 | Server virus killing method, device and system |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2283341A (en) * | 1993-10-29 | 1995-05-03 | Sophos Plc | Central virus checker for computer network. |
JP4145582B2 (en) * | 2002-06-28 | 2008-09-03 | Kddi株式会社 | Computer virus inspection device and mail gateway system |
EP1549012A1 (en) * | 2003-12-24 | 2005-06-29 | DataCenterTechnologies N.V. | Method and system for identifying the content of files in a network |
-
2007
- 2007-04-27 CN CN 200710027735 patent/CN101039177A/en active Pending
-
2008
- 2008-04-25 JP JP2008115669A patent/JP4773475B2/en not_active Expired - Fee Related
Cited By (46)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101388056B (en) * | 2008-10-20 | 2010-06-02 | 成都市华为赛门铁克科技有限公司 | Method, system and apparatus for preventing worm |
CN101859349B (en) * | 2009-04-13 | 2012-05-09 | 珠海金山软件有限公司 | File screening system and file screening method for searching and killing malicious programs |
CN101827096A (en) * | 2010-04-09 | 2010-09-08 | 潘燕辉 | Cloud computing-based multi-user collaborative safety protection system and method |
CN101827096B (en) * | 2010-04-09 | 2012-09-05 | 潘燕辉 | Cloud computing-based multi-user collaborative safety protection system and method |
CN101808102A (en) * | 2010-04-23 | 2010-08-18 | 潘燕辉 | Operating record tracing system and method based on cloud computing |
CN101808102B (en) * | 2010-04-23 | 2012-12-12 | 潘燕辉 | Operating record tracing system and method based on cloud computing |
CN103106366A (en) * | 2010-08-18 | 2013-05-15 | 北京奇虎科技有限公司 | Dynamic maintenance method of sample database based on cloud |
CN101923617A (en) * | 2010-08-18 | 2010-12-22 | 奇智软件(北京)有限公司 | Cloud-based sample database dynamic maintaining method |
CN101923617B (en) * | 2010-08-18 | 2013-03-20 | 北京奇虎科技有限公司 | Cloud-based sample database dynamic maintaining method |
CN103106366B (en) * | 2010-08-18 | 2016-05-04 | 北京奇虎科技有限公司 | A kind of sample database dynamic maintaining method based on cloud |
CN102377753A (en) * | 2010-08-19 | 2012-03-14 | 腾讯科技(深圳)有限公司 | System information identification method, device and system |
CN102542207A (en) * | 2010-12-07 | 2012-07-04 | 微软公司 | Antimalware protection of virtual machines |
CN102073815A (en) * | 2010-12-27 | 2011-05-25 | 奇瑞汽车股份有限公司 | Vehicle-mounted antivirus system and antivirus method |
CN102073815B (en) * | 2010-12-27 | 2013-11-20 | 奇瑞汽车股份有限公司 | Vehicle-mounted antivirus system and antivirus method |
CN102081714A (en) * | 2011-01-25 | 2011-06-01 | 潘燕辉 | Cloud antivirus method based on server feedback |
CN102222184A (en) * | 2011-05-17 | 2011-10-19 | 中兴通讯股份有限公司 | Method and system for killing mobile terminal viruses |
CN102222184B (en) * | 2011-05-17 | 2016-10-19 | 南京中兴软件有限责任公司 | A kind of method and system moving the virus killing of terminal virus |
CN102915421B (en) * | 2011-08-04 | 2013-10-23 | 腾讯科技(深圳)有限公司 | Method and system for scanning files |
CN102915421A (en) * | 2011-08-04 | 2013-02-06 | 腾讯科技(深圳)有限公司 | Method and system for scanning files |
US10353566B2 (en) | 2011-09-09 | 2019-07-16 | Microsoft Technology Licensing, Llc | Semantic zoom animations |
US11392288B2 (en) | 2011-09-09 | 2022-07-19 | Microsoft Technology Licensing, Llc | Semantic zoom animations |
CN103164653B (en) * | 2011-12-13 | 2016-08-03 | 三星电子株式会社 | For analyzing equipment and the method for Malware in data analysis system |
CN103164653A (en) * | 2011-12-13 | 2013-06-19 | 三星电子株式会社 | Apparatus and method for analyzing malware in data analysis system |
US9280663B2 (en) | 2011-12-13 | 2016-03-08 | Samsung Electronics Co., Ltd. | Apparatus and method for analyzing malware in data analysis system |
CN102750463A (en) * | 2011-12-16 | 2012-10-24 | 北京安天电子设备有限公司 | System and method for improving file rescanning speed |
CN103369003A (en) * | 2012-03-30 | 2013-10-23 | 网秦无限(北京)科技有限公司 | A method and a system for scanning redundancy files in a mobile device by using cloud computing |
CN103425927A (en) * | 2012-05-16 | 2013-12-04 | 腾讯科技(深圳)有限公司 | Device and method for removing viruses of computer documents |
CN102904874A (en) * | 2012-08-23 | 2013-01-30 | 珠海市君天电子科技有限公司 | Method for conducting cross-server data validity verification |
CN102904874B (en) * | 2012-08-23 | 2015-08-05 | 珠海市君天电子科技有限公司 | A kind of cross-server carries out the method for data validation |
CN103685150A (en) * | 2012-09-03 | 2014-03-26 | 腾讯科技(深圳)有限公司 | File uploading method and device |
US9596260B2 (en) | 2012-09-03 | 2017-03-14 | Tencent Technology (Shenzhen) Company Limited | Method and apparatus for uploading files |
WO2014032608A1 (en) * | 2012-09-03 | 2014-03-06 | Tencent Technology (Shenzhen) Company Limited | Method and apparatus for uploading files |
CN102945348A (en) * | 2012-10-19 | 2013-02-27 | 北京奇虎科技有限公司 | Method and device for collecting file information |
CN103064894A (en) * | 2012-12-14 | 2013-04-24 | 北京思特奇信息技术股份有限公司 | Method and device for querying retrieval contents in browser |
CN103886257B (en) * | 2012-12-21 | 2017-05-03 | 珠海市君天电子科技有限公司 | Automatic proofreading method and automatic proofreading system for antivirus engines |
CN103886257A (en) * | 2012-12-21 | 2014-06-25 | 珠海市君天电子科技有限公司 | Automatic proofreading method and automatic proofreading system for antivirus engines |
CN103294955A (en) * | 2013-06-28 | 2013-09-11 | 北京奇虎科技有限公司 | Macro-virus searching and killing method and system |
CN103294955B (en) * | 2013-06-28 | 2016-06-08 | 北京奇虎科技有限公司 | Macrovirus checking and killing method and system |
WO2014206183A1 (en) * | 2013-06-28 | 2014-12-31 | 北京奇虎科技有限公司 | Macro virus scanning method and system |
CN106203102A (en) * | 2015-05-06 | 2016-12-07 | 北京金山安全管理系统技术有限公司 | A kind of checking and killing virus method and device of the whole network terminal |
CN106203102B (en) * | 2015-05-06 | 2019-10-11 | 北京金山安全管理系统技术有限公司 | A kind of checking and killing virus method and device of the whole network terminal |
CN106682508A (en) * | 2016-06-17 | 2017-05-17 | 腾讯科技(深圳)有限公司 | Method and device for searching and killing viruses |
CN110771190A (en) * | 2017-06-22 | 2020-02-07 | 森特里克斯信息安全技术有限公司 | Controlling access to data |
CN111191232A (en) * | 2019-06-28 | 2020-05-22 | 腾讯科技(深圳)有限公司 | Method, device and storage medium for virus searching and killing |
CN111191232B (en) * | 2019-06-28 | 2023-09-29 | 腾讯科技(深圳)有限公司 | Method, device and storage medium for virus killing |
CN111400714A (en) * | 2020-04-16 | 2020-07-10 | Oppo广东移动通信有限公司 | Virus detection method, device, equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
JP2008276774A (en) | 2008-11-13 |
JP4773475B2 (en) | 2011-09-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101039177A (en) | Apparatus and method for on-line searching virus | |
US9407717B1 (en) | Selective prefetch scanning | |
US7096500B2 (en) | Predictive malware scanning of internet data | |
US8549099B2 (en) | Methods and systems for javascript parsing | |
US6487555B1 (en) | Method and apparatus for finding mirrored hosts by analyzing connectivity and IP addresses | |
US20080209120A1 (en) | Accelerating cache performance by active cache validation | |
US8521696B2 (en) | Structure of an alternative evaluator for directory operations | |
US20040044731A1 (en) | System and method for optimizing internet applications | |
US20080168345A1 (en) | Automatically collecting and compressing style attributes within a web document | |
EP2452287A1 (en) | Anti-virus scanning | |
US8438336B2 (en) | System and method for managing large filesystem-based caches | |
EP1303820A2 (en) | Dynamic web page caching system and method | |
CN1808426A (en) | Universal file search system and method | |
US7840557B1 (en) | Search engine cache control | |
CN101042694A (en) | Method for accessing father page in the time of browing web page | |
WO2017165914A1 (en) | "methods and systems for database optimisation" | |
CN112257032B (en) | Method and system for determining APP responsibility main body | |
CN111881394B (en) | Request processing method and system for application middle layer | |
CN110929194B (en) | Abstract algorithm-based static resource file cache control method and system | |
US20030070088A1 (en) | Computer virus names cross-reference and information method and system | |
WO2011067769A1 (en) | Shared dictionary compression over http proxy | |
CN111782244A (en) | Configuration file updating method and device, computer equipment and storage medium | |
US9973597B1 (en) | Differential dictionary compression of network-accessible content | |
Cambazoglu et al. | The Web Crawling System | |
CN114003795A (en) | Plug-in-based document acquisition and storage system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Open date: 20070919 |