Terminal, and system and method for automatically blocking file transmission of counterfeit software file

A technology of software file and file transfer, applied in the field of communication, to achieve the effect of avoiding the acquisition of feature codes, reducing the calculation load, and simplifying the process of obtaining attribute information

Inactive Publication Date: 2012-12-12
ZICT TECH CO LTD
View PDF2 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This technology helps detect illegal copies on email sent from unknown sources without compromising their security. It uses an algorithm called Factorization Analysis (FA) for calculating characteristics codes based upon attributes like IP addresses used during communication between sender's devices and receiving device. If there isn’t any suspicious behavior found within this data set, then emails with these properties will have higher risk of being copied than those containing legitimate ones. By comparing them against each other, suspect documents may also been identified beforehand.

Problems solved by technology

This patented technical solution described by this patents relates to an improved way of stopping piracy from sending viruses onto internet-connected devices like IMs without being detected during their communication sessions.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal, and system and method for automatically blocking file transmission of counterfeit software file
  • Terminal, and system and method for automatically blocking file transmission of counterfeit software file
  • Terminal, and system and method for automatically blocking file transmission of counterfeit software file

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] In order to understand the above-mentioned purpose, features and advantages of the present invention more clearly, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. It should be noted that, in the case of no conflict, the embodiments of the present application and the features in the embodiments can be combined with each other.

[0044] In the following description, many specific details are set forth in order to fully understand the present invention. However, the present invention can also be implemented in other ways different from those described here. Therefore, the protection scope of the present invention is not limited by the specific details disclosed below. EXAMPLE LIMITATIONS.

[0045] figure 1 A block diagram of a terminal according to an embodiment of the present invention is shown.

[0046] Such as figure 1 As shown, the terminal 100 includes: a file transfer unit 102, us

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a terminal, which comprises a file transmission unit, a detection unit and a control unit, wherein the file transmission unit is used for carrying out file transmission with other terminals, the detection unit is used for detecting the file transmitted by the file transmission unit, and the control unit is used for stopping the file transmission when the file is a counterfeit software file or a sub file in the file is the counterfeit software file. According to another aspect of the invention, the invention also provides a system for automatically blocking the file transmission of the counterfeit software file. According to another aspect of the invention, the invention also provides a method for automatically blocking the file transmission of the counterfeit software file. Through the technical scheme provided by the invention, the transmitted file can be detected, in addition, the file transmission can be stopped after confirming that the file is the counterfeit software file, and further, the spreading of the counterfeit software file is prevented.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner ZICT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products