CN103310154B - The method, apparatus and system that information security processes - Google Patents

The method, apparatus and system that information security processes Download PDF

Info

Publication number
CN103310154B
CN103310154B CN201310218989.9A CN201310218989A CN103310154B CN 103310154 B CN103310154 B CN 103310154B CN 201310218989 A CN201310218989 A CN 201310218989A CN 103310154 B CN103310154 B CN 103310154B
Authority
CN
China
Prior art keywords
file
information
client
server end
virus document
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310218989.9A
Other languages
Chinese (zh)
Other versions
CN103310154A (en
Inventor
周锐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Tencent Cloud Computing Beijing Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201310218989.9A priority Critical patent/CN103310154B/en
Publication of CN103310154A publication Critical patent/CN103310154A/en
Application granted granted Critical
Publication of CN103310154B publication Critical patent/CN103310154B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses the method, apparatus and system that a kind of information security processes, belong to field of information security technology.Described method includes: when client executing file scan, obtains the information list to be collected that server end issues;Information according to the file included in the local corresponding software of information list to be collected collection;By the information reporting of file that collects to server end, make server end that the information of the file that all clients received report to be screened by preset rules, and according to the data synchronization updating back-end data screened, back-end data is for repairing the virus document in client.Server end of the present invention is by gathering the information of file from client, upgrade in time back-end data, it is thus achieved that the information of recent software, so after this software installed in certain client is destroyed, just in time it can be repaired, thus improve the repair ability of fail-safe software.

Description

The method, apparatus and system that information security processes
Technical field
The present invention relates to field of information security technology, a kind of process particularly to information security method, equipment And system.
Background technology
Along with the development of the Internet, various application are arisen at the historic moment, user can download on the internet various from The application that oneself is interested, and it is installed in this locality.But some malicious attacker, can be implanted to virus In application on the Internet, when this application of terminal downloads, virus will be invaded along with the installation of application In terminal, other application in terminal is possible to be destroyed by the virus, thus can not use.So how Could repair destroyed application is the problem needing in prior art to solve.
The most a lot of fail-safe softwares are the method that terminal provides that application is repaired, the operation of the Internet security software Business collects existing application message, and after terminal installs this fail-safe software, fail-safe software is to the application in terminal It is monitored, if it find that there is destroyed application, then according to the software information prestored to destroyed Application is repaired.
During realizing the present invention, inventor finds that prior art at least there is problems in that
Application update on the Internet, than very fast, collects the letter of current application by fail-safe software operator Breath, efficiency comparison is low, it is impossible to upgrade in time current emerging application message, the most once has emerging Application is infracting by virus, and owing to not having this information applied, cannot repair it in time, thus Reduce the repair ability of this fail-safe software.
Summary of the invention
In order to improve the repair ability to application of fail-safe software, the embodiment of the present invention provides a kind of information The method, apparatus and system of safe handling.Described technical scheme is as follows:
On the one hand, it is provided that a kind of method that information security processes, described method includes:
When client executing file scan, obtain the information list to be collected that server end issues;
Instruction according to described information list to be collected gathers the letter of the file included in local corresponding software Breath;
By the information reporting of the described described file collected to described server end, make described server end pair The information of the file that all clients received report is screened by preset rules, and according to described screening Data synchronization updating back-end data out, described back-end data is for the virus document in described client Repair.
On the other hand, it is provided that a kind of method that information security processes, described method includes:
Server end issues information list to be collected to multiple in the client performing file scan, makes described visitor Family end gathers the file included in described client corresponding software according to the instruction of described information list to be collected Information;
Receive the information of the file that described each client reports;
The information of the file that the described all clients received report is screened by preset rules, and root According to the described data synchronization updating back-end data screened, described back-end data is in described client Virus document repair.
On the other hand, additionally providing a kind of client, described client includes:
Acquisition module, for when client executing file scan, obtains the letter to be collected that server end issues Breath list;
Acquisition module, for being wrapped according in instruction collection this locality corresponding software of described information list to be collected The information of the file contained;
Reporting module, is used for the information reporting of the described described file collected to described server end, makes The information of the file that all clients received report is screened by described server end by preset rules, And according to the described data synchronization updating back-end data screened, described back-end data is for described client Virus document in end is repaired.
On the other hand, additionally providing a kind of server end, described server end includes:
Issue module, issue to be collected information to multiple in the client performing file scan for server end List, makes described client gather described client corresponding software according to the instruction of described information list to be collected Included in the information of file;
Receiver module, for receiving the information of the file that described each client reports;
Synchronization module, the information to the file that the described all clients received report that is used for is by preset rules Screen, and according to the described data synchronization updating back-end data screened, described back-end data is used for Virus document in described client is repaired.
On the other hand, additionally providing the system that a kind of information security processes, described system includes: as mentioned above Client and server end as above.
The technical scheme that the embodiment of the present invention provides has the benefit that server end passes through from client The information of upper collection file, upgrade in time back-end data, it is thus achieved that the information of recent software, so as certain visitor After this software installed on the end of family is destroyed, owing to server end stores the information of this software, it becomes possible to and Time it is repaired, thus improve the repair ability of fail-safe software.Due to the data of server end be from Collect in each client, so include the most all popular popular softwares, so using this Method repair coverage in embodiment is relatively wider, and repairing object is all abnormal documents, including infection type and misfortune Hold type, support the most popular all popular softwares, can directly use after software reparation, eliminate weight Newly installed cost;On the other hand, in repair process, simply virus document is replaced with secure file, do not have Have the software to virus document place to reset so that it is higher to repair degree of accuracy, file after reparation and Original document is completely the same, and highly versatile: do not fear any virus mutation, as long as can recognize that danger File is all supported to repair.
Accompanying drawing explanation
For the technical scheme being illustrated more clearly that in the embodiment of the present invention, institute in embodiment being described below The accompanying drawing used is needed to be briefly described, it should be apparent that, the accompanying drawing in describing below is only the present invention Some embodiments, for those of ordinary skill in the art, on the premise of not paying creative work, Other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is the method flow diagram that a kind of information security provided in the embodiment of the present invention one processes;
Fig. 2 is the method flow diagram that a kind of information security provided in the embodiment of the present invention two processes;
Fig. 3 is the method flow diagram that a kind of information security provided in the embodiment of the present invention three processes;
Fig. 4 is the method flow diagram that a kind of information security provided in the embodiment of the present invention four processes;
Fig. 5 is the schematic diagram of a kind of client provided in the embodiment of the present invention five;
Fig. 6 is the schematic diagram of the another kind of client provided in the embodiment of the present invention five;
Fig. 7 is the schematic diagram of a kind of server end provided in the embodiment of the present invention six;
Fig. 8 is the schematic diagram of the another kind of server end provided in the embodiment of the present invention six;
Fig. 9 is the application scenarios schematic diagram that a kind of information security provided in the embodiment of the present invention six processes;
Figure 10 is the system schematic that a kind of information security provided in the embodiment of the present invention seven processes.
Detailed description of the invention
For making the object, technical solutions and advantages of the present invention clearer, below in conjunction with accompanying drawing to the present invention Embodiment is described in further detail.
Embodiment one
See Fig. 1, the present embodiment provides a kind of method that information security processes, including:
101, when client executing file scan, the information list to be collected that server end issues is obtained;
102, file included in local corresponding software is gathered according to the instruction of described information list to be collected Information;
103, by the information reporting of the described described file collected to server end, described server end pair is made The information of the file that all clients received report is screened by preset rules, and according to described screening Data synchronization updating back-end data out, described back-end data is for the virus document in described client Repair.
In another embodiment, the information list to be collected that described acquisition server end issues, including:
Send inquiry request to server end, described inquiry request be used for asking for instructions described server end the need of Gather the information of Current software;
Receiving the query-response that described server end returns, described query-response includes information list to be collected.
In another embodiment, described before server end sends inquiry request, also include:
Judge that the user of the described client information gathering whether to server end is authorized, if it is, Then continuing executing with the step sending inquiry request to server end, otherwise stopping sending inquiry to server end please Ask.
In another embodiment, the information of described file includes but not limited to following one or more: file The title of the software at place, filename, FileVersion, file size, file signature information, file place The version of software, file MD5(Message Digest Algorithm5, Message Digest Algorithm 5) And the GUID(Globally Unique Identifier of described client, GUID).
In another embodiment, described method also includes:
When finding virus document during described client scan, detect whether described virus document is to prop up Hold the file of reparation, if it is, obtain the back-end data of described server end corresponding to described virus document, And according to the back-end data of described server end, described virus document is repaired.
In another embodiment, whether the described virus document of described detection is the file supporting to repair, including:
Detect whether described virus document place catalogue is the popular software installation directory supporting to repair, if it is, Then confirm that described virus document is the file supporting to repair, otherwise confirm that described virus document is not to support to repair File, by described virus document delete or remove infected fragment in described virus document.
In another embodiment, the back-end data of the described server end that the described virus document of described acquisition is corresponding, And according to the back-end data of described server end, described virus document is repaired, including:
The information of described virus document is sent to described server end;
When receive that described server end returns with the fileinfo of the information match of described virus document time, Download the secure file corresponding with described virus document according to the described fileinfo matched, and use described peace Whole file replaces described virus document, described in the fileinfo that matches include: the MD5 of described secure file Download address information with described secure file.
In another embodiment, described method also includes:
When the file not having the information match with described virus document receiving the return of described server end is believed During breath, described virus document is deleted or removes infected fragment in described virus document.
The beneficial effect of the present embodiment includes: server end passes through to gather the information of file from client, and Shi Gengxin back-end data, it is thus achieved that the information of recent software, so when this software quilt installed in certain client After destruction, owing to server end stores the information of this software, it becomes possible in time it is repaired, thus Improve the repair ability of fail-safe software.
Embodiment two
See Fig. 2, the embodiment of the present invention provides a kind of method that information security processes, including:
201, server end issues information list to be collected to multiple in the client performing file scan, makes institute State client to gather included in described client corresponding software according to the instruction of described information list to be collected The information of file;
202, the information of the file that described each client reports is received;
203, the information of the file that the described all clients received report is screened by preset rules, And according to the described data synchronization updating back-end data screened, described back-end data is for described client Virus document in end is repaired.
In another embodiment, described server end issues to multiple clients at execution file scan and waits to adopt Collection information list, including:
The inquiry request that the multiple client of received server-side sends when performing file scan, described inquiry please Ask for asking described server end for instructions the need of the information gathering Current software;
Returning query-response to the plurality of client, described query-response includes information list to be collected.
In another embodiment, the information of described file includes but not limited to following one or more: file The title of the software at place, filename, FileVersion, file size, file signature information, file place The GUID GUID of the version of software, file MD5 and described client.
In another embodiment, the described information to the file that the described all clients received report is by advance If rule is screened, and according to the described data synchronization updating back-end data screened, including:
Every Preset Time, the information of the file that the described all clients received report is screened, will In the information of the file of described all client upload in addition to the GUID of client, out of Memory is consistent Record accumulative total more than the first preset value document screening out;
The file that described accumulative total is maximum is selected in the described file screened;
When the file that described accumulative total is maximum accounts for all the second preset values reporting ratio, and described file is peace During whole file, by described file synchronization to back-end data.
In another embodiment, described by after in described file synchronization to back-end data, also include:
Obtain the MD5 of described file;
MD5 according to described file obtains the secure file that described file is corresponding, and the described safety of corresponding storage File.
In another embodiment, described method also includes:
Receive the information of the virus document that any client sends in the plurality of client;
The information of described virus document is matched with described back-end data;
When described back-end data has the fileinfo matched with described virus document, match described Fileinfo be sent to described any client, make described any client according to described in the file that matches Information downloads the secure file corresponding with described virus document, and replaces described virus literary composition with described secure file Part, wherein, described in the fileinfo that matches include: the MD5 of described secure file and described secure file Download address information.
The beneficial effect of the present embodiment includes: server end passes through to gather the information of file from client, and Shi Gengxin back-end data, it is thus achieved that the information of recent software, so when this software quilt installed in certain client After destruction, owing to server end stores the information of this software, it becomes possible in time it is repaired, thus Improve the repair ability of fail-safe software.
Embodiment three
Providing a kind of method that information security processes in the embodiment of the present invention, in the present embodiment, server end can Can carry out information with multiple clients mutual, the client being previously mentioned in the present embodiment includes and server simultaneously Any one client that end interacts, other clients are similar, to this with the execution flow process of this client The present embodiment repeats no more.In the present embodiment, in order to realize the reparation to client file, by gathering The information of the file in client, establishes background data base beyond the clouds, when the file quilt in certain client During destruction, it is possible to corrupted file is repaired by the back-end data utilizing server end to safeguard.See Fig. 3, Method flow includes:
301, when client executing file scan, it is judged that whether the user of described client is to server end Information gathering is authorized, if it is, perform step 302, otherwise stops sending inquiry to server end Request.
In this step, client is mounted with preset security software, in order to ensure the right of privacy of user and know the inside story Power, this fail-safe software can gather the fileinfo in this client after authorized.Concrete, when with When family triggering client carries out file scan, first check whether the user of this client adds appointment plan, If it is, confirm that the information gathering of server end is authorized by this client user, client is permissible Continue executing with collecting flowchart, if the user of this client does not add implement plan, then confirm this client User's not information gathering to server end authorizes, and server end cannot obtain the literary composition in this client Part information.Wherein, it is intended that plan includes but not limited to the cloud killing plan that operator initiates.
What deserves to be explained is, in order to improve user's experience sense to preset security software, in the present embodiment preferably Ground, when gathering the information of client, first confirms whether user is authorized server end, certainly, In order to ensure the safety of client-side information, it is also possible to default setting server end can gather the letter of client Breath, without the mandate of client user, in this present embodiment and be not specifically limited.
Certainly, the present embodiment preferably carries out information gathering when client executing file scan, certainly Can also trigger message collection by other means, such as, server end and client were carried out by the designated time Information gathering, is not specifically limited in this present embodiment.
302, client sends inquiry request, and described inquiry request is used for asking described server for instructions Hold the need of the information gathering Current software.
In this step, in order to save the electricity of client, the method not taking Real-time Collection client-side information, But after the mandate obtaining client user, first inquire about server end the need of gather Current software Information, if server end needs collection information, perform collecting flowchart the most again, be not acquired, Thus save the power consumption of client.
303, the inquiry request that received server-side client sends, and return query-response to client.
In this step, when the inquiry of received server-side to client is asked, if needing collection information, In query-response, then carry information list to be collected, if need not collection information, then in query-response Return the instruction that need not gather, as returned sky, then it represents that need not collection information.Wherein, specifically with what The mode of kind indicates client need not in collection information the present embodiment and be not specifically limited.
In this step, information list to be collected is for determining that under certain software version, certain filename is corresponding just Really which file is, it includes but not limited to one or more information: the title of software to be collected, Filename, FileVersion, file size, file signature information, the version of software, file MD5 and institute State the GUID GUID etc. of client.Wherein, client is according to the finger of information list to be collected Show and the corresponding software in client is carried out information gathering.
In this step, server end may and interact between multiple client simultaneously, askes each transmission Ask that the client of information will return query-response information, but the content of its query-response information can be not With, in this present embodiment and be not specifically limited.
304, client receives the query-response that described server end returns, and described query-response includes to be collected Information list.
Wherein, step 302-304 is specifically to perform client to obtain the information list to be collected that server end issues Flow process, this flow process initiated by client, and it is to be collected that certain client obtains that server end issues The method of information list is also not necessarily limited to this, such as client and server real-time Communication for Power, when server end finds Client when carrying out file scan, then directly issues information list to be collected to client, to this this enforcement In example and be not specifically limited.
305, client is according to the file included in the local corresponding software of described information list to be collected collection Information, and by the information reporting of the described file collected to server end.
In this step, client is after getting information list to be collected, according to the instruction of this list to client The information of the file included in corresponding software in end, wherein, corresponding software in client Refer to need the software of collection information.Concrete, client is when performing file scan, it is judged that Current Scan To software whether in information list to be collected, if it is, this software is carried out information gathering, if No, then need not this software is acquired.Wherein, the information of file includes but not limited to following one Or multiple: the title of the software at file place, filename, FileVersion, file size, file signature are believed Breath, the version of software at file place, file MD5 and the GUID GUID of described client Deng.Wherein, the concrete method gathered similarly to the prior art, repeats no more in this present embodiment.
306, the information of the file that all clients received report is sieved by server end by preset rules Choosing, and according to the data synchronization updating back-end data screened, described back-end data is for described client Virus document in end is repaired.
In this step, server end carries out pretreatment to the information of the file that all clients received report, To update back-end data.Preferably, to the information of the file that the described all clients received report by advance If rule is screened, and according to the described data synchronization updating back-end data screened, including:
Every Preset Time, the information of the file that the described all clients received report is screened, will In the information of the file of described all client upload in addition to the GUID of client, out of Memory is consistent Record accumulative total more than the first preset value document screening out;
The file that described accumulative total is maximum is selected in the described file screened;
When the file that described accumulative total is maximum accounts for all the second preset values reporting ratio, and described file is peace During whole file, by described file synchronization to back-end data.
Such as, synchronizing every 6 hours information to collecting, the information wherein synchronized meets: a. removes Outside user GUID, the consistent record accumulative total of remaining full detail have to be larger than 1000, and selects cumulative amount Maximum file synchronizes;B. the file that cumulative amount is maximum accounts for and reports record ratio to must be over 50%, with Prevent junk data from entering software information inquiry storehouse;C. the safe class of the file that cumulative amount is maximum is necessary for white, It is safe to guarantee the fileinfo synchronized.Preset security software in the present embodiment, protects at server end Deposit a huge library of data volume, this document storehouse contains the file of user's overwhelming majority, Mei Gewen Part has a security level attributes, and grade generally can be divided into from low to high: black, unknown and white, Ke Yixiang The safe class of each file of this document library inquiry.
In the present embodiment, server end collects the information of the file in multiple client dynamically, to update cloud The back-end data of end storage, when so having new software to occur, server end can get new soft timely The information of part, if this software goes wrong when follow-up operation, utilizes the back-end data just can be in time to it Repair, thus improve the repair ability of fail-safe software.
307, obtain the MD5 of described file, obtain, according to the MD5 of described file, the peace that described file is corresponding Whole file, and the described secure file of corresponding storage.
In this step, after filtering out the file needing to synchronize, obtain the MD5 of this document, and according to this article The MD5 of part mates in white library, by corresponding file synchronization to file download storehouse.Wherein, White library and file download storehouse are all parts for server end.When there is a need to the file repaired, according to The MD5 of file obtains the secure file of its correspondence from file download storehouse, downloads this document and repairs.
The beneficial effect of the present embodiment includes: server end passes through to gather the information of file from client, and Shi Gengxin back-end data, it is thus achieved that the information of recent software, so when this software quilt installed in certain client After destruction, owing to server end stores the information of this software, it becomes possible in time it is repaired, thus Improve the repair ability of fail-safe software.Owing to the data of server end collect from each client, So include the most all popular popular softwares, so using the method repair coverage in the present embodiment The widest, repairing object is all abnormal documents, including infection type and abduction type, supports the most popular All popular softwares, can directly use after software reparation, eliminate the cost reinstalled;On the other hand, In repair process, simply virus document is replaced with secure file, the software at virus document place is not entered Row refitting so that reparation degree of accuracy is higher, and file and original document after reparation are completely the same and general Property strong: do not fear any virus mutation, as long as can recognize that danger file all support repair.
Embodiment four
The embodiment of the present invention provides a kind of method that information security processes, Application Example in the present embodiment The back-end data that in three, server end is set up, repairs the file that client is destroyed, sees Fig. 4, side Method flow process includes:
401, when finding virus document during described client scan, whether described virus document is detected For support repair file, if it is, perform step 402, otherwise this virus document is directly deleted or Remove infected fragment in virus document.
In this step, virus document can find in a scan, it is also possible to is to be monitored file Middle discovery, in this present embodiment and be not specifically limited.Preferably, whether described virus document is detected For supporting the file repaired, including: detect whether described virus document place catalogue is to support that repairs commonly uses Software installation directory, if it is, confirm that described virus document is the file supporting to repair, otherwise confirms institute Stating virus document is not the file supporting to repair, and is deleted by described virus document or removes quilt in virus document The fragment infected.The present embodiment can also having, whether other detection virus document is the literary composition supporting to repair certainly The method of part, in this present embodiment and be not specifically limited.
In the present embodiment, if be detected that the virus document not section of support repair, then directly this document is deleted Or infected fragment in removing virus document, in order to avoid this virus document may proceed to infect to other file.
402, the information of described virus document is sent to described server end.
In this step, virus document is the file supporting to repair, then the information of this virus document is sent to clothes Business device end, to repair it.Wherein, the information of virus document includes but not limited to: virus document institute At the title of software, virus file names, virus document version, virus document size, virus document A.L.S. Breath, the version of virus document place software, virus document MD5 etc..
403, the information of described virus document is matched by server end with described back-end data, and will mate To information return to client.
In this step, after server end receives the information of the virus document that client sends, by virus document Information is mated with the information in software information inquiry storehouse, if there being the information matched, then will match Fileinfo return to client, wherein, the fileinfo matched includes but not limited to: described safety The MD5 of file and the download address information etc. of described secure file.Software information inquiry storehouse is server end A part.
404, client receives the file of the information match with described virus document that described server end returns Information, downloads the secure file corresponding with described virus document according to the described fileinfo matched, and uses Described secure file replaces described virus document.
In this step, when client receives the literary composition of the information match with virus document that server end returns During part information, download this secure file according to the download address of secure file, and verify the MD5 value of this document, After verifying successfully, replace current virus document with secure file, thus complete the reparation to virus document. Wherein need not reinstall the software at this document place, it is only necessary to replace virus therein with secure file File, the software that just can make this virus document place is properly functioning, improves remediation efficiency.
What deserves to be explained is, when client receives not having and described virus document of described server end return The fileinfo of information match time, described virus document is deleted or removes in virus document infected Fragment.
Wherein, step 402-404 is after concrete execution obtains the described server end that described virus document is corresponding Number of units evidence, and the step described virus document repaired according to the back-end data of described server end.
The beneficial effect of the present embodiment includes: server end passes through to gather the information of file from client, and Shi Gengxin back-end data, it is thus achieved that the information of recent software, so when this software quilt installed in certain client After destruction, owing to server end stores the information of this software, it becomes possible in time it is repaired, thus Improve the repair ability of fail-safe software.Owing to the data of server end collect from each client, So include the most all popular popular softwares, so using the method repair coverage in the present embodiment The widest, repairing object is all abnormal documents, including infection type and abduction type, supports the most popular All popular softwares, can directly use after software reparation, eliminate the cost reinstalled;On the other hand, In repair process, simply virus document is replaced with secure file, the software at virus document place is not entered Row refitting so that reparation degree of accuracy is higher, and file and original document after reparation are completely the same and general Property strong: do not fear any virus mutation, as long as can recognize that danger file all support repair.
Embodiment five
See Fig. 5, the embodiment of the present invention provides a kind of client, including: acquisition module 501, gather Module 502 and reporting module 503.
Acquisition module 501, for when client executing file scan, it is to be collected that acquisition server end issues Information list;
Acquisition module 502, gathers institute in local corresponding software for the instruction according to described information list to be collected The information of the file comprised;
Reporting module 503, is used for the information reporting of the described described file collected to server end, makes institute State server end the information of the file that all clients received report is screened by preset rules, and According to the described data synchronization updating back-end data screened, described back-end data is for described client In virus document repair.
In another embodiment, see Fig. 6, described acquisition module 501, including:
First transmitting element 501a, for sending, to server end, the request of inquiry, described inquiry request is for asking Show that described server end is the need of the information gathering Current software;
Receive unit 501b, for receiving the query-response that described server end returns, described query-response bag Include information list to be collected.
In another embodiment, seeing Fig. 6, described acquisition module also includes:
Judging unit 501c, for described first transmitting element 501a before server end sends inquiry request, Judge that the user of the described client information gathering whether to server end is authorized, if it is, continue The continuous step performing to send inquiry request to server end, otherwise stops sending inquiry request to server end.
In another embodiment, the information of described file includes but not limited to following one or more: file The title of the software at place, filename, FileVersion, file size, file signature information, file place The GUID GUID of the version of software, file MD5 and described client.
In another embodiment, seeing Fig. 6, described client also includes:
Repair module 504, for when finding virus document during described client scan, detection is described Whether virus document is the file supporting to repair, if it is, obtain the described clothes that described virus document is corresponding The back-end data of business device end, and according to the back-end data of described server end, described virus document is repaired.
In another embodiment, see Fig. 6, described repair module 504, including:
Detector unit 504a, for detecting whether described virus document place catalogue is the conventional soft of support reparation Part installation directory, if it is, confirm that described virus document is the file supporting to repair, otherwise confirms described Virus document is not the file supporting to repair, and is deleted by described virus document or removes in described virus document Infected fragment.
In another embodiment, described repair module 504, including:
Second transmitting element 504b, for being sent to described server end by the information of described virus document;
Repair unit 504c, for when receiving the information phase with described virus document that described server end returns During the fileinfo mated, download the peace corresponding with described virus document according to the described fileinfo matched Whole file, and replace described virus document with described secure file, described in the fileinfo that matches include: The MD5 of described secure file and the download address information of described secure file.
In another embodiment, described repair module 504 also includes:
Delete unit 504d, for when receiving not having and described virus document of described server end return During the fileinfo of information match, described virus document is deleted or removed in described virus document and is felt The fragment of dye.
The beneficial effect of the present embodiment includes: server end passes through to gather the information of file from client, and Shi Gengxin back-end data, it is thus achieved that the information of recent software, so when this software quilt installed in certain client After destruction, owing to server end stores the information of this software, it becomes possible in time it is repaired, thus Improve the repair ability of fail-safe software.
Embodiment six
See Fig. 7, the embodiment of the present invention provides a kind of server end, including: issue module 601, connect Receive module 602 and synchronization module 603.
Issue module 601, issue to be collected letter to multiple in the client performing file scan for server end Breath list, makes described client gather described client according to the instruction of described information list to be collected the softest The information of the file included in part;
Receiver module 602, for receiving the information of the file that described each client reports;
Synchronization module 603, the information to the file that the described all clients received report that is used for is by default rule Then screen, and according to the described data synchronization updating back-end data screened, described back-end data is used In the virus document in described client is repaired.
In another embodiment, see Fig. 8, described in issue module 601, including:
Receive unit 601a, for receiving the inquiry request that multiple client sends when performing file scan, Described inquiry request is for asking described server end for instructions the need of the information gathering Current software;
Return unit 601b, for returning query-response to the plurality of client, described query-response wraps Include information list to be collected.
In another embodiment, the information of described file includes but not limited to following one or more: file The title of the software at place, filename, FileVersion, file size, file signature information, file place The GUID GUID of the version of software, file MD5 and described client.
In another embodiment, see Fig. 8, described synchronization module 603, including:
Screening unit 603a, for the file reported the described all clients received every Preset Time Information screen, by the information of the file of described all client upload except the GUID of client Outside, the accumulative total of the record that out of Memory is consistent more than the first preset value document screening out;
Acquiring unit 603b, for selecting the file that described accumulative total is maximum in the described file screened;
Lock unit 603c, for all reporting the second of ratio to preset when the maximum file of described accumulative total accounts for Value, and when described file is secure file, by described file synchronization to back-end data.
In another embodiment, seeing Fig. 8, described synchronization module 603 also includes:
Memory element 603d, is used for after described lock unit is by described file synchronization to back-end data, Obtain the MD5 of described file, obtain, according to the MD5 of described file, the secure file that described file is corresponding, And the described secure file of corresponding storage.
In another embodiment, described receiver module is additionally operable to receive any client in the plurality of client The information of the virus document sent;
Seeing Fig. 8, described server end also includes: matching module 604, for by the letter of described virus document Breath matches with described back-end data;
The described module that issues is additionally operable to when there being the file letter matched with described virus document in described back-end data During breath, the described fileinfo matched is sent to described any client, makes described any client root Download the secure file corresponding with described virus document according to the described fileinfo matched, and use described safety Described virus document replaced by file, wherein, described in the fileinfo that matches include: described secure file The download address information of MD5 and described secure file.
It should be understood that server end only being partitioned into above-mentioned each functional module that above-described embodiment provides Row illustrates, and in actual application, can distribute above-mentioned functions by different functional modules as desired Complete, the internal structure of equipment will be divided into different functional modules, with complete described above all or Person's partial function.Such as, application scenarios schematic diagram as shown in Figure 9, multiple client and servers enter Row is mutual, and server end includes that software information collects storehouse, software information inquiry storehouse, file/software information Cache (cache memory), white library and file download storehouse.Software information is collected storehouse and is used for collecting client On fileinfo, then by synchronizing information to software information inquiry storehouse, after synchronously completing, take out new It is synchronized to the file MD5 in software information inquiry storehouse, mates in white library, by corresponding file It is synchronized to file download storehouse.After client detects virus document, by file/software information Cache to The information of software information inquiry this virus document of library inquiry, and after obtaining match information from the address of coupling Carry secure file, and by MD5, secure file is verified, replaced by rear secure file in verification Virus document, completes the reparation to virus document.File download storehouse, software information inquiry storehouse and file/software Information Cache is associated together by MD5, and the most concrete interaction does not repeats them here.
The beneficial effect of the present embodiment includes: server end passes through to gather the information of file from client, and Shi Gengxin back-end data, it is thus achieved that the information of recent software, so when this software quilt installed in certain client After destruction, owing to server end stores the information of this software, it becomes possible in time it is repaired, thus Improve the repair ability of fail-safe software.
Embodiment 7
See Figure 10, the embodiment of the present invention provides the system that a kind of information security processes, including: implement Client 500 described in example five and the server end 600 described in embodiment six.
The beneficial effect of the present embodiment includes: server end passes through to gather the information of file from client, and Shi Gengxin back-end data, it is thus achieved that the information of recent software, so when this software quilt installed in certain client After destruction, owing to server end stores the information of this software, it becomes possible in time it is repaired, thus Improve the repair ability of fail-safe software.
It should be understood that the server end of above-described embodiment offer, client and information security process is System, is only illustrated with the division of above-mentioned each functional module, in actual application, and can be as desired Above-mentioned functions distribution is completed by different functional modules, the internal structure of equipment will be divided into different merits Energy module, to complete all or part of function described above.
It addition, the server end of above-described embodiment offer, client and the system of information security process and information The embodiment of the method for safe handling belongs to same design, and it implements process and refers to embodiment of the method, here Repeat no more.
The invention described above embodiment sequence number, just to describing, does not represent the quality of embodiment.
One of ordinary skill in the art will appreciate that all or part of step realizing above-described embodiment can be passed through Hardware completes, it is also possible to instructing relevant hardware by program and complete, described program can be stored in In a kind of computer-readable recording medium, storage medium mentioned above can be read only memory, disk or CD etc..
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention, all the present invention's Within spirit and principle, any modification, equivalent substitution and improvement etc. made, should be included in the present invention's Within protection domain.

Claims (23)

1. the method that an information security processes, it is characterised in that described method includes:
When client executing file scan, obtain the information list to be collected that server end issues;
Instruction according to described information list to be collected gathers the letter of the file included in local corresponding software Breath;
By the information reporting of the described described file collected to described server end, make described server end pair The information of the file that all clients received report is screened by preset rules, and according to described screening Data synchronization updating back-end data out, it is thus achieved that the information of recent software, described back-end data is for institute The virus document stated in client is repaired;
The information list to be collected that described acquisition server end issues, including:
Judge that the user of the described client information gathering whether to server end is authorized, particularly as follows: Judge that the preset security software installed in described client is the most authorized;
If it is, send inquiry request to server end, described inquiry request is used for asking described server for instructions Hold the need of the information gathering Current software;Receive the query-response that described server end returns, described inquiry Ask that response includes information list to be collected;
Otherwise stop sending inquiry request to server end.
Method the most according to claim 1, it is characterised in that the information of described file includes following One or more: the title of the software at file place, filename, FileVersion, file size, file label Name information, the version of software at file place, file MD5 and the GUID of described client GUID。
Method the most according to claim 1, it is characterised in that described method also includes:
When finding virus document during described client scan, detect whether described virus document is to prop up Hold the file of reparation, if it is, obtain the back-end data of described server end corresponding to described virus document, And according to the back-end data of described server end, described virus document is repaired.
Method the most according to claim 3, it is characterised in that whether the described virus document of described detection For supporting the file repaired, including:
Detect whether described virus document place catalogue is the popular software installation directory supporting to repair, if it is, Then confirm that described virus document is the file supporting to repair, otherwise confirm that described virus document is not to support to repair File, by described virus document delete or remove infected fragment in described virus document.
Method the most according to claim 3, it is characterised in that the described virus document of described acquisition is corresponding The back-end data of described server end, and according to the back-end data of described server end to described virus document Repair, including:
The information of described virus document is sent to described server end;
When receive that described server end returns with the fileinfo of the information match of described virus document time, Download the secure file corresponding with described virus document according to the described fileinfo matched, and use described peace Whole file replaces described virus document, described in the fileinfo that matches include: the MD5 of described secure file Download address information with described secure file.
Method the most according to claim 5, it is characterised in that described method also includes:
When the file not having the information match with described virus document receiving the return of described server end is believed During breath, described virus document is deleted or removes infected fragment in file.
7. the method that an information security processes, it is characterised in that described method includes:
Server end issues information list to be collected to multiple in the client performing file scan, makes described visitor Family end gathers the file included in described client corresponding software according to the instruction of described information list to be collected Information;
Receive the information of the file that described each client reports;
The information of the file that the described all clients received report is screened by preset rules, and root According to the described data synchronization updating back-end data screened, it is thus achieved that the information of recent software, described rear number of units According to for the virus document in described client is repaired;
Described server end issues information list to be collected to multiple in the client performing file scan, including:
In the case of the information gathering of server end has been carried out authorizing by the user of client, server terminates Receiving the inquiry request that multiple client sends when performing file scan, described inquiry request is used for asking for instructions described Server end is the need of the information gathering Current software;
Returning query-response to the plurality of client, described query-response includes information list to be collected.
Method the most according to claim 7, it is characterised in that the information of described file includes following One or more: the title of the software at file place, filename, FileVersion, file size, file label Name information, the version of software at file place, file MD5 and the GUID of described client GUID。
Method the most according to claim 7, it is characterised in that described to the described all visitors received The information of the file that family end reports is screened by preset rules, and according to the described data syn-chronization screened Update back-end data, including:
Every Preset Time, the information of the file that the described all clients received report is screened, will In the information of the file of described all client upload in addition to the GUID of client, out of Memory is consistent Record accumulative total more than the first preset value document screening out;
The file that described accumulative total is maximum is selected in the described file screened;
When the file that described accumulative total is maximum accounts for all the second preset values reporting ratio, and described file is peace During whole file, by described file synchronization to back-end data.
Method the most according to claim 9, it is characterised in that described described file synchronization is arrived after After in number of units evidence, also include:
Obtain the MD5 of described file;
MD5 according to described file obtains the secure file that described file is corresponding, and the described safety of corresponding storage File.
11. methods according to claim 7, it is characterised in that described method also includes:
Receive the information of the virus document that any client sends in the plurality of client;
The information of described virus document is matched with described back-end data;
When described back-end data has the fileinfo matched with described virus document, match described Fileinfo be sent to described any client, make described any client according to described in the file that matches Information downloads the secure file corresponding with described virus document, and replaces described virus literary composition with described secure file Part, wherein, described in the fileinfo that matches include: the MD5 of described secure file and described secure file Download address information.
12. 1 kinds of clients, it is characterised in that described client includes:
Acquisition module, for when client executing file scan, obtains the letter to be collected that server end issues Breath list;
Acquisition module, for being wrapped according in instruction collection this locality corresponding software of described information list to be collected The information of the file contained;
Reporting module, is used for the information reporting of the described described file collected to described server end, makes The information of the file that all clients received report is screened by described server end by preset rules, And according to the described data synchronization updating back-end data screened, it is thus achieved that the information of recent software, described after Number of units is according to for repairing the virus document in described client;
Described acquisition module, including:
First transmitting element, for sending inquiry request to server end, described inquiry request is used for asking institute for instructions State server end the need of the information gathering Current software;
Receiving unit, for receiving the query-response that described server end returns, described query-response includes treating Gather information list;
Judging unit, for described first transmitting element before server end sends inquiry request, it is judged that institute State the user of the client information gathering whether to server end to be authorized, particularly as follows: judge described visitor The preset security software installed on the end of family is the most authorized;Send out if it is, continue executing with to server end Send the step of inquiry request, otherwise stop sending inquiry request to server end.
13. clients according to claim 12, it is characterised in that the information of described file include with Under one or more: the title of the software at file place, filename, FileVersion, file size, literary composition Part signing messages, the version of software at file place, file MD5 and the globally unique mark of described client Know symbol GUID.
14. clients according to claim 12, it is characterised in that described client also includes:
Repair module, for when finding virus document during described client scan, detecting described disease Whether poison file is the file supporting to repair, if it is, obtain the described service that described virus document is corresponding The back-end data of device end, and according to the back-end data of described server end, described virus document is repaired.
15. clients according to claim 14, it is characterised in that described repair module, including:
Detector unit, for detecting whether described virus document place catalogue is the popular software peace supporting to repair Dress catalogue, if it is, confirm that described virus document is the file supporting to repair, otherwise confirms described virus File is not the file supporting to repair, and described virus document is deleted or is removed in described virus document and is felt The fragment of dye.
16. clients according to claim 14, it is characterised in that described repair module, including:
Second transmitting element, for being sent to described server end by the information of described virus document;
Repair unit, for when receiving the information match with described virus document that described server end returns Fileinfo time, download corresponding with described virus document safety according to the described fileinfo matched civilian Part, and replace described virus document with described secure file, described in the fileinfo that matches include: described The MD5 of secure file and the download address information of described secure file.
17. clients according to claim 16, it is characterised in that described repair module also includes:
Delete unit, for when receive that described server end returns not with the information of described virus document During the fileinfo matched, described virus document is deleted or removes in described virus document infected Fragment.
18. 1 kinds of server ends, it is characterised in that described server end includes:
Issue module, issue to be collected information to multiple in the client performing file scan for server end List, makes described client gather described client corresponding software according to the instruction of described information list to be collected Included in the information of file;
Receiver module, for receiving the information of the file that described each client reports;
Synchronization module, the information to the file that the described all clients received report that is used for is by preset rules Screen, and according to the described data synchronization updating back-end data screened, it is thus achieved that the letter of recent software Breath, described back-end data is for repairing the virus document in described client;
Described issue module, including:
Receive unit, for situation about the information gathering of server end being authorized the user of client Under, receiving the inquiry request of multiple client transmission when performing file scan, described inquiry request is for asking Show that described server end is the need of the information gathering Current software;
Returning unit, for returning query-response to the plurality of client, described query-response includes treating Gather information list.
19. server ends according to claim 18, it is characterised in that the information of described file includes Following one or more: the title of the software at file place, filename, FileVersion, file size, File signature information, the version of software at file place, file MD5 and described client globally unique Identifier GUID.
20. server ends according to claim 18, it is characterised in that described synchronization module, including:
Screening unit, for every the Preset Time letter to the file that the described all clients received report Breath screen, by the information of the file of described all client upload in addition to the GUID of client, The accumulative total of the record that out of Memory is consistent more than the first preset value document screening out;
Acquiring unit, for selecting the file that described accumulative total is maximum in the described file screened;
Lock unit, for accounting for all the second preset values reporting ratio when the maximum file of described accumulative total, And described file is when being secure file, by described file synchronization to back-end data.
21. server ends according to claim 20, it is characterised in that described synchronization module also includes:
Memory element, for after described lock unit is by described file synchronization to back-end data, obtains The MD5 of described file, obtains, according to the MD5 of described file, the secure file that described file is corresponding, and right Described secure file should be stored.
22. server ends according to claim 18, it is characterised in that described server end also includes:
Described receiver module is additionally operable to receive the virus document of any client transmission in the plurality of client Information;
Matching module, for matching the information of described virus document with described back-end data;
The described module that issues is additionally operable to when there being the file letter matched with described virus document in described back-end data During breath, the described fileinfo matched is sent to described any client, makes described any client root Download the secure file corresponding with described virus document according to the described fileinfo matched, and use described safety Described virus document replaced by file, wherein, described in the fileinfo that matches include: described secure file The download address information of MD5 and described secure file.
The system that 23. 1 kinds of information securities process, it is characterised in that described system includes: such as claim Client described in any one of 12-17 and the server end as described in any one of claim 18-22.
CN201310218989.9A 2013-06-04 2013-06-04 The method, apparatus and system that information security processes Active CN103310154B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310218989.9A CN103310154B (en) 2013-06-04 2013-06-04 The method, apparatus and system that information security processes

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310218989.9A CN103310154B (en) 2013-06-04 2013-06-04 The method, apparatus and system that information security processes

Publications (2)

Publication Number Publication Date
CN103310154A CN103310154A (en) 2013-09-18
CN103310154B true CN103310154B (en) 2016-12-28

Family

ID=49135359

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310218989.9A Active CN103310154B (en) 2013-06-04 2013-06-04 The method, apparatus and system that information security processes

Country Status (1)

Country Link
CN (1) CN103310154B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103593613A (en) * 2013-11-26 2014-02-19 北京网秦天下科技有限公司 Method, terminal, server and system for computer virus detection
CN104317672A (en) * 2014-10-24 2015-01-28 北京奇虎科技有限公司 System file repairing method, device and system
CN106934276B (en) * 2015-12-30 2020-02-28 北京金山安全软件有限公司 Method and device for detecting security of mobile terminal system and mobile terminal
CN106709344B (en) * 2016-08-09 2019-12-13 腾讯科技(深圳)有限公司 Virus checking and killing notification method and server
CN109587095A (en) * 2017-09-28 2019-04-05 中国电信股份有限公司 Information security control method, device and system
CN112580037B (en) * 2019-09-30 2023-12-12 奇安信安全技术(珠海)有限公司 Method, device and equipment for repairing virus file data

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102592103A (en) * 2011-01-17 2012-07-18 中国电信股份有限公司 Secure file processing method, equipment and system
CN102799500A (en) * 2012-06-25 2012-11-28 腾讯科技(深圳)有限公司 System repair method, device and storage medium
CN102902604A (en) * 2012-09-28 2013-01-30 北京奇虎科技有限公司 Method and device for repairing files
CN102902922A (en) * 2012-09-29 2013-01-30 北京奇虎科技有限公司 File repair method and system

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101924762B (en) * 2010-08-18 2013-02-27 北京奇虎科技有限公司 Cloud security-based active defense method
CN102843400A (en) * 2011-06-23 2012-12-26 珠海市君天电子科技有限公司 method and system for downloading file
CN103023988B (en) * 2012-11-27 2016-05-04 北京金山云科技有限公司 File synchronisation method, server, client and terminal device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102592103A (en) * 2011-01-17 2012-07-18 中国电信股份有限公司 Secure file processing method, equipment and system
CN102799500A (en) * 2012-06-25 2012-11-28 腾讯科技(深圳)有限公司 System repair method, device and storage medium
CN102902604A (en) * 2012-09-28 2013-01-30 北京奇虎科技有限公司 Method and device for repairing files
CN102902922A (en) * 2012-09-29 2013-01-30 北京奇虎科技有限公司 File repair method and system

Also Published As

Publication number Publication date
CN103310154A (en) 2013-09-18

Similar Documents

Publication Publication Date Title
CN103310154B (en) The method, apparatus and system that information security processes
CN107395767B (en) Message pushing system and method based on long connection
CN103023710B (en) A kind of safety test system and method
CN103391216B (en) A kind of illegal external connection is reported to the police and blocking-up method
EP2566130B1 (en) Automatic analysis of security related incidents in computer networks
US20230096032A1 (en) Hybrid Approach To Data Governance
CN102592103B (en) Secure file processing method, equipment and system
CN103685150B (en) The method and apparatus of upload file
CN104270467B (en) A kind of virtual machine management-control method for mixed cloud
JP6408395B2 (en) Blacklist management method
CN105653329A (en) Application management method, apparatus and system
CN105659245A (en) Context-aware network forensics
CN107395395B (en) Processing method and device of safety protection system
CN107294924B (en) Vulnerability detection method, device and system
CN111898124B (en) Process access control method and device, storage medium and electronic equipment
CN107864056A (en) A kind of distributed event acquisition probe, distributed event high speed acquisition system and method
CN111010405B (en) SaaS-based website security monitoring system
CN102045220A (en) Wooden horse monitoring and auditing method and system thereof
CN108092936A (en) A kind of Host Supervision System based on plug-in architecture
CN112261172A (en) Service addressing access method, device, system, equipment and medium
CN110620768A (en) Baseline safety detection method and device for intelligent terminal of Internet of things
CN109522042A (en) A kind of patch update method, system and associated component
CN109918089A (en) A kind of software deployment method and system
CN109684155A (en) Monitor configuration method, device, equipment and readable storage medium storing program for executing
CN108809950B (en) Wireless router protection method and system based on cloud shadow system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20190730

Address after: Shenzhen Futian District City, Guangdong province 518044 Zhenxing Road, SEG Science Park 2 East Room 403

Co-patentee after: Tencent cloud computing (Beijing) limited liability company

Patentee after: Tencent Technology (Shenzhen) Co., Ltd.

Address before: 518000 Guangdong city of Shenzhen province Futian District SEG Science Park 2 East Room 403

Patentee before: Tencent Technology (Shenzhen) Co., Ltd.