Method, system and apparatus for improving security level of a terminal when surfing internet
First Claim
1. A method for improving security level of a terminal when the terminal surfs the Internet, comprising:
- receiving, by a network side, characteristic code information of a file reported by the terminal, wherein the characteristic code information of the file is collected by the terminal using a first collecting algorithm;
comparing, by the network side, the characteristic code information reported by the terminal with a characteristic code of a safe file, and comparing the characteristic code information reported by the terminal with a characteristic code of an unsafe file,if compared results conflict with each other, transmitting an indication to the terminal indicating the terminal to collect the characteristic code information of the file again, wherein if the characteristic code information of the file matches both the characteristic code of the safe file and the characteristic code of the unsafe file, the compared results conflict with each other;
otherwise, generating a network security policy, and transmitting a security indication according to the network security policy to the terminal such that the terminal provides a security prompt for the file according to the security indication;
the method further comprising;
the terminal receiving a first website address inputted by a user, displaying locally-stored relevant addresses which are obtained through a fuzzy matching according to the first website address inputted by the user;
comparing the relevant addresses with addresses in a black list and/or white list;
for each of the relevant addresses, displaying a safe icon if the relevant address matches an address in the white list;
wherein the indication transmitted by the network side to the terminal indicates a second collecting algorithm, wherein the terminal collects the characteristic code information of the file using the second collecting algorithm indicated by the network side, wherein the terminal collects the characteristic code of a first part of the file according to the first collecting algorithm and collects the characteristic code of a second part of the file according to the second collecting algorithm, the first part is different from the second part.
1 Assignment
0 Petitions
Accused Products
Abstract
A method, system, and apparatus for improving security level of a terminal when it surfs the Internet. The method includes receiving, by a network side, network security information reported by a terminal, generating a network security policy according to the network security information reported by each terminal, and transmitting a security indication to the network security policy to the terminal; providing, by the terminal, a security prompt for network information to be obtained or having been obtained according to the security indication. Various embodiments can improve the security level of the terminal when it surfs the Internet and save resources of the terminal.
7 Citations
10 Claims
-
1. A method for improving security level of a terminal when the terminal surfs the Internet, comprising:
-
receiving, by a network side, characteristic code information of a file reported by the terminal, wherein the characteristic code information of the file is collected by the terminal using a first collecting algorithm; comparing, by the network side, the characteristic code information reported by the terminal with a characteristic code of a safe file, and comparing the characteristic code information reported by the terminal with a characteristic code of an unsafe file, if compared results conflict with each other, transmitting an indication to the terminal indicating the terminal to collect the characteristic code information of the file again, wherein if the characteristic code information of the file matches both the characteristic code of the safe file and the characteristic code of the unsafe file, the compared results conflict with each other; otherwise, generating a network security policy, and transmitting a security indication according to the network security policy to the terminal such that the terminal provides a security prompt for the file according to the security indication; the method further comprising; the terminal receiving a first website address inputted by a user, displaying locally-stored relevant addresses which are obtained through a fuzzy matching according to the first website address inputted by the user;
comparing the relevant addresses with addresses in a black list and/or white list;
for each of the relevant addresses, displaying a safe icon if the relevant address matches an address in the white list;wherein the indication transmitted by the network side to the terminal indicates a second collecting algorithm, wherein the terminal collects the characteristic code information of the file using the second collecting algorithm indicated by the network side, wherein the terminal collects the characteristic code of a first part of the file according to the first collecting algorithm and collects the characteristic code of a second part of the file according to the second collecting algorithm, the first part is different from the second part. - View Dependent Claims (2)
-
-
3. A system for improving security level of a terminal when the terminal surfs the Internet, comprising:
- a security server and a hardware terminal;
the security server is adapted to receive characteristic code information of a file reported by the hardware terminal, wherein the characteristic code information of the file is collected by the hardware terminal using a first collecting algorithm, compare the characteristic code information reported by the hardware terminal with a characteristic code of a safe file, and compare the characteristic code information reported by the hardware terminal with a characteristic code of an unsafe file, if compared results conflict with each other, transmit an indication to the hardware terminal indicating the hardware terminal to collect the characteristic code information of the file again;
otherwise, generate a network security policy, and transmit a security indication to the hardware terminal according to the network security policy, wherein if the characteristic code information of the file matches both the characteristic code of the safe file and the characteristic code of the unsafe file, the compared results conflict with each other; andthe hardware terminal is adapted to receive the security indication transmitted by the security server, provide a security prompt for the file according to the security indication;
the hardware terminal is further to receive a first website address inputted by a user, display locally-stored relevant addresses which are obtained through a fuzzy matching according to the first website address inputted by the user;
compare the relevant addresses with addresses in a black list and/or white list; and
for each of the relevant addresses, display a safe icon if the relevant address matches an address in the white list;wherein the indication transmitted by the security server to the hardware terminal indicates a second collecting algorithm, wherein the hardware terminal collects the characteristic code information of the file using the second collecting algorithm indicated by the security server, wherein the hardware terminal collects the characteristic code of a first part of the file according to the first collecting algorithm and collects the characteristic code of a second part of the file according to the second collecting algorithm, the first part is different from the second part. - View Dependent Claims (4, 5, 6)
- a security server and a hardware terminal;
-
7. A terminal, comprising:
- a processor and a memory;
wherein one or more program modules stored in the memory and to be executed by the processor, the one or more program modules comprise;
a downloading module, a reporting module and a security prompting module;
whereinthe downloading module is adapted to download a file; the reporting module is adapted to obtain characteristic code information of the file downloaded by the downloading module using a first collecting algorithm, and report the characteristic code information of the file to a security server, such that the security server compares the characteristic code information reported by the reporting module with a characteristic code of a safe file, and compares the characteristic code information reported by the reporting module with a characteristic code of an unsafe file, if compared results conflict with each other, the security server transmits an indication to the terminal indicating the terminal to collect the characteristic code information of the file again, and generate a network security policy and transmits a security indication to the hardware terminal according to the network security policy if otherwise, wherein if the characteristic code information of the file matches both the characteristic code of the safe file and the characteristic code of the unsafe file, the compared results conflict with each other; and the security prompting module is adapted to receive the security indication returned by the security server, and provide a security prompt for the file according to the security indication; wherein the security prompting module is further adapted to receive a first website address inputted by a user, display locally-stored relevant addresses which are obtained through a fuzzy matching according to the first website address inputted by the user, compare the relevant addresses with addresses in a black list and/or white list; and
for each of the relevant addresses, display a safe icon if the relevant address matches an address in the white list;wherein the indication transmitted by the network side to the terminal indicates a second collecting algorithm, wherein the terminal collects the characteristic code information of the file using the second collecting algorithm indicated by the network side, wherein the terminal collects the characteristic code of a first part of the file according to the first collecting algorithm and collects the characteristic code of a second part of the file according to the second collecting algorithm, the first part is different from the second part. - View Dependent Claims (8, 9, 10)
- a processor and a memory;
Specification