The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Aug. 13, 2024

Filed:

Aug. 20, 2020
Applicant:

Hillstone Networks Co., Ltd., Jiangsu, CN;

Inventors:

Ye Zhao, Jiangsu, CN;

Wei Yuan, Jiangsu, CN;

Peng Lu, Jiangsu, CN;

Haixu Wang, Jiangsu, CN;

Assignee:
Attorney:
Primary Examiner:
Int. Cl.
CPC ...
G06F 21/55 (2013.01); G06F 21/56 (2013.01); G06F 21/60 (2013.01); H04L 9/40 (2022.01); G06F 21/64 (2013.01);
U.S. Cl.
CPC ...
G06F 21/564 (2013.01); H04L 63/168 (2013.01);
Abstract

This application discloses a method and device for determining a malicious file. The method includes: whether a plurality of received file blocks meet a preset condition is judged. Herein, the plurality of file blocks are file blocks of a file to be detected, and the preset condition at least includes: a size condition of each of the plurality of file blocks and a sorting condition of each of the plurality of file blocks. When the plurality of file blocks do not meet the preset condition, a Hash eigenvalue of at least one header file block is calculated, wherein the at least one header file block is at least one file block cached in a device cache area according to the order of the file blocks. The plurality of file blocks are divided into subfiles with a preset quantity, and the Hash eigenvalue unrelated to the order of each subfile is calculated. Whether or not the file to be detected is the malicious file is judged based on the Hash eigenvalue of the at least one header file block and the Hash eigenvalue unrelated to the order of each subfile. Through this application, the problem that the file to be detected is difficult to be detected as the malicious file when the device has no enough space to cache all file blocks of the file to be detected in the related art is solved.


Find Patent Forward Citations

Loading…