CN104767876A - Safety software processing method and user terminal - Google Patents

Safety software processing method and user terminal Download PDF

Info

Publication number
CN104767876A
CN104767876A CN201510093822.3A CN201510093822A CN104767876A CN 104767876 A CN104767876 A CN 104767876A CN 201510093822 A CN201510093822 A CN 201510093822A CN 104767876 A CN104767876 A CN 104767876A
Authority
CN
China
Prior art keywords
software
downloaded
security
information
party
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510093822.3A
Other languages
Chinese (zh)
Inventor
曹万鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201510093822.3A priority Critical patent/CN104767876A/en
Publication of CN104767876A publication Critical patent/CN104767876A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention provides a safety software processing method and a user terminal. The software processing method comprises the steps that the software to be downloaded is obtained, and source information and safety information which correspond to the software to be downloaded are obtained; the corresponding safety level of the software to be downloaded is determined according to the source information and the safety information which correspond to the software to be downloaded; the software to be downloaded is processed in the monitoring way and the resource scheduling mode which correspond to the safety level. According to the software processing method and the user terminal, the safety of software in the user terminal is graded by the user terminal, the monitoring strength and management resources which correspond to the safety levels are provided according to the different safety levels, in this way, monitoring and resource scheduling can be conducted on different software flexibly, and the operating efficiency of the software with the high safety level can be effectively improved; meanwhile, the monitoring strength of the software with the low safety level is improved, and the software which is potentially dangerous can be effectively recognized.

Description

Based on security processing and the user terminal of software
Technical field
The present invention relates to the communication technology, particularly relate to a kind of security processing based on software and user terminal.
Background technology
Along with developing rapidly of the communication technology and computer technology, the quantity that user runs various software is on the subscriber terminal also more and more diversified.But, at present, some software in user terminal may be embedded into some malicious codes, thus become attack software, and then the system of user terminal is caused to the leakage encroaching on or cause user profile, such as: at present, the cell phone software that user uses is mainly derived from different software stores, a lot of regular software can be implanted one or more snippets malicious code by the lawless person had ulterior motives, be also placed on software store and sell.These so-called regular softwares continue to be placed on software store because of the not strict of software store inspection lures cellphone subscriber to download, and is installed on user mobile phone according to regular software.Thereupon, these softwares are also equally authorized the ability of related resource on corresponding calling party mobile phone according to regular software accordingly.Therefore, these malicious codes also utilize these authorities to conduct interviews to relevant resource with regard to having an opportunity.
In order to solve the problems of the technologies described above, in prior art, the method that software carries out safety management is mainly: adopt unified security monitoring and prevention policies, all softwares on user terminal are managed, to identify which software is for attacking software.
But, along with the continuous increase of software type and quantity, adopt unified security monitoring and prevention policies, not only can cause the waste of resource, the problem that some also can be caused to have potential hazard software accurately cannot be identified by user terminal.
Summary of the invention
The invention provides a kind of security processing based on software and user terminal, unified security monitoring and prevention policies is adopted in order to solve in prior art, cause the waste of resource, and the problem causing some to have potential hazard software accurately cannot being identified by user terminal.
First aspect of the present invention is to provide a kind of security processing based on software, comprising:
Obtain software to be downloaded, and obtain the source-information corresponding with described software to be downloaded and security information;
The source-information corresponding according to described software to be downloaded and security information, determine the level of security that described software to be downloaded is corresponding;
The monitor mode corresponding with described level of security is adopted to process described software to be downloaded, and the resource in the scheduling of resource mode dispatching user terminal making the employing of described software to be downloaded corresponding with described level of security.
Another aspect of the present invention is to provide a kind of user terminal, comprising:
Acquisition module, for obtaining software to be downloaded, and obtains the source-information corresponding with described software to be downloaded and security information;
Determination module: for according to source-information corresponding to described software to be downloaded and security information, determine the level of security that described software to be downloaded is corresponding;
Processing module, for adopting the monitor mode corresponding with described level of security to process described software to be downloaded, and the resource in the scheduling of resource mode dispatching user terminal making the employing of described software to be downloaded corresponding with described level of security.
Security processing based on software provided by the invention and user terminal, by obtaining software to be downloaded, and obtain the source-information corresponding with software to be downloaded and security information; Then according to source-information corresponding to software to be downloaded and security information, the level of security that software to be downloaded is corresponding is determined; Adopt the monitor mode corresponding with level of security and scheduling of resource pattern, software to be downloaded is processed.Achieve user terminal carries out level of security division to the software in user terminal, there is provided should the control and monitoring of level of security and management resource according to different level of securitys, thus different monitoring and scheduling of resource can be carried out for different software flexibly, thus effectively can improve the operational efficiency of the high software of level of security; Also increase the control and monitoring to the low software of level of security simultaneously, and effectively can recognize the software of potential hazard.
Accompanying drawing explanation
The flow chart of the security processing based on software that Fig. 1 provides for the embodiment of the present invention one;
The flow chart of the security processing based on software that Fig. 2 provides for the embodiment of the present invention two;
The structural representation of the user terminal that Fig. 3 provides for the embodiment of the present invention three;
The structural representation of the user terminal that Fig. 4 provides for the embodiment of the present invention four.
Embodiment
For making the object of the embodiment of the present invention, technical scheme and advantage clearly, below in conjunction with the accompanying drawing in the embodiment of the present invention, technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
The flow chart of the security processing based on software that Fig. 1 provides for the embodiment of the present invention one, as shown in Figure 1, the method for the present embodiment comprises:
Step 101, obtain software to be downloaded, and obtain the source-information corresponding with described software to be downloaded and security information.
In the present embodiment, for example, software to be downloaded can be obtained from the server in different software stores; In addition, the source-information that this software to be downloaded is corresponding can be specially the mark of the software mall server that it is downloaded.The security information that this software to be downloaded is corresponding can be specially the evaluation of himself fail safe.Alternatively, this security information comprises the safety evaluation information of user security evaluation information and/or third party software evaluation and test mechanism.
Step 102, according to source-information corresponding to described software to be downloaded and security information, determine the level of security that described software to be downloaded is corresponding.
In the present embodiment, according to the source-information that software to be downloaded is corresponding, evaluate in list at the software source prestored, search the software source evaluation information that this source-information is corresponding; Meanwhile, when obtaining software to be downloaded in the server from different software stores, carry user security evaluation information in software to be downloaded, user security evaluation information represents the evaluation of user to the fail safe of this software to be downloaded; And the safety evaluation information of third party software evaluation and test mechanism is that third party software evaluation and test mechanism is to the evaluation of the fail safe of this software to be downloaded.
For example, time security information includes the safety evaluation information of user security evaluation information and third party software evaluation and test mechanism, user terminal is according to software source evaluation information, the safety evaluation information of user security evaluation information and third party software evaluation and test mechanism, software is carried out to the division of level of security, wherein, the ratio that software source evaluation information accounts for when dividing level of security is 50%, the ratio that user security evaluation information accounts for when dividing level of security is 30%, the ratio that the safety evaluation information of third party software evaluation and test mechanism accounts for when dividing level of security is 20%.Utilize three kinds of different evaluation informations can reflect the fail safe of software more accurately, the level of security of software to be downloaded can be determined more accurately.Time security information includes user security evaluation information, user terminal carries out the division of level of security according to software source evaluation information and user security evaluation information to software, wherein, the ratio that software source evaluation information accounts for when dividing level of security is 60%, and the ratio that user security evaluation information accounts for when dividing level of security is 40%.Time security information includes the safety evaluation information of third party software evaluation and test mechanism, the safety evaluation information of user terminal foundation software source evaluation information and third party software evaluation and test mechanism carries out the division of level of security to software, wherein, the ratio that software source evaluation information accounts for when dividing level of security is 60%, and the ratio that the safety evaluation information of third party software evaluation and test mechanism accounts for when dividing level of security is 40%.
For example, level of security can comprise system-level, safe level, general level and limiter stage.Wherein, rank successively from high in the end.
Step 103, the employing monitor mode corresponding with described level of security process described software to be downloaded, and the resource in the scheduling of resource mode dispatching user terminal making the employing of described software to be downloaded corresponding with described level of security.
In the present embodiment, concrete, according to the level of security of software to be downloaded, the software of user terminal to different stage adopts different monitor modes, and the software of different stage has the scheduling of resource pattern of different invoke user terminal resources.
If determine in step 102, the level of security of software to be downloaded is first level, and first level can be specifically system-level, then user terminal can not carry out any monitoring to any behavior of this software; And, this software can call or read all resources on user terminal, access and revise system-level file, application program class file and the nonsystematic file in user terminal, such as, this software can delete the old software, the setting can revising client terminal system, the All Files obtained on user terminal etc. that the system Central Plains on user terminal carries.If determine in step 102, the level of security of software to be downloaded is second level, second level can be specifically safe level, then user terminal is the monitoring of the behavior that this software set is exceeded one's powers, the behavior of exceeding one's powers comprises Operation system setting and system class file, the undelegated file of amendment system, the amendment application program class file etc. of this software modification user terminal, user terminal only monitors the operation of exceeding one's powers of this software, and when above behavior occurs software time, user terminal will stop the behavior of software; The above operation of exceeding one's powers of removing, this software can all the other resources arbitrarily in invoke user terminal, the resource that this software can call comprises the user terminals resources beyond the Operation system setting, the undelegated file of access system etc. of removing amendment user terminal, such as, access application class file, access the file of having authorized, the address list of accessing in the user terminal of having authorized.If determine in step 102, the level of security of software to be downloaded is third level, third level can be specifically general level, then user terminal is the monitoring of the responsive behavior of this software set, these responsive behaviors comprise Operation system setting, access or the undelegated file of amendment system, the access of access or amendment user terminal or revise the behavior such as system-level file and application program class file, the geographical position obtaining user terminal, the address list obtained in user terminal, and more than software generation, when responsive behavior, user terminal will stop and limit the behavior of this software; Further, remove the responsive behavior of this software, this software can other resources arbitrarily in calling and obtaining user terminal, such as transfer authorized document, acquisition unencrypted picture etc.If determine in step 102, the level of security of software to be downloaded is fourth level, and fourth level can be specifically limiter stage, and user terminal needs all behaviors monitoring this software; Further, user terminal is this software set scheduling of resource authority, and this software can only nonsystematic level file in calling party terminal and nonusable routine class file, and this software can not carry out any amendment to nonsystematic level file and nonusable routine class file.
In the present embodiment, by according to source-information corresponding to software to be downloaded and security information, after removing the level of security determining that software to be downloaded is corresponding, adopt the monitor mode corresponding with level of security and scheduling of resource pattern, software to be downloaded is processed.Achieve user terminal carries out level of security division to the software in user terminal, there is provided should the control and monitoring of level of security and management resource according to different level of securitys, thus different monitoring and scheduling of resource can be carried out for different software flexibly, thus effectively can improve the operational efficiency of the high software of level of security; Also increase the control and monitoring to the low software of level of security simultaneously, and effectively can recognize the software of potential hazard.
The flow chart of the security processing based on software that Fig. 2 provides for the embodiment of the present invention two, as shown in Figure 2, when security information is the safety evaluation information of third party software evaluation and test mechanism, the method for the present embodiment comprises:
Step 201, obtain software to be downloaded, and obtain the source-information corresponding with described software to be downloaded.
In the present embodiment, for example, software to be downloaded can be obtained from the server in different software stores; In addition, the source-information that this software to be downloaded is corresponding can be specially the mark of the software mall server that it is downloaded.
Step 202, obtain described software to be downloaded software development mark, and sending to third party's stand alone software to evaluate and test the server of mechanism the safety information acquisition request carrying described software development mark, the server for described third party's stand alone software evaluation and test mechanism obtains and identifies with described software development the safety evaluation information that corresponding described third party software evaluates and tests mechanism.
In the present embodiment, because each software in the server in software store has respective software development mark, software development mark comprises the information such as the title of software supplier, the title of software and software version, thus can obtain its software development mark from the software to be downloaded got, third party's stand alone software is sent to evaluate and test the server of mechanism the safety information acquisition request carrying software development mark, server due to third party's stand alone software evaluation and test mechanism has established a third party in advance and has evaluated and tested database, third party evaluates and tests in database and stores third party's stand alone software evaluation and test mechanism to the safety evaluation information of various software, the server of third party's stand alone software evaluation and test mechanism is by the software development mark in the safety information acquisition request that receives, can evaluate and test in database to find third party and identify corresponding third party software with this software development and evaluate and test the safety evaluation information of mechanism to software to be downloaded, simultaneously, third party evaluates and tests database and regularly upgrades, afterwards, third party software is evaluated and tested the safety evaluation information of mechanism to software to be downloaded and is sent to user terminal by third party's stand alone software evaluation and test mechanism again.
The safety evaluation information of the described third party software evaluation and test mechanism that step 203, the server receiving described third party's stand alone software evaluation and test mechanism send.
Step 204, safety evaluation information according to source-information corresponding to described software to be downloaded and described third party software evaluation and test mechanism, determine the level of security that described software to be downloaded is corresponding.
In the present embodiment, the safety evaluation information of mechanism is evaluated and tested according to software source evaluation information corresponding to the source-information corresponding with software to be downloaded, third party software, to software demarcation level of security.For example, level of security is divided into system-level, safe level, general level and limiter stage from high to low.
Step 205, the employing monitor mode corresponding with described level of security and scheduling of resource pattern, process described software to be downloaded.
In the present embodiment, by sending to third party's stand alone software to evaluate and test the server of mechanism the safety information acquisition request carrying software development mark, server for third party's stand alone software evaluation and test mechanism obtains and identifies with software development the safety evaluation information that corresponding third party software evaluates and tests mechanism, thus user terminal can get the safety evaluation information of the third party software evaluation and test mechanism of the server coming from third party's stand alone software evaluation and test mechanism, get the information of more reflection software security height, be beneficial to software demarcation level of security.
The structural representation of the user terminal that Fig. 3 provides for the embodiment of the present invention three, as shown in Figure 3, the user terminal of the present embodiment comprises: acquisition module 11, determination module 12 and processing module 13; Wherein, acquisition module 11 for obtaining software to be downloaded, and obtains the source-information corresponding with described software to be downloaded and security information; Determination module 12, for according to source-information corresponding to described software to be downloaded and security information, determines the level of security that described software to be downloaded is corresponding; Processing module 13 processes described software to be downloaded for adopting the monitor mode corresponding with described level of security, and the resource in the scheduling of resource mode dispatching user terminal making the employing of described software to be downloaded corresponding with described level of security.
The security processing based on software that the known execution embodiment of the present invention one of user terminal of the present embodiment provides, it is similar that it realizes principle, repeats no more herein.
In the present embodiment, by according to source-information corresponding to software to be downloaded and security information, after removing the level of security determining that software to be downloaded is corresponding, adopt the monitor mode corresponding with level of security and scheduling of resource pattern, software to be downloaded is processed.Achieve user terminal carries out level of security division to the software in user terminal, there is provided should the control and monitoring of level of security and management resource according to different level of securitys, thus different monitoring and scheduling of resource can be carried out for different software flexibly, thus effectively can improve the operational efficiency of the high software of level of security; Also increase the control and monitoring to the low software of level of security simultaneously, and effectively can recognize the software of potential hazard.
The structural representation of the user terminal that Fig. 4 provides for the embodiment of the present invention four, on above-mentioned basis embodiment illustrated in fig. 3, as shown in Figure 4, this acquisition module 11 also comprises: acquiring unit 111 and Transmit-Receive Unit 112; Wherein, acquiring unit 111 is for obtaining the source-information corresponding with described software to be downloaded; Described acquiring unit 111 is also for obtaining the software development mark of described software to be downloaded; Transmit-Receive Unit 112 is for sending to third party's stand alone software to evaluate and test the server of mechanism the safety information acquisition request carrying described software development mark, and the server for described third party's stand alone software evaluation and test mechanism obtains and identifies with described software development the safety evaluation information that corresponding described third party software evaluates and tests mechanism; The described third party software that described Transmit-Receive Unit 112 also sends for the server receiving described third party's stand alone software evaluation and test mechanism evaluates and tests the safety evaluation information of mechanism.
The security processing based on software that the known execution embodiment of the present invention two of user terminal of the present embodiment provides, it is similar that it realizes principle, repeats no more herein.
In the present embodiment, by sending to third party's stand alone software to evaluate and test the server of mechanism the safety information acquisition request carrying software development mark, server for third party's stand alone software evaluation and test mechanism obtains and identifies with software development the safety evaluation information that corresponding third party software evaluates and tests mechanism, thus user terminal can get the safety evaluation information of the third party software evaluation and test mechanism of the server coming from third party's stand alone software evaluation and test mechanism, get the information of more reflection software security height, be beneficial to software demarcation level of security.
One of ordinary skill in the art will appreciate that: all or part of step realizing above-mentioned each embodiment of the method can have been come by the hardware that program command is relevant.Aforesaid program can be stored in a computer read/write memory medium.This program, when performing, performs the step comprising above-mentioned each embodiment of the method; And aforesaid storage medium comprises: ROM, RAM, magnetic disc or CD etc. various can be program code stored medium.
Last it is noted that above embodiment is only in order to illustrate technical scheme of the present invention, be not intended to limit; Although with reference to previous embodiment to invention has been detailed description, those of ordinary skill in the art is to be understood that: it still can be modified to the technical scheme described in foregoing embodiments, or carries out equivalent replacement to wherein portion of techniques feature; And these amendments or replacement, do not make the essence of appropriate technical solution depart from the spirit and scope of various embodiments of the present invention technical scheme.

Claims (5)

1. based on a security processing for software, it is characterized in that, comprising:
Obtain software to be downloaded, and obtain the source-information corresponding with described software to be downloaded and security information;
The source-information corresponding according to described software to be downloaded and security information, determine the level of security that described software to be downloaded is corresponding;
The monitor mode corresponding with described level of security is adopted to process described software to be downloaded, and the resource in the scheduling of resource mode dispatching user terminal making the employing of described software to be downloaded corresponding with described level of security.
2. method according to claim 1, is characterized in that, described security information comprises the safety evaluation information of user security evaluation information and/or third party software evaluation and test mechanism.
3. method according to claim 2, is characterized in that, when described security information comprises the safety evaluation information of described third party software evaluation and test mechanism, obtains the security information corresponding with described software to be downloaded, specifically comprises:
Obtain the software development mark of described software to be downloaded, and sending to third party's stand alone software to evaluate and test the server of mechanism the safety information acquisition request carrying described software development mark, the server for described third party's stand alone software evaluation and test mechanism obtains and identifies with described software development the safety evaluation information that corresponding described third party software evaluates and tests mechanism;
The safety evaluation information of the described third party software evaluation and test mechanism that the server receiving described third party's stand alone software evaluation and test mechanism sends.
4. a user terminal, is characterized in that, comprising:
Acquisition module, for obtaining software to be downloaded, and obtains the source-information corresponding with described software to be downloaded and security information;
Determination module, for according to source-information corresponding to described software to be downloaded and security information, determines the level of security that described software to be downloaded is corresponding;
Processing module, for adopting the monitor mode corresponding with described level of security to process described software to be downloaded, and the resource in the scheduling of resource mode dispatching user terminal making the employing of described software to be downloaded corresponding with described level of security.
5. user terminal according to claim 4, is characterized in that, when described security information comprises the safety evaluation information of described third party software evaluation and test mechanism, described acquisition module comprises:
Acquiring unit, for obtaining the source-information corresponding with described software to be downloaded;
Described acquiring unit, also for obtaining the software development mark of described software to be downloaded;
Transmit-Receive Unit, for sending to third party's stand alone software to evaluate and test the server of mechanism the safety information acquisition request carrying described software development mark, the server for described third party's stand alone software evaluation and test mechanism obtains and identifies with described software development the safety evaluation information that corresponding described third party software evaluates and tests mechanism;
Described Transmit-Receive Unit, the described third party software also sent for the server receiving described third party's stand alone software evaluation and test mechanism evaluates and tests the safety evaluation information of mechanism.
CN201510093822.3A 2015-03-03 2015-03-03 Safety software processing method and user terminal Pending CN104767876A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510093822.3A CN104767876A (en) 2015-03-03 2015-03-03 Safety software processing method and user terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510093822.3A CN104767876A (en) 2015-03-03 2015-03-03 Safety software processing method and user terminal

Publications (1)

Publication Number Publication Date
CN104767876A true CN104767876A (en) 2015-07-08

Family

ID=53649461

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510093822.3A Pending CN104767876A (en) 2015-03-03 2015-03-03 Safety software processing method and user terminal

Country Status (1)

Country Link
CN (1) CN104767876A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106055973A (en) * 2016-05-30 2016-10-26 深圳市永兴元科技有限公司 Application permission management method and application apparatus
CN107526969A (en) * 2016-06-20 2017-12-29 中国科学院微电子研究所 A kind of method and device for determining IP kernel level of security
CN109272335A (en) * 2018-09-17 2019-01-25 深圳市元征科技股份有限公司 A kind of intelligence contract administration method, system, equipment and computer storage medium
CN109729089A (en) * 2019-01-02 2019-05-07 中国电子科技网络信息安全有限公司 A kind of intelligent network security function management method and system based on container
WO2022062924A1 (en) * 2020-09-23 2022-03-31 华为云计算技术有限公司 Vulnerability assessment method and apparatus, computation device and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080288784A1 (en) * 2007-05-17 2008-11-20 Samsung Electronics Co., Ltd. Method of installing software for using digital content and apparatus for playing digital content
CN101984691A (en) * 2010-10-25 2011-03-09 东莞宇龙通信科技有限公司 Upgrading method of system built-in software and mobile terminal
CN102354352A (en) * 2011-09-23 2012-02-15 宇龙计算机通信科技(深圳)有限公司 Method for monitoring safety of application software and device therefor
CN102420902A (en) * 2011-11-24 2012-04-18 中兴通讯股份有限公司 Method for classification management over right of using functions and mobile terminal
CN102521549A (en) * 2011-11-28 2012-06-27 宇龙计算机通信科技(深圳)有限公司 Security pre-judgment device and method for application program
CN102810143A (en) * 2012-04-28 2012-12-05 天津大学 Safety detecting system and method based on mobile phone application program of Android platform
CN103546436A (en) * 2012-07-13 2014-01-29 中兴通讯股份有限公司 Security control method, terminal, and cloud server

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080288784A1 (en) * 2007-05-17 2008-11-20 Samsung Electronics Co., Ltd. Method of installing software for using digital content and apparatus for playing digital content
CN101984691A (en) * 2010-10-25 2011-03-09 东莞宇龙通信科技有限公司 Upgrading method of system built-in software and mobile terminal
CN102354352A (en) * 2011-09-23 2012-02-15 宇龙计算机通信科技(深圳)有限公司 Method for monitoring safety of application software and device therefor
CN102420902A (en) * 2011-11-24 2012-04-18 中兴通讯股份有限公司 Method for classification management over right of using functions and mobile terminal
CN102521549A (en) * 2011-11-28 2012-06-27 宇龙计算机通信科技(深圳)有限公司 Security pre-judgment device and method for application program
CN102810143A (en) * 2012-04-28 2012-12-05 天津大学 Safety detecting system and method based on mobile phone application program of Android platform
CN103546436A (en) * 2012-07-13 2014-01-29 中兴通讯股份有限公司 Security control method, terminal, and cloud server

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106055973A (en) * 2016-05-30 2016-10-26 深圳市永兴元科技有限公司 Application permission management method and application apparatus
CN107526969A (en) * 2016-06-20 2017-12-29 中国科学院微电子研究所 A kind of method and device for determining IP kernel level of security
CN109272335A (en) * 2018-09-17 2019-01-25 深圳市元征科技股份有限公司 A kind of intelligence contract administration method, system, equipment and computer storage medium
CN109729089A (en) * 2019-01-02 2019-05-07 中国电子科技网络信息安全有限公司 A kind of intelligent network security function management method and system based on container
CN109729089B (en) * 2019-01-02 2021-04-27 中国电子科技网络信息安全有限公司 Container-based intelligent network security function management method and system
WO2022062924A1 (en) * 2020-09-23 2022-03-31 华为云计算技术有限公司 Vulnerability assessment method and apparatus, computation device and storage medium

Similar Documents

Publication Publication Date Title
CN104767876A (en) Safety software processing method and user terminal
EP2595423A1 (en) Application security evaluation system and method
CN105117544A (en) Android platform App risk assessment method based on mobile cloud computing and Android platform App risk assessment device based on mobile cloud computing
CN103761472A (en) Application program accessing method and device based on intelligent terminal
CN104346566A (en) Method, device, terminal, server and system for detecting privacy authority risks
CN102340398A (en) Security policy setting and determining method, and method and device for executing operation by application program
CN106034054B (en) Redundant access controls list acl rule file test method and device
CN104199703A (en) Unattended setup management method and device
CN104036194B (en) Vulnerability detection method and device for revealing private data in application program
CN110806978A (en) Defect management method and device for third-party component
CN110222535B (en) Processing device, method and storage medium for block chain configuration file
CN108667802B (en) Method and system for monitoring power application network security
CN103065083A (en) Method and system for monitoring application program interface of intelligent mobile terminal
CN111783082A (en) Process tracing method, device, terminal and computer readable storage medium
CN102158369B (en) Method and device for checking patch
CN111131474A (en) Method, device and medium for managing user protocol based on block chain
CN116108435A (en) On-demand opening method and device for safety cut surface of mobile terminal
CN113609478B (en) IOS platform application program tampering detection method and device
CN115757318A (en) Log query method and device, storage medium and electronic equipment
CN106485104B (en) Automatic restoration method, device and system for terminal security policy
CN114386047A (en) Application vulnerability detection method and device, electronic equipment and storage medium
CN115455414A (en) Safety detection method and device
Kim et al. Detecting illegally-copied apps on android devices
CN113449308A (en) Vulnerability processing method and device, computer equipment and readable storage medium
CN110866225A (en) Risk control method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20150708