CN112347041A - Industrial cloud application store system file uploading security scanning method and system - Google Patents

Industrial cloud application store system file uploading security scanning method and system Download PDF

Info

Publication number
CN112347041A
CN112347041A CN202011208718.1A CN202011208718A CN112347041A CN 112347041 A CN112347041 A CN 112347041A CN 202011208718 A CN202011208718 A CN 202011208718A CN 112347041 A CN112347041 A CN 112347041A
Authority
CN
China
Prior art keywords
file
uploading
scanning
uploaded
storing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011208718.1A
Other languages
Chinese (zh)
Inventor
赵铭远
李大斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ziguang Cloud Engine Technology Suzhou Co Ltd
Original Assignee
Ziguang Cloud Engine Technology Suzhou Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ziguang Cloud Engine Technology Suzhou Co Ltd filed Critical Ziguang Cloud Engine Technology Suzhou Co Ltd
Priority to CN202011208718.1A priority Critical patent/CN112347041A/en
Publication of CN112347041A publication Critical patent/CN112347041A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/13File access structures, e.g. distributed indices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/172Caching, prefetching or hoarding of files

Abstract

The invention discloses a method, a system method and a system for safely scanning uploading of system files of an industrial cloud application store. In this way, applications that only reach a specified security level are allowed to be brought up to the industrial cloud component store, providing safer services for the user.

Description

Industrial cloud application store system file uploading security scanning method and system
Technical Field
The invention relates to the technical field of industrial cloud computing application, in particular to a method and a system for uploading security scanning of system files of an industrial cloud application store.
Background
The industrial cloud application store mainly provides SaaS type applications, a terminal user uses a U application to deploy the applications after selecting the required applications through the cloud application store, the applications are approved and generated through a management end, an access address, an account and a password of the applications are issued to the user, and the user logs in an application system through the access.
Currently, the types of applications provided by an industrial cloud application store are relatively single, and if multiple types of applications (download type, SaaS type, download type, and the like) need to be supported, the complexity of the system is increased. This results in that the server may receive some unsafe files, which causes inconvenience to the server in normal file management.
In view of the above situation, the invention provides a system file uploading security scanning method and system for an industrial cloud application store, which can effectively improve the prior art to overcome the defects.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides a system file uploading security scanning method and system for an industrial cloud application store, which solve the problem of poor security in the prior art, and the specific scheme is as follows:
in a first aspect, the invention provides a security scanning method for uploading system files of an industrial cloud application store, which comprises the following steps:
receiving a file uploading request;
judging whether the uploading request meets the uploading condition of the file or not, if so, receiving the uploaded file and safely scanning the file;
and storing the safety scanning result and informing a background server.
Preferably, the security scan result is stored, and the method includes:
and storing the security file which is determined to be safe after security scanning in a storage space of a security region, and storing the challenge file which is determined to be illegal in the storage space of the temporary file server.
Preferably, the method further comprises:
and reviewing the suspected illegal file, and if the result of the review judges that the suspected illegal file is a safe file, recovering the suspected illegal file into the safe file.
Preferably, the method further comprises:
and reviewing the suspected illegal file, and if the review result judges that the suspected illegal file is an illegal file, carrying out deletion marking operation on the suspected illegal file.
Preferably, the determining whether the upload request meets the upload condition of the file includes:
judging whether the type of the uploaded file carried by the uploading request belongs to a file type allowing uploading or not;
if the uploaded file belongs to the file type allowing uploading, judging that the uploaded file meets the uploading condition of the file;
and if the uploaded file does not belong to the file type allowing uploading, judging that the uploaded file does not conform to the uploading condition of the file.
Preferably, the method further comprises: and updating the storage space according to the review result and informing a background server.
Preferably, the method further comprises: and if the uploading request does not accord with the uploading condition of the file, rejecting the uploading file corresponding to the uploading request.
In a second aspect, the present invention provides an industrial cloud application store system file uploading security scanning system, including:
the receiving module is used for receiving a file uploading request;
the scanning module is used for judging whether the uploading request meets the uploading condition of the file or not, and if so, receiving the uploaded file and safely scanning the file;
and the message module is used for storing the safety scanning result and informing the background server.
In a third aspect, the present invention provides an industrial cloud application store system file upload security scanning device, where the device includes:
the communication bus is used for realizing the connection communication between the processor and the memory;
a memory for storing a computer program;
a processor for executing the computer program to implement the steps of:
receiving a file uploading request;
judging whether the uploading request meets the uploading condition of the file or not, if so, receiving the uploaded file and safely scanning the file;
and storing the safety scanning result and informing a background server.
In a fourth aspect, the present invention provides a computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the method of the first aspect described above.
Has the advantages that: according to the method and the system for safely scanning the uploading of the system files of the industrial cloud application store, after the condition judgment is carried out on the file uploading request, the legal uploading files are safely scanned, the illegal applications are intercepted and blocked, and the safety scanning results are stored and notified to a background server. In this way, applications that only reach a specified security level are allowed to be brought up to the industrial cloud component store, providing safer services for the user.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, it is obvious that the drawings in the following description are only some embodiments of the present invention, the embodiments in the drawings do not constitute any limitation to the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic flow chart of an embodiment of a file upload security scanning method for an industrial cloud application store system according to the present invention.
Fig. 2 is a schematic structural diagram of an embodiment of a file upload security scanning system of an industrial cloud application store system according to the present invention.
Fig. 3 is a schematic structural diagram of an embodiment of a file upload security scanning device of an industrial cloud application store system according to the present invention.
Detailed Description
The technical solution of the present invention will be further described in detail with reference to the accompanying drawings and embodiments, which are preferred embodiments of the present invention. It is to be understood that the described embodiments are merely a subset of the embodiments of the invention, and not all embodiments; it should be noted that the embodiments and features of the embodiments may be combined with each other without conflict. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The main idea of the technical scheme of the embodiment of the invention is as follows: receiving a file uploading request; judging whether the uploading request meets the uploading condition of the file or not, if so, receiving the uploaded file and safely scanning the file; and storing the safety scanning result and informing a background server.
In order to better understand the technical solutions, the technical solutions will be described in detail below with reference to the drawings and specific embodiments.
Example one
An embodiment of the present invention provides a security scanning method for uploading a file in an industrial cloud application store system, and as shown in fig. 1, the security scanning method for uploading a file may specifically include the following steps:
step S101, receiving a file uploading request;
for example, a user may send a file upload through a user terminal in a wired or wireless communication manner, and the industrial cloud application store system obtains a file upload request sent by the user terminal. The execution subject of each step in this embodiment may specifically be various devices having a file processing function.
It should be noted that, in this embodiment, an execution subject of each step may specifically be a file processing device of an industrial cloud application device, for example: the cloud server and the one or industrial cloud application terminal may also be other devices that can implement the same or similar functions, for example: mobile phone, personal computer, PAD, etc., which are not limited in this embodiment.
Step S102, judging whether the uploading request accords with the uploading condition of the file, if so, receiving the uploaded file and carrying out safety scanning on the file;
specifically, whether the type of the uploaded file carried by the uploading request belongs to a file type allowing uploading is judged; if the uploaded file belongs to the file type allowing uploading, judging that the uploaded file meets the uploading condition of the file;
correspondingly, if the uploaded file does not belong to the file type allowing uploading, the uploaded file is judged not to be in accordance with the uploading condition of the file.
In this embodiment, if the uploaded file meets the uploading condition of the file, the uploaded file is received and security scanning is performed on the file.
In another embodiment, if the upload request does not meet the upload condition of the file, the upload request is rejected to the corresponding upload file.
And step S103, storing the security scanning result and informing a background server.
In this embodiment, the storing the security scanning result may specifically include: and storing the security file which is determined to be safe after security scanning in a storage space of a security region, and storing the challenge file which is determined to be illegal in the storage space of the temporary file server.
In an optional embodiment, the method may further comprise: and reviewing the suspected illegal file, if the result of the review judges that the suspected illegal file is a safe file, recovering the suspected illegal file into the safe file, updating a storage space according to the result of the review, and notifying a background server.
In another optional embodiment, the method may further comprise: and reviewing the suspected illegal file, if the review result judges that the suspected illegal file is an illegal file, deleting and marking the suspected illegal file, updating a storage space according to the review result, and informing a background server to delete the suspected illegal file.
Example two
An embodiment of the present invention provides an industrial cloud application store system file uploading security scanning system, and as shown in fig. 2, the file uploading security scanning system may specifically include the following modules:
the receiving module is used for receiving a file uploading request;
for example, a user may send a file upload through a user terminal in a wired or wireless communication manner, and the industrial cloud application store system obtains a file upload request sent by the user terminal. The execution subject of each step in this embodiment may specifically be various devices having a file processing function.
It should be noted that, in this embodiment, an execution subject of each step may specifically be a file processing device of an industrial cloud application device, for example: the cloud server and the one or industrial cloud application terminal may also be other devices that can implement the same or similar functions, for example: mobile phone, personal computer, PAD, etc., which are not limited in this embodiment.
The scanning module is used for judging whether the uploading request meets the uploading condition of the file or not, and if so, receiving the uploaded file and safely scanning the file;
specifically, whether the type of the uploaded file carried by the uploading request belongs to a file type allowing uploading is judged; if the uploaded file belongs to the file type allowing uploading, judging that the uploaded file meets the uploading condition of the file;
correspondingly, if the uploaded file does not belong to the file type allowing uploading, the uploaded file is judged not to be in accordance with the uploading condition of the file.
In this embodiment, if the uploaded file meets the uploading condition of the file, the uploaded file is received and security scanning is performed on the file.
In another embodiment, if the upload request does not meet the upload condition of the file, the upload request is rejected to the corresponding upload file.
And the message module is used for storing the safety scanning result and informing the background server.
In this embodiment, the storing the security scanning result may specifically include: and storing the security file which is determined to be safe after security scanning in a storage space of a security region, and storing the challenge file which is determined to be illegal in the storage space of the temporary file server.
In an optional embodiment, the method may further comprise: and reviewing the suspected illegal file, if the result of the review judges that the suspected illegal file is a safe file, recovering the suspected illegal file into the safe file, updating a storage space according to the result of the review, and notifying a background server.
In another optional embodiment, the method may further comprise: and reviewing the suspected illegal file, if the review result judges that the suspected illegal file is an illegal file, deleting and marking the suspected illegal file, updating a storage space according to the review result, and informing a background server to delete the suspected illegal file.
EXAMPLE III
An embodiment of the present invention provides an industrial cloud application store system file uploading security scanning device, and as shown in fig. 3, the file uploading security scanning device may specifically include the following modules:
the communication bus is used for realizing the connection communication between the processor and the memory;
a memory for storing a computer program; the memory may comprise high-speed RAM memory and may also comprise non-volatile memory (non-volatile memory), such as at least one disk memory. The memory may optionally comprise at least one memory device.
A processor for executing the computer program to implement the steps of:
firstly, receiving a file uploading request;
for example, a user may send a file upload through a user terminal in a wired or wireless communication manner, and the industrial cloud application store system obtains a file upload request sent by the user terminal. The execution subject of each step in this embodiment may specifically be various devices having a file processing function.
It should be noted that, in this embodiment, an execution subject of each step may specifically be a file processing device of an industrial cloud application device, for example: the cloud server and the one or industrial cloud application terminal may also be other devices that can implement the same or similar functions, for example: mobile phone, personal computer, PAD, etc., which are not limited in this embodiment.
Secondly, judging whether the uploading request accords with the uploading condition of the file, if so, receiving the uploaded file and safely scanning the file;
specifically, whether the type of the uploaded file carried by the uploading request belongs to a file type allowing uploading is judged; if the uploaded file belongs to the file type allowing uploading, judging that the uploaded file meets the uploading condition of the file;
correspondingly, if the uploaded file does not belong to the file type allowing uploading, the uploaded file is judged not to be in accordance with the uploading condition of the file.
In this embodiment, if the uploaded file meets the uploading condition of the file, the uploaded file is received and security scanning is performed on the file.
In another embodiment, if the upload request does not meet the upload condition of the file, the upload request is rejected to the corresponding upload file.
And finally, storing the safety scanning result and informing a background server.
In this embodiment, the storing the security scanning result may specifically include: and storing the security file which is determined to be safe after security scanning in a storage space of a security region, and storing the challenge file which is determined to be illegal in the storage space of the temporary file server.
In an optional embodiment, the method may further comprise: and reviewing the suspected illegal file, if the result of the review judges that the suspected illegal file is a safe file, recovering the suspected illegal file into the safe file, updating a storage space according to the result of the review, and notifying a background server.
In another optional embodiment, the method may further comprise: and reviewing the suspected illegal file, if the review result judges that the suspected illegal file is an illegal file, deleting and marking the suspected illegal file, updating a storage space according to the review result, and informing a background server to delete the suspected illegal file.
The processor in this embodiment may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware in a processor or instructions in the form of software. The processor described above may be a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components. The various methods, steps and logic blocks disclosed in the embodiments of the present invention may be implemented or performed. The processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the embodiments of the present invention may be directly implemented by a hardware processor, or may be implemented by a combination of hardware and software modules in the processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in a memory, and a processor reads information in the memory and completes the steps of the method in combination with hardware of the processor.
Example four
An embodiment of the present invention provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the above-mentioned industrial cloud application store system file upload security scanning method.
In summary, according to the method and the system for scanning file uploading security of the industrial cloud application store, provided by the embodiments of the present invention, after the file uploading request is conditionally determined, the legal uploading file is safely scanned, the illegal application is intercepted and blocked, and the security scanning result is stored and notified to the background server. In this way, applications that only reach a specified security level are allowed to be brought up to the industrial cloud component store, providing safer services for the user.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present invention is not limited by the order of acts, as some steps may occur in other orders or concurrently in accordance with the invention. Further, those skilled in the art should also appreciate that the embodiments described in the specification are exemplary embodiments and that the acts and modules illustrated are not necessarily required to practice the invention.
The above embodiments may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, the above-described embodiments may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. The procedures or functions described in accordance with the embodiments of the present application are generated in whole or in part when the computer program instructions are loaded or executed on a computer. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored on a computer readable storage medium or transmitted from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by wire (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains one or more collections of available media. The available media may be magnetic media (e.g., floppy disks, hard disks, tapes), optical media (e.g., DVDs), or semiconductor media. The semiconductor medium may be a solid state disk.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the embodiments provided in the present invention, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a read-only memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The present invention has been described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (devices) and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (10)

1. An industrial cloud application store system file uploading security scanning method is characterized by comprising the following steps:
receiving a file uploading request;
judging whether the uploading request meets the uploading condition of the file or not, if so, receiving the uploaded file and safely scanning the file;
and storing the safety scanning result and informing a background server.
2. The method of claim 1, wherein storing the security scan results comprises:
and storing the security file which is determined to be safe after security scanning in a storage space of a security region, and storing the challenge file which is determined to be illegal in the storage space of the temporary file server.
3. The method of claim 2, further comprising:
and reviewing the suspected illegal file, and if the result of the review judges that the suspected illegal file is a safe file, recovering the suspected illegal file into the safe file.
4. The method of claim 2, further comprising:
and reviewing the suspected illegal file, and if the review result judges that the suspected illegal file is an illegal file, carrying out deletion marking operation on the suspected illegal file.
5. The method according to any one of claims 3 or 4, wherein the determining whether the upload request meets the upload condition of the file comprises:
judging whether the type of the uploaded file carried by the uploading request belongs to a file type allowing uploading or not;
if the uploaded file belongs to the file type allowing uploading, judging that the uploaded file meets the uploading condition of the file;
and if the uploaded file does not belong to the file type allowing uploading, judging that the uploaded file does not conform to the uploading condition of the file.
6. The method of claim 5, further comprising: and updating the storage space according to the review result and informing a background server.
7. The method of claim 6, further comprising: and if the uploading request does not accord with the uploading condition of the file, rejecting the uploading file corresponding to the uploading request.
8. A system for secure scan results, the system comprising:
the receiving module is used for receiving a file uploading request;
the scanning module is used for judging whether the uploading request meets the uploading condition of the file or not, and if so, receiving the uploaded file and safely scanning the file;
and the message module is used for storing the safety scanning result and informing the background server.
9. A secure scan results device, the device comprising:
the communication bus is used for realizing the connection communication between the processor and the memory;
a memory for storing a computer program;
a processor for executing the computer program to implement the steps of:
receiving a file uploading request;
judging whether the uploading request meets the uploading condition of the file or not, if so, receiving the uploaded file and safely scanning the file;
and storing the safety scanning result and informing a background server.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the method according to any one of claims 1-7.
CN202011208718.1A 2020-11-03 2020-11-03 Industrial cloud application store system file uploading security scanning method and system Pending CN112347041A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011208718.1A CN112347041A (en) 2020-11-03 2020-11-03 Industrial cloud application store system file uploading security scanning method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011208718.1A CN112347041A (en) 2020-11-03 2020-11-03 Industrial cloud application store system file uploading security scanning method and system

Publications (1)

Publication Number Publication Date
CN112347041A true CN112347041A (en) 2021-02-09

Family

ID=74356492

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011208718.1A Pending CN112347041A (en) 2020-11-03 2020-11-03 Industrial cloud application store system file uploading security scanning method and system

Country Status (1)

Country Link
CN (1) CN112347041A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103632094A (en) * 2013-11-04 2014-03-12 天津汉柏信息技术有限公司 Virus defense system for uploading cloud computing big data
CN104462601A (en) * 2014-12-31 2015-03-25 北京奇虎科技有限公司 File scanning method, device and system
US9405904B1 (en) * 2013-12-23 2016-08-02 Symantec Corporation Systems and methods for providing security for synchronized files
CN107370747A (en) * 2017-08-14 2017-11-21 北京奇安信科技有限公司 A kind of method and device for preventing malicious file from propagating
US20170372070A1 (en) * 2016-06-28 2017-12-28 Sophos Limited Cloud storage scanner
CN109361731A (en) * 2018-09-03 2019-02-19 中国平安人寿保险股份有限公司 A kind of method, storage medium and server that file uploads
CN110704384A (en) * 2019-09-30 2020-01-17 深圳前海环融联易信息科技服务有限公司 Scanned file uploading method and device, computer equipment and storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103632094A (en) * 2013-11-04 2014-03-12 天津汉柏信息技术有限公司 Virus defense system for uploading cloud computing big data
US9405904B1 (en) * 2013-12-23 2016-08-02 Symantec Corporation Systems and methods for providing security for synchronized files
CN104462601A (en) * 2014-12-31 2015-03-25 北京奇虎科技有限公司 File scanning method, device and system
US20170372070A1 (en) * 2016-06-28 2017-12-28 Sophos Limited Cloud storage scanner
CN107370747A (en) * 2017-08-14 2017-11-21 北京奇安信科技有限公司 A kind of method and device for preventing malicious file from propagating
CN109361731A (en) * 2018-09-03 2019-02-19 中国平安人寿保险股份有限公司 A kind of method, storage medium and server that file uploads
CN110704384A (en) * 2019-09-30 2020-01-17 深圳前海环融联易信息科技服务有限公司 Scanned file uploading method and device, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
CN109766696B (en) Method and device for setting software permission, storage medium and electronic device
CN106998329B (en) File sharing method and device
WO2015180690A1 (en) Method and device for reading verification information
CN104967997A (en) Wireless network accessing method, Wi-Fi equipment, terminal equipment and system
US20140095682A1 (en) System and Method for Performing Administrative Tasks on Mobile Devices
CN108063818B (en) Data downloading method, device, terminal and computer readable storage medium
CN111131221B (en) Interface checking device, method and storage medium
EP3253088B1 (en) Control method and terminal for short message reading
CN111132267A (en) Network distribution method and device and terminal equipment
CN117378173A (en) Transfer of ownership of computing device via secure processor
CN110704820A (en) Login processing method and device, electronic equipment and computer readable storage medium
CN111161071A (en) Data processing method, device, equipment and storage medium based on block chain
CN111104142A (en) Software upgrading method and device, electronic equipment and storage medium
CN113132484B (en) Data transmission method and device
CN104780162A (en) Authentication information verification method
CN112261003A (en) Safety authentication method and system for industrial internet edge computing node
US20140289127A1 (en) Secured Online Transactions
CN112347041A (en) Industrial cloud application store system file uploading security scanning method and system
CN108021967B (en) Method and device for copying intelligent card and computer readable storage medium
CN113365272B (en) Method and system for preventing network from being rubbed
CN117413267A (en) Firmware policy enforcement via secure processor
CN106529290B (en) Malicious software protection method and device and electronic equipment
CN113596833A (en) Authentication method and system based on 5G power
CN107291401B (en) File scanning method, file cleaning method, related device and electronic equipment
CN114270309A (en) Resource acquisition method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination