CN101621511A - Multilayer detecting method without local virus library and multilayer detecting system - Google Patents
Multilayer detecting method without local virus library and multilayer detecting system Download PDFInfo
- Publication number
- CN101621511A CN101621511A CN200910086295A CN200910086295A CN101621511A CN 101621511 A CN101621511 A CN 101621511A CN 200910086295 A CN200910086295 A CN 200910086295A CN 200910086295 A CN200910086295 A CN 200910086295A CN 101621511 A CN101621511 A CN 101621511A
- Authority
- CN
- China
- Prior art keywords
- server
- virus
- white list
- command sequence
- client
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a multilayer detecting method without a local virus library, which comprises the following steps: only preserving partial white list libraries by a client without preserving a local virus library; filtering white lists after a normalization command sequence of a file to be detected is obtained; reporting the filtered normalization command sequence to a server end; and receiving a detecting result returned by the server end. The server end comprise a multistep server group, only a top server group is used for storing the integrated white list library and a virus library, other levels of server groups only retain partial white list libraries and virus libraries, an uploaded normalization command sequence is carried out the multilevel white list filtration and the virus library comparison; and a selecting result is fed back the client. The invention also discloses a multilayer detecting system without a local virus library. The invention increases the speed and the effect of virus detection, reduces bandwidth occupation, can improve the detection capability of new viruses and can realize the customization of the enterprise private virus library.
Description
Technical field
The present invention relates to field of computer technology, particularly a kind of multi-level no local virus library detection method and system.
Background technology
Along with developing rapidly of information network, the safety problem that we faced becomes increasingly complex, security threat rapidly increases, especially mix the risk that threatens, as assault, worm-type virus, wooden horse back door, spyware, Botnet etc., greatly perplexing the user, causing serious destruction to information network.And how to utilize information network to carry out safe communication, and protect the fail safe of computer self information simultaneously, become the extremely urgent problem of current network safety and information security.
The investigation of nearly 2 years Prevention-Security shows, surpasses 80% management and safety problem and comes self terminal, and terminal relates generally to each user because its dispersiveness, get the brush-off, security means lacks, and become the weak link of information security system.
At present, in existing virus detection techniques, up-to-date disclosed technical scheme has following two kinds:
One kind online look into the poison apparatus and method
(data source: open day of Chinese patent publication number: CN101039177A: on September 19th, 2007)
A kind of online device of looking into poison, be used for client terminal and server end carry out virus to local computing system by the Internet killing, it is characterized in that, described client terminal includes client program module, described Server Side Include has the serve end program module, wherein, described client program module is uploaded the check value of waiting to look into malicious file or waiting to look into malicious file to described serve end program module, and accepts the Query Result that described server module is returned; Described serve end program module is inquired about this according to this check value and is waited to look into the information of malicious file or call antivirus engine and this is waited to look into malicious file look into poison, and returns Query Result to described client program module.The advantage of this technical scheme is to need not at the huge virus base of client installation volume, need not also to upgrade in time in client that client terminal is disposed is simple for up-to-date viral data, can provide and look into the poison service more fast.But this technical scheme is waited to look into malicious file or is waited to look into the method that the check value of malicious file detects by uploading, and still exists to tackle hidden-type virus, has had a strong impact on detection speed and effect, and the bigger relevant issues of bandwidth occupancy.
2. the methods, devices and systems of checking and killing virus
(data source: open day of Chinese patent publication number: CN101308533A: on November 19th, 2008)
A kind of method of checking and killing virus, in client, the method for described checking and killing virus comprises: the characteristic information of collecting file destination;
Described characteristic information is sent to server end carry out characteristic matching; Receive the matching result that service end is returned; According to described matching result described file destination is handled.At server end, the method for described checking and killing virus comprises: the characteristic information that receives the file destination of client transmission; Characteristic information in described characteristic information and the feature database is carried out characteristic matching, and wherein, described feature database is positioned at server end, is used for the characteristic information of the virulent file destination of file; Described matching result is sent to client, according to described matching result described file destination is handled by client.The advantage of this technical scheme is to carry out the killing of virus at server end, can save the FTP client FTP resource.Though the characteristic information coupling of utilizing of this technical scheme has the accuracy that virus is discerned, and still exists unknown virus is not possessed recognition capability, can't take precautions against most current virus and hidden-type virus, and detection speed and the relatively low problem of effect.
More than two technical schemes, only upgrade operation,, then still require a great deal of time and wait for testing result if certain enterprise customer needs a certain class of special detection or a few viroid at virus base, then greatly loss the cost of enterprise, cause unnecessary loss.
Summary of the invention
At above-mentioned at the problem in the existing virus detection techniques, the object of the present invention is to provide a kind of multi-level no local virus library detection method, when avoiding the virus base upgrade cost, promoted viral detection speed and, can also realize the customization of the privately owned virus base of enterprise simultaneously the detectability of new virus.In order to realize method of the present invention, the invention also discloses a kind of multi-level no local virus library detection system.
The technical scheme that the present invention solves its technical problem employing is:
A kind of multi-level no local virus library detection method is characterized in that, may further comprise the steps:
Described client is not preserved local virus library, only preserve the white list storehouse of part, obtain the normalization command sequence of file to be detected after, carry out white list and filter, with the end that uploads onto the server of the normalization command sequence after filtering, and the testing result returned of reception server end;
Described service end comprises multistage server zone, complete white list storehouse and the virus base of top server zone storage only arranged, the server zone of other grade is reserve part white list storehouse and virus base only, the normalization command sequence of uploading is carried out multistage white list filter and the virus base comparison, testing result is fed back to client.
The described normalization command sequence of obtaining file to be detected, carry out the step that white list filters, be specially: when carrying out viral detecting operation, described client will comprise the rejecting constant to the instruction of file to be detected, remove the conversion of order statement etc., the normalization command sequence that obtains is carried out white list again and is filtered, and the normalization command sequence after will filtering is uploaded to the server end nearest apart from client and carries out the virus detection;
Describedly the normalization command sequence of uploading is carried out multistage white list filter and the virus base comparison, testing result is fed back to the step of client, be specially: described service end is carried out white list with the normalization command sequence of client upload and is filtered and the virus base comparison, judge whether to be virus, testing result is fed back to client; If this command sequence is for unknown and be to require for the first time to detect, then upwards the primary server group requires to detect, and carries out precedence parse for the unknown file that requires to detect often simultaneously, and server end is only preserved feature and the information that requires the file that detected.
A kind of multi-level no local virus library detection system, it is characterized in that: described client includes client program module, and described Server Side Include has top server and multistage sub server.
Described client program module is obtained the normalization command sequence of file to be detected, and carry out white list and filter, with the end that uploads onto the server of the normalization command sequence after filtering, and the testing result returned of reception server end;
The multistage sub server group of described server end utilizes the similitude and the finiteness of file in the local area network (LAN), every server storage area feature, white list filters and the virus base comparison by the normalization command sequence of obtaining is carried out, provide testing result to client, simultaneously for unknown file with the file that requires for the first time the to detect primary server request that makes progress;
The top server zone of described server end includes most complete virus base and white list storehouse, by receiving multistage sub server group's detection request, the normalization command sequence of obtaining is carried out last white list filtration and virus base comparison, and the unknown file that requires to detect often carried out precedence parse, testing result is fed back to client through multistage sub server group.
Described client program module can also be specified by the content of enterprises server, realizes the customization of the privately owned virus base of enterprise.
Compared with prior art, the present invention has following beneficial effect:
The present invention is by being installed in the program module of client terminal, carry out the interaction response that virus detects with the multistage sub server group and the top sub server group of described server end, make the user needn't load virus base at client terminal, only filter first in reserve part white list storehouse, and, the speed and the effect of viral detection have been improved by the multistage sub server group of server end and the multi-level filtration and the detection of top server zone; By precedence parse, effectively promoted detectability to new virus to unknown file; For enterprise customer's specific (special) requirements, can specify by the content of enterprises server simultaneously, carry out the customization of the privately owned virus base of enterprise, the virus of saving enterprise greatly detects cost.
Description of drawings
Fig. 1 is the client flow chart of the detection method of multi-level no local virus library provided by the invention
Fig. 2 is the server end flow chart of the detection method of multi-level no local virus library provided by the invention
Fig. 3 is the structural representation of the detection system of multi-level no local virus library provided by the invention
Embodiment
The present invention is described in further detail below in conjunction with drawings and Examples:
Embodiments of the invention provide a kind of multi-level no local virus library detection method and system
As shown in Figure 1, the method for the detection in described multi-level virus-free storehouse comprises:
In client,
101, obtain the normalization command sequence of file to be detected
102, white list filters
103, with the end that uploads onto the server of the command sequence after filtering
104, reception server end feedback result
105, make corresponding prompting and processing according to feedback result
At server end,
201, obtain the normalization command sequence to be detected of client
202, white list filters
203, carry out the virus base comparison, judge whether to be virus
204, for unknown file, then ask to upper level sub server group
205, judge whether to be top server zone
206, preservation information feeds back to client with testing result
207, detect and finish
A kind of multi-level no local virus library detection method that the embodiment of the invention provides, by obtain the normalization command sequence of file to be detected in client, and the command sequence after will filtering through white list be sent to server end and carry out, there is server end to carry out multistage white list filtration and virus base comparison, testing result is fed back to client, and client can provide corresponding prompt and processing.
As shown in Figure 3, the system of the detection in described multi-level virus-free storehouse comprises:
Described client program module 405 is carried out virus by the multistage sub server group who the normalization command sequence is uploaded to the server end nearest apart from client and is detected;
The multistage sub server group (402 ~ 404) of described service end carries out white list with the normalization command sequence of client upload and filters, and file destination to be detected after will filtering and virus base comparison, if this command sequence exists, then testing result is fed back to client program module; If this command sequence does not exist and be to require for the first time to detect, then upwards the primary server group requires to detect, and multistage sub server group only preserves feature and the information that requires the file that detected;
The top server zone 401 of described server end includes most complete virus base and white list storehouse, by receiving multistage sub server group's detection request, command sequence is carried out white list filtration and virus base comparison, simultaneously carry out precedence parse, and testing result is fed back to multistage sub server group for the unknown file that requires to detect often.
This multi-level no local virus library detection method and system that the embodiment of the invention provided; compared with prior art; by being installed in the program module of client terminal; carry out the interaction response that virus detects with the multistage sub server and the top sub server of described server end; make the user needn't load virus base at client terminal; only filter first in reserve part white list storehouse; and by the multistage sub server of server end and the multi-level filtration and the detection of top server; the speed and the effect of viral detection have been improved; and reduced bandwidth occupancy greatly, better protection the system safety of user computer.The described method and system of present embodiment have been realized.Described client program module can also be specified by the content of enterprises server simultaneously, realizes the customization of the privately owned virus base of enterprise, has reduced the cost of enterprise upgrading virus base, and has improved viral detection speed and effect.
The above only is the specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, and is within the spirit and principles in the present invention all, any modification of being made, is equal to replacement, improvement etc., all should be included within protection scope of the present invention.
Claims (8)
1. a multi-level no local virus library detection method is characterized in that, may further comprise the steps:
Described client is not preserved local virus library, only preserve part white list storehouse, obtain the normalization command sequence of file to be detected after, carry out white list and filter, with the end that uploads onto the server of the normalization command sequence after filtering, and the testing result returned of reception server end;
Described service end comprises multistage server zone, complete white list storehouse and the virus base of top server zone storage only arranged, the server zone of other grade is reserve part white list storehouse and virus base only, the normalization command sequence of uploading is carried out multistage white list filter and the virus base comparison, testing result is fed back to client.
2. method according to claim 1 is characterized in that, the described normalization command sequence of obtaining file to be detected is carried out the step that white list filters, and is specially:
When carrying out viral detecting operation, described client will comprise the rejecting constant to the instruction of file to be detected, remove the conversion of order statement etc., the normalization command sequence that obtains is carried out white list again and is filtered, and the normalization command sequence after will filtering is uploaded to the server end nearest apart from client and carries out the virus detection.
3. according to the described method of claim 1, it is characterized in that, describedly the normalization command sequence of uploading is carried out multistage white list filter and the virus base comparison, testing result is fed back to the step of client, be specially:
Described service end is carried out white list filtration and virus base comparison with the normalization command sequence of client upload, judges whether to be virus, and testing result is fed back to client; If this command sequence is for unknown and be to require for the first time to detect, then upwards the primary server group requires to detect, and carries out precedence parse for the unknown file that requires to detect often simultaneously, and server end is only preserved feature and the information that requires the file that detected.
4. multi-level no local virus library detection system, it is characterized in that: described client includes client program module, and described Server Side Include has top server zone and multistage sub server group.
5. system according to claim 4, it is characterized in that described client program module is obtained the normalization command sequence of file to be detected, carry out white list and filter, with the end that uploads onto the server of the normalization command sequence after filtering, and the testing result returned of reception server end.
6. system according to claim 4, it is characterized in that, the multistage sub server group of described server end utilizes the similitude and the finiteness of file in the local area network (LAN), every station server storage area feature, white list filters and the virus base comparison by the normalization command sequence of obtaining is carried out, provide testing result to client, simultaneously for unknown file with the file that requires for the first time the to detect primary server request that makes progress.
7. system according to claim 4, it is characterized in that, the top server zone of described server end includes most complete virus base and white list storehouse, by receiving multistage sub server group's detection request, the normalization command sequence of obtaining is carried out last white list filtration and virus base comparison, and the unknown file that requires to detect often carried out precedence parse, testing result is fed back to client through multistage sub server group.
8. system according to claim 4 is characterized in that, described client program module can also be specified by the content of enterprises server, realizes the customization of the privately owned virus base of enterprise.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200910086295A CN101621511A (en) | 2009-06-09 | 2009-06-09 | Multilayer detecting method without local virus library and multilayer detecting system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200910086295A CN101621511A (en) | 2009-06-09 | 2009-06-09 | Multilayer detecting method without local virus library and multilayer detecting system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101621511A true CN101621511A (en) | 2010-01-06 |
Family
ID=41514554
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN200910086295A Pending CN101621511A (en) | 2009-06-09 | 2009-06-09 | Multilayer detecting method without local virus library and multilayer detecting system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101621511A (en) |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102377753A (en) * | 2010-08-19 | 2012-03-14 | 腾讯科技(深圳)有限公司 | System information identification method, device and system |
CN102790758A (en) * | 2011-05-18 | 2012-11-21 | 海尔集团公司 | Firewall system and processing method thereof |
CN102819713A (en) * | 2012-06-29 | 2012-12-12 | 北京奇虎科技有限公司 | Method and system for detecting security of popup window |
CN102831338A (en) * | 2012-06-28 | 2012-12-19 | 北京奇虎科技有限公司 | Security detection method and system of Android application program |
CN102915421A (en) * | 2011-08-04 | 2013-02-06 | 腾讯科技(深圳)有限公司 | Method and system for scanning files |
CN103020118A (en) * | 2012-11-14 | 2013-04-03 | 北京奇虎科技有限公司 | Method and device for identifying security attributes of application programs |
CN103049697A (en) * | 2012-11-26 | 2013-04-17 | 北京奇虎科技有限公司 | File detection method and system for enterprises |
CN103150512A (en) * | 2013-03-18 | 2013-06-12 | 珠海市君天电子科技有限公司 | Honeypot system and method for detecting trojan by using same |
CN103678997A (en) * | 2012-08-30 | 2014-03-26 | 腾讯科技(深圳)有限公司 | System safety check method and device |
CN103890770A (en) * | 2011-10-17 | 2014-06-25 | 迈可菲公司 | System and method for whitelisting applications in a mobile network environment |
CN106203102A (en) * | 2015-05-06 | 2016-12-07 | 北京金山安全管理系统技术有限公司 | A kind of checking and killing virus method and device of the whole network terminal |
CN106682505A (en) * | 2016-05-04 | 2017-05-17 | 腾讯科技(深圳)有限公司 | Virus detection method, terminal, server and system |
CN107086978A (en) * | 2016-02-15 | 2017-08-22 | 中国移动通信集团福建有限公司 | A kind of method and device for recognizing trojan horse |
CN107294929A (en) * | 2016-04-05 | 2017-10-24 | 阿里巴巴集团控股有限公司 | Rule match and management method and device |
CN107294966A (en) * | 2017-06-21 | 2017-10-24 | 四川大学 | A kind of IP white list construction methods based on Intranet flow |
CN108234469A (en) * | 2017-12-28 | 2018-06-29 | 江苏通付盾信息安全技术有限公司 | Mobile terminal application safety protecting method, apparatus and system |
CN114120474A (en) * | 2021-11-29 | 2022-03-01 | 广东九联科技股份有限公司 | Automatic alarm system for illegal vehicle |
CN116821910A (en) * | 2023-08-30 | 2023-09-29 | 北京安天网络安全技术有限公司 | Safety protection system |
CN117056928A (en) * | 2023-10-11 | 2023-11-14 | 深圳安天网络安全技术有限公司 | Virus library deployment method and device, medium and electronic equipment |
-
2009
- 2009-06-09 CN CN200910086295A patent/CN101621511A/en active Pending
Cited By (34)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102377753A (en) * | 2010-08-19 | 2012-03-14 | 腾讯科技(深圳)有限公司 | System information identification method, device and system |
CN102377753B (en) * | 2010-08-19 | 2015-12-02 | 腾讯科技(深圳)有限公司 | System information recognition methods, device and system |
CN102790758B (en) * | 2011-05-18 | 2017-08-18 | 海尔集团公司 | Firewall system and its processing method |
CN102790758A (en) * | 2011-05-18 | 2012-11-21 | 海尔集团公司 | Firewall system and processing method thereof |
CN102915421B (en) * | 2011-08-04 | 2013-10-23 | 腾讯科技(深圳)有限公司 | Method and system for scanning files |
CN102915421A (en) * | 2011-08-04 | 2013-02-06 | 腾讯科技(深圳)有限公司 | Method and system for scanning files |
CN103890770A (en) * | 2011-10-17 | 2014-06-25 | 迈可菲公司 | System and method for whitelisting applications in a mobile network environment |
CN102831338A (en) * | 2012-06-28 | 2012-12-19 | 北京奇虎科技有限公司 | Security detection method and system of Android application program |
CN102831338B (en) * | 2012-06-28 | 2015-09-30 | 北京奇虎科技有限公司 | A kind of safety detection method of Android application program and system |
CN102819713B (en) * | 2012-06-29 | 2015-09-16 | 北京奇虎科技有限公司 | A kind of method and system detecting bullet window safe |
CN102819713A (en) * | 2012-06-29 | 2012-12-12 | 北京奇虎科技有限公司 | Method and system for detecting security of popup window |
CN103678997A (en) * | 2012-08-30 | 2014-03-26 | 腾讯科技(深圳)有限公司 | System safety check method and device |
CN103678997B (en) * | 2012-08-30 | 2017-12-01 | 腾讯科技(深圳)有限公司 | System safety check method and device |
CN103020118A (en) * | 2012-11-14 | 2013-04-03 | 北京奇虎科技有限公司 | Method and device for identifying security attributes of application programs |
CN103020118B (en) * | 2012-11-14 | 2016-09-28 | 北京奇虎科技有限公司 | Security attribute recognition methods and device for application program |
CN103049697A (en) * | 2012-11-26 | 2013-04-17 | 北京奇虎科技有限公司 | File detection method and system for enterprises |
CN103150512A (en) * | 2013-03-18 | 2013-06-12 | 珠海市君天电子科技有限公司 | Honeypot system and method for detecting trojan by using same |
CN103150512B (en) * | 2013-03-18 | 2015-10-21 | 珠海市君天电子科技有限公司 | Honeypot system and method for detecting trojan by using same |
CN106203102A (en) * | 2015-05-06 | 2016-12-07 | 北京金山安全管理系统技术有限公司 | A kind of checking and killing virus method and device of the whole network terminal |
CN106203102B (en) * | 2015-05-06 | 2019-10-11 | 北京金山安全管理系统技术有限公司 | A kind of checking and killing virus method and device of the whole network terminal |
CN107086978B (en) * | 2016-02-15 | 2019-12-10 | 中国移动通信集团福建有限公司 | Method and device for identifying Trojan horse virus |
CN107086978A (en) * | 2016-02-15 | 2017-08-22 | 中国移动通信集团福建有限公司 | A kind of method and device for recognizing trojan horse |
CN107294929A (en) * | 2016-04-05 | 2017-10-24 | 阿里巴巴集团控股有限公司 | Rule match and management method and device |
CN106682505A (en) * | 2016-05-04 | 2017-05-17 | 腾讯科技(深圳)有限公司 | Virus detection method, terminal, server and system |
CN106682505B (en) * | 2016-05-04 | 2020-06-12 | 腾讯科技(深圳)有限公司 | Virus detection method, terminal, server and system |
US10803171B2 (en) | 2016-05-04 | 2020-10-13 | Tencent Technology (Shenzhen) Company Limited | Virus detection method, terminal and server |
CN107294966A (en) * | 2017-06-21 | 2017-10-24 | 四川大学 | A kind of IP white list construction methods based on Intranet flow |
CN108234469A (en) * | 2017-12-28 | 2018-06-29 | 江苏通付盾信息安全技术有限公司 | Mobile terminal application safety protecting method, apparatus and system |
CN114120474A (en) * | 2021-11-29 | 2022-03-01 | 广东九联科技股份有限公司 | Automatic alarm system for illegal vehicle |
CN114120474B (en) * | 2021-11-29 | 2024-06-07 | 广东九联科技股份有限公司 | Automatic alarm system for illegal vehicles |
CN116821910A (en) * | 2023-08-30 | 2023-09-29 | 北京安天网络安全技术有限公司 | Safety protection system |
CN116821910B (en) * | 2023-08-30 | 2023-11-17 | 北京安天网络安全技术有限公司 | Safety protection system |
CN117056928A (en) * | 2023-10-11 | 2023-11-14 | 深圳安天网络安全技术有限公司 | Virus library deployment method and device, medium and electronic equipment |
CN117056928B (en) * | 2023-10-11 | 2024-01-26 | 深圳安天网络安全技术有限公司 | Virus library deployment method and device, medium and electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101621511A (en) | Multilayer detecting method without local virus library and multilayer detecting system | |
US8966633B2 (en) | Method and device for multiple engine virus killing | |
US9935972B2 (en) | Emulator-based malware learning and detection | |
EP2447877B1 (en) | System and method for detection of malware and management of malware-related information | |
US8528089B2 (en) | Known files database for malware elimination | |
US8650646B2 (en) | System and method for optimization of security traffic monitoring | |
EP1701285A1 (en) | System security approaches using multiple processing units | |
US10257216B2 (en) | Method and system for obtaining and analyzing forensic data in a distributed computer infrastructure | |
CN102970272B (en) | Method, device and cloud server for detesting viruses | |
US20070136809A1 (en) | Apparatus and method for blocking attack against Web application | |
CN110519150B (en) | Mail detection method, device, equipment, system and computer readable storage medium | |
CN102081714A (en) | Cloud antivirus method based on server feedback | |
CN101594248A (en) | The remote assistance method of information security and system maintenance, system and server | |
CN101252443B (en) | Apparatus and method for detecting message security | |
CN106095575B (en) | A kind of devices, systems, and methods of log audit | |
CN104580133A (en) | Malicious program protection method and system and filtering table updating method thereof | |
CN116303290B (en) | Office document detection method, device, equipment and medium | |
CN102523223A (en) | Trojan detection method and apparatus thereof | |
CN102684944A (en) | Method and device for detecting intrusion | |
CN102768792B (en) | Network alarm centralized pushing method and device | |
CN105357179A (en) | Network attack handling method and network attack handling device | |
CN109460638A (en) | A kind of method and apparatus for managing executable program | |
CN116305129B (en) | Document detection method, device, equipment and medium based on VSTO | |
CN102750476A (en) | Method and system for identifying file security | |
CN100521679C (en) | Sensitive information filter system and method for server up transfer file |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
DD01 | Delivery of document by public notice |
Addressee: Lu Yuan Document name: Notification that Application Deemed not to be Proposed |
|
DD01 | Delivery of document by public notice |
Addressee: Beijing Antiy Electronic Installation Co., Ltd. Document name: Notification to Go Through Formalities of Registration |
|
AD01 | Patent right deemed abandoned |
Effective date of abandoning: 20100106 |
|
C20 | Patent right or utility model deemed to be abandoned or is abandoned |