CN104767876A - Safety software processing method and user terminal - Google Patents
Safety software processing method and user terminal Download PDFInfo
- Publication number
- CN104767876A CN104767876A CN201510093822.3A CN201510093822A CN104767876A CN 104767876 A CN104767876 A CN 104767876A CN 201510093822 A CN201510093822 A CN 201510093822A CN 104767876 A CN104767876 A CN 104767876A
- Authority
- CN
- China
- Prior art keywords
- software
- downloaded
- security
- information
- party
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The invention provides a safety software processing method and a user terminal. The software processing method comprises the steps that the software to be downloaded is obtained, and source information and safety information which correspond to the software to be downloaded are obtained; the corresponding safety level of the software to be downloaded is determined according to the source information and the safety information which correspond to the software to be downloaded; the software to be downloaded is processed in the monitoring way and the resource scheduling mode which correspond to the safety level. According to the software processing method and the user terminal, the safety of software in the user terminal is graded by the user terminal, the monitoring strength and management resources which correspond to the safety levels are provided according to the different safety levels, in this way, monitoring and resource scheduling can be conducted on different software flexibly, and the operating efficiency of the software with the high safety level can be effectively improved; meanwhile, the monitoring strength of the software with the low safety level is improved, and the software which is potentially dangerous can be effectively recognized.
Description
Technical field
The present invention relates to the communication technology, particularly relate to a kind of security processing based on software and user terminal.
Background technology
Along with developing rapidly of the communication technology and computer technology, the quantity that user runs various software is on the subscriber terminal also more and more diversified.But, at present, some software in user terminal may be embedded into some malicious codes, thus become attack software, and then the system of user terminal is caused to the leakage encroaching on or cause user profile, such as: at present, the cell phone software that user uses is mainly derived from different software stores, a lot of regular software can be implanted one or more snippets malicious code by the lawless person had ulterior motives, be also placed on software store and sell.These so-called regular softwares continue to be placed on software store because of the not strict of software store inspection lures cellphone subscriber to download, and is installed on user mobile phone according to regular software.Thereupon, these softwares are also equally authorized the ability of related resource on corresponding calling party mobile phone according to regular software accordingly.Therefore, these malicious codes also utilize these authorities to conduct interviews to relevant resource with regard to having an opportunity.
In order to solve the problems of the technologies described above, in prior art, the method that software carries out safety management is mainly: adopt unified security monitoring and prevention policies, all softwares on user terminal are managed, to identify which software is for attacking software.
But, along with the continuous increase of software type and quantity, adopt unified security monitoring and prevention policies, not only can cause the waste of resource, the problem that some also can be caused to have potential hazard software accurately cannot be identified by user terminal.
Summary of the invention
The invention provides a kind of security processing based on software and user terminal, unified security monitoring and prevention policies is adopted in order to solve in prior art, cause the waste of resource, and the problem causing some to have potential hazard software accurately cannot being identified by user terminal.
First aspect of the present invention is to provide a kind of security processing based on software, comprising:
Obtain software to be downloaded, and obtain the source-information corresponding with described software to be downloaded and security information;
The source-information corresponding according to described software to be downloaded and security information, determine the level of security that described software to be downloaded is corresponding;
The monitor mode corresponding with described level of security is adopted to process described software to be downloaded, and the resource in the scheduling of resource mode dispatching user terminal making the employing of described software to be downloaded corresponding with described level of security.
Another aspect of the present invention is to provide a kind of user terminal, comprising:
Acquisition module, for obtaining software to be downloaded, and obtains the source-information corresponding with described software to be downloaded and security information;
Determination module: for according to source-information corresponding to described software to be downloaded and security information, determine the level of security that described software to be downloaded is corresponding;
Processing module, for adopting the monitor mode corresponding with described level of security to process described software to be downloaded, and the resource in the scheduling of resource mode dispatching user terminal making the employing of described software to be downloaded corresponding with described level of security.
Security processing based on software provided by the invention and user terminal, by obtaining software to be downloaded, and obtain the source-information corresponding with software to be downloaded and security information; Then according to source-information corresponding to software to be downloaded and security information, the level of security that software to be downloaded is corresponding is determined; Adopt the monitor mode corresponding with level of security and scheduling of resource pattern, software to be downloaded is processed.Achieve user terminal carries out level of security division to the software in user terminal, there is provided should the control and monitoring of level of security and management resource according to different level of securitys, thus different monitoring and scheduling of resource can be carried out for different software flexibly, thus effectively can improve the operational efficiency of the high software of level of security; Also increase the control and monitoring to the low software of level of security simultaneously, and effectively can recognize the software of potential hazard.
Accompanying drawing explanation
The flow chart of the security processing based on software that Fig. 1 provides for the embodiment of the present invention one;
The flow chart of the security processing based on software that Fig. 2 provides for the embodiment of the present invention two;
The structural representation of the user terminal that Fig. 3 provides for the embodiment of the present invention three;
The structural representation of the user terminal that Fig. 4 provides for the embodiment of the present invention four.
Embodiment
For making the object of the embodiment of the present invention, technical scheme and advantage clearly, below in conjunction with the accompanying drawing in the embodiment of the present invention, technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
The flow chart of the security processing based on software that Fig. 1 provides for the embodiment of the present invention one, as shown in Figure 1, the method for the present embodiment comprises:
Step 101, obtain software to be downloaded, and obtain the source-information corresponding with described software to be downloaded and security information.
In the present embodiment, for example, software to be downloaded can be obtained from the server in different software stores; In addition, the source-information that this software to be downloaded is corresponding can be specially the mark of the software mall server that it is downloaded.The security information that this software to be downloaded is corresponding can be specially the evaluation of himself fail safe.Alternatively, this security information comprises the safety evaluation information of user security evaluation information and/or third party software evaluation and test mechanism.
Step 102, according to source-information corresponding to described software to be downloaded and security information, determine the level of security that described software to be downloaded is corresponding.
In the present embodiment, according to the source-information that software to be downloaded is corresponding, evaluate in list at the software source prestored, search the software source evaluation information that this source-information is corresponding; Meanwhile, when obtaining software to be downloaded in the server from different software stores, carry user security evaluation information in software to be downloaded, user security evaluation information represents the evaluation of user to the fail safe of this software to be downloaded; And the safety evaluation information of third party software evaluation and test mechanism is that third party software evaluation and test mechanism is to the evaluation of the fail safe of this software to be downloaded.
For example, time security information includes the safety evaluation information of user security evaluation information and third party software evaluation and test mechanism, user terminal is according to software source evaluation information, the safety evaluation information of user security evaluation information and third party software evaluation and test mechanism, software is carried out to the division of level of security, wherein, the ratio that software source evaluation information accounts for when dividing level of security is 50%, the ratio that user security evaluation information accounts for when dividing level of security is 30%, the ratio that the safety evaluation information of third party software evaluation and test mechanism accounts for when dividing level of security is 20%.Utilize three kinds of different evaluation informations can reflect the fail safe of software more accurately, the level of security of software to be downloaded can be determined more accurately.Time security information includes user security evaluation information, user terminal carries out the division of level of security according to software source evaluation information and user security evaluation information to software, wherein, the ratio that software source evaluation information accounts for when dividing level of security is 60%, and the ratio that user security evaluation information accounts for when dividing level of security is 40%.Time security information includes the safety evaluation information of third party software evaluation and test mechanism, the safety evaluation information of user terminal foundation software source evaluation information and third party software evaluation and test mechanism carries out the division of level of security to software, wherein, the ratio that software source evaluation information accounts for when dividing level of security is 60%, and the ratio that the safety evaluation information of third party software evaluation and test mechanism accounts for when dividing level of security is 40%.
For example, level of security can comprise system-level, safe level, general level and limiter stage.Wherein, rank successively from high in the end.
Step 103, the employing monitor mode corresponding with described level of security process described software to be downloaded, and the resource in the scheduling of resource mode dispatching user terminal making the employing of described software to be downloaded corresponding with described level of security.
In the present embodiment, concrete, according to the level of security of software to be downloaded, the software of user terminal to different stage adopts different monitor modes, and the software of different stage has the scheduling of resource pattern of different invoke user terminal resources.
If determine in step 102, the level of security of software to be downloaded is first level, and first level can be specifically system-level, then user terminal can not carry out any monitoring to any behavior of this software; And, this software can call or read all resources on user terminal, access and revise system-level file, application program class file and the nonsystematic file in user terminal, such as, this software can delete the old software, the setting can revising client terminal system, the All Files obtained on user terminal etc. that the system Central Plains on user terminal carries.If determine in step 102, the level of security of software to be downloaded is second level, second level can be specifically safe level, then user terminal is the monitoring of the behavior that this software set is exceeded one's powers, the behavior of exceeding one's powers comprises Operation system setting and system class file, the undelegated file of amendment system, the amendment application program class file etc. of this software modification user terminal, user terminal only monitors the operation of exceeding one's powers of this software, and when above behavior occurs software time, user terminal will stop the behavior of software; The above operation of exceeding one's powers of removing, this software can all the other resources arbitrarily in invoke user terminal, the resource that this software can call comprises the user terminals resources beyond the Operation system setting, the undelegated file of access system etc. of removing amendment user terminal, such as, access application class file, access the file of having authorized, the address list of accessing in the user terminal of having authorized.If determine in step 102, the level of security of software to be downloaded is third level, third level can be specifically general level, then user terminal is the monitoring of the responsive behavior of this software set, these responsive behaviors comprise Operation system setting, access or the undelegated file of amendment system, the access of access or amendment user terminal or revise the behavior such as system-level file and application program class file, the geographical position obtaining user terminal, the address list obtained in user terminal, and more than software generation, when responsive behavior, user terminal will stop and limit the behavior of this software; Further, remove the responsive behavior of this software, this software can other resources arbitrarily in calling and obtaining user terminal, such as transfer authorized document, acquisition unencrypted picture etc.If determine in step 102, the level of security of software to be downloaded is fourth level, and fourth level can be specifically limiter stage, and user terminal needs all behaviors monitoring this software; Further, user terminal is this software set scheduling of resource authority, and this software can only nonsystematic level file in calling party terminal and nonusable routine class file, and this software can not carry out any amendment to nonsystematic level file and nonusable routine class file.
In the present embodiment, by according to source-information corresponding to software to be downloaded and security information, after removing the level of security determining that software to be downloaded is corresponding, adopt the monitor mode corresponding with level of security and scheduling of resource pattern, software to be downloaded is processed.Achieve user terminal carries out level of security division to the software in user terminal, there is provided should the control and monitoring of level of security and management resource according to different level of securitys, thus different monitoring and scheduling of resource can be carried out for different software flexibly, thus effectively can improve the operational efficiency of the high software of level of security; Also increase the control and monitoring to the low software of level of security simultaneously, and effectively can recognize the software of potential hazard.
The flow chart of the security processing based on software that Fig. 2 provides for the embodiment of the present invention two, as shown in Figure 2, when security information is the safety evaluation information of third party software evaluation and test mechanism, the method for the present embodiment comprises:
Step 201, obtain software to be downloaded, and obtain the source-information corresponding with described software to be downloaded.
In the present embodiment, for example, software to be downloaded can be obtained from the server in different software stores; In addition, the source-information that this software to be downloaded is corresponding can be specially the mark of the software mall server that it is downloaded.
Step 202, obtain described software to be downloaded software development mark, and sending to third party's stand alone software to evaluate and test the server of mechanism the safety information acquisition request carrying described software development mark, the server for described third party's stand alone software evaluation and test mechanism obtains and identifies with described software development the safety evaluation information that corresponding described third party software evaluates and tests mechanism.
In the present embodiment, because each software in the server in software store has respective software development mark, software development mark comprises the information such as the title of software supplier, the title of software and software version, thus can obtain its software development mark from the software to be downloaded got, third party's stand alone software is sent to evaluate and test the server of mechanism the safety information acquisition request carrying software development mark, server due to third party's stand alone software evaluation and test mechanism has established a third party in advance and has evaluated and tested database, third party evaluates and tests in database and stores third party's stand alone software evaluation and test mechanism to the safety evaluation information of various software, the server of third party's stand alone software evaluation and test mechanism is by the software development mark in the safety information acquisition request that receives, can evaluate and test in database to find third party and identify corresponding third party software with this software development and evaluate and test the safety evaluation information of mechanism to software to be downloaded, simultaneously, third party evaluates and tests database and regularly upgrades, afterwards, third party software is evaluated and tested the safety evaluation information of mechanism to software to be downloaded and is sent to user terminal by third party's stand alone software evaluation and test mechanism again.
The safety evaluation information of the described third party software evaluation and test mechanism that step 203, the server receiving described third party's stand alone software evaluation and test mechanism send.
Step 204, safety evaluation information according to source-information corresponding to described software to be downloaded and described third party software evaluation and test mechanism, determine the level of security that described software to be downloaded is corresponding.
In the present embodiment, the safety evaluation information of mechanism is evaluated and tested according to software source evaluation information corresponding to the source-information corresponding with software to be downloaded, third party software, to software demarcation level of security.For example, level of security is divided into system-level, safe level, general level and limiter stage from high to low.
Step 205, the employing monitor mode corresponding with described level of security and scheduling of resource pattern, process described software to be downloaded.
In the present embodiment, by sending to third party's stand alone software to evaluate and test the server of mechanism the safety information acquisition request carrying software development mark, server for third party's stand alone software evaluation and test mechanism obtains and identifies with software development the safety evaluation information that corresponding third party software evaluates and tests mechanism, thus user terminal can get the safety evaluation information of the third party software evaluation and test mechanism of the server coming from third party's stand alone software evaluation and test mechanism, get the information of more reflection software security height, be beneficial to software demarcation level of security.
The structural representation of the user terminal that Fig. 3 provides for the embodiment of the present invention three, as shown in Figure 3, the user terminal of the present embodiment comprises: acquisition module 11, determination module 12 and processing module 13; Wherein, acquisition module 11 for obtaining software to be downloaded, and obtains the source-information corresponding with described software to be downloaded and security information; Determination module 12, for according to source-information corresponding to described software to be downloaded and security information, determines the level of security that described software to be downloaded is corresponding; Processing module 13 processes described software to be downloaded for adopting the monitor mode corresponding with described level of security, and the resource in the scheduling of resource mode dispatching user terminal making the employing of described software to be downloaded corresponding with described level of security.
The security processing based on software that the known execution embodiment of the present invention one of user terminal of the present embodiment provides, it is similar that it realizes principle, repeats no more herein.
In the present embodiment, by according to source-information corresponding to software to be downloaded and security information, after removing the level of security determining that software to be downloaded is corresponding, adopt the monitor mode corresponding with level of security and scheduling of resource pattern, software to be downloaded is processed.Achieve user terminal carries out level of security division to the software in user terminal, there is provided should the control and monitoring of level of security and management resource according to different level of securitys, thus different monitoring and scheduling of resource can be carried out for different software flexibly, thus effectively can improve the operational efficiency of the high software of level of security; Also increase the control and monitoring to the low software of level of security simultaneously, and effectively can recognize the software of potential hazard.
The structural representation of the user terminal that Fig. 4 provides for the embodiment of the present invention four, on above-mentioned basis embodiment illustrated in fig. 3, as shown in Figure 4, this acquisition module 11 also comprises: acquiring unit 111 and Transmit-Receive Unit 112; Wherein, acquiring unit 111 is for obtaining the source-information corresponding with described software to be downloaded; Described acquiring unit 111 is also for obtaining the software development mark of described software to be downloaded; Transmit-Receive Unit 112 is for sending to third party's stand alone software to evaluate and test the server of mechanism the safety information acquisition request carrying described software development mark, and the server for described third party's stand alone software evaluation and test mechanism obtains and identifies with described software development the safety evaluation information that corresponding described third party software evaluates and tests mechanism; The described third party software that described Transmit-Receive Unit 112 also sends for the server receiving described third party's stand alone software evaluation and test mechanism evaluates and tests the safety evaluation information of mechanism.
The security processing based on software that the known execution embodiment of the present invention two of user terminal of the present embodiment provides, it is similar that it realizes principle, repeats no more herein.
In the present embodiment, by sending to third party's stand alone software to evaluate and test the server of mechanism the safety information acquisition request carrying software development mark, server for third party's stand alone software evaluation and test mechanism obtains and identifies with software development the safety evaluation information that corresponding third party software evaluates and tests mechanism, thus user terminal can get the safety evaluation information of the third party software evaluation and test mechanism of the server coming from third party's stand alone software evaluation and test mechanism, get the information of more reflection software security height, be beneficial to software demarcation level of security.
One of ordinary skill in the art will appreciate that: all or part of step realizing above-mentioned each embodiment of the method can have been come by the hardware that program command is relevant.Aforesaid program can be stored in a computer read/write memory medium.This program, when performing, performs the step comprising above-mentioned each embodiment of the method; And aforesaid storage medium comprises: ROM, RAM, magnetic disc or CD etc. various can be program code stored medium.
Last it is noted that above embodiment is only in order to illustrate technical scheme of the present invention, be not intended to limit; Although with reference to previous embodiment to invention has been detailed description, those of ordinary skill in the art is to be understood that: it still can be modified to the technical scheme described in foregoing embodiments, or carries out equivalent replacement to wherein portion of techniques feature; And these amendments or replacement, do not make the essence of appropriate technical solution depart from the spirit and scope of various embodiments of the present invention technical scheme.
Claims (5)
1. based on a security processing for software, it is characterized in that, comprising:
Obtain software to be downloaded, and obtain the source-information corresponding with described software to be downloaded and security information;
The source-information corresponding according to described software to be downloaded and security information, determine the level of security that described software to be downloaded is corresponding;
The monitor mode corresponding with described level of security is adopted to process described software to be downloaded, and the resource in the scheduling of resource mode dispatching user terminal making the employing of described software to be downloaded corresponding with described level of security.
2. method according to claim 1, is characterized in that, described security information comprises the safety evaluation information of user security evaluation information and/or third party software evaluation and test mechanism.
3. method according to claim 2, is characterized in that, when described security information comprises the safety evaluation information of described third party software evaluation and test mechanism, obtains the security information corresponding with described software to be downloaded, specifically comprises:
Obtain the software development mark of described software to be downloaded, and sending to third party's stand alone software to evaluate and test the server of mechanism the safety information acquisition request carrying described software development mark, the server for described third party's stand alone software evaluation and test mechanism obtains and identifies with described software development the safety evaluation information that corresponding described third party software evaluates and tests mechanism;
The safety evaluation information of the described third party software evaluation and test mechanism that the server receiving described third party's stand alone software evaluation and test mechanism sends.
4. a user terminal, is characterized in that, comprising:
Acquisition module, for obtaining software to be downloaded, and obtains the source-information corresponding with described software to be downloaded and security information;
Determination module, for according to source-information corresponding to described software to be downloaded and security information, determines the level of security that described software to be downloaded is corresponding;
Processing module, for adopting the monitor mode corresponding with described level of security to process described software to be downloaded, and the resource in the scheduling of resource mode dispatching user terminal making the employing of described software to be downloaded corresponding with described level of security.
5. user terminal according to claim 4, is characterized in that, when described security information comprises the safety evaluation information of described third party software evaluation and test mechanism, described acquisition module comprises:
Acquiring unit, for obtaining the source-information corresponding with described software to be downloaded;
Described acquiring unit, also for obtaining the software development mark of described software to be downloaded;
Transmit-Receive Unit, for sending to third party's stand alone software to evaluate and test the server of mechanism the safety information acquisition request carrying described software development mark, the server for described third party's stand alone software evaluation and test mechanism obtains and identifies with described software development the safety evaluation information that corresponding described third party software evaluates and tests mechanism;
Described Transmit-Receive Unit, the described third party software also sent for the server receiving described third party's stand alone software evaluation and test mechanism evaluates and tests the safety evaluation information of mechanism.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510093822.3A CN104767876A (en) | 2015-03-03 | 2015-03-03 | Safety software processing method and user terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510093822.3A CN104767876A (en) | 2015-03-03 | 2015-03-03 | Safety software processing method and user terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104767876A true CN104767876A (en) | 2015-07-08 |
Family
ID=53649461
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510093822.3A Pending CN104767876A (en) | 2015-03-03 | 2015-03-03 | Safety software processing method and user terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104767876A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106055973A (en) * | 2016-05-30 | 2016-10-26 | 深圳市永兴元科技有限公司 | Application permission management method and application apparatus |
CN107526969A (en) * | 2016-06-20 | 2017-12-29 | 中国科学院微电子研究所 | A kind of method and device for determining IP kernel level of security |
CN109272335A (en) * | 2018-09-17 | 2019-01-25 | 深圳市元征科技股份有限公司 | A kind of intelligence contract administration method, system, equipment and computer storage medium |
CN109729089A (en) * | 2019-01-02 | 2019-05-07 | 中国电子科技网络信息安全有限公司 | A kind of intelligent network security function management method and system based on container |
WO2022062924A1 (en) * | 2020-09-23 | 2022-03-31 | 华为云计算技术有限公司 | Vulnerability assessment method and apparatus, computation device and storage medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080288784A1 (en) * | 2007-05-17 | 2008-11-20 | Samsung Electronics Co., Ltd. | Method of installing software for using digital content and apparatus for playing digital content |
CN101984691A (en) * | 2010-10-25 | 2011-03-09 | 东莞宇龙通信科技有限公司 | Upgrading method of system built-in software and mobile terminal |
CN102354352A (en) * | 2011-09-23 | 2012-02-15 | 宇龙计算机通信科技(深圳)有限公司 | Method for monitoring safety of application software and device therefor |
CN102420902A (en) * | 2011-11-24 | 2012-04-18 | 中兴通讯股份有限公司 | Method for classification management over right of using functions and mobile terminal |
CN102521549A (en) * | 2011-11-28 | 2012-06-27 | 宇龙计算机通信科技(深圳)有限公司 | Security pre-judgment device and method for application program |
CN102810143A (en) * | 2012-04-28 | 2012-12-05 | 天津大学 | Safety detecting system and method based on mobile phone application program of Android platform |
CN103546436A (en) * | 2012-07-13 | 2014-01-29 | 中兴通讯股份有限公司 | Security control method, terminal, and cloud server |
-
2015
- 2015-03-03 CN CN201510093822.3A patent/CN104767876A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080288784A1 (en) * | 2007-05-17 | 2008-11-20 | Samsung Electronics Co., Ltd. | Method of installing software for using digital content and apparatus for playing digital content |
CN101984691A (en) * | 2010-10-25 | 2011-03-09 | 东莞宇龙通信科技有限公司 | Upgrading method of system built-in software and mobile terminal |
CN102354352A (en) * | 2011-09-23 | 2012-02-15 | 宇龙计算机通信科技(深圳)有限公司 | Method for monitoring safety of application software and device therefor |
CN102420902A (en) * | 2011-11-24 | 2012-04-18 | 中兴通讯股份有限公司 | Method for classification management over right of using functions and mobile terminal |
CN102521549A (en) * | 2011-11-28 | 2012-06-27 | 宇龙计算机通信科技(深圳)有限公司 | Security pre-judgment device and method for application program |
CN102810143A (en) * | 2012-04-28 | 2012-12-05 | 天津大学 | Safety detecting system and method based on mobile phone application program of Android platform |
CN103546436A (en) * | 2012-07-13 | 2014-01-29 | 中兴通讯股份有限公司 | Security control method, terminal, and cloud server |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106055973A (en) * | 2016-05-30 | 2016-10-26 | 深圳市永兴元科技有限公司 | Application permission management method and application apparatus |
CN107526969A (en) * | 2016-06-20 | 2017-12-29 | 中国科学院微电子研究所 | A kind of method and device for determining IP kernel level of security |
CN109272335A (en) * | 2018-09-17 | 2019-01-25 | 深圳市元征科技股份有限公司 | A kind of intelligence contract administration method, system, equipment and computer storage medium |
CN109729089A (en) * | 2019-01-02 | 2019-05-07 | 中国电子科技网络信息安全有限公司 | A kind of intelligent network security function management method and system based on container |
CN109729089B (en) * | 2019-01-02 | 2021-04-27 | 中国电子科技网络信息安全有限公司 | Container-based intelligent network security function management method and system |
WO2022062924A1 (en) * | 2020-09-23 | 2022-03-31 | 华为云计算技术有限公司 | Vulnerability assessment method and apparatus, computation device and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104767876A (en) | Safety software processing method and user terminal | |
EP2595423A1 (en) | Application security evaluation system and method | |
CN105117544A (en) | Android platform App risk assessment method based on mobile cloud computing and Android platform App risk assessment device based on mobile cloud computing | |
CN103761472A (en) | Application program accessing method and device based on intelligent terminal | |
CN104346566A (en) | Method, device, terminal, server and system for detecting privacy authority risks | |
CN102340398A (en) | Security policy setting and determining method, and method and device for executing operation by application program | |
CN106034054B (en) | Redundant access controls list acl rule file test method and device | |
CN104199703A (en) | Unattended setup management method and device | |
CN104036194B (en) | Vulnerability detection method and device for revealing private data in application program | |
CN110806978A (en) | Defect management method and device for third-party component | |
CN110222535B (en) | Processing device, method and storage medium for block chain configuration file | |
CN108667802B (en) | Method and system for monitoring power application network security | |
CN103065083A (en) | Method and system for monitoring application program interface of intelligent mobile terminal | |
CN111783082A (en) | Process tracing method, device, terminal and computer readable storage medium | |
CN102158369B (en) | Method and device for checking patch | |
CN111131474A (en) | Method, device and medium for managing user protocol based on block chain | |
CN116108435A (en) | On-demand opening method and device for safety cut surface of mobile terminal | |
CN113609478B (en) | IOS platform application program tampering detection method and device | |
CN115757318A (en) | Log query method and device, storage medium and electronic equipment | |
CN106485104B (en) | Automatic restoration method, device and system for terminal security policy | |
CN114386047A (en) | Application vulnerability detection method and device, electronic equipment and storage medium | |
CN115455414A (en) | Safety detection method and device | |
Kim et al. | Detecting illegally-copied apps on android devices | |
CN113449308A (en) | Vulnerability processing method and device, computer equipment and readable storage medium | |
CN110866225A (en) | Risk control method and device, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
EXSB | Decision made by sipo to initiate substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20150708 |