Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Recognition method and device for secure file

A security file and identification method technology, which is applied in the field of network security, can solve the problem of low identification rate of security documents, achieve the effect of solving the low identification rate, meeting identification requirements, and improving user experience

Active Publication Date: 2015-12-09
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the embodiment of the present invention provides a security document identification method and device to solve the problem of relatively low identification rate of security documents in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Recognition method and device for secure file
  • Recognition method and device for secure file
  • Recognition method and device for secure file

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 2

[0075] Based on the security file identification method provided in the first embodiment above, the embodiment of the present invention specifically describes the method of obtaining a known security file that matches the file to be identified according to the file to be identified in S101. This step can specifically include:

[0076] To illustrate, in the embodiment of the present invention, according to the file to be identified, the method of obtaining a known safe file that matches the file to be identified may include but not limited to:

[0077] Please refer to figure 2 , which is an example diagram of using a known security file to identify a file to be identified provided by an embodiment of the present invention. As shown in the figure, according to the detailed information of the file to be identified, matching is performed in the database to obtain the A known safe file that matches the file to be identified; wherein, the database contains detailed information of ...

Embodiment 3

[0085] Based on the security file identification method provided in the first embodiment and the second embodiment, the embodiment of the present invention specifically describes the method for obtaining the similarity between the file to be identified and the known security file in S102. This step can specifically include:

[0086] In a specific implementation process, the method for obtaining the similarity between the file to be identified and the known safe file may include but not limited to: first, obtain the code block fingerprint of the file to be identified. Then, according to the code block fingerprint of the file to be identified and the code block fingerprint of the known safe file, the similarity between the file to be identified and the known safe file is obtained.

[0087] To illustrate, in the embodiment of the present invention, the method for obtaining the code block fingerprint of the file to be identified may include but not limited to:

[0088] Decompilin...

Embodiment 4

[0112] Based on the security file identification method provided in the first embodiment above, the second embodiment and the third embodiment, the embodiment of the present invention identifies the security file to be identified according to the similarity between the file to be identified and the known security file in S103. The method for identifying whether a file is a safe file is described in detail. This step can specifically include:

[0113] For example, in the embodiment of the present invention, according to the similarity between the file to be identified and the known safe file, the method for identifying whether the file to be identified is a safe file may include:

[0114] Such as figure 2 As shown, the similarity between the file to be identified and the known safe file is compared with a preset similarity threshold. If the comparison result is that the similarity between the file to be identified and the known safe file is greater than the similarity thresh...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a recognition method and device for a secure file. The recognition method comprises the steps that firstly, a known secure file matched with a file to be recognized is obtained according to the file to be recognized; secondly, the similarity of the file to be recognized and the known secure file is obtained; thirdly, whether the file to be recognized is the secure file is recognized according to the similarity of the file to be recognized and the known secure file. Accordingly, the recognition method and device for the secure file are used for solving the problem that in the prior art, the recognition rate of the secure file is low.

Description

【Technical field】 [0001] The invention relates to the technical field of network security, in particular to a security file identification method and device. 【Background technique】 [0002] With the rapid development of the Internet and communication technology in recent years, various applications are constantly appearing, and are updated iteratively and rapidly, and many application-related files are generated every day. Therefore, the security system will capture many unknown files, and these unknown files include both safe files and malicious files, so it is necessary to identify safe files from the numerous unknown files. [0003] In the prior art, the data signature of the unknown file is used to search in the preset white list. If the unknown file belongs to the white list, it is recognized that the unknown file is a safe file, otherwise, it is recognized that the unknown file is a non-safe file. However, the speed of adding and updating applications is very fast, s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/56
CPCG06F21/563
Inventor 党伟郭根邹荣新
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products