WO2012065551A1 - 一种云安全下载方法 - Google Patents

一种云安全下载方法 Download PDF

Info

Publication number
WO2012065551A1
WO2012065551A1 PCT/CN2011/082280 CN2011082280W WO2012065551A1 WO 2012065551 A1 WO2012065551 A1 WO 2012065551A1 CN 2011082280 W CN2011082280 W CN 2011082280W WO 2012065551 A1 WO2012065551 A1 WO 2012065551A1
Authority
WO
WIPO (PCT)
Prior art keywords
cloud security
download
file
security server
url address
Prior art date
Application number
PCT/CN2011/082280
Other languages
English (en)
French (fr)
Inventor
齐向东
赵晨曦
Original Assignee
北京奇虎科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京奇虎科技有限公司 filed Critical 北京奇虎科技有限公司
Priority to US13/885,738 priority Critical patent/US20140310807A1/en
Publication of WO2012065551A1 publication Critical patent/WO2012065551A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]

Definitions

  • the present invention relates to the field of computer security, and in particular to a secure download method.
  • the anti-virus software for the determination of viruses is divided into two modes, namely the traditional "feature library” scanning and active defense based on behavioral judgment.
  • Other technologies including heuristics, virtual machine killing, etc., can be seen as a refinement or branch of the two sets of patterns.
  • the "feature library scan” has the least false positives, but one of its fatal problems is the serious hysteresis.
  • active defense mainly judges Trojans through file behavior. Therefore, the biggest advantage of this model is that it can abandon the feature library and realize smarter Trojan detection.
  • the behavior judgment itself may cause misjudgment, Manslaughter has occurred from time to time.
  • the security of downloading files has been paid more and more attention by more and more people, and the strategy of most products is to automatically kill the files after downloading files in the first stage; if the user computer has anti-virus software installed, the anti-virus software will be automatically called after downloading the files.
  • the file is scanned for viruses.
  • the anti-virus software related killing technology will be applied to quickly scan the user download environment. If a virus or suspicious program is found, it will be automatically checked or uploaded directly to the "cloud security" system for automatic analysis and processing to ensure the security of the user download environment.
  • the present invention provides a cloud security download method.
  • the present invention provides a cloud security downloading method, in which a download terminal performs information interaction with a cloud security server via the Internet, and the method includes the following steps: downloading a terminal to obtain a URL address of a user downloading a file; and downloading a URL address of the downloaded file
  • the cloud security server is in danger list comparison; the download terminal will prompt the user for the comparison result.
  • the method further comprises: if the comparison result indicates that the download file has a security risk and the user has started downloading the file, the download terminal issues an instruction to terminate the download process.
  • the step of comparing the URL address of the downloaded file with the cloud security server danger list further comprises: the downloading terminal uploading the URL address of the downloaded file to the cloud security server via the Internet, and the URL address is Danger list comparison.
  • the step of comparing the URL address of the downloaded file with the cloud security server danger list further comprises: downloading the terminal to obtain the latest dangerous list from the cloud security server via the Internet, and comparing the URL address to the dangerous list locally .
  • the method for obtaining the cloud security server danger list comprises: downloading a file by the download terminal, and recording a URL address of the download file; checking the download file; and when the download file is found to have a security risk , the URL address of the downloaded file is written into the danger list of the cloud security server.
  • the step of killing the downloaded file further comprises: downloading, by the downloading terminal, the downloading file by using a local virus database, or downloading the terminal to upload the suspicious file to the cloud security server for killing.
  • the security risk includes a virus, a Trojan horse, a malicious script, a malicious plug-in, a bad review software, or a rogue software.
  • the comparison result prompts the user through a dialog box or a text picture.
  • the present invention also provides a cloud security download terminal, where the download terminal performs information interaction with a cloud security server via the Internet, and the download terminal includes:
  • the module for comparing uploads the URL address of the downloaded file to the cloud security server via the Internet, and the cloud security server compares the URL address with the dangerous list.
  • the module for comparing obtains the latest dangerous list from the cloud security server via the Internet, and compares the URL address to the dangerous list locally.
  • the present invention also provides a computer readable recording medium on which a program for executing the above-described cloud security download method is recorded.
  • the embodiment provided by the present invention compares the URL address of the downloaded file with the cloud security server, and can inform the user whether the downloaded file is secure before downloading. If the user has started downloading the file, the present invention can also terminate the download process in time and prompt the user.
  • FIG. 1 is a flow chart of a specific embodiment of a cloud security download method according to the present invention.
  • FIG. 2 is a structural diagram of a specific embodiment of a cloud security download terminal according to the present invention.
  • FIG. 3 is a schematic diagram of a specific embodiment of an application environment of the present invention.
  • each user client will become a member of "cloud security”. They monitor the abnormal behavior of software in the network and automatically send it to the server for analysis. After processing, the virus or Trojan processing solution is distributed to each client, so that any computer equipped with anti-virus software can detect and kill new viruses in a short time.
  • the user may not be equipped with cloud-enabled anti-virus software, so how to protect the computer when the user downloads the file is the problem to be solved by the present invention.
  • the present invention provides a cloud security downloading method, in which a download terminal performs information interaction with a cloud server (such as a cloud security server) via the Internet.
  • a cloud server such as a cloud security server
  • the method includes the following steps. Step 101: The download terminal obtains a URL address of the user download file.
  • Any file downloaded from the network has its own unique URL address, even if it is redirected, it ultimately points to its unique URL address. If the file corresponding to the URL address is confirmed to be dangerous, then it should be dangerous to download the file corresponding to the URL address. Although it is not possible to exclude a file corresponding to a URL address from being replaced by a virus-free file, such a possibility is very small. Because the purpose of deliberately destroying people is to poison the other party, neither the Trojan nor the virus is intended to poison the other party, so this situation will hardly occur.
  • the page will give a prompt message whether to download.
  • the real download process can be started.
  • the download terminal can obtain the URL address of the downloaded file that the user clicks.
  • the above URL (Uniform Resource Locator) is only a form indicating the link address of the downloaded file.
  • the link address of the download file can also be a URI (Univer sa l Resource Ident if ie
  • URI Uniform Resource Ident if ie
  • UDN Uniform Resource Name
  • URN Uniform Resource Name
  • Step 102 Compare the URL address of the downloaded file with the cloud security server danger list.
  • the comparison work can be performed on the download terminal or on the cloud security server side.
  • the download terminal uploads the URL address of the downloaded file to the cloud security server via the Internet, and the cloud security server compares the URL address with the dangerous list, and then the cloud security server compares The result is returned to the download terminal.
  • the download terminal obtains the latest danger list from the cloud security server via the Internet, compares the URL address locally with the danger list, and obtains a comparison result.
  • the URL of the download file can be matched to the cloud security server hazard list for full-text matching or feature string matching.
  • a dangerous list is maintained on the cloud security server to store the URL address determined to be a risky file.
  • the danger list is maintained jointly by users connected to the cloud security server.
  • the method for obtaining the cloud security server danger list includes the following steps.
  • Step 201 The user downloads the file through the download terminal, and records the downloaded file by the download terminal.
  • URL address
  • Step 202 Kill the downloaded file.
  • Step 203 When the downloaded file is detected as a security risk, write the URL address of the downloaded file into the danger list of the cloud security server.
  • the security risks include viruses, Trojans, malicious scripts, malicious plugins, bad reviews software, or rogue software.
  • the step of the download terminal checking and killing the download file may be performed by using the local virus database of the download terminal, or uploading the suspicious file to the cloud security server for killing.
  • the download terminal When it is determined that the downloaded file is detected as a security risk, if the download terminal is detected locally, the URL address of the downloaded file is uploaded to the cloud security server and written into the danger list; if it is detected by the cloud security server, the cloud The security server directly writes the URL of the downloaded file to the danger list.
  • Step 1 03 the user will be prompted for the comparison result.
  • the comparing result prompts the user to give corresponding prompt information according to the comparison result.
  • the comparison result includes downloading a file security or having a security risk.
  • the downloaded file is safe, the user can be prompted to download through a dialog box, a text picture prompt, and the like.
  • the downloaded file When it is detected that the downloaded file includes a security risk, it is risky to notify the user of the downloaded file through a dialog box or a text picture prompt.
  • the download terminal prompts the user to download the file for security before displaying the prompt information for downloading, thereby providing a security basis for the user to select "yes" or "no".
  • the embodiment of the present invention further provides a cloud security download terminal.
  • the download terminal may include the following modules:
  • the module 1 0 for obtaining the URL address of the user to download the file may be referred to as the acquisition module 1 0;
  • the module 30 for prompting the user of the comparison result may be simply referred to as the prompt module 30.
  • the comparison work may be performed on the download terminal or on the cloud security server side.
  • the comparison module 20 obtains the latest danger list from the cloud security server via the Internet, and compares the URL address to the danger list locally. If the comparison works on the cloud security server side, the comparison module 20 uploads the URL address of the downloaded file to the cloud security server via the Internet, and the cloud security server compares the URL address with the dangerous list.
  • the comparison result may prompt the user through a dialog box or a text picture.
  • the download terminal may further include a download termination module for issuing an instruction to terminate the download process.
  • the security risks include viruses, Trojans, malicious scripts, malicious plug-ins, bad reviews software, or rogue software.
  • the above download terminal can be applied to the following environment. As shown in FIG. 3, it is a cloud-based application environment, which is as follows:
  • each download terminal 1 can exchange information with the cloud security server 2 through the Internet, and each download terminal 1 implements cloud security download through interaction with the cloud security server 2.
  • the download terminal 1 can include an acquisition module 10, a comparison module 20, and a prompt module 30 module.
  • the comparison module 20 in the terminal 1 can upload the URL address of the downloaded file to the cloud security server 2 via the Internet, and the cloud security server 2 compares the URL address with the danger list.
  • the comparison module 20 in the download terminal 1 can also obtain the latest danger list from the cloud security server 2 via the Internet, and compare the URL address to the danger list locally.
  • the danger list in the cloud security server can be obtained by: downloading a file by downloading the terminal 1 and recording a URL address of the downloaded file; checking the downloaded file; and when the downloaded file is detected In the case of a security risk, the URL of the downloaded file is written to the cloud security service. Server 2 is in the danger list.
  • the download file may be detected by using the local virus database of the download terminal 1, or the suspicious file may be uploaded to the cloud security server by the download terminal 1 to check and kill.
  • the present invention also provides a computer readable recording medium on which a program for executing the above-described cloud security download method is recorded.
  • the content of the cloud security downloading method can be referred to the content described in the embodiment of FIG. 1 , and details are not described herein again.
  • the computer readable recording medium includes any mechanism for storing or transmitting information in a form readable by a computer (e.g., a computer).
  • a machine-readable medium includes a read only memory (ROM), a random access memory (RAM), a magnetic disk storage medium, an optical storage medium, a flash storage medium, an electrical, optical, acoustic, or other form of propagated signal (eg, a carrier wave) , infrared signals, digital signals, etc.).
  • the invention is applicable to a wide variety of general purpose or special purpose computing system environments or configurations.
  • personal computer server computer, handheld or portable device, tablet device, multiprocessor system, microprocessor based system, set-top box, programmable consumer electronics device, network PC, small computer, mainframe computer, including A distributed computing environment of any of the above systems or devices, and the like.
  • the invention may be described in the general context of computer-executable instructions executed by a computer, such as a program module.
  • program modules include routines, programs, objects, components, data structures, and the like that perform particular tasks or implement particular abstract data types.
  • the present application can also be practiced in distributed computing environments where tasks are performed by remote processing devices that are connected through a communication network.
  • program modules can be located in both local and remote computer storage media including storage devices.
  • a component can be, but is not limited to being, a process running on a processor, a processor, an object, an executable component, a thread of execution, a program, and/or a computer.
  • an application or script running on a server, or a server can be a component.
  • One or more components can be executed in a process and/or thread, and the components can be localized on a single computer and/or distributed between two or more computers and can be run by various computer readable media. .
  • the component may also pass signals based on data having one or more data packets, for example, from a signal interacting with another component in the local system, the distributed system, and/or interacting with other systems over the network of the Internet. Local and/or remote processes to communicate.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Information Transfer Between Computers (AREA)

Description

一种云安全下载方法 技术领域
本发明涉及计算机安全领域, 特别是一种安全下载方法。 技术背景
目前杀毒软件对于病毒的判定, 无非分为两种模式, 即传统的 "特征库" 扫描及基于行为判断的主动防御。 而包括启发式查毒、虚拟机查杀等其他技术, 大多可以看作是这两组模式的细化或分支。 在这其中 "特征库扫描"误报最少, 但它的一个很致命的问题就是滞后性严重。 尤其在目前木马变种呈指数化增多 的情况下, 漏杀、 漏检的情况十分严重。 而作为一项行为判断模式, 主动防御 主要是通过文件行为判定木马, 因此这种模式最大的优点就是可以抛弃特征库 而实现更智能的木马检测, 然而由于行为判断本身就可能产生误判, 因此误杀 现象时有发生。
正是基于上述两种模式的考虑, 一些具有前瞻性的公司便开始构思一种全 新模式, 即将为数众多的客户端电脑当成一个病毒采集器, 由他们将日常遭遇 到的可疑文件上传至服务器端, 这样服务器便能通过对上传样本进行分析, 实 现新病毒的快速响应, 而这便是 "云安全"。
而下载文件的安全性已经被越来越多的人所重视, 而多数产品的策略为第 一阶段下载文件后自动进行杀毒; 如果用户电脑安装有杀毒软件, 下载文件后, 会自动调用杀毒软件对该文件进行病毒扫描。 第二阶段, 将会应用杀毒软件的 相关查杀技术对用户下载环境进行快速扫描。 如果发现病毒或可疑程序, 会自 动查杀或直接上传至 "云安全" 系统, 进行自动分析处理, 以保证用户下载环 境的安全。
由此可见, 目前的方案仅仅能够将下载下来的文件进行扫描处理, 而对于 那些需要耗费大量网络资源下载的病毒或者木马文件则需要下载命令执行完毕 后才有可能发现并删除。 而对于正在下载的内容来说却是无能为力。 发明内容
有鉴于此, 为解决上述问题, 本发明提供了一种云安全下载方法。
为了达到上述目的, 本发明提供一种云安全下载方法, 其中下载终端通过 互联网与云安全服务器进行信息交互, 其包括以下步骤: 下载终端获得用户下 载文件的 URL地址; 将下载文件的 URL地址与云安全服务器危险列表比对; 下 载终端将比对结果提示用户。
优选地, 所述方法进一步包括: 如果比对结果显示下载文件存在安全隐患 且用户已经开始下载文件时, 下载终端发出指令, 终止下载过程。
优选地, 所述将下载文件的 URL地址与云安全服务器危险列表比对步骤进 一步包括: 下载终端将下载文件的 URL地址通过互联网上传至云安全服务器, 并由云安全服务器将所述 URL地址与危险列表比对。
优选地, 所述将下载文件的 URL地址与云安全服务器危险列表比对步骤进 一步包括: 下载终端通过互联网从云安全服务器处获取最新的危险列表, 将所 述 URL地址在本地与危险列表比对。
优选地, 所述云安全服务器危险列表的获得方法包括: 用户通过下载终端 下载文件, 并记录该下载文件的 URL地址; 查杀所述下载文件; 当所述下载文 件被查出有安全隐患时, 将所述下载文件的 URL地址写入云安全服务器的危险 列表中。
优选地, 所述查杀所述下载文件的步骤进一步包括: 下载终端利用本地病 毒库对下载文件查杀或下载终端将可疑文件上传至云安全服务器查杀。
优选地, 所述安全隐患包括病毒、 木马、 恶意脚本、 恶意插件、 恶评软件 或流 ΐ民软件。
优选地, 所述比对结果通过对话框或文字图片提示用户。
本发明还提供了一种云安全下载终端, 所述下载终端通过互联网与云安全 服务器进行信息交互, 所述下载终端包括:
用于获得用户下载文件的 URL地址的模块;
用于将下载文件的 URL地址与云安全服务器危险列表比对的模块; 用于将比对结果提示用户的模块。 优选地, 所述用于比对的模块将下载文件的 URL地址通过互联网上传至云 安全服务器, 并由云安全服务器将所述 URL地址与危险列表比对。
优选地, 所述用于比对的模块通过互联网从云安全服务器处获取最新的危 险列表, 将所述 URL地址在本地与危险列表比对。
本发明还提供了一种在其上记录有用于执行上述云安全下载方法的程序的 计算机可读记录介质。
本发明提供的实施例通过将下载文件的 URL 地址与云安全服务器进行比 对, 可以在下载前告知用户下载的文件是否安全。如果用户已经开始下载文件, 本发明还可以及时终止下载过程, 并对用户进行提示。 附图说明
图 1 是本发明一种云安全下载方法一个具体实施例的流程图;
图 2是本发明一种云安全下载终端一个具体实施例的结构图;
图 3是本发明应用环境一个具体实施例的示意图。
具体实施方式
由于各个公司对于 "云" 的理解不尽相同, 使得我们最终见到的 "云安全" 还是有着很大区别的。 其中以国外杀毒软件为代表, 主要是通过互联网中的服 务器群, 对用户电脑中的进程进行标记, 凡是被标记为可信文件的将不再参与 日常扫描, 从而大大提高了日常扫描的运行速度。 而这样的设计, 与我们熟悉 的 "白名单" 异曲同工。
在与之相比国内杀毒软件中, 每个用户客户端都将成为 "云安全" 中的一 员, 它们通过对网络中软件的异常行为进行监测, 并自动发送到服务器端进行 分析, 稍加处理后再将病毒或木马的处理方案分发至每一个客户端, 这样任何 一台装有杀毒软件电脑便能在很短时间内对新病毒实现查杀。
但是 4艮多情况下用户未必会装有带云功能杀毒软件, 那么当用户在下载文 件的时候如何保护计算机便是本发明所要解决的问题。
本发明提供了一种云安全下载方法, 其中下载终端通过互联网与云端服务 器(如云安全服务器)进行信息交互, 具体参看图 1所示, 其包括以下步骤。 步骤 101 , 下载终端获得用户下载文件的 URL地址。
从网络上下载的任何一种文件均有其独有的 URL地址, 即便是被重新指向 的地址, 最终指向的也是其独有的 URL地址。 如果 URL地址对应的文件被证实 是有危险的, 那么无论是谁下载这个 URL地址对应的文件也应该是危险的。 虽 然不排除 URL地址对应的文件被没有病毒的文件替换的可能, 但是这样的可能 性非常小。 因为蓄意破坏的人员的目的就是让对方中毒, 因此无论是木马还是 病毒都是以让对方中毒为目的, 因此这种情况几乎不会发生。
也就是说利用 URL地址确定下载的文件是否安全是可行的。
通常, 用户点击下载地址后, 页面会给出是否下载的提示信息, 用户再次 选择点击 "是" 或 "否" 之后, 才能开始真正的下载过程。 在此操作过程中, 当用户点击下载地址的时候, 下载终端就可以获取到用户所点击的下载文件的 URL地址。
需要说明的是, 上述 URL ( Uniform Resource Loca t ion, 统一资源定位符) 仅是表示下载文件链接地址的一种形式, 此外, 下载文件的链接地址也可以用 URI ( Univer sa l Resource Ident i f ie,统一资源标识符 )、 URN( Uniform Resource Name, 统一资源名称)等其他信息表示, 均属于本发明的保护范围。
步骤 102 , 将下载文件的 URL地址与云安全服务器危险列表比对。
所述比对工作可以在下载终端进行, 也可以在云安全服务器端比对。 在一 个具体的实施例中, 所述下载终端将下载文件的 URL地址通过互联网上传至云 安全服务器, 并由云安全服务器将所述 URL地址与危险列表比对, 然后由云安 全服务器将比对结果返回给下载终端。 在另一个具体的实施例中所述下载终端 通过互联网从云安全服务器处获取最新的危险列表, 将所述 URL地址在本地与 危险列表比对, 并得到比对结果。
下载文件的 URL地址与云安全服务器危险列表比对可以为全文匹配, 也可 以为特征字符串匹配。
在云安全服务器上维护了一个危险列表, 用于存储确定为有风险文件的 URL地址。 所述危险列表由连接到云安全服务器上的用户共同维护。
所述云安全服务器危险列表的获得方法包括以下步骤。
步骤 201 , 用户通过下载终端下载文件, 并由下载终端记录该下载文件的 URL地址;
步骤 202 , 查杀所述下载文件;
步骤 203 , 当所述下载文件被查出有安全隐患, 将所述下载文件的 URL地 址写入云安全服务器的危险列表中。
所述安全隐患包括病毒、 木马、 恶意脚本、 恶意插件、 恶评软件或流氓软 件。
所述下载终端查杀下载文件的步骤可以利用下载终端的本地病毒库查杀, 也可以将可疑文件上传到云安全服务器端查杀。
当确定下载文件被查出有安全隐患时, 如果为下载终端本地查出, 则将下 载文件的 URL地址上传至云安全服务器并写入危险列表中; 如果为云安全服务 器端查出, 则云安全服务器直接将下载文件的 URL写入危险列表中。
步骤 1 03 , 将比对结果提示用户。
所述将比对结果提示用户可以是根据比对结果给出相应的提示信息。
所述比对结果包括下载文件安全或者有安全隐患。 当下载文件安全时, 通 过对话框、 文字图片提示等方式提示用户可以下载。
当检测出下载文件包括有安全隐患时, 通过对话框或文字图片提示等方式 通知用户下载的文件有风险。
如前所述, 用户点击下载地址后, 页面会给出是否下载的提示信息。 通常, 下载终端会在显示是否下载的提示信息之前, 提示用户下载文件是否安全, 从 而为用户选择 "是" 或 "否" 提供安全依据。
但是, 在一个具体的实施例中, 通过云安全服务器比对一个连接是否安全 是需要一定时间的。 如果是否下载的提示信息先显示, 用户在这段时间内已经 点击 "是" 开始了文件的下载, 则可以不必在下载结束后再查杀, 而由下载终 端直接发出指令, 终止下载过程。 这样安全性大大提高, 彻底避免了可疑文件 对系统的侵害。
基于以上内容, 本发明实施例还提供了一种云安全下载终端, 具体参看图 2所示, 所述下载终端可以包括以下模块:
用于获得用户下载文件的 URL地址的模块 1 0 , 可简称为获取模块 1 0;
用于将下载文件的 URL地址与云安全服务器危险列表比对的模块 20 , 可简 称为比对模块 20 ;
用于将比对结果提示用户的模块 30 , 可简称为提示模块 30。
其中, 所述比对工作可以在下载终端进行,也可以在云安全服务器端比对。 相应的,如果比对工作在下载终端进行, 则所述比对模块 20通过互联网从云安 全服务器处获取最新的危险列表, 将所述 URL地址在本地与危险列表比对。 如 果比对工作在云安全服务器端进行,则所述比对模块 20将下载文件的 URL地址 通过互联网上传至云安全服务器, 并由云安全服务器将所述 URL地址与危险列 表比对。
优选地, 所述比对结果可通过对话框或文字图片提示用户。
优选地, 如果比对结果显示下载文件存在安全隐患且用户已经开始下载文 件时, 则所述下载终端还可以包括下载终止模块, 用于发出指令, 终止下载过 程。
其中, 所述安全隐患包括病毒、 木马、 恶意脚本、 恶意插件、 恶评软件或 流氓软件。
对于上述云安全下载终端的实施例而言, 由于其与方法实施例基本相似, 所以描述的比较简单, 相关之处参见图 1所示方法实施例的部分说明即可。
上述下载终端可以应用到以下环境中, 如图 3所示, 是一种基于云计算的 应用环境, 具体如下:
在该应用环境中, 每个下载终端 1均可通过互联网与云安全服务器 2进行 信息交互, 各下载终端 1通过与云安全服务器 2的交互来实现云安全下载。
如前所述, 下载终端 1可以包含获取模块 1 0、 比对模块 20和提示模块 30 模块。 云安全服务器 2中存有危险列表, 列表中记录了危险的 URL地址。 下载 终端 1中的比对模块 20可以将下载文件的 URL地址通过互联网上传至云安全服 务器 2 , 并由云安全服务器 2将所述 URL地址与危险列表比对。 下载终端 1 中 的比对模块 20也可以通过互联网从云安全服务器 2处获取最新的危险列表,将 所述 URL地址在本地与危险列表比对。
此外, 所述云安全服务器中的危险列表可以通过以下方法获得: 用户通过 下载终端 1下载文件, 并记录该下载文件的 URL地址; 查杀所述下载文件; 当 所述下载文件被查出有安全隐患时, 将所述下载文件的 URL地址写入云安全服 务器 2的危险列表中。
其中, 所述下载文件可以利用下载终端 1的本地病毒库查杀, 也可以由下 载终端 1将可疑文件上传到云安全服务器 2端查杀。
基于以上内容, 本发明还提供了一种在其上记录有用于执行上述云安全下 载方法的程序的计算机可读记录介质。 其中, 所述云安全下载方法的具体内容 可参见图 1实施例所述的内容, 在此不再贅述。
所述计算机可读记录介质包括用于以计算机(例如计算机)可读的形式存 储或传送信息的任何机制。 例如, 机器可读介质包括只读存储器(ROM )、 随机 存取存储器(RAM )、 磁盘存储介质、 光存储介质、 闪速存储介质、 电、 光、 声 或其他形式的传播信号 (例如, 载波、 红外信号、 数字信号等)等。
本发明可用于众多通用或专用的计算系统环境或配置中。 例如: 个人计算 机、 服务器计算机、 手持设备或便携式设备、 平板型设备、 多处理器系统、 基 于微处理器的系统、 置顶盒、 可编程的消费电子设备、 网络 PC、 小型计算机、 大型计算机、 包括以上任何系统或设备的分布式计算环境等等。
本发明可以在由计算机执行的计算机可执行指令的一般上下文中描述, 例 如程序模块。 一般地, 程序模块包括执行特定任务或实现特定抽象数据类型的 例程、 程序、 对象、 组件、 数据结构等等。 也可以在分布式计算环境中实践本 申请, 在这些分布式计算环境中, 由通过通信网络而被连接的远程处理设备来 执行任务。 在分布式计算环境中, 程序模块可以位于包括存储设备在内的本地 和远程计算机存储介质中。
在本发明中, "组件" 、 "装置" 、 "系统" 等等指应用于计算机的相关 实体, 如硬件、 硬件和软件的组合、 软件或执行中的软件等。 详细地说, 例如, 组件可以、 但不限于是运行于处理器的过程、 处理器、 对象、 可执行组件、 执 行线程、 程序和 /或计算机。 还有, 运行于服务器上的应用程序或脚本程序、 服 务器都可以是组件。一个或多个组件可在执行的过程和 /或线程中, 并且组件可 以在一台计算机上本地化和 /或分布在两台或多台计算机之间,并可以由各种计 算机可读介质运行。 组件还可以根据具有一个或多个数据包的信号, 例如, 来 自一个与本地系统、分布式系统中另一组件交互的, 和 /或在因特网的网络通过 信号与其它系统交互的数据的信号通过本地和 /或远程过程来进行通信。 以上所述仅为本发明的较佳实施例而已, 并不用以限制本发明, 凡在本发 明的精神和原则之内, 所作的任何修改、 等同替换等, 均应包含在本发明的保 护范围之内。

Claims

1. 一种云安全下载方法, 其特征在于, 其中下载终端通过互联网与云安全 服务器进行信息交互, 其包括以下步骤:
下载终端获得用户下载文件的 URL地址;
将下载文件的 URL地址与云安全服务器危险列表比对;
下载终端将比对结果提示用户。
2. 根据权利要求 1所述的方法, 其特征在于, 所述方法进一步包括: 如果比对结果显示下载文件存在安全隐患且用户已经开始下载文件时, 下 载终端发出指令, 终止下载过程。
3. 根据权利要求 1或 2所述的方法, 其特征在于, 所述将下载文件的 URL 地址与云安全服务器危险列表比对步骤进一步包括:
下载终端将下载文件的 URL地址通过互联网上传至云安全服务器, 并由云 安全服务器将所述 URL地址与危险列表比对。
4. 根据权利要求 1或 2所述的方法, 其特征在于, 所述将下载文件的 URL 地址与云安全服务器危险列表比对步骤进一步包括:
下载终端通过互联网从云安全服务器处获取最新的危险列表, 将所述 URL 地址在本地与危险列表比对。
5. 根据权利要求 1所述的方法, 其特征在于, 所述云安全服务器危险列表 的获得方法包括:
用户通过下载终端下载文件, 并记录该下载文件的 URL地址;
查杀所述下载文件;
当所述下载文件被查出有安全隐患时, 将所述下载文件的 URL地址写入云 安全服务器的危险列表中。
6. 根据权利要求 5所述的方法, 其特征在于, 所述查杀所述下载文件的步 骤进一步包括:
下载终端利用本地病毒库对下载文件查杀或下载终端将可疑文件上传至云 安全服务器查杀。
7.根据权利要求 2或 5所述的方法,其特征在于,所述安全隐患包括病毒、 木马、 恶意脚本、 恶意插件、 恶评软件或流氓软件。
8、 根据权利要求 1所述的方法, 其特征在于, 所述比对结果通过对话框或 文字图片提示用户。
9、一种云安全下载终端, 其特征在于, 所述下载终端通过互联网与云安全 服务器进行信息交互, 所述下载终端包括:
用于获得用户下载文件的 URL地址的模块;
用于将下载文件的 URL地址与云安全服务器危险列表比对的模块; 用于将比对结果提示用户的模块。
1 0、 根据权利要求 9所述的下载终端, 其特征在于:
所述用于比对的模块将下载文件的 URL地址通过互联网上传至云安全服务 器, 并由云安全服务器将所述 URL地址与危险列表比对。
1 1、 根据权利要求 9所述的下载终端, 其特征在于:
所述用于比对的模块通过互联网从云安全服务器处获取最新的危险列表, 将所述 URL地址在本地与危险列表比对。
12、 一种在其上记录有用于执行权利要求 1所述方法的程序的计算机可读 记录介质。
PCT/CN2011/082280 2010-11-19 2011-11-16 一种云安全下载方法 WO2012065551A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US13/885,738 US20140310807A1 (en) 2010-11-19 2011-11-16 Cloud-based secure download method

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201010552564.8 2010-11-19
CN201010552564.8A CN102469146B (zh) 2010-11-19 2010-11-19 一种云安全下载方法

Publications (1)

Publication Number Publication Date
WO2012065551A1 true WO2012065551A1 (zh) 2012-05-24

Family

ID=46072309

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2011/082280 WO2012065551A1 (zh) 2010-11-19 2011-11-16 一种云安全下载方法

Country Status (3)

Country Link
US (1) US20140310807A1 (zh)
CN (1) CN102469146B (zh)
WO (1) WO2012065551A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2901615A4 (en) * 2012-09-28 2016-06-22 Intel Corp METHOD AND CLOUD SERVICE FOR APPLICATION SECURITY CHECK

Families Citing this family (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102790799B (zh) * 2012-06-05 2015-01-21 电子科技大学 一种基于云安全服务的资源下载方法
CN102946377A (zh) * 2012-07-16 2013-02-27 珠海市君天电子科技有限公司 防止用户从互联网下载病毒文件的杀毒系统及方法
CN103780589A (zh) * 2012-10-24 2014-05-07 腾讯科技(深圳)有限公司 病毒提示方法、客户端设备和服务器
CN102984205A (zh) * 2012-11-01 2013-03-20 北京奇虎科技有限公司 辅助浏览器进行软件下载的安全管理器
US9286402B2 (en) * 2013-07-03 2016-03-15 Majestic-12 Ltd System for detecting link spam, a method, and an associated computer readable medium
US10089458B2 (en) * 2013-09-26 2018-10-02 Citrix Systems, Inc. Separate, disposable execution environment for accessing unverified content
CN103716394B (zh) * 2013-12-26 2018-02-13 北京奇虎科技有限公司 下载文件的管理方法及装置
CN103914655A (zh) * 2014-03-17 2014-07-09 北京奇虎科技有限公司 一种检测下载文件安全性的方法及装置
CN105282091B (zh) * 2014-06-05 2017-12-12 腾讯科技(深圳)有限公司 安全应用的服务器检测方法及其系统
US10860715B2 (en) * 2016-05-26 2020-12-08 Barracuda Networks, Inc. Method and apparatus for proactively identifying and mitigating malware attacks via hosted web assets
CN107846381B (zh) * 2016-09-18 2021-02-09 阿里巴巴集团控股有限公司 网络安全处理方法及设备
CN106411891B (zh) * 2016-09-29 2019-12-06 北京小米移动软件有限公司 文件处理方法、装置、服务端和设备
CN109462582B (zh) * 2018-10-30 2020-11-20 腾讯科技(深圳)有限公司 文本识别方法、装置、服务器及存储介质
GB201911459D0 (en) 2019-08-09 2019-09-25 Majestic 12 Ltd Systems and methods for analysing information content
CN110851822B (zh) * 2019-11-19 2023-06-06 东北石油大学 网络下载安全处理方法和装置
CN111190877B (zh) * 2019-12-27 2023-05-05 全球能源互联网研究院有限公司 一种基于企业内网的分布式文件分发方法及系统
CN111625828B (zh) * 2020-07-29 2021-02-26 杭州海康威视数字技术股份有限公司 勒索病毒防御方法、装置及电子设备

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1588879A (zh) * 2004-08-12 2005-03-02 复旦大学 一种互联网内容过滤系统及过滤方法
CN101141469A (zh) * 2007-10-17 2008-03-12 深圳市迅雷网络技术有限公司 一种安全信息检索服务器、系统、方法及一种终端
CN101316171A (zh) * 2008-06-30 2008-12-03 华为技术有限公司 病毒防范方法和装置

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6721721B1 (en) * 2000-06-15 2004-04-13 International Business Machines Corporation Virus checking and reporting for computer database search results
KR20030032123A (ko) * 2001-10-10 2003-04-26 김덕우 무선 통신 단말기의 인터넷 접속 장치 및 그 접속 방법
US7606821B2 (en) * 2004-06-30 2009-10-20 Ebay Inc. Method and system for preventing fraudulent activities
US20060075494A1 (en) * 2004-10-01 2006-04-06 Bertman Justin R Method and system for analyzing data for potential malware
US7698442B1 (en) * 2005-03-03 2010-04-13 Voltage Security, Inc. Server-based universal resource locator verification service
US20070130327A1 (en) * 2005-12-05 2007-06-07 Kuo Cynthia Y Browser system and method for warning users of potentially fraudulent websites
US20080082662A1 (en) * 2006-05-19 2008-04-03 Richard Dandliker Method and apparatus for controlling access to network resources based on reputation
US8255999B2 (en) * 2007-05-24 2012-08-28 Microsoft Corporation Anti-virus scanning of partially available content
US9092823B2 (en) * 2007-06-01 2015-07-28 F-Secure Oyj Internet fraud prevention
US8443449B1 (en) * 2009-11-09 2013-05-14 Trend Micro, Inc. Silent detection of malware and feedback over a network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1588879A (zh) * 2004-08-12 2005-03-02 复旦大学 一种互联网内容过滤系统及过滤方法
CN101141469A (zh) * 2007-10-17 2008-03-12 深圳市迅雷网络技术有限公司 一种安全信息检索服务器、系统、方法及一种终端
CN101316171A (zh) * 2008-06-30 2008-12-03 华为技术有限公司 病毒防范方法和装置

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2901615A4 (en) * 2012-09-28 2016-06-22 Intel Corp METHOD AND CLOUD SERVICE FOR APPLICATION SECURITY CHECK
US9430640B2 (en) 2012-09-28 2016-08-30 Intel Corporation Cloud-assisted method and service for application security verification

Also Published As

Publication number Publication date
CN102469146B (zh) 2015-11-25
US20140310807A1 (en) 2014-10-16
CN102469146A (zh) 2012-05-23

Similar Documents

Publication Publication Date Title
WO2012065551A1 (zh) 一种云安全下载方法
US11687653B2 (en) Methods and apparatus for identifying and removing malicious applications
US20240320323A1 (en) Methods and apparatus for control and detection of malicious content using a sandbox environment
US10198574B1 (en) System and method for analysis of a memory dump associated with a potentially malicious content suspect
US8572750B2 (en) Web application exploit mitigation in an information technology environment
US9268946B2 (en) Quantifying the risks of applications for mobile devices
WO2015081900A1 (zh) 基于云安全拦截广告程序的方法、装置和系统
US7647631B2 (en) Automated user interaction in application assessment
Xing et al. Integuard: Toward automatic protection of third-party web service integrations
JP5920169B2 (ja) 不正コネクション検出方法、ネットワーク監視装置及びプログラム
JP2014504765A (ja) 悪意あるpdfネットワークコンテンツを検出するシステムおよび方法
WO2014003872A1 (en) In-line filtering of insecure or unwanted mobile device software components or communications
WO2013117148A1 (zh) 检测远程入侵计算机行为的方法及系统
CN103618626A (zh) 一种基于日志的安全分析报告生成的方法和系统
US9129287B2 (en) System and method for gathering data for detecting fraudulent transactions
WO2011131019A1 (zh) 一种基于云计算的操作记录追踪系统和方法
WO2013010394A1 (zh) 一种互联网病毒检测方法、装置和系统
CN109040080B (zh) 文件篡改处理方法、装置、云服务平台及存储介质
US20220083646A1 (en) Context Based Authorized External Device Copy Detection
Chen et al. Toward discovering and exploiting private server-side web apis
CN106529292A (zh) 病毒查杀的方法及装置
Geniola et al. Automated analysis of freeware installers promoted by download portals
Sundareswaran et al. Image repurposing for gifar-based attacks
WO2013038261A2 (fr) Procédé de constatation fiable et sécurisée de l'existence d'un contenu numérisé sur des réseaux de données et d'en émettre un procès verbal de constatation, avec la faculté de pouvoir vérifier ultérieurement la fiabilité de ladite constatation et dudit procès verbal. appareil associé à cet effet

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11841341

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 13885738

Country of ref document: US

122 Ep: pct application non-entry in european phase

Ref document number: 11841341

Country of ref document: EP

Kind code of ref document: A1