The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Apr. 17, 2018

Filed:

Jun. 03, 2014
Applicant:

Beijing Qihoo Technology Company Limited, Beijing, CN;

Inventors:

Qinglong Kong, Beijing, CN;

Tong Yao, Beijing, CN;

Bo Zhang, Beijing, CN;

Zhifeng Liu, Beijing, CN;

Aijun Jiang, Beijing, CN;

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
G06F 12/14 (2006.01); H04L 29/06 (2006.01); H04L 29/08 (2006.01);
U.S. Cl.
CPC ...
H04L 63/1441 (2013.01); H04L 63/1416 (2013.01); H04L 67/06 (2013.01); H04L 67/10 (2013.01); H04L 67/42 (2013.01); H04L 63/145 (2013.01);
Abstract

The invention discloses a cloud security-based file processing method and apparatus. The method comprises: generating a signature identifier uniquely corresponding to an unknown program file downloaded locally according to signature related information of the unknown program file; sending a query request to a server end to query whether the unknown program file is a malicious program or not, wherein the query request carries the signature identifier of the unknown program file and a part or all of the file features of the unknown program file; and receiving a feedback message from the server end, and performing subsequent process on the unknown program file according to the feedback message, wherein the server end generates the feedback message according to the signature identifier and the file features. The invention solves the problem of breaking through the cloud killing by utilizing a Trojan in the prior art and at the same time can also reduce the time from discovering a malicious program to killing the malicious program, thereby accelerating the speed of fighting against a new malicious program, reducing the information storage amount of the server as well and in turn guaranteeing the security of a client program.


Find Patent Forward Citations

Loading…