CN102081714A - Cloud antivirus method based on server feedback - Google Patents
Cloud antivirus method based on server feedback Download PDFInfo
- Publication number
- CN102081714A CN102081714A CN2011100267606A CN201110026760A CN102081714A CN 102081714 A CN102081714 A CN 102081714A CN 2011100267606 A CN2011100267606 A CN 2011100267606A CN 201110026760 A CN201110026760 A CN 201110026760A CN 102081714 A CN102081714 A CN 102081714A
- Authority
- CN
- China
- Prior art keywords
- server end
- apocrypha
- antivirus software
- client
- scanning result
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Information Transfer Between Computers (AREA)
Abstract
The invention discloses a cloud antivirus method based on server feedback, comprising the steps of: firstly, judging whether suspicious files are submitted by other users and are scanned in a server side, if not, uploading the files to the server side, scanning the suspicious files on the server side by calling various antivirus software, feeding back scanning results to a client side, meanwhile, storing the scanning results in a historical scanning result library of the server side, and carrying out further processing by the client side according to the scanning results; if so, directly feeding back the historical scanning results, which correspond to the suspicious files and are stored in the historical scanning result library, to the client side by the server side; and meanwhile, checking the antivirus software on the server side and an antivirus library thereof, if the virus database of the antivirus software has been updated or new antivirus software is added, prompting a user on whether to scan, and calling the new antivirus software and the new virus database for scanning if the user agrees to rescan.
Description
Technical field
The present invention relates to the computer security technique field, relate in particular to a kind of cloud checking and killing method based on server feedback.
Background technology
Now, along with the raising of the level of informatization and the continuous release of various applicability technology, it is also convenient all the more that the user carries out the various activities relevant with numerical information, and undeniablely be user and informationization, digitized related also tight all the more.Yet accompany therewith, the numerical information crime but frequently takes place such as the incident of attacking (especially passing through the internet) PC, server or other computerized device.Clearly, the industrialization day by day of present underground digital economy, scale, and also its corresponding criminal offence also gets over hiddenization, and the attack means of Malware has obtained great development.Such as the form that developed into the attack of multimode, multicompartmentization by former single file, more in addition most Malware all have stronger camouflage ability.
In most client computers, majority is only installed a kind of antivirus software at present, and three kinds of antivirus softwares are installed at most, but problem be, can scan all virus without any a kind of antivirus software.Simultaneously,, because the antivirus software bulky, also may have conflict between mutually, cause single client to be difficult to install simultaneously multiple antivirus software if that various antivirus softwares are installed is also unrealistic for the suggestion client.This has just brought the new technical issues that need to address.The present invention produces thus.
Summary of the invention
Technical matters to be solved by this invention be at the deficiencies in the prior art provide a kind of can integrated multiple antivirus software function based on the cloud checking and killing method of server end to client feedback.
The present invention adopts following technical scheme:
A kind of cloud checking and killing method based on server feedback, comprise at least one client and at least one server end, after the described client terminal to discover apocrypha, this apocrypha is reported to described server end, described server end is equipped with multiple antivirus software in advance, judge that at first whether described apocrypha submitted to by other users and carry out overscanning at server end, if not, end then uploads onto the server this document, calling various antivirus softwares at server end scans, scanning result is fed back to client, simultaneously this scanning result is stored in the historical scanning result storehouse of server end, client is made further processing according to described scanning result; If yes, this document corresponding historical scanning result that then described server end directly will be stored in the described historical scanning result storehouse feeds back to described client, check the antivirus software and the virus base thereof of server end simultaneously, if the antivirus software virus base upgrades, perhaps there is new antivirus software to add, whether the prompting user rescans, if the user agrees to rescan, then calls new antivirus software and new virus base scans.
Described client is one of computing machine, smart mobile phone, palm PC.
Further, the method for described report apocrypha is: extract Hash (hash) value of apocrypha, described cryptographic hash is uploaded to described server end.
Preferably, the scope of wherein said apocrypha is limited in executable file, driving and service that is moving in the system and the various dll files that call.The file total amount that reports is reduced greatly, thereby realize the HASH value of first documents, will not have scanned file to upload onto the server then and scan, improved efficient greatly.
When virus is not performed, do not have danger, therefore only scan, can guarantee the safety of present system at the file that is moving.
Description of drawings
Fig. 1 is a system architecture synoptic diagram of the present invention;
Fig. 2 is the inventive method process flow diagram.
Embodiment
Below in conjunction with specific embodiment, the present invention is described in detail.
As shown in Figure 1, 2, a kind of cloud checking and killing method based on server feedback, be used for client and server end carry out virus to local user system (for example user terminals such as computing machine, palm PC, smart mobile phone) by the internet killing, after user terminal is found apocrypha, when requirement is looked into the poison operation to this apocrypha, described client program module 11 is obtained the hash value of this apocrypha 121 from the local file system of described client terminal 1, can adopt hash algorithm commonly used to have: sha, sha1, sha256 and md5 etc.Other also have md4, md2, mdc2 and ripemd160 etc.
The scope of apocrypha is limited in executable file, driving and service that is moving in the system and the various dll files that call.The file total amount that reports is reduced greatly, thereby realize first documents HASH, will not have scanned file to upload onto the server then and scan, improved efficient greatly.
Described client program module 11 is given described serve end program module 21 with this hash value reporting, and whether the file of attempting to inquire about at server end this apocrypha 121 is virus or dangerous file;
Described serve end program module 21 is retrieved this hash value in the historical scanning result database 22 of described server end 2, if finding this hash value exists, promptly show the scan request that once had the user to submit this document to, store the scanning result of this apocrypha in historical scanning result database 22, then described server module 21 is returned this hash value corresponding historical scanning result to described client program module 11; Simultaneously, check the antivirus software and the virus base thereof of server end, if the antivirus software virus base upgrades, perhaps there is new antivirus software to add, whether the prompting user rescans, if the user agrees to rescan, then calls new antivirus software and new virus base scans.
If this hash value does not exist, then described server module 21 requires described client program module 11 that this apocrypha 121 is uploaded to described server end 2, and uses the antivirus engine 22 or a series of antivirus engines such as antivirus engine 23 or 24 that are installed in described server end 2 to look into the poison operation;
If wait to look into discovery virus in the malicious file at this, then described server module 21 will be looked into malicious result and return to described client program module 11, and add this hash value of looking into malicious file 121 correspondences, file type and virus name to the historical scanning result database of described server end 2;
If wait to look into discovery virus or dangerous file in the malicious file 121 at this, then described server module 21 is designated as this apocrypha " finding virus ", and this result is returned to described client program module 11.Simultaneously, this being waited to look into malicious file submits to virus analysis person and makes artificial treatment; After manual analysis is finished, if normal file, with proof test value, file type and other information updatings of this document of obtaining in the historical scanning result database of described server end 2; Through after the manual analysis, find virus, virus analysis person will extract this viral condition code and be updated to the antivirus engine virus base of described server end 2, and this result is fed back to client.
In client antivirus engine can be installed like this and can realize virus killing scan operation, save the system resource of client greatly, by retrieval, can save time greatly in addition to user feedback to historical scanning result database to apocrypha.
Should be understood that, for those of ordinary skills, can be improved according to the above description or conversion, and all these improvement and conversion all should belong to the protection domain of claims of the present invention.
Claims (4)
1. cloud checking and killing method based on server feedback, it is characterized in that, comprise at least one client and at least one server end, after the described client terminal to discover apocrypha, this apocrypha is reported to described server end, described server end is equipped with multiple antivirus software in advance, judge that at first whether described apocrypha submitted to by other users and carry out overscanning at server end, if not, end then uploads onto the server this document, calling various antivirus softwares at server end scans, scanning result is fed back to client, simultaneously this scanning result is stored in the historical scanning result storehouse of server end, client is made further processing according to described scanning result; If yes, this document corresponding historical scanning result that then described server end directly will be stored in the described historical scanning result storehouse feeds back to described client, check the antivirus software and the virus base thereof of server end simultaneously, if the antivirus software virus base upgrades, perhaps there is new antivirus software to add, whether the prompting user rescans, if the user agrees to rescan, then calls new antivirus software and new virus base scans.
2. cloud checking and killing method according to claim 1 is characterized in that, described client is one of computing machine, smart mobile phone, palm PC.
3. cloud checking and killing method according to claim 1 is characterized in that, the method for described report apocrypha is: extract the cryptographic hash of apocrypha, described cryptographic hash is uploaded to described server end.
4. cloud checking and killing method according to claim 1 is characterized in that, the scope of described apocrypha is limited in executable file, driving and service that is moving in the system and the various dll files that call.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011100267606A CN102081714A (en) | 2011-01-25 | 2011-01-25 | Cloud antivirus method based on server feedback |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011100267606A CN102081714A (en) | 2011-01-25 | 2011-01-25 | Cloud antivirus method based on server feedback |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102081714A true CN102081714A (en) | 2011-06-01 |
Family
ID=44087673
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2011100267606A Pending CN102081714A (en) | 2011-01-25 | 2011-01-25 | Cloud antivirus method based on server feedback |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102081714A (en) |
Cited By (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102413142A (en) * | 2011-11-30 | 2012-04-11 | 华中科技大学 | Active defense method based on cloud platform |
CN102546628A (en) * | 2011-12-31 | 2012-07-04 | 北京奇虎科技有限公司 | Sample authenticating method and system |
CN102663284A (en) * | 2012-03-21 | 2012-09-12 | 南京邮电大学 | Malicious code identification method based on cloud computing |
CN102664884A (en) * | 2012-04-18 | 2012-09-12 | 南京邮电大学 | Malicious code recognition method based on cloud computing |
CN102685100A (en) * | 2012-03-08 | 2012-09-19 | 珠海市君天电子科技有限公司 | Distribution document security identification system and distribution document security identification method |
CN102790799A (en) * | 2012-06-05 | 2012-11-21 | 电子科技大学 | Resource downloading method based on cloud security service |
CN102811213A (en) * | 2011-11-23 | 2012-12-05 | 北京安天电子设备有限公司 | Fuzzy hashing algorithm-based malicious code detection system and method |
CN102855420A (en) * | 2012-08-23 | 2013-01-02 | 珠海市君天电子科技有限公司 | Inspiration detection method for judging safety of starting point by combining multidimensional engines |
CN102904874A (en) * | 2012-08-23 | 2013-01-30 | 珠海市君天电子科技有限公司 | Method for conducting cross-server data validity verification |
CN102945350A (en) * | 2012-10-24 | 2013-02-27 | 珠海市君天电子科技有限公司 | Remote antivirus method |
CN102970272A (en) * | 2011-09-01 | 2013-03-13 | 腾讯科技(深圳)有限公司 | Method, device and cloud server for detesting viruses |
CN102970283A (en) * | 2012-10-31 | 2013-03-13 | 北京奇虎科技有限公司 | File scanning system |
CN102968589A (en) * | 2012-11-14 | 2013-03-13 | 北京奇虎科技有限公司 | Method and device for identifying safety attributes of application procedure |
WO2013044716A1 (en) * | 2011-09-30 | 2013-04-04 | 腾讯科技(深圳)有限公司 | Method and device for multiple engine virus killing |
CN103049697A (en) * | 2012-11-26 | 2013-04-17 | 北京奇虎科技有限公司 | File detection method and system for enterprises |
CN103164653A (en) * | 2011-12-13 | 2013-06-19 | 三星电子株式会社 | Apparatus and method for analyzing malware in data analysis system |
CN103425928A (en) * | 2012-05-17 | 2013-12-04 | 富泰华工业(深圳)有限公司 | Virus killing system and method for electronic device |
CN103500305A (en) * | 2013-09-04 | 2014-01-08 | 中国航天科工集团第二研究院七〇六所 | System and method for malicious code analysis based on cloud computing |
CN103593613A (en) * | 2013-11-26 | 2014-02-19 | 北京网秦天下科技有限公司 | Method, terminal, server and system for computer virus detection |
CN103795695A (en) * | 2012-10-31 | 2014-05-14 | 珠海市君天电子科技有限公司 | Self-learning file identification method and system |
CN103823871A (en) * | 2014-02-26 | 2014-05-28 | 可牛网络技术(北京)有限公司 | Method and device for searching for software |
CN103886257A (en) * | 2012-12-21 | 2014-06-25 | 珠海市君天电子科技有限公司 | Automatic proofreading method and automatic proofreading system for antivirus engines |
CN104462969A (en) * | 2014-12-16 | 2015-03-25 | 北京奇虎科技有限公司 | Method, device and system for checking and killing malicious application programs |
CN104506521A (en) * | 2014-12-18 | 2015-04-08 | 北京奇虎科技有限公司 | Method for sending file to mobile terminal by browser, browser client side and device |
CN105303106A (en) * | 2014-06-06 | 2016-02-03 | 腾讯科技(深圳)有限公司 | Malicious code processing method, apparatus, and system |
CN105488391A (en) * | 2014-12-13 | 2016-04-13 | 哈尔滨安天科技股份有限公司 | System and method used for defending APT (Advanced Persistent Threat) attack |
CN105556481A (en) * | 2013-06-27 | 2016-05-04 | 联传科技公司 | System and method for antivirus protection |
CN106778240A (en) * | 2016-11-18 | 2017-05-31 | 航天恒星科技有限公司 | A kind of virtual machine virus method method and device |
CN106855833A (en) * | 2016-12-02 | 2017-06-16 | 航天星图科技(北京)有限公司 | A kind of data verification method |
CN108171058A (en) * | 2017-12-26 | 2018-06-15 | 中国联合网络通信集团有限公司 | Multi engine virus scan system and multi engine virus scan method based on Serverless frames |
US10063412B2 (en) | 2013-04-19 | 2018-08-28 | Zte Corporation | Network device detecting method and apparatus, and cloud detection system |
CN116405272A (en) * | 2023-03-17 | 2023-07-07 | 中广核智能科技(深圳)有限责任公司 | Safety protection method of DCS software server and computer equipment |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101039177A (en) * | 2007-04-27 | 2007-09-19 | 珠海金山软件股份有限公司 | Apparatus and method for on-line searching virus |
CN101808102A (en) * | 2010-04-23 | 2010-08-18 | 潘燕辉 | Operating record tracing system and method based on cloud computing |
CN101827096A (en) * | 2010-04-09 | 2010-09-08 | 潘燕辉 | Cloud computing-based multi-user collaborative safety protection system and method |
-
2011
- 2011-01-25 CN CN2011100267606A patent/CN102081714A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101039177A (en) * | 2007-04-27 | 2007-09-19 | 珠海金山软件股份有限公司 | Apparatus and method for on-line searching virus |
CN101827096A (en) * | 2010-04-09 | 2010-09-08 | 潘燕辉 | Cloud computing-based multi-user collaborative safety protection system and method |
CN101808102A (en) * | 2010-04-23 | 2010-08-18 | 潘燕辉 | Operating record tracing system and method based on cloud computing |
Cited By (49)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102970272B (en) * | 2011-09-01 | 2015-05-20 | 腾讯科技(深圳)有限公司 | Method, device and cloud server for detesting viruses |
CN102970272A (en) * | 2011-09-01 | 2013-03-13 | 腾讯科技(深圳)有限公司 | Method, device and cloud server for detesting viruses |
WO2013044716A1 (en) * | 2011-09-30 | 2013-04-04 | 腾讯科技(深圳)有限公司 | Method and device for multiple engine virus killing |
US8966633B2 (en) | 2011-09-30 | 2015-02-24 | Tencent Technology (Shenzhen) Company Limited | Method and device for multiple engine virus killing |
RU2584508C2 (en) * | 2011-09-30 | 2016-05-20 | Тенсент Текнолоджи (Шеньчжень) Компани Лимитед | Method and device for determination of file scanning results using multiple engines |
CN102811213A (en) * | 2011-11-23 | 2012-12-05 | 北京安天电子设备有限公司 | Fuzzy hashing algorithm-based malicious code detection system and method |
CN102413142A (en) * | 2011-11-30 | 2012-04-11 | 华中科技大学 | Active defense method based on cloud platform |
CN103164653A (en) * | 2011-12-13 | 2013-06-19 | 三星电子株式会社 | Apparatus and method for analyzing malware in data analysis system |
CN103164653B (en) * | 2011-12-13 | 2016-08-03 | 三星电子株式会社 | For analyzing equipment and the method for Malware in data analysis system |
US9280663B2 (en) | 2011-12-13 | 2016-03-08 | Samsung Electronics Co., Ltd. | Apparatus and method for analyzing malware in data analysis system |
CN102546628A (en) * | 2011-12-31 | 2012-07-04 | 北京奇虎科技有限公司 | Sample authenticating method and system |
CN102685100B (en) * | 2012-03-08 | 2015-05-20 | 珠海市君天电子科技有限公司 | Distribution document security identification method |
CN102685100A (en) * | 2012-03-08 | 2012-09-19 | 珠海市君天电子科技有限公司 | Distribution document security identification system and distribution document security identification method |
CN102663284A (en) * | 2012-03-21 | 2012-09-12 | 南京邮电大学 | Malicious code identification method based on cloud computing |
CN102664884A (en) * | 2012-04-18 | 2012-09-12 | 南京邮电大学 | Malicious code recognition method based on cloud computing |
CN103425928A (en) * | 2012-05-17 | 2013-12-04 | 富泰华工业(深圳)有限公司 | Virus killing system and method for electronic device |
CN103425928B (en) * | 2012-05-17 | 2017-11-24 | 富泰华工业(深圳)有限公司 | The antivirus system and method for electronic installation |
CN102790799A (en) * | 2012-06-05 | 2012-11-21 | 电子科技大学 | Resource downloading method based on cloud security service |
CN102790799B (en) * | 2012-06-05 | 2015-01-21 | 电子科技大学 | Resource downloading method based on cloud security service |
CN102855420B (en) * | 2012-08-23 | 2015-08-19 | 珠海市君天电子科技有限公司 | Combine between a kind of various dimensions engine and judge the safe sexual enlightenment detection method in start-up point |
CN102904874B (en) * | 2012-08-23 | 2015-08-05 | 珠海市君天电子科技有限公司 | A kind of cross-server carries out the method for data validation |
CN102855420A (en) * | 2012-08-23 | 2013-01-02 | 珠海市君天电子科技有限公司 | Inspiration detection method for judging safety of starting point by combining multidimensional engines |
CN102904874A (en) * | 2012-08-23 | 2013-01-30 | 珠海市君天电子科技有限公司 | Method for conducting cross-server data validity verification |
CN102945350A (en) * | 2012-10-24 | 2013-02-27 | 珠海市君天电子科技有限公司 | Remote antivirus method |
CN102945350B (en) * | 2012-10-24 | 2016-01-20 | 珠海市君天电子科技有限公司 | A kind of method of remote virus-killing |
CN102970283A (en) * | 2012-10-31 | 2013-03-13 | 北京奇虎科技有限公司 | File scanning system |
CN102970283B (en) * | 2012-10-31 | 2015-08-12 | 北京奇虎科技有限公司 | Document scanning system |
CN103795695A (en) * | 2012-10-31 | 2014-05-14 | 珠海市君天电子科技有限公司 | Self-learning file identification method and system |
CN102968589A (en) * | 2012-11-14 | 2013-03-13 | 北京奇虎科技有限公司 | Method and device for identifying safety attributes of application procedure |
CN102968589B (en) * | 2012-11-14 | 2015-09-23 | 北京奇虎科技有限公司 | A kind of recognition methods of application security attribute and device |
CN103049697A (en) * | 2012-11-26 | 2013-04-17 | 北京奇虎科技有限公司 | File detection method and system for enterprises |
CN103886257A (en) * | 2012-12-21 | 2014-06-25 | 珠海市君天电子科技有限公司 | Automatic proofreading method and automatic proofreading system for antivirus engines |
CN103886257B (en) * | 2012-12-21 | 2017-05-03 | 珠海市君天电子科技有限公司 | Automatic proofreading method and automatic proofreading system for antivirus engines |
US10063412B2 (en) | 2013-04-19 | 2018-08-28 | Zte Corporation | Network device detecting method and apparatus, and cloud detection system |
CN105556481A (en) * | 2013-06-27 | 2016-05-04 | 联传科技公司 | System and method for antivirus protection |
CN103500305A (en) * | 2013-09-04 | 2014-01-08 | 中国航天科工集团第二研究院七〇六所 | System and method for malicious code analysis based on cloud computing |
CN103593613A (en) * | 2013-11-26 | 2014-02-19 | 北京网秦天下科技有限公司 | Method, terminal, server and system for computer virus detection |
CN103823871A (en) * | 2014-02-26 | 2014-05-28 | 可牛网络技术(北京)有限公司 | Method and device for searching for software |
CN105303106A (en) * | 2014-06-06 | 2016-02-03 | 腾讯科技(深圳)有限公司 | Malicious code processing method, apparatus, and system |
CN105303106B (en) * | 2014-06-06 | 2019-06-25 | 腾讯科技(深圳)有限公司 | Malevolence code processing method, apparatus and system |
CN105488391A (en) * | 2014-12-13 | 2016-04-13 | 哈尔滨安天科技股份有限公司 | System and method used for defending APT (Advanced Persistent Threat) attack |
CN105488391B (en) * | 2014-12-13 | 2018-05-25 | 哈尔滨安天科技股份有限公司 | A kind of system and method for being used to that APT to be defendd to attack |
CN104462969A (en) * | 2014-12-16 | 2015-03-25 | 北京奇虎科技有限公司 | Method, device and system for checking and killing malicious application programs |
CN104506521B (en) * | 2014-12-18 | 2018-09-04 | 北京奇虎科技有限公司 | Browser sends method, browser client and the device of file |
CN104506521A (en) * | 2014-12-18 | 2015-04-08 | 北京奇虎科技有限公司 | Method for sending file to mobile terminal by browser, browser client side and device |
CN106778240A (en) * | 2016-11-18 | 2017-05-31 | 航天恒星科技有限公司 | A kind of virtual machine virus method method and device |
CN106855833A (en) * | 2016-12-02 | 2017-06-16 | 航天星图科技(北京)有限公司 | A kind of data verification method |
CN108171058A (en) * | 2017-12-26 | 2018-06-15 | 中国联合网络通信集团有限公司 | Multi engine virus scan system and multi engine virus scan method based on Serverless frames |
CN116405272A (en) * | 2023-03-17 | 2023-07-07 | 中广核智能科技(深圳)有限责任公司 | Safety protection method of DCS software server and computer equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102081714A (en) | Cloud antivirus method based on server feedback | |
EP2452287B1 (en) | Anti-virus scanning | |
CN105553917B (en) | Method and system for detecting webpage bugs | |
US8528089B2 (en) | Known files database for malware elimination | |
US8359651B1 (en) | Discovering malicious locations in a public computer network | |
CN102915421B (en) | Method and system for scanning files | |
CN101599947B (en) | Trojan horse virus scanning method based on WEB page | |
CN107786564B (en) | Attack detection method and system based on threat intelligence and electronic equipment | |
CN102945348B (en) | Fileinfo collection method and device | |
US20110083181A1 (en) | Comprehensive password management arrangment facilitating security | |
CN102073820A (en) | User sharing-based cloud scanning method | |
CN102945349B (en) | unknown file processing method and device | |
US9614866B2 (en) | System, method and computer program product for sending information extracted from a potentially unwanted data sample to generate a signature | |
CN103207970B (en) | Virus document scan method and device | |
WO2011090466A1 (en) | Method and system for using spam e-mail honeypots to identify potential malware containing e-mails | |
US20180082061A1 (en) | Scanning device, cloud management device, method and system for checking and killing malicious programs | |
CN102469146A (en) | Cloud security downloading method | |
US8656494B2 (en) | System and method for optimization of antivirus processing of disk files | |
CN102663288A (en) | Virus killing method and device thereof | |
GB2531514B (en) | Malware detection method | |
CN102638617A (en) | Active response system based on intrusion detection for Android mobile phones | |
EP2605174B1 (en) | Apparatus and method for analyzing malware in data analysis system | |
CN104021017A (en) | Starting item processing method and device | |
US8799450B2 (en) | Server-based system, method, and computer program product for scanning data on a client using only a subset of the data | |
US8959640B2 (en) | Controlling anti-virus software updates |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20110601 |