CN116760819B - Computer file network transmission method, computer device and device medium - Google Patents
Computer file network transmission method, computer device and device medium Download PDFInfo
- Publication number
- CN116760819B CN116760819B CN202310873026.6A CN202310873026A CN116760819B CN 116760819 B CN116760819 B CN 116760819B CN 202310873026 A CN202310873026 A CN 202310873026A CN 116760819 B CN116760819 B CN 116760819B
- Authority
- CN
- China
- Prior art keywords
- computer file
- file
- computer
- client
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 87
- 238000000034 method Methods 0.000 title claims abstract description 45
- 238000001514 detection method Methods 0.000 claims abstract description 132
- 230000002155 anti-virotic effect Effects 0.000 claims abstract description 70
- 238000012546 transfer Methods 0.000 claims description 27
- 230000008569 process Effects 0.000 claims description 12
- 238000004891 communication Methods 0.000 abstract description 4
- 230000036541 health Effects 0.000 abstract description 3
- 241000700605 Viruses Species 0.000 description 24
- 238000004590 computer program Methods 0.000 description 7
- 230000006870 function Effects 0.000 description 4
- 230000009286 beneficial effect Effects 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 208000015181 infectious disease Diseases 0.000 description 2
- 238000007689 inspection Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000012360 testing method Methods 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000003384 imaging method Methods 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 239000002245 particle Substances 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention discloses a computer file network transmission method, a computer device and a storage medium, which comprise the steps of obtaining characteristic information of a computer file, inquiring corresponding security detection records of the characteristic information through a server, determining a transmission mode according to the security detection records, executing the determined transmission mode and the like, wherein the transmission mode is used for determining a calling mode of antivirus software and a sending state of the computer file from a client to the server. The invention can enable one side of the client to directly sense the problems of the uploaded computer file and the information such as the uploading failure reason, and the like, thereby improving the user experience; the client can judge the health of the computer file more accurately; and the transmission mode to be executed is determined according to the security detection record, so that the anti-virus software and the communication link resource from the client to the server are reasonably called, and the load condition of the computer network is improved. The invention is widely applied to the technical field of computers.
Description
Technical Field
The present invention relates to the field of computer technologies, and in particular, to a method for network transmission of computer files, a computer device, and a storage medium.
Background
In the field of Web applications such as cloud storage, online offices, and network communication software, file transfer via a computer network is often required. Because of the wide spread of computer networks, if a transmitted computer file carries malicious content such as a computer virus, the computer virus will be susceptible to extensive transmission causing damage. When the client uploads the file to the server, the client has the characteristics of wide distribution, poor protection capability, high tracking difficulty and the like, so that the transmission of computer viruses is easier to occur. Therefore, in the related art, software such as a Web application firewall and an antivirus gateway is run on the server side, and when abnormal content such as computer viruses and the like in the computer files uploaded by the client is detected, the computer files uploaded by the client are intercepted, so that the transmission of the computer viruses is prevented. However, in the related art at present, on one hand, the problem that the client side is difficult to perceive the uploaded computer file and the information such as the failure reason of uploading have a negative influence on the user experience; on the other hand, before the client uploads the computer file to the server, the computer file is generally encrypted, that is, the computer file detected when the server performs the computer virus inspection is an encrypted result, which may affect the accuracy of the computer virus inspection result, so that the computer virus protection mechanism is disabled.
Disclosure of Invention
Aiming at the technical problems existing in the prior related art, the invention aims to provide a computer file network transmission method, a computer device and a storage medium.
In one aspect, an embodiment of the present invention includes a method for transferring a computer file over a network, including:
acquiring characteristic information of a computer file; the computer file is initially stored in a client, and anti-virus software is installed on the client;
inquiring a safety detection record corresponding to the characteristic information through a server;
determining a transmission mode according to the security detection record; the transmission mode is used for determining a calling mode of the antivirus software and a sending state of the computer file from the client to the server;
executing the determined transfer mode.
Further, the obtaining the feature information of the computer file includes:
and acquiring abstract data of the computer file as the characteristic information.
Further, the summary data is a hash value.
Further, the determining a transmission mode according to the security detection record includes:
when the security detection record is passed, the transmission mode is to transmit the computer file from the client to a server;
when the security detection record is failed, the transmission mode is to terminate the transmission of the computer file;
and when the security detection record does not exist, the transmission mode is that the anti-virus software is called at one side of the client side, the computer file is detected, an updated security detection record is obtained, the computer file is transmitted from the client side to the server side when the updated security detection record is passed, and the transmission of the computer file is terminated when the updated security detection record is not passed.
Further, the determining a transmission mode according to the security detection record includes:
and when the security detection record does not exist, the transmission mode is that the anti-virus software is called at one side of the client side, the computer file is detected, and the computer file is transmitted from the client side to the server side during detection.
Further, the transmitting the computer file from the client to the server at the same time of the detecting includes:
decomposing the computer file to obtain a first part of file and a second part of file;
transmitting the first part of files from the client to a server in the process of detecting the computer files;
if the detection of the computer file is completed before the first part of file is completely transmitted to the server, and the obtained updated security detection record passes, transmitting the first part of file and the second part of file from the client to the server;
if the detection of the computer file is completed before the first part of file is completely transmitted to the server, and the obtained updated security detection record is failed, terminating the transmission of the first part of file or the second part of file;
if the detection of the computer file is not completed after the first part of file is completely transmitted to the server, suspending the transmission of the second part of file, waiting for the detection of the computer file to be completed to obtain an updated security detection record, and executing the transmission of the second part of file according to the updated security detection record.
Further, the computer file network transmission method further comprises the following steps:
when the safety detection record does not exist, acquiring the current software version information of the antivirus software;
and transmitting the characteristic information, the updated security detection record and the current software version information to the server.
Further, the determining a transmission mode according to the security detection record includes:
when the safety detection record exists, acquiring historical software version information of the antivirus software from the safety detection record;
acquiring the latest software version information of the antivirus software;
determining performance difference information of the antivirus software according to the historical software version information and the latest software version information;
detecting the performance difference information and the characteristic information;
and when the performance difference information is not matched with the characteristic information, the transmission mode is that the computer file is transmitted from the client to the server, otherwise, the transmission mode is that the antivirus software is called at one side of the client, the computer file is detected, an updated security detection record is obtained, when the updated security detection record is passed, the computer file is transmitted from the client to the server, and when the updated security detection record is failed, the transmission of the computer file is terminated.
In another aspect, an embodiment of the present invention further includes a computer apparatus including a memory for storing at least one program and a processor for loading the at least one program to perform the computer file network transfer method of the embodiment.
In another aspect, the embodiments of the present invention further include a storage medium having stored therein a processor-executable program which when executed by a processor is for performing the computer file network transfer method of the embodiments.
The beneficial effects of the invention are as follows: according to the computer file network transmission method, the anti-virus software is installed on the client side, when the anti-virus software needs to be called for detection, the client side can directly sense the problems of the uploaded computer file and the information such as the uploading failure reason, and user experience is improved; on the other hand, the client can directly call the anti-virus software installed on the client, so that the client can detect the computer file before or after encryption and more accurately judge the health of the computer file; and the transmission mode to be executed is determined according to the security detection record, so that the anti-virus software and the communication link resource from the client to the server are reasonably called, and the load condition of the computer network is improved.
Drawings
FIG. 1 is a flow chart of a computer file network transfer method in an embodiment;
fig. 2 is a schematic diagram of a computer network in an embodiment.
Detailed Description
In this embodiment, referring to fig. 1, the computer file network transmission method includes:
s1, acquiring characteristic information of a computer file;
s2, inquiring corresponding safety detection records of the characteristic information through the server;
s3, determining a transmission mode according to the safety detection record; the transmission mode is used for determining a calling mode of the anti-virus software and a sending state of the computer file from the client to the server;
s4, executing the determined transmission mode.
In this embodiment, steps S1-S4 may be applied in the computer network shown in FIG. 2. Referring to fig. 2, there are a server and n clients, and the clients may be terminals such as a desktop computer, a notebook computer, a tablet computer, or a mobile phone, and the clients and the server may be connected through media such as a network cable, a router, and an optical cable.
Steps S1-S4 may be performed when any client needs to upload a computer file to the server, and thus, one of the clients needs to upload a computer file to the server is described as an example.
In this embodiment, all of steps S1-S4 may be executed by the server, where the server may request the client to provide necessary support, for example, request the client to upload feature information when executing step S1; steps S1-S4 may also be performed by the client, where the client may request the server to provide the necessary support, for example, to query the security check record when performing step S2.
In this embodiment, the client that needs to upload the computer file installs the antivirus software, and the server side may or may not install the antivirus software.
In this embodiment, the client or the server may execute steps S1 to S4 by installing a security component on the client or the server.
Before executing steps S1-S4, it may be checked whether the client or the server has the security component installed, and if not, installation is prompted. The first time the security component is run, the running environment of the host is initially checked. Before executing steps S1-S4, it may be checked whether the client has authenticated anti-virus software installed, and if so, the real-time security detection function of the anti-virus software is enabled.
After confirming that the real-time security detection function of the antivirus software is normal, execution of steps S1-S4 may begin.
In step S1, the feature information may be information capable of describing the features of the computer file, such as file name, author signature, source, data size, generation time, etc., and these feature information may be directly obtained by searching for a specific data area in the computer file. The characteristic information may also be digest data obtained by processing the computer file by a digest algorithm, such as hash values. When executing step S1, the client transmits the feature information to the server either actively or at the request of the server.
In step S2, the server searches the security detection record in the database according to the feature information, and the searched result includes searching the corresponding security detection record (the security detection record exists) and not searching the corresponding security detection record (the security detection record does not exist). The server side searches the corresponding security detection record, which indicates that the computer file has been previously checked and killed by the antivirus software, and obtains the security detection record, wherein the specific content of the security detection record can pass (which indicates that the computer file has harmful contents such as computer viruses) or not pass (which indicates that the computer file does not have harmful contents such as computer viruses); the server cannot find the corresponding security detection record, which indicates that the computer file has not been previously checked and killed by the antivirus software, so that the corresponding security detection record is not generated.
In step S3, according to the specific situation of the security detection record, that is, the security detection record cannot be found, the found security detection record result is passed, the found security detection record result is failed, and the like, a calling mode of the antivirus software installed on the client and a sending state of the computer file from the client to the server are determined, in step S4, the determined transferring mode is executed, for example, the client calls or does not call the antivirus software to detect the computer file to be uploaded, the client directly sends the computer file to the server, and the client terminates sending the computer file to the server.
In the steps S1-S4, anti-virus software is installed on the client side, when the anti-virus software is required to be called for detection, the client side can directly sense the problems of the uploaded computer file and the information such as the uploading failure reason, and the user experience is improved; on the other hand, the client can directly call the anti-virus software installed on the client, so that the client can detect the computer file before or after encryption and more accurately judge the health of the computer file; and the transmission mode to be executed is determined according to the security detection record, so that the anti-virus software and the communication link resource from the client to the server are reasonably called, and the load condition of the computer network is improved.
In this embodiment, when step S3 is performed, that is, the step of determining the transmission mode according to the security detection record, the following steps may be specifically performed:
s301, when the security detection record is passed, the transmission mode is that the computer file is transmitted from the client to the server;
s302, when the security detection record is failed, the transmission mode is to terminate the transmission of the computer file;
s303, when the security detection record does not exist, the transmission mode is that anti-virus software is called at one side of the client side, the computer file is detected, the updated security detection record is obtained, when the updated security detection record is passed, the computer file is transmitted from the client side to the server side, and when the updated security detection record is not passed, the transmission of the computer file is terminated.
In step S301, if the server finds the security detection record and the result of the security detection record is a pass, it indicates that the computer file has been previously detected by the antivirus software, and the computer file is not found to include content such as computer virus, and the computer file is secure, and the transfer mode may be determined as "transfer computer file from client to server". When executing step S4, the client may not call the antivirus software to detect the computer file any more, and directly send the computer file to the server. Because the process of detecting the computer file again is omitted, resources of the client are saved, and the efficiency of transmitting the computer file is improved.
In step S302, if the server finds the security detection record and the result of the security detection record is failed, it indicates that the computer file has been previously detected by the antivirus software, and the computer file is found to contain content such as computer virus, and the computer file is dangerous, and the transmission mode may be determined as "terminate transmission of the computer file". When executing step S4, if the client does not start transmitting the computer file to the server, the client no longer transmits the computer file to the server; if the client has begun transmitting the computer file to the server, the client stops transmitting the computer file to the server. Because the process of re-detecting the computer file is omitted, the method is beneficial to saving the resources of the client and preventing the spread of computer viruses.
In step S303, if the server side cannot find the security detection record, the security detection record does not exist, the transmission mode may be determined as "call anti-virus software on the client side, detect the computer file, obtain an updated security detection record, and determine whether to transmit the computer file according to the result of updating the security detection record. When step S4 is performed, if the updated security detection record is passed, the client transmits the computer file to the server, and if the updated security detection record is failed, the client terminates the transmission of the computer file. By executing step S303, the client side may call the antivirus software to obtain the detection result of the computer file, that is, update the security detection record, so that the client side can directly perceive the problems existing in the uploaded computer file, and the information such as the cause of the uploading failure, thereby improving the user experience.
In this embodiment, when executing step S303, when the client invokes the antivirus software to detect the computer file, the client may temporarily not transmit the computer file to the server, and when the updated security detection record is obtained and passed, the client transmits the computer file to the server, thereby effectively guaranteeing the security of the computer. On the other hand, when executing step S303, the client may transmit the computer file to the server side at the same time when invoking the antivirus software to detect the computer file, that is, the two processes of "invoking the antivirus software to detect the computer file" and "transmitting the computer file to the server side" may be performed at the same time, thereby saving the time required for the computer file transmitting process.
Specifically, upon detecting the simultaneous transfer of a computer file from a client to a server, the client may perform the steps of:
s30101, decomposing the computer file to obtain a first part of file and a second part of file;
s30102, in the process of detecting the computer file, transmitting a first part of file from the client to the server;
s30103, if the detection of the computer file is completed before all the first part of files are transmitted to the server, and the obtained updated security detection record is passed, transmitting the first part of files and the second part of files from the client to the server;
s30104, if the detection of the computer file is completed before all the first part of files are transmitted to the server, and the obtained updated security detection record is failed, the transmission of the first part of files or the second part of files is terminated;
s30105, if the detection of the computer file is not completed after the first part of file is completely transmitted to the server, suspending the transmission of the second part of file, waiting for the detection of the computer file to be completed to obtain an updated security detection record, and executing the transmission of the second part of file according to the updated security detection record.
In step S30101, the client may copy the computer file to obtain a copy file identical to the computer file, decompose the copy file to obtain a first portion of file and a second portion of file, and simultaneously reserve the computer file. The first part of the file can be a part with larger data volume, the second part of the file can be a part with smaller data volume, the whole computer file is difficult to recover only by the first part of the file or the second part of the file, and the whole computer file can be recovered only by simultaneously obtaining the first part of the file and the second part of the file.
In step S30102, the client directly transmits the first portion of the file to the server during the process of detecting the computer file, that is, the two processes of "detecting the computer file" and "transmitting the first portion of the file from the client to the server" are performed synchronously.
If the "detect computer file" precedes "the transfer of the first partial file from the client to the server and the obtained updated security detection record is passed, i.e. the situation in step S30103, it indicates that the complete computer file is secure, and the client may transfer the first partial file and the second partial file to the server. Specifically, the client may send the first partial file to the server, and then send the second partial file to the server, where the server may obtain the first partial file and the second partial file, and recover to obtain the complete computer file according to the first partial file and the second partial file.
If the "detect computer file" precedes "the transfer of the first partial file from the client to the server and the obtained updated security detection record is not passed, i.e. the situation in step S30104, it indicates that the complete computer file is not secure, and the client may terminate the transfer of the first partial file or the second partial file. Specifically, if the client side has not completed the transmission of the first part of file, the transmission of the first part of file can be stopped, and the second part of file is not transmitted any more, and the server side can only obtain a part of data in the first part of file and can not obtain the second part of file, so that the complete dangerous computer file cannot be recovered, and the transmission of harmful data in the computer file is prevented.
If the "transfer of the first partial file from the client to the server" is finished before the "test the computer file", that is, the situation in step S30105 occurs, after the transfer of the first partial file is completed, the client temporarily does not start the transfer of the second partial file, waits for the completion of the test of the computer file to obtain an updated security detection record, and executes the transfer of the second partial file according to the updated security detection record. Specifically, if the updated security detection record passes, the client transmits the second partial file to the server, so that the server can obtain the second partial file, and recover to obtain the complete and safe computer file together with the first partial file which has been received before; if the updated security detection record is not passed, the client side does not transmit the second part of files to the server side, so that the server side cannot obtain the second part of files, the server side only obtains the first part of files, and cannot recover to obtain the complete dangerous computer files, and the transmission of harmful data in the computer files is prevented.
In this embodiment, when the security detection record does not exist, the client invokes the antivirus software to detect the computer file, and obtains the updated security detection record, and then the client obtains the current software version information of the antivirus software, where the current software version information includes information such as a system version, a virus library version, and the like, and transmits the information such as the feature information, the updated security detection record, and the current software version information to the server, and the server stores the information in the database, so that the computer file is marked as having undergone the detection of the computer file, and can be later invoked according to the index such as the feature information.
In this embodiment, when step S3 is performed, that is, the step of determining the transmission mode according to the security detection record, the following steps may be specifically performed:
s304, when a security detection record exists, historical software version information of antivirus software is obtained from the security detection record;
s305, acquiring the latest software version information of the antivirus software;
s306, determining performance difference information of the antivirus software according to the historical software version information and the latest software version information;
s307, detecting the performance difference information and the characteristic information;
s308, when the performance difference information is not matched with the characteristic information, the transmission mode is that the computer file is transmitted from the client side to the server side, otherwise, the transmission mode is that anti-virus software is called on one side of the client side, the computer file is detected, an updated security detection record is obtained, the computer file is transmitted from the client side to the server side when the updated security detection record is passed, and the transmission of the computer file is terminated when the updated security detection record is not passed.
In step S304, the client obtains the historical software version information of the antivirus software from the security detection record, where the historical software version information may be information recorded by the server, which reflects the information such as the system version, the virus library version, and the like of the antivirus software used when the computer file is previously detected by the antivirus software.
In step S305, in the case where the antivirus software has been updated to the latest version, the client may directly call the latest software version information from the update log of the antivirus software; in the case that the antivirus software is not updated to the latest version, the client may be networked with a vendor of the antivirus software to obtain the latest software version information of the antivirus software. The latest software version information comprises the latest system version, the latest virus library version and the like of the antivirus software.
In step S306, the client compares the historical software version information with the latest software version information to determine performance difference information of the antivirus software. The content of the performance difference information can be the newly added function of the latest version of antivirus software, including the newly added type of computer virus which can be defended or killed, the easily infected file characteristics of the novel computer virus, the common sources of the novel computer virus and the like.
In step S307, the client compares the performance difference information with the feature information, for example, determines whether the computer file conforms to the characteristics of the file that is susceptible to infection by the new computer virus, the common source of the new computer virus, and the like, and if the characteristics do not match, in step S308, the client may determine that the computer file is not infected by the new computer virus, and if the computer file has been previously detected by the antivirus software, and if the result is passed, the transfer mode is determined as "transfer the computer file from the client to the server", and when step S4 is executed, the client directly transfers the computer file to the server. If these characteristics do not match, which means that even though the computer file has been previously detected by the antivirus software, there is still a risk of infection with the new type of computer virus, in step S308, the transfer mode is "call antivirus software on the client side, the computer file is detected, an updated security detection record is obtained, when the updated security detection record is passed, the computer file is transferred from the client to the server, when the updated security detection record is failed, the transfer of the computer file is terminated, and when step S4 is executed, the client recalls the latest version of antivirus software to detect the computer file, an updated security detection record is obtained, and only if the updated security detection record is passed, the client transfers the computer file to the server, and when the updated security detection record is failed, the client does not transfer the computer file to the server.
By executing steps S304-S308, the latest version of the antivirus software can be tracked, and the computer file is again detected when appropriate, thereby reducing the risk of computer virus transmission.
The computer program for executing the computer file network transmission method in the present embodiment may be written in a computer device or a storage medium, and when the computer program is read out to run, the computer file network transmission method in the present embodiment is executed, thereby achieving the same technical effects as the computer file network transmission method in the embodiment.
It should be noted that, unless otherwise specified, when a feature is referred to as being "fixed" or "connected" to another feature, it may be directly or indirectly fixed or connected to the other feature. Further, the descriptions of the upper, lower, left, right, etc. used in this disclosure are merely with respect to the mutual positional relationship of the various components of this disclosure in the drawings. As used in this disclosure, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. In addition, unless defined otherwise, all technical and scientific terms used in this example have the same meaning as commonly understood by one of ordinary skill in the art. The terminology used in the description of the embodiments is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. The term "and/or" as used in this embodiment includes any combination of one or more of the associated listed items.
It should be understood that although the terms first, second, third, etc. may be used in this disclosure to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element of the same type from another. For example, a first element could also be termed a second element, and, similarly, a second element could also be termed a first element, without departing from the scope of the present disclosure. The use of any and all examples, or exemplary language (e.g., "such as") provided herein, is intended merely to better illuminate embodiments of the invention and does not pose a limitation on the scope of the invention unless otherwise claimed.
It should be appreciated that embodiments of the invention may be implemented or realized by computer hardware, a combination of hardware and software, or by computer instructions stored in a non-transitory computer readable memory. The methods may be implemented in a computer program using standard programming techniques, including a non-transitory computer readable storage medium configured with a computer program, where the storage medium so configured causes a computer to operate in a specific and predefined manner, in accordance with the methods and drawings described in the specific embodiments. Each program may be implemented in a high level procedural or object oriented programming language to communicate with a computer system. However, the program(s) can be implemented in assembly or machine language, if desired. In any case, the language may be a compiled or interpreted language. Furthermore, the program can be run on a programmed application specific integrated circuit for this purpose.
Furthermore, the operations of the processes described in the present embodiments may be performed in any suitable order unless otherwise indicated herein or otherwise clearly contradicted by context. The processes (or variations and/or combinations thereof) described in this embodiment may be performed under control of one or more computer systems configured with executable instructions, and may be implemented as code (e.g., executable instructions, one or more computer programs, or one or more applications), by hardware, or combinations thereof, that collectively execute on one or more processors. The computer program includes a plurality of instructions executable by one or more processors.
Further, the method may be implemented in any type of computing platform operatively connected to a suitable computing platform, including, but not limited to, a personal computer, mini-computer, mainframe, workstation, network or distributed computing environment, separate or integrated computer platform, or in communication with a charged particle tool or other imaging device, and so forth. Aspects of the invention may be implemented in machine-readable code stored on a non-transitory storage medium or device, whether removable or integrated into a computing platform, such as a hard disk, optical read and/or write storage medium, RAM, ROM, etc., such that it is readable by a programmable computer, which when read by a computer, is operable to configure and operate the computer to perform the processes described herein. Further, the machine readable code, or portions thereof, may be transmitted over a wired or wireless network. When such media includes instructions or programs that, in conjunction with a microprocessor or other data processor, implement the steps described above, the invention described in this embodiment includes these and other different types of non-transitory computer-readable storage media. The invention also includes the computer itself when programmed according to the methods and techniques of the present invention.
The computer program can be applied to the input data to perform the functions described in this embodiment, thereby converting the input data to generate output data that is stored to the non-volatile memory. The output information may also be applied to one or more output devices such as a display. In a preferred embodiment of the invention, the transformed data represents physical and tangible objects, including specific visual depictions of physical and tangible objects produced on a display.
The present invention is not limited to the above embodiments, but can be modified, equivalent, improved, etc. by the same means to achieve the technical effects of the present invention, which are included in the spirit and principle of the present invention. Various modifications and variations are possible in the technical solution and/or in the embodiments within the scope of the invention.
Claims (9)
1. A computer file network transmission method, characterized in that the computer file network transmission method comprises:
acquiring characteristic information of a computer file; the computer file is initially stored in a client, and anti-virus software is installed on the client;
inquiring a safety detection record corresponding to the characteristic information through a server;
determining a transmission mode according to the security detection record; the transmission mode is used for determining a calling mode of the antivirus software and a sending state of the computer file from the client to the server;
executing the determined transfer mode;
said determining a transfer mode from said security detection record comprises:
when the safety detection record exists, acquiring historical software version information of the antivirus software from the safety detection record;
acquiring the latest software version information of the antivirus software;
determining performance difference information of the antivirus software according to the historical software version information and the latest software version information;
detecting the performance difference information and the characteristic information;
and when the performance difference information is not matched with the characteristic information, the transmission mode is that the computer file is transmitted from the client to the server, otherwise, the transmission mode is that the antivirus software is called at one side of the client, the computer file is detected, an updated security detection record is obtained, when the updated security detection record is passed, the computer file is transmitted from the client to the server, and when the updated security detection record is failed, the transmission of the computer file is terminated.
2. The method for network transmission of computer files according to claim 1, wherein the acquiring the characteristic information of the computer files comprises:
and acquiring abstract data of the computer file as the characteristic information.
3. The computer file network transmission method according to claim 2, wherein the digest data is a hash value.
4. The computer file network transmission method according to claim 1, wherein the determining a transmission mode based on the security detection record includes:
when the security detection record is passed, the transmission mode is to transmit the computer file from the client to a server;
when the security detection record is failed, the transmission mode is to terminate the transmission of the computer file;
and when the security detection record does not exist, the transmission mode is that the anti-virus software is called at one side of the client side, the computer file is detected, an updated security detection record is obtained, the computer file is transmitted from the client side to the server side when the updated security detection record is passed, and the transmission of the computer file is terminated when the updated security detection record is not passed.
5. The computer file network transmission method according to claim 4, wherein the determining a transmission mode based on the security detection record comprises:
and when the security detection record does not exist, the transmission mode is that the anti-virus software is called at one side of the client side, the computer file is detected, and the computer file is transmitted from the client side to the server side during detection.
6. The computer file network transmission method according to claim 5, wherein the transmitting the computer file from the client to the server while detecting includes:
decomposing the computer file to obtain a first part of file and a second part of file;
transmitting the first part of files from the client to a server in the process of detecting the computer files;
if the detection of the computer file is completed before the first part of file is completely transmitted to the server, and the obtained updated security detection record passes, transmitting the first part of file and the second part of file from the client to the server;
if the detection of the computer file is completed before the first part of file is completely transmitted to the server, and the obtained updated security detection record is failed, terminating the transmission of the first part of file or the second part of file;
if the detection of the computer file is not completed after the first part of file is completely transmitted to the server, suspending the transmission of the second part of file, waiting for the detection of the computer file to be completed to obtain an updated security detection record, and executing the transmission of the second part of file according to the updated security detection record.
7. The computer file network transmission method according to any one of claims 4 to 6, characterized in that the computer file network transmission method further comprises:
when the safety detection record does not exist, acquiring the current software version information of the antivirus software;
and transmitting the characteristic information, the updated security detection record and the current software version information to the server.
8. A computer apparatus comprising a memory for storing at least one program and a processor for loading the at least one program to perform the computer file network transfer method of any of claims 1-7.
9. A computer readable storage medium, in which a processor executable program is stored, characterized in that the processor executable program is for performing the computer file network transfer method of any of claims 1-7 when being executed by a processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310873026.6A CN116760819B (en) | 2023-07-14 | 2023-07-14 | Computer file network transmission method, computer device and device medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310873026.6A CN116760819B (en) | 2023-07-14 | 2023-07-14 | Computer file network transmission method, computer device and device medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116760819A CN116760819A (en) | 2023-09-15 |
CN116760819B true CN116760819B (en) | 2024-01-30 |
Family
ID=87959019
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310873026.6A Active CN116760819B (en) | 2023-07-14 | 2023-07-14 | Computer file network transmission method, computer device and device medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116760819B (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102945349A (en) * | 2012-10-19 | 2013-02-27 | 北京奇虎科技有限公司 | Method and device for processing unknown files |
CN103731451A (en) * | 2012-10-12 | 2014-04-16 | 腾讯科技(深圳)有限公司 | Method and system for uploading file |
CN104537304A (en) * | 2014-12-31 | 2015-04-22 | 北京奇虎科技有限公司 | File checking and killing method, device and system |
CN107370747A (en) * | 2017-08-14 | 2017-11-21 | 北京奇安信科技有限公司 | A kind of method and device for preventing malicious file from propagating |
CN109194739A (en) * | 2018-09-03 | 2019-01-11 | 中国平安人寿保险股份有限公司 | A kind of file uploading method, storage medium and server |
CN112463398A (en) * | 2019-09-09 | 2021-03-09 | 杭州海康机器人技术有限公司 | File transmission method and device, terminal equipment and storage medium |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130007769A1 (en) * | 2011-06-29 | 2013-01-03 | International Business Machines Corporation | Tracking File-Centric Events |
-
2023
- 2023-07-14 CN CN202310873026.6A patent/CN116760819B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103731451A (en) * | 2012-10-12 | 2014-04-16 | 腾讯科技(深圳)有限公司 | Method and system for uploading file |
CN102945349A (en) * | 2012-10-19 | 2013-02-27 | 北京奇虎科技有限公司 | Method and device for processing unknown files |
CN104537304A (en) * | 2014-12-31 | 2015-04-22 | 北京奇虎科技有限公司 | File checking and killing method, device and system |
CN107370747A (en) * | 2017-08-14 | 2017-11-21 | 北京奇安信科技有限公司 | A kind of method and device for preventing malicious file from propagating |
CN109194739A (en) * | 2018-09-03 | 2019-01-11 | 中国平安人寿保险股份有限公司 | A kind of file uploading method, storage medium and server |
CN112463398A (en) * | 2019-09-09 | 2021-03-09 | 杭州海康机器人技术有限公司 | File transmission method and device, terminal equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN116760819A (en) | 2023-09-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9596257B2 (en) | Detection and prevention of installation of malicious mobile applications | |
EP2860657B1 (en) | Determining a security status of potentially malicious files | |
RU2680736C1 (en) | Malware files in network traffic detection server and method | |
US9154517B2 (en) | System and method for preventing spread of malware in peer-to-peer network | |
RU2551820C2 (en) | Method and apparatus for detecting viruses in file system | |
CN106650436B (en) | A kind of safety detection method and device based on local area network | |
US9332029B1 (en) | System and method for malware detection in a distributed network of computer nodes | |
KR101512611B1 (en) | Systems and methods for repairing system files | |
US11520889B2 (en) | Method and system for granting access to a file | |
JP2013508823A (en) | Malware detection and response to malware using link files | |
CN111177706A (en) | Process white list updating method based on trusted software library | |
US10073973B2 (en) | Process testing apparatus, computer-readable medium, and process testing method | |
US20190138713A1 (en) | Method for Detecting a Deviation of a Security State of a Computing Device from a Desired Security State | |
CN113360913A (en) | Malicious program detection method and device, electronic equipment and storage medium | |
CN116226865A (en) | Security detection method, device, server, medium and product of cloud native application | |
CN113656809A (en) | Mirror image security detection method, device, equipment and medium | |
CN102982279A (en) | Computer aided design virus infection prevention system and computer aided design virus infection prevention method | |
CN116760819B (en) | Computer file network transmission method, computer device and device medium | |
CN111193730B (en) | IoT trusted scene construction method and device | |
CN112258137A (en) | Mail blocking method and device | |
CN113965363B (en) | Vulnerability research and judgment method and device based on Web user behaviors | |
CN106856477B (en) | Threat processing method and device based on local area network | |
CN111158736B (en) | Method for intelligently capturing WINDOWS operating system patch update files | |
US20190294787A1 (en) | Application Behaviour Control | |
CN117762430B (en) | Processing method and device based on application program, computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |