WO2020000753A1 - 一种设备安全监控方法和装置 - Google Patents

一种设备安全监控方法和装置 Download PDF

Info

Publication number
WO2020000753A1
WO2020000753A1 PCT/CN2018/108887 CN2018108887W WO2020000753A1 WO 2020000753 A1 WO2020000753 A1 WO 2020000753A1 CN 2018108887 W CN2018108887 W CN 2018108887W WO 2020000753 A1 WO2020000753 A1 WO 2020000753A1
Authority
WO
WIPO (PCT)
Prior art keywords
device identification
security
identification code
server
security alarm
Prior art date
Application number
PCT/CN2018/108887
Other languages
English (en)
French (fr)
Inventor
姜若芾
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Publication of WO2020000753A1 publication Critical patent/WO2020000753A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications

Definitions

  • the present application relates to the field of network security, and in particular, to a method and device for device security monitoring.
  • the equipment's device identification code is a very important identification parameter.
  • device identification codes such as TalkingData, Friends of Union, Tongtong, etc.
  • the existing generation methods can easily be reversed, cracked, tampered with or deleted. If the device identification code is deleted or tampered with, it will lose its role of identifying the device, and it will not be able to effectively identify the identity of the user. If the deletion or tampering operation is not detected, it may cause greater economic losses.
  • the embodiments of the present application provide a device security monitoring method and device, which can improve the efficiency of device security monitoring through multiple storages of the device identification code, and simultaneously issue a security alarm to the server when the device identification code is abnormal, thereby improving transaction security.
  • a first aspect of the embodiments of the present application provides a device security monitoring method.
  • the device security monitoring method includes:
  • the device identification code in the local file of the application APP and the device identification code in the keychain Keychain are obtained.
  • the device identification code is obtained by the APP on the client device and stored separately. In APP local files and Keychain;
  • a second aspect of the embodiments of the present application provides a security monitoring device, where the security monitoring device includes:
  • An obtaining unit configured to obtain the device identification code in the local file of the application APP and the device identification code in the keychain Keychain when the user's first-type operation application is received; the device identification code is provided by the APP on the client device; Obtained and stored in the APP local file and Keychain respectively;
  • a determining unit configured to determine that the electronic device is safe if two equal device identification codes are obtained
  • An alarm unit configured to issue a security alarm to the server if two equal device identification codes are not obtained, and perform security processing on the device identification codes
  • the monitoring unit is configured to receive a monitoring instruction issued by the server for the security alarm, and obtain a security monitoring result, where the security monitoring result includes determining that the electronic device is safe or has a risk.
  • a third aspect of the embodiments of the present application provides an electronic device including a processor, a memory, a communication interface, and one or more programs.
  • the one or more programs are stored in the memory and configured by The processor executes, and the program includes instructions for performing steps in any method of the first aspect.
  • a fourth aspect of the embodiments of the present application provides a computer-readable storage medium storing a computer program for electronic data exchange, wherein the computer program causes a computer to execute instructions of the steps described in any of the methods of the first aspect.
  • the security of the device is determined by the acquisition of the device identification code. This process makes the security monitoring of the device more targeted and differentiated, improves the accuracy and efficiency of security monitoring, and further improves the financial use of the device. Activity security.
  • FIG. 1 is a schematic flowchart of a device security monitoring method according to an embodiment of the present application
  • FIG. 2 is a schematic flowchart of a method for generating and processing a security alarm according to an embodiment of the present application
  • FIG. 3 is a schematic flowchart of a device identification code processing method according to an embodiment of the present application.
  • FIG. 4 is a schematic diagram of an interactive process of security monitoring provided by an embodiment of the present application.
  • FIG. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
  • FIG. 6 is a structural block diagram of a security monitoring device according to an embodiment of the present application.
  • the detection method includes determining whether the user's account information and the electronic device binding relationship are unique to avoid unsafe behaviors in which the same device corresponds to multiple accounts or the same account logs in to multiple devices. Then the third-party platform generates a device identification code according to the user's login account, and then uses the device identification code to uniquely identify the device. If the device identification code is detected to be tampered or cleared, it indicates that the account is at risk, otherwise, the description The account is secure.
  • FIG. 1 is a schematic flowchart of a device security monitoring method according to an embodiment of the present application. As shown in FIG. 1, the device security monitoring method includes:
  • APP Application
  • APP refers to a third-party application installed on an electronic device. It can be classified into shopping apps, map apps, game apps, learning apps, and social apps according to their application scope. Different platforms can be divided into iOS system apps, Android system apps, and Microsoft system apps. After the APP is installed on the electronic device, a corresponding text file directory is generated for storing the running files and download files of the APP therein.
  • Keychain is a password management system on Apple products. A keychain can contain multiple types of data: passwords (including websites, FTP servers, SSH accounts, network shares, wireless networks, group software, Encrypted disk image, etc.), private key, e-certificate and encrypted notes.
  • a trading platform when a user operates on a trading platform, a commonly used method for ensuring user identity security is the unique correspondence between a user's login account and an electronic device, and the electronic device can be identified by a device identification code.
  • the trading platform is in the form of an application APP here.
  • the first type of user's application includes user-initiated applications such as payment applications or loan applications, which are related to capital transactions. Such applications are relatively risky for the trading platform, so the user's device security needs to be implemented. Detection and determination.
  • device identifiers that can be used to identify devices include International Mobile Equipment Identifier (IMEI), Device Unique Device Identifier (UDID), Mobile Phone Physical Address (MAC Address), Universal Unique Identifier (UUID), Advertising Identifier Character (IDFA), etc.
  • IMEI International Mobile Equipment Identifier
  • UDID Device Unique Device Identifier
  • MAC Address Mobile Phone Physical Address
  • UUID Universal Unique Identifier
  • IDFA Advertising Identifier Character
  • a UUID method can be generated on the client to obtain the device identification code.
  • UUID is a 32-bit hexadecimal sequence, which is unique in a certain time and space. For example, in the current second, UUIDs generated worldwide are different.
  • the UUID version includes: time-based, distributed computing environment (DCE) security, name-based, random generation, etc.
  • the standard UUID type contains 32 hexadecimal digits, which are divided into five segments by hyphens. 32 characters for 8-4-4-4-12. For example: 550e8400-e29b-41d4-a716-446655440000, which is a UUID. After generating a UUID and saving it in the APP local file, under normal circumstances, as long as the APP has not been uninstalled, the UUID corresponding to the device is a constant value.
  • a method for generating a UUID is: randomly generating 32-bit characters as the UUID.
  • a 32-bit string is randomly generated as the UUID of the device.
  • the device identification code has been stored in the APP local file and Keychain respectively in S101. If the electronic device is operating normally, the APP local file data has not been cleared or tampered with, and the data in the Keychain has not been cleared or tampered with, then the customer The client successfully obtains the APP local file and the device identification code in the Keychain according to a preset time interval, and the two are equal, that is, the strings of the two are exactly the same.
  • the time for obtaining the device identification code may be obtained according to a preset time interval, such as 1s, 5s, 1min, 10min, 2h, 5h, etc .; or it may be obtained according to a preset period, such as 1 day, 2 days, or 5 days.
  • One week, one month, etc. are cycles; it can also be obtained according to trigger conditions, for example, when receiving user-initiated payment or loan applications and other financial transaction-related operations, determine whether the current transaction environment is obtained by obtaining a device identification code Safety.
  • the client did not obtain two equal device identification codes, including the following cases: only one device identification code was obtained, two unequal device identification codes were obtained, and no device identification code was obtained.
  • only one device identification code is obtained, it specifically includes: only the device identification code in the APP local file is obtained but not the device identification code in the Keychain; a security alarm is issued to the server, and the device is identified
  • the code performs security processing, including: initiating a first security alarm to the server; copying and storing the device identification code in the APP local file to the Keychain.
  • the device identification code in the local file of the APP is obtained but the device identification code in the Keychain is not obtained, since the important information such as the website login password, the encrypted private key, and the electronic certificate are stored in the Keychain, under normal circumstances . Including when the user uses the device, installs, updates, or uninstalls the APP, the data in the Keychain will be retained for a long time. Only when the electronic device is attacked or the system is reset, it is possible to make the data in the Keychain cleared, regardless of the electronic device. Being attacked or resetting the system are risky operations. Therefore, at this time, the first security alert is issued to the server, indicating that the electronic device may be attacked, and the current operation of the electronic device has certain risks.
  • the server needs to focus on checking or monitoring the electronic device corresponding to the UUID number to further identify the unsafe behavior of the device.
  • the UUID in the APP local file is copied and stored in the Keychain to back up the device identification code and maintain the uniqueness of the device UUID.
  • only one device identification code is obtained, it also specifically includes: only the device identification code in the Keychain is obtained but not the device identification code in the APP local file; a security alarm is issued to the server, and the device is identified Code security processing includes: initiating a second security alarm to the server, the security level of the second security alarm is lower than the first security alarm; copying and storing the device identification code in the Keychain to the APP local file.
  • the possible situations include the user cleaning the APP local file or the device being attacked, resulting in the UUID in the APP local file. It is cleared or the APP is uninstalled and reinstalled, resulting in no UUID in the APP local file. In this case, the device may be threatened by insecure information or the normal operation of the user. Therefore, at this time, a second security alarm is issued to the server, and the security level of the second security alarm is lower than the first security alarm. , Can be further processed according to subsequent detection. At the same time, the device identification code in the Keychain is copied and stored in the APP local file to maintain the invariance of the device identification code to uniquely identify the electronic device.
  • a security alarm is issued to the server, and the device identification codes are processed securely, including: identifying the devices in the Keychain.
  • the code is copied and stored in the APP local file, and a third security alarm is issued to the server.
  • the security level of the third security alarm is higher than the second security alarm and lower than the first security alarm.
  • the device identification code in the APP's local file and the device identification code in the Keychain are obtained at the same time, but the two are not the same, then one of them may be tampered with, or the device in the Keychain was not obtained when the APP was reinstalled.
  • the device identification code was regenerated by the identification code.
  • the former indicates that the electronic device has been threatened by security.
  • the latter indicates that the device is operating or set abnormally. Therefore, a third security alert is issued to the server. In this case, it is better than not obtaining the APP local file.
  • Device identification code is more likely to be subject to security threats, so the security level of the third security alarm is higher than that of the second security alarm.
  • the security level and security level of Keychain are higher than the local file of the APP, the device identification in Keychain was successfully obtained , Then the security level of the third security alarm is lower than the first security alarm.
  • the device identification code in Keychain is copied and stored in the APP local file, overwriting the original in the APP local file. Device identification number.
  • a security alarm is issued to the server, and the device identification code is processed securely, including: sending a fourth security alarm to the server, a fourth The security level of the security alarm is higher than the first security alarm; a new device identification code is generated, and the device identification code is stored in the APP local file and Keychain.
  • the device identification code is not obtained in the APP local file and the Keychain. Possible situations include the reset of the electronic device or the electronic device has been threatened by a security, and a fourth security alert is issued to the server.
  • the APP local file and the Keychain The device identification codes in the device are all cleared, so the security level of the fourth security alarm is higher than that of the first security alarm, which indicates that the security level is very high, and it is urgent to further verify the safety of the electronic device.
  • the client when it does not obtain two equal device identification codes, it will send a security alarm to the server. Then the server judges how to initiate a monitoring instruction to the client according to the current situation. Monitoring instructions, further security testing of electronic equipment, and finally determine whether the electronic equipment is safe.
  • receiving a monitoring instruction issued by the server for the security alarm to obtain the security monitoring result includes: receiving a first monitoring instruction issued by the server for the first security alarm, and acquiring, in accordance with the first monitoring instruction, a target for the first preset time period.
  • the operation record of the APP if the operation record is standardized, determine the safety of the electronic device, otherwise determine that the electronic device is the first risk level; receive the second monitoring instruction issued by the server for the second security alarm, and obtain the second monitoring instruction according to the second monitoring instruction. Set the operation record for Keychain within the time period.
  • the operation record is standardized, determine the electronic device is safe, otherwise determine that the electronic device is the second risk level; receive the third monitoring instruction issued by the server for the third security alarm, and according to the third monitoring instruction Check whether the APP has been installed within the third preset time period. If so, determine that the electronic device is safe, otherwise determine that the electronic device is at the third risk level; receive the fourth monitoring instruction issued by the server for the fourth security alarm, and Four monitoring instructions to check electronic equipment at the fourth preset time Whether carried out within a System Restore operation, and if so, to determine the safety of electronic equipment, electronic equipment for the fourth or determine the level of risk.
  • the first security alarm is aimed at obtaining only the device identification code in the APP local file and not the device identification code in the Keychain, then the server issues a first monitoring instruction, and the client obtains the first preset instruction according to the first monitoring instruction.
  • Keychain operation records during the time period including the keychain operation frequency, the number of operations, whether it is similar to historical operation records, and whether other Keychain data has also been cleared.
  • the first preset time period can be any time set by the server.
  • the second security alarm is aimed at only obtaining the device identification code in the Keychain and not the device identification code in the APP local file.
  • the server issues a second security monitoring instruction, and the client obtains the second preset value according to the second monitoring instruction.
  • the operation records of the APP during the time period, including the operation frequency of the APP, transaction history, transaction amount, whether to modify the binding number, the length of the page stay, etc.
  • the second preset time period can be any time set by the server. It can also be a time period determined by the server from the time when the second monitoring instruction was last issued to the current time, based on these data to determine whether the APP local file was maliciously deleted or the user's normal cleaning operation. If it is the latter, it determines The electronic device is safe; otherwise, the electronic device is determined as the second risk level.
  • the third security alarm is aimed at obtaining two unequal device identification codes, that is, the obtained device identification code in the APP local file is different from the device identification code in the Keychain because the data in the Keychain is highly confidential and relatively secure. Therefore, the device identification code in the APP's local file is further detected, and whether the APP is installed within a third preset period of time is checked according to the third monitoring instruction.
  • the third preset time may be the last time the server issued based on the record.
  • the time period from the time of the third monitoring instruction to the current time may also be the time period from the last time the electronic device was determined to be safe to the current time, or the time determined from the time when the APP was last installed to the current time segment.
  • the reason for obtaining two different device identification codes may be that when the APP was reinstalled, due to the setting reasons, the APP did not obtain the original device identification from the Keychain. Code, and the device identification code is regenerated. In this case, because there is no threat to APP's trading operations or financial activities, the device is judged to be safe, otherwise, the device is judged to be a third risk level.
  • the fourth security alarm is directed to a situation where the device identification code is not obtained.
  • the most likely situation corresponding to this situation is that the electronic device has performed a system restore operation or received a malicious attack. Therefore, the server monitors the fourth monitoring instruction issued by the fourth security alarm, and the APP checks whether the electronic device has performed a system restore operation within the fourth preset time period according to the fourth monitoring instruction on the client side, and if so, determines the electronic device It is safe, otherwise it is determined that the electronic device is a fourth risk level, wherein the fourth preset time period may be a time period arbitrarily set on the server side, or a time period determined according to the time when the electronic device is judged to be safe to the current time.
  • the electronic device is further monitored by acquiring the monitoring instruction issued by the server according to the security alarm, and finally the safety of the electronic device is judged, which can guide the APP's next actions, including continuing transaction activities and ending transactions Activities or to a certain extent reduce transaction limits.
  • the server when it receives a security alarm, it can also issue instructions to perform security detection on other data of the electronic device on the client, including whether the wifi connected to the electronic device is secure, whether the GPS address has a large span, and the buddy list changes. Whether it is greater than a preset percentage, whether it has been set as an unsecured user by another platform, and whether there is an association relationship with the unsecured user.
  • the safety of the electronic device to be verified can also be verified through other secure electronic devices bound to the electronic device to be authenticated.
  • verification information can be initiated to other secure electronic devices, including sending text messages. , Send voice, send test questions, etc., and then receive responses from other secure electronic devices to determine the safety of the electronic device to be verified. It can also initiate video verification or voice verification to other secure electronic devices, and verify the identity of the holder of the electronic device to be verified through real-time video or voice, so as to achieve the purpose of verifying the safety of the electronic device to be verified.
  • the device identification code is stored in the APP local file and the Keychain at the same time, and only when two identical device identification codes are obtained, the device is determined to be safe, which can help to monitor whether the device identification code has been tampered with or tampered with. Deletion makes security monitoring more targeted and differentiated, improves the accuracy and efficiency of security monitoring, and further enhances the security of financial activities through equipment.
  • FIG. 2 is a schematic flowchart of a method for generating and processing a security alarm according to an embodiment of the present application. As shown in the figure, the method for generating and processing a security alarm in this embodiment includes:
  • S208 Receive a third monitoring instruction issued by the server for the third security alarm, and check whether the APP has been installed within a third preset time period according to the third monitoring instruction. If yes, execute S210, otherwise execute S211. ;
  • FIG. 3 is a schematic flowchart of a device identification code processing method according to an embodiment of the present application.
  • the device identification code processing method in this embodiment includes:
  • the device identification code is not obtained, a new device identification code is generated, and the new device identification code is stored in the APP local file and the Keychain.
  • the device identification code in order to maintain the unique identification function of the device identification code for the electronic device, when two equal device identification codes are not obtained, the device identification code is correspondingly copied and stored, and the device identification code is backed up and retained. It uniquely identifies the role of the electronic device.
  • FIG. 4 a schematic diagram of an interaction process of security monitoring shown in FIG. 4 can be obtained.
  • the objects involved in the interaction process include a client, a server, and a database. among them:
  • the client is configured to obtain the device identification code in the local file of the application APP and the device identification code in the keychain Keychain when the user's first type of operation application is received.
  • the device identification code is provided by the APP in the
  • the client device obtains and stores them in the APP local file and Keychain respectively; if two equal device identification codes are obtained, the electronic device is determined to be safe; if the two equal device identification codes are not obtained, the device is requested
  • the server issues a security alarm and performs security processing on the device identification code; receives a monitoring instruction issued by the server for the security alarm, and obtains a security monitoring result, where the security monitoring result includes determining that the electronic device is safe or present risk;
  • the server is configured to receive the security alarm and issue a monitoring instruction according to the received security alarm.
  • FIG. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
  • the electronic device includes a processor, a memory, a communication interface, and one or more programs.
  • the one or more programs are Stored in the memory and configured to be executed by the processor, the program includes instructions for performing the following steps:
  • the device identification code in the local file of the application APP and the device identification code in the keychain Keychain are obtained.
  • the device identification code is obtained by the APP on the client device and stored separately. In APP local files and Keychain;
  • FIG. 6 is a block diagram of the functional units of the security monitoring device 600 according to the embodiment of the present application.
  • the security monitoring device 600 is applied to an electronic device, and the security monitoring device includes:
  • An obtaining unit 601 is configured to obtain a device identification code in a local file of an application APP and a device identification code in a keychain Keychain when a user's first-type operation application is received, where the device identification code is provided by the APP on a client Obtained by the device and stored in the APP local file and Keychain respectively;
  • a determining unit 602 configured to determine that the electronic device is safe if two equal device identification codes are obtained
  • An alarm unit 603 configured to issue a security alarm to the server if two equal device identification codes are not obtained, and perform security processing on the device identification codes;
  • the monitoring unit 604 is configured to receive a monitoring instruction issued by the server for the security alarm, and obtain a security monitoring result, where the security monitoring result includes determining that the electronic device is safe or exists a risk.
  • the failure to obtain two equal device identification codes includes obtaining the device identification code in the APP local file and not obtaining the device identification code in the Keychain;
  • the alarm unit 603 is specifically configured to: initiate a first security alarm to the server; and copy and store the device identification code in the APP local file to the Keychain.
  • An embodiment of the present application further provides a computer storage medium, wherein the computer storage medium stores a computer program for electronic data exchange, and the computer program causes a computer to perform part or all of the steps of any method described in the foregoing method embodiments
  • the computer includes a mobile terminal.
  • An embodiment of the present application further provides a computer program product.
  • the computer program product includes a non-transitory computer-readable storage medium storing a computer program, and the computer program is operable to cause a computer to execute any of the methods described in the foregoing method embodiments. Some or all steps of a method.
  • the computer program product may be a software installation package, and the computer includes a mobile terminal.
  • the program may be stored in a computer-readable memory, and the memory may include a flash disk , ROM, RAM, disk or disc, etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Alarm Systems (AREA)

Abstract

本申请实施例公开了一种设备安全监控方法和装置,设备安全监控方法包括:当接收到用户的第一类操作申请时,获取应用程序APP本地文件中的设备识别码和密钥链Keychain中的设备识别码,设备识别码由APP在客户端设备获取,并分别存储在APP本地文件和Keychain中;若获取到两个相等的设备识别码,则确定电子设备安全;若没有获取到两个相等的设备识别码,则向服务器发出安全报警,并对设备识别码进行安全处理;接收服务器针对安全报警发出的监控指令,获得安全监控结果,安全监控结果包括确定电子设备安全或存在风险。采用本申请,能够通过对设备识别码的多处存储提升设备安全监控效率,同时在设备识别码发生异常时向服务器发出安全报警,提升交易安全性。

Description

一种设备安全监控方法和装置
本申请要求于2018年6月30日提交中国专利局、申请号为2018107027408、申请名称为“一种设备安全监控方法和装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及网络安全领域,具体涉及一种设备安全监控方法和装置。
背景技术
在很多金融活动中,需要将用户设备和用户账号进行对应识别,以保证用户身份的真实可靠,进而保证金融活动的安全性,而设备的设备识别码是一个十分重要的识别参数。目前市面上有诸多可以生成设备识别码的产品,例如TalkingData、友盟、同盾等,但现有的生成方法很容易被逆向、破解、篡改或删除。如果设备识别码被删除或篡改,就失去了对设备的标识作用,也就无法对用户身份进行有效的对应识别。如果被删除或篡改的操作没有被发觉,则可能造成更大的经济损失。
发明内容
本申请实施例提供一种设备安全监控方法和装置,能够通过对设备识别码的多处存储提升设备安全监控效率,同时在设备识别码发生异常时向服务器发出安全报警,提升交易安全性。
本申请实施例的第一方面提供了一种设备安全监控方法,所述设备安全监控方法包括:
当接收到用户的第一类操作申请时,获取应用程序APP本地文件中的设备识别码和密钥链Keychain中的设备识别码,所述设备识别码由APP在客户端设备获取,并分别存储在APP本地文件和Keychain中;
若获取到两个相等的设备识别码,则确定所述电子设备安全;
若没有获取到两个相等的设备识别码,则向服务器发出安全报警,并对所述设备识别码进行安全处理;
接收所述服务器针对所述安全报警发出的监控指令,获得安全监控结果, 所述安全监控结果包括确定所述电子设备安全或存在风险。
本申请实施例的第二方面提供了一种安全监控装置,所述安全监控装置包括:
获取单元,用于当接收到用户的第一类操作申请时,获取应用程序APP本地文件中的设备识别码和密钥链Keychain中的设备识别码,所述设备识别码由APP在客户端设备获取,并分别存储在APP本地文件和Keychain中;
确定单元,用于若获取到两个相等的设备识别码,则确定所述电子设备安全;
报警单元,用于若没有获取到两个相等的设备识别码,则向所述服务器发出安全报警,并对所述设备识别码进行安全处理;
监控单元,用于接收服务器针对所述安全报警发出的监控指令,获得安全监控结果,所述安全监控结果包括确定所述电子设备安全或存在风险。
本申请实施例第三方面提供了一种电子装置,包括处理器、存储器、通信接口,以及一个或多个程序,所述一个或多个程序被存储在所述存储器中,并且被配置由所述处理器执行,所述程序包括用于执行第一方面任一方法中的步骤的指令。
本申请实施例第四方面提供了一种计算机可读存储介质,存储用于电子数据交换的计算机程序,其中,所述计算机程序使得计算机执行第一方面任一方法所述的步骤的指令。
在本申请实施例中,通过设备识别码的获取情况判断设备安全,这个过程使得设备的安全监控更具有针对性和差异性,提升了安全监控的准确性和效率,进一步提升了通过设备进行金融活动的安全性。
附图说明
为了更清楚地说明本申请实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍。
图1是本申请实施例提供的一种设备安全监控方法流程示意图;
图2是本申请实施例提供的一种生成并处理安全报警的方法流程示意图;
图3是本申请实施例提供的一种设备识别码处理方法流程示意图;
图4是本申请实施例提供的一种安全监控的交互过程示意图;
图5是本申请实施例提供的一种电子装置的结构示意图;
图6是本申请实施例提供的一种安全监控装置结构框图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本申请一部分实施例,而不是全部的实施例。
为更好的理解本申请技术方案,下面先对相关的现有技术的实施例应用方案进行简要介绍。在当前互联网技术高速发展的时代,许多金融活动、交易活动都从线下转移到了线上,例如用户进行购买活动时,由于余额不足需要向第三方平台发起贷款或担保,那么第三方平台就要对用户的设备安全性进行检测,检测方法包括确定用户的账户信息和电子设备绑定关系是否唯一,以避免同一设备对应多个账户或同一账户在对应多个设备登录的不安全行为。那么第三方平台根据用户的登录账户生成一个设备识别码,然后将设备识别码用于唯一标识设备,如果检测到设备识别码有被篡改或被清除迹象,则说明该账户有风险,反之,说明该账户安全。
下面对本申请实施例进行详细介绍。
请参阅图1,图1为本申请实施例中一种设备安全监控方法流程示意图,如图1所示,所述设备安全监控方法包括:
S101、当接收到用户的第一类操作申请时,获取应用程序APP本地文件中的设备识别码和密钥链Keychain中的设备识别码,所述设备识别码由APP在客户端设备获取,并分别存储在APP本地文件和Keychain中。
应用程序(Application,APP)是指安装在电子设备上的第三方应用程序,根据其应用范围可分类为购物类APP,地图类APP,游戏类APP,学习类APP和社交类APP等,根据应用平台的不同,可分为iOS系统APP,Android系统APP,和微软系统APP等。在电子设备上安装了APP后,会生成相应的文本文件目录,用于将APP的运行文件和下载文件存储其中。密钥链(Keychain)是苹果公司产品设备上的密码管理系统,一个密钥链可以包含多种类型的数 据:密码(包括网站,FTP服务器,SSH帐户,网络共享,无线网络,群组软件,加密磁盘镜像等),私钥,电子证书和加密笔记等。
具体地,当用户在交易平台上进行操作时,一种常用的确保用户身份安全的方法是用户登录账户和电子设备的唯一对应性,电子设备可以通过设备标识码进行识别。交易平台在此处表现为应用程序APP形式,那么当用户在iOS系统的客户端电子设备上安装APP时,即获取设备识别码,将用户账户与设备识别码进行对应,并将设备识别码同时存储在APP本地文件和密钥链Keychain中。
用户的第一类操作申请,包括用户发起的付款申请或贷款申请等与资金交易有关的操作申请,这类申请对于交易平台来说,具有较大的风险性,因此需要对用户的设备安全进行检测和确定。
在iOS系统中,可用来标识设备的设备识别码包括国际移动设备识别码(IMEI),设备唯一设备识别符(UDID),手机物理地址(MAC Address),通用唯一识别码(UUID),广告标识符(IDFA)等。为了兼顾标识设备和保护用户隐私的目标,可以采用UUID或IDFA数据,存储在APP本地文件中,同时也存储在Keychain中,采用双重保险,用于保存设备识别码,减小设备识别码被更改且难以找回的概率。
可选的,可以在客户端生成UUID的方法来获得设备识别码。UUID是一个32位的十六进制序列,在某一时空下是唯一的,例如在当前这一秒,全世界产生的UUID都是不一样的。UUID的版本包括:基于时间,基于分布式计算环境(Distributed Computing Environment,DCE)安全,基于名字,随机生成等,UUID的标准型式包含32个16进制数字,以连字号分为五段,形式为8-4-4-4-12的32个字符。例如:550e8400-e29b-41d4-a716-446655440000,即为一个UUID。生成一个UUID并保存在APP本地文件中后,正常情况下,只要APP没有被卸载,该设备对应的UUID就是不变值。
可选的,生成UUID的方法为:随机生成32位字符作为所述UUID。随机生成一个32位的字符串作为设备的UUID,那么UUID理论上的总数为16^32=2^128,约等于3.4x10^38。也就是说若每纳秒产生1兆个UUID,每个设备的UUID几乎不会重复,因此也就保证了UUID唯一标识设备。
S102、若获取到两个相等的设备识别码,则判断所述电子设备安全。
具体地,在S101中已经将设备识别码分别存储在APP本地文件和Keychain中,如果电子设备正常运行,APP本地文件数据没有被清除或篡改,Keychain中的数据也没有被清除或篡改,那么客户端根据预设时间间隔获取APP本地文件和Keychain中的设备识别码都会获取成功,且两者相等,即两者的字符串完全相同。其中,获取设备识别码的时间可以是根据预设时间间隔获取,例如1s,5s,1min,10min,2h,5h等;也可以是根据预设周期获取,例如以1天,2天,5天,一星期,一个月等为周期;还可以是根据触发条件获取,例如当接收到用户发起的付款申请或贷款申请等与资金交易有关的操作行为时,通过获取设备识别码判断当前交易环境是否安全。
S103、若没有获取到两个相等的设备识别码,则对所述设备识别码进行安全处理,并向所述服务器发出安全报警。
客户端没有获取到两个相等的设备识别码,包含的情况有:只获取到一个设备识别码、获取到两个不相等的设备识别码,没有获取到设备识别码。
可选的,如果只获取到一个设备识别码,那么具体包括:只获取到APP本地文件中的设备识别码而没有获取到Keychain中的设备识别码;则向服务器发出安全报警,并对设备识别码进行安全处理,包括:向服务器发起第一安全报警;将APP本地文件中的设备识别码复制并存储到Keychain中。
具体地,如果获取到APP本地文件中的设备识别码而没有获取到Keychain中的设备识别码,那么,由于Keychain中保存了网站登录密码、加密私钥和电子证书等重要信息,在通常情况下,包括用户使用设备,安装、更新或卸载APP时,Keychain中的数据都会长期保留,只有当电子设备被攻击或系统重置时,才有可能使Keychain中的数据被清理,而无论是电子设备被攻击或者系统重置,都是有风险的操作,因此,此时向服务器发起第一安全警报,表示电子设备可能遭遇攻击,电子设备的当前操作有一定的风险。服务器端需要重点检查或监测该UUID号对应的电子设备,进一步识别该设备的不安全行为。同时,将APP本地文件中的UUID复制并存储到Keychain中,用以备份设备识别码并保持设备UUID的唯一性。
可选的,如果只获取到一个设备识别码,还具体包括:只获取到Keychain 中的设备识别码而没有获取到APP本地文件中的设备识别码;则向服务器发出安全报警,并对设备识别码进行安全处理,包括:向服务器发起第二安全报警,第二安全报警的安全等级低于第一安全报警;将Keychain中的设备识别码复制并存储到APP本地文件中。
具体地,如果获取到Keychain中的设备识别码而没有获取到APP本地文件中的设备识别码,那么可能的情况包括用户对APP本地文件进行清理,或者设备受到攻击,导致APP本地文件中的UUID被清除,或者APP被卸载之后重新安装,导致APP本地文件中不存在UUID。在这种情况下,设备有可能被不安全的信息威胁,也有可能是用户的正常操作,因此,此时向服务器发起第二安全报警,并且第二安全报警的安全等级低于第一安全报警,可根据后续检测再做进一步的处理。同时将Keychain中的设备识别码复制并存储到APP本地文件中,以保持设备识别码的不变性用以唯一标识电子设备。
可选的,没有获取到两个相等的设备识别码包括获取到两个不相等的设备识别码,则向服务器发出安全报警,并对设备识别码进行安全处理,包括:将Keychain中的设备识别码复制并存储到APP本地文件中,并向服务器发出第三安全报警,第三安全报警的安全等级高于第二安全报警并低于第一安全报警。
具体地,同时获取到了APP本地文件中的设备识别码和Keychain中的设备识别码,但两者不相同,那么可能是其中一个被篡改,或者APP重新安装时,并没有获取到Keychain中的设备识别码而重新生成了设备识别码,前者表示电子设备受到了安全威胁,后者表示设备操作或设置异常,因此,向服务器发出第三安全报警,该种情况下比没有获取到APP本地文件中的设备识别码时更有可能受到安全威胁,所以第三安全报警的安全等级高于第二安全报警,由于Keychain的安全等级和保密等级都比APP本地文件高,成功获取到Keychain中的设备识别,那么第三安全报警的安全等级低于第一安全报警。同时,因为APP本地文件受到攻击并被篡改的可能性更大,而Keychain中的数据更加安全可靠,因此,将Keychain中的设备识别码复制并存储在APP本地文件中,覆盖APP本地文件中原来的设备识别码。
可选的,没有获取到两个相等的设备识别码包括没有获取到设备识别码, 则向服务器发出安全报警,并对设备识别码进行安全处理,包括:向服务器发出第四安全报警,第四安全报警的安全等级高于第一安全报警;生成新的设备识别码,并将设备识别码存储在APP本地文件和Keychain中。
具体地,在APP本地文件和Keychain中都没有获取到设备识别码,可能的情况包括电子设备进行了重置或电子设备受到了安全威胁,向服务器发出第四安全报警,并且APP本地文件和Keychain中的设备识别码都被清除了,所以第四安全报警的安全等级高于第一安全报警,表示安全等级很高,急需进一步验证电子设备的安全。
四种警报和安全等级别对照表如表1所示:
表1安全报警情况表
Figure PCTCN2018108887-appb-000001
可见,在本申请实施例中,根据获取到的设备识别码的情况的不同,向服务器发出不同的安全报警,提示服务器对电子设备进行相对应的进一步检测,有助于进一步判定电子设备的安全性,同时,为了保持设备识别码对电子设备的唯一标识作用,在没有获取到两个相等的设备识别码时,对设备识别码进行相应的复制和存储,备份设备识别码并保留其唯一标识电子设备的作用。
S104、接收服务器针对所述安全报警发出的监控指令,获得安全监控结果。
根据S103中的过程可知,客户端当没有获取到两个相等的设备识别码时,会向服务器发出安全报警,那么服务器端根据当前情况判断如何向客户端发起监控指令,客户端根据接收到的监控指令,进一步对电子设备进行安全检测,最终确定电子设备是否安全。
可选的,接收服务器针对安全报警发出的监控指令,获得安全监控结果, 包括:接收服务器针对第一安全报警发出的第一监控指令,根据第一监控指令获取在第一预设时间段内针对APP的操作记录,若操作记录规范,则确定电子设备安全,否则确定电子设备为第一风险等级;接收服务器针对第二安全报警发出的第二监控指令,根据第二监控指令获取在第二预设时间段内针对Keychain的操作记录,若操作记录规范,则确定电子设备安全,否则确定电子设备为第二风险等级;接收服务器针对第三安全报警发出的第三监控指令,根据第三监控指令检查APP在第三预设时间段内是否进行了安装操作,若是,则确定电子设备安全,否则确定电子设备为第三风险等级;接收服务器针对第四安全报警发出的第四监控指令,根据第四监控指令检查电子设备在第四预设时间段内是否进行了系统还原操作,若是,则确定电子设备安全,否则确定电子设备为第四风险等级。
第一安全报警针对的是只获取到APP本地文件中的设备识别码而没有获取到Keychain中的设备识别码,那么服务器发出第一监控指令,客户端根据第一监控指令获取在第一预设时间段内针对Keychain的操作记录,包括Keychain的操作频率,操作次数,是否与历史操作记录相似,其他Keychain数据是否也被清除等,其中第一预设时间段可以是服务器端任意设定的时间,例如1天,2天,2周等,也可以是服务器根据记录的上一次发出第一监控指令的时刻到当前时刻确定的时间段,根据这些数据判断Keychain是遭到恶意清除还是用户的规范操作,若是后者,则确定电子设备安全,否则确定电子设备为第一风险等级。
第二安全报警针对的是只获取到Keychain中的设备识别码而没有获取到APP本地文件中的设备识别码,服务器发出第二安全监控指令,客户端根据第二监控指令获取在第二预设时间段内针对APP的操作记录,包括APP的操作频率,交易记录,交易金额,是否修改绑定号码,页面停留时长等,同理第二预设时间段可以是服务器端任意设定的时间,也可以是服务器根据记录的上一次发出第二监控指令的时刻到当前时刻确定的时间段,根据这些数据判断APP本地文件是遭到恶意删除还是用户的正常清理操作,如果是后者,则确定电子设备安全,否则确定电子设备为第二风险等级。
第三安全报警针对的是获取到两个不相等的设备识别码,即获取到的APP 本地文件中的设备识别码和Keychain中设备识别码不同,因为Keychain中的数据保密性高,相对安全,因此主要对APP本地文件中的设备识别码进行进一步检测,根据第三监控指令检查APP在第三预设时间段内是否进行了安装操作,第三预设时间可以是服务器根据记录的上一次发出第三监控指令的时刻到当前时刻确定的时间段,也可以是上一次判断电子设备安全的时刻到当前时刻确定的时间段,还可以是根据上一次安装该APP的时刻到当前时刻确定的时间段。如果在第三预设时间段内APP进行了安装操作,那么说明导致获取到两个不同设备识别码的原因可能是重新安装APP时,由于设置原因,APP没有从Keychain中获取到原先的设备识别码,而重新生成了设备识别码,这种情况下,因为对APP的交易操作或金融活动没有威胁,所以判断设备安全,否则,判断设备为第三风险等级。
第四安全报警针对的是没有获取到设备识别码的情况,这种情况对应的最有可能的情况是:电子设备进行了系统还原操作,或者受到了恶意攻击。因此,服务器针对第四安全报警发出的第四监控指令,APP在客户端根据第四监控指令检查电子设备在第四预设时间段内是否进行了系统还原操作,若是,则确定所述电子设备安全,否则确定所述电子设备为第四风险等级,其中第四预设时间段可以是服务器端任意设置的时间段,或者是根据上一次判断电子设备安全的时刻到当前时刻确定的时间段。
可见,在本申请实施例中,通过获取服务器根据安全报警发出的监控指令,对电子装置进行进一步监控,最终判断电子设备的安全性,可以指导APP的下一步行为,包括继续交易活动、结束交易活动或一定程度地降低交易额度。
另外,在服务器端接收到安全报警时,还可以发出指令,在客户端对电子设备的其他数据进行安全检测,包括电子设备连接的wifi是否安全,GPS定位的地址是否跨度较大,好友列表变化是否大于预设百分比,是否曾被别的平台设置为不安全用户,是否与不安全用户有关联关系等。
可选的,还可以通过待验证电子设备绑定的其他安全电子设备来验证待验证电子设备的安全性,在保证其他电子设备安全的前提下,向其他安全电子设备发起验证信息,包括发送短信,发送语音,发送测试题目等,然后接收其他安全电子设备的回复,确定待验证电子设备的安全。还可以向其他安全电子设 备发起视频验证或语音验证,通过实时的视频或语音验证待验证电子设备的持有者的身份,以达到验证待验证电子设备安全的目的。
在本申请实施例中,将设备识别码同时存储在APP本地文件和Keychain中,并且只有在获取到两个完全相等的设备识别码时,判断设备安全,这样可以帮助监测设备识别码被篡改或删除,使得安全监控的更具有针对性和差异性,提升了安全监控的准确性和效率,进一步提升了通过设备进行金融活动的安全性。
请参阅图2,图2是本申请实施例中一种生成并处理安全报警的方法流程示意图,如图所示,本实施例中的生成并处理安全报警的方法包括:
S201、获取所述APP本地文件中的设备识别码和所述Keychain中的设备识别码;
S202、只获取到所述APP本地文件中的设备识别码而没有获取到所述Keychain中的设备识别码,向服务器发起第一安全报警;
S203、只获取到所述Keychain中的设备识别码而没有获取到所述APP本地文件中的设备识别码,向服务器发起第二安全报警;
S204、获取到两个不相等的设备识别码,向所述服务器发出第三安全报警;
S205、没有获取到设备识别码,向所述服务器发出第四安全报警;
S206、接收服务器针对第一安全报警发出的第一监控指令,根据所述第一监控指令获取在第一预设时间段内针对所述Keychain的操作记录,判断针对所述Keychain的操作记录是否规范,若是,则执行S210,否则执行S211;
S207、接收服务器针对第二安全报警发出的第二监控指令,根据所述第二监控指令获取在第二预设时间段内针对所述APP的操作记录,判断针对所述APP的操作记录是否规范,若是,则执行S210,否则执行S211;
S208、接收服务器针对第三安全报警发出的第三监控指令,根据所述第三监控指令检查所述APP在第三预设时间段内是否进行了安装操作,若是,则执行S210,否则执行S211;
S209、接收服务器针对第四安全报警发出的第四监控指令,根据所述第四监控指令检查所述电子设备在第四预设时间段内是否进行了系统还原操作,若是,则执行S210,否则执行S211。
S210、确定所述电子设备安全;
S211、确定所述电子设备存在风险。
在本申请实施例中,通过获取到的设备识别码的不同情况,生成不同的安全报警,得安全监控的更具有针对性和差异性,提升安全监控的准确性和效率。
请参阅图3,图3是本申请实施例提供的一种设备识别码处理方法流程示意图,如图所示,本实施例中的设备识别码处理方法包括:
S301、获取所述APP本地文件中的设备识别码和所述Keychain中的设备识别码;
S302、只获取到所述APP本地文件中的设备识别码而没有获取到所述Keychain中的设备识别码,将所述APP本地文件中的设备识别码复制并存储到所述Keychain中;
S303、只获取到所述Keychain中的设备识别码而没有获取到所述APP本地文件中的设备识别码,将所述Keychain中的设备识别码复制并存储到所述APP本地文件中;
S304、获取到两个不相等的设备识别码,将所述Keychain中的设备识别码复制并存储到所述APP本地文件中;
S305、没有获取到设备识别码,生成新的设备识别码,并将所述新的设备识别码存储在APP本地文件和Keychain中。
在本申请实施例中,为了保持设备识别码对电子设备的唯一标识作用,在没有获取到两个相等的设备识别码时,对设备识别码进行相应的复制和存储,备份设备识别码并保留其唯一标识电子设备的作用。
根据上述方法,可以得到如图4所示的安全监控的交互过程示意图,请参阅图4,该交互过程涉及的对象包括客户端、服务器和数据库。其中:
所述处客户端,用于当接收到用户的第一类操作申请时,获取应用程序APP本地文件中的设备识别码和密钥链Keychain中的设备识别码,所述设备识别码由APP在客户端设备获取,并分别存储在APP本地文件和Keychain中;若获取到两个相等的设备识别码,则确定所述电子设备安全;若没有获取到两个相等的设备识别码,则向所述服务器发出安全报警,并对所述设备识别码进行安全处理;接收所述服务器针对所述安全报警发出的监控指令,获得安 全监控结果,所述安全监控结果包括确定所述电子设备安全或存在风险;
数据库,用于所述存储APP本地文件和所述Keychain;
服务器,用于接收所述安全报警,并根据接收到的安全报警发出监控指令。
图5是本申请实施例提供的一种电子装置的结构示意图,如图5所示,该电子装置包括处理器、存储器、通信接口以及一个或多个程序,其中,上述一个或多个程序被存储在上述存储器中,并且被配置由上述处理器执行,上述程序包括用于执行以下步骤的指令:
当接收到用户的第一类操作申请时,获取应用程序APP本地文件中的设备识别码和密钥链Keychain中的设备识别码,所述设备识别码由APP在客户端设备获取,并分别存储在APP本地文件和Keychain中;
若获取到两个相等的设备识别码,则确定所述电子设备安全;
若没有获取到两个相等的设备识别码,则向所述服务器发出安全报警,并对所述设备识别码进行安全处理;
接收服务器针对所述安全报警发出的监控指令,获得安全监控结果。
图6是本申请实施例中所涉及的安全监控装置600的功能单元组成框图。该安全监控装置600应用于电子装置,所述安全监控装置包括:
获取单元601,用于当接收到用户的第一类操作申请时,获取应用程序APP本地文件中的设备识别码和密钥链Keychain中的设备识别码,所述设备识别码由APP在客户端设备获取,并分别存储在APP本地文件和Keychain中;
确定单元602,用于若获取到两个相等的设备识别码,则确定所述电子设备安全;
报警单元603,用于若没有获取到两个相等的设备识别码,则向所述服务器发出安全报警,并对所述设备识别码进行安全处理;
监控单元604,用于接收服务器针对所述安全报警发出的监控指令,获得安全监控结果,所述安全监控结果包括确定所述电子设备安全或存在风险。
在可选情况下,所述没有获取到两个相等的设备识别码包括获取到所述APP本地文件中的设备识别码且没有获取到所述Keychain中的设备识别码;
所述报警单元603具体用于:向所述服务器发起第一安全报警;将所述APP本地文件中的设备识别码复制并存储到所述Keychain中。
本申请实施例还提供一种计算机存储介质,其中,该计算机存储介质存储用于电子数据交换的计算机程序,该计算机程序使得计算机执行如上述方法实施例中记载的任一方法的部分或全部步骤,上述计算机包括移动终端。
本申请实施例还提供一种计算机程序产品,上述计算机程序产品包括存储了计算机程序的非瞬时性计算机可读存储介质,上述计算机程序可操作来使计算机执行如上述方法实施例中记载的任一方法的部分或全部步骤。该计算机程序产品可以为一个软件安装包,上述计算机包括移动终端。
本领域普通技术人员可以理解上述实施例的各种方法中的全部或部分步骤是可以通过程序来指令相关的硬件来完成,该程序可以存储于一计算机可读存储器中,存储器可以包括:闪存盘、ROM、RAM、磁盘或光盘等。
以上对本申请实施例进行了详细介绍,本文中应用了具体个例对本申请的原理及实施方式进行了阐述,以上实施例的说明只是用于帮助理解本申请的方法及其核心思想;同时,对于本领域的一般技术人员,依据本申请的思想,在具体实施方式及应用范围上均会有改变之处,综上所述,本说明书内容不应理解为对本申请的限制。

Claims (20)

  1. 一种设备安全监控方法,其特征在于,所述方法包括:
    当接收到用户的第一类操作申请时,获取应用程序APP本地文件中的设备识别码和密钥链Keychain中的设备识别码,所述设备识别码由APP在客户端设备获取,并分别存储在APP本地文件和Keychain中;
    若获取到两个相等的设备识别码,则确定所述电子设备安全;
    若没有获取到两个相等的设备识别码,则向服务器发出安全报警,并对所述设备识别码进行安全处理;
    接收所述服务器针对所述安全报警发出的监控指令,获得安全监控结果,所述安全监控结果包括确定所述电子设备安全或存在风险。
  2. 根据权利要求1所述的方法,其特征在于,所述没有获取到两个相等的设备识别码包括:获取到所述APP本地文件中的设备识别码且没有获取到所述Keychain中的设备识别码;
    则所述向所述服务器发出安全报警,并对所述设备识别码进行安全处理,包括:
    向所述服务器发起第一安全报警;
    将所述APP本地文件中的设备识别码复制并存储到所述Keychain中。
  3. 根据权利要求1或2所述的方法,其特征在于,所述没有获取到两个相等的设备识别码包括:获取到所述Keychain中的设备识别码且没有获取到所述APP本地文件中的设备识别码;
    则所述向所述服务器发出安全报警,并对所述设备识别码进行安全处理,包括:
    向所述服务器发起第二安全报警,所述第二安全报警的安全等级低于所述第一安全报警;
    将所述Keychain中的设备识别码复制并存储到所述APP本地文件中。
  4. 根据权利要求1-3任一项所述的方法,其特征在于,所述没有获取到两个相等的设备识别码包括获取到两个不相等的设备识别码;
    则所述向所述服务器发出安全报警,并对所述设备识别码进行安全处理, 包括:
    向所述服务器发出第三安全报警,所述第三安全报警的安全等级高于所述第二安全报警并低于所述第一安全报警;
    将所述Keychain中的设备识别码复制并存储到所述APP本地文件中。
  5. 根据权利要求1-4任一项所述的方法,其特征在于,所述没有获取到两个相等的设备识别码包括没有获取到设备识别码;
    则所述向服务器发出安全报警,并对所述设备识别码进行安全处理,包括:
    向所述服务器发出第四安全报警,所述第四安全报警的安全等级高于所述第一安全报警;
    生成新的设备识别码,并将所述新的设备识别码存储在APP本地文件和Keychain中。
  6. 根据权利要求5所述的方法,其特征在于,所述接收服务器针对所述安全报警发出的监控指令,获得安全监控结果,包括:
    接收服务器针对第一安全报警发出的第一监控指令,根据所述第一监控指令获取在第一预设时间段内针对所述Keychain的操作记录,若针对所述Keychain的操作记录规范,则确定所述电子设备安全,否则确定所述电子设备存在风险;
    接收服务器针对第二安全报警发出的第二监控指令,根据所述第二监控指令获取在第二预设时间段内针对所述APP的操作记录,若针对所述APP的操作记录规范,则确定所述电子设备安全,否则确定所述电子设备存在风险;
    接收服务器针对第三安全报警发出的第三监控指令,根据所述第三监控指令检查所述APP在第三预设时间段内是否进行了安装操作,若是,则确定所述电子设备安全,否则确定所述电子设备存在风险;
    接收服务器针对第四安全报警发出的第四监控指令,根据所述第四监控指令检查所述电子设备在第四预设时间段内是否进行了系统还原操作,若是,则确定所述电子设备安全,否则确定所述电子设备存在风险。
  7. 根据权利要求6所述的方法,其特征在于,所述设备识别码由APP在客户端设备获取包括:
    所述设备识别码由APP随机生成的32位字符的通用唯一识别码UUID组 成。
  8. 一种安全监控装置,其特征在于,所述设备安全监控装置包括:
    获取单元,用于当接收到用户的第一类操作申请时,获取应用程序APP本地文件中的设备识别码和密钥链Keychain中的设备识别码,所述设备识别码由APP在客户端设备获取,并分别存储在APP本地文件和Keychain中;
    确定单元,用于若获取到两个相等的设备识别码,则确定所述电子设备安全;
    报警单元,用于若没有获取到两个相等的设备识别码,则向所述服务器发出安全报警,并对所述设备识别码进行安全处理;
    监控单元,用于接收服务器针对所述安全报警发出的监控指令,获得安全监控结果,所述安全监控结果包括确定所述电子设备安全或存在风险。
  9. 根据权利要求8所述的装置,其特征在于,所述没有获取到两个相等的设备识别码包括获取到所述APP本地文件中的设备识别码且没有获取到所述Keychain中的设备识别码;
    所述报警单元具体用于:向所述服务器发起第一安全报警;将所述APP本地文件中的设备识别码复制并存储到所述Keychain中。
  10. 根据权利要求8或9所述的装置,其特征在于,所述没有获取到两个相等的设备识别码包括获取到所述Keychain中的设备识别码且没有获取到所述APP本地文件中的设备识别码;
    所述报警单元具体用于:向所述服务器发起第二安全报警,所述第二安全报警的安全等级低于所述第一安全报警;将所述Keychain中的设备识别码复制并存储到所述APP本地文件中。
  11. 根据权利要求8-10任一项所述的装置,其特征在于,所述没有获取到两个相等的设备识别码包括获取到两个不相等的设备识别码;
    所述报警单元具体用于:向所述服务器发出第三安全报警,所述第三安全报警的安全等级高于所述第二安全报警并低于所述第一安全报警;将所述Keychain中的设备识别码复制并存储到所述APP本地文件中。
  12. 根据权利要求8-11任一项所述的装置,其特征在于,所述没有获取到两个相等的设备识别码包括没有获取到设备识别码;
    所述报警单元具体用于:向所述服务器发出第四安全报警,所述第四安全报警的安全等级高于所述第一安全报警;生成新的设备识别码,并将所述新的设备识别码存储在APP本地文件和Keychain中。
  13. 根据权利要求12所述的装置,其特征在于,所述监控单元具体用于:接收服务器针对第一安全报警发出的第一监控指令,根据所述第一监控指令获取在第一预设时间段内针对所述Keychain的操作记录,若针对所述Keychain的操作记录规范,则确定所述电子设备安全,否则确定所述电子设备存在风险;
    接收服务器针对第二安全报警发出的第二监控指令,根据所述第二监控指令获取在第二预设时间段内针对所述APP的操作记录,若针对所述APP的操作记录规范,则确定所述电子设备安全,否则确定所述电子设备存在风险;
    接收服务器针对第三安全报警发出的第三监控指令,根据所述第三监控指令检查所述APP在第三预设时间段内是否进行了安装操作,若是,则确定所述电子设备安全,否则确定所述电子设备存在风险;
    接收服务器针对第四安全报警发出的第四监控指令,根据所述第四监控指令检查所述电子设备在第四预设时间段内是否进行了系统还原操作,若是,则确定所述电子设备安全,否则确定所述电子设备存在风险。
  14. 根据权利要求13所述的装置,其特征在于,所述生成单元具体用于:
    随机生成32位字符作为UUID,将所述UUID作为设备识别码。
  15. 一种终端,其特征在于,包括处理器、输入设备、输出设备和存储器,所述处理器、输入设备、输出设备和存储器相互连接,其中,所述存储器用于存储计算机程序,所述计算机程序包括程序指令,所述处理器被配置用于调用所述程序指令,执行:
    当接收到用户的第一类操作申请时,获取应用程序APP本地文件中的设备识别码和密钥链Keychain中的设备识别码,所述设备识别码由APP在客户端设备获取,并分别存储在APP本地文件和Keychain中;
    若获取到两个相等的设备识别码,则确定所述电子设备安全;
    若没有获取到两个相等的设备识别码,则向服务器发出安全报警,并对所述设备识别码进行安全处理;
    接收所述服务器针对所述安全报警发出的监控指令,获得安全监控结果, 所述安全监控结果包括确定所述电子设备安全或存在风险。
  16. 根据权利要求15所述的终端,其特征在于,所述没有获取到两个相等的设备识别码包括:获取到所述APP本地文件中的设备识别码且没有获取到所述Keychain中的设备识别码;则在向所述服务器发出安全报警,并对所述设备识别码进行安全处理方面,所述处理器具体用于:
    向所述服务器发起第一安全报警;
    将所述APP本地文件中的设备识别码复制并存储到所述Keychain中。
  17. 根据权利要求15或16所述的终端,其特征在于,所述没有获取到两个相等的设备识别码包括:获取到所述Keychain中的设备识别码且没有获取到所述APP本地文件中的设备识别码;则在向所述服务器发出安全报警,并对所述设备识别码进行安全处理方面,所述处理器具体用于:
    向所述服务器发起第二安全报警,所述第二安全报警的安全等级低于所述第一安全报警;
    将所述Keychain中的设备识别码复制并存储到所述APP本地文件中。
  18. 根据权利要求15-17任一项所述的终端,其特征在于,所述没有获取到两个相等的设备识别码包括获取到两个不相等的设备识别码;则在向所述服务器发出安全报警,并对所述设备识别码进行安全处理方面,所述处理器具体用于:
    向所述服务器发出第三安全报警,所述第三安全报警的安全等级高于所述第二安全报警并低于所述第一安全报警;
    将所述Keychain中的设备识别码复制并存储到所述APP本地文件中。
  19. 根据权利要求15-18任一项所述的终端,其特征在于,所述没有获取到两个相等的设备识别码包括没有获取到设备识别码;则在向服务器发出安全报警,并对所述设备识别码进行安全处理方面,所述处理器具体用于:
    向所述服务器发出第四安全报警,所述第四安全报警的安全等级高于所述第一安全报警;
    生成新的设备识别码,并将所述新的设备识别码存储在APP本地文件和Keychain中。
  20. 一种计算机可读存储介质,存储用于电子数据交换的计算机程序,其 中,所述计算机程序使得计算机执行权利要求1-7中任一方法所述的步骤的指令。
PCT/CN2018/108887 2018-06-30 2018-09-29 一种设备安全监控方法和装置 WO2020000753A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810702740.8A CN108989298B (zh) 2018-06-30 2018-06-30 一种设备安全监控方法、装置及计算机可读存储介质
CN201810702740.8 2018-06-30

Publications (1)

Publication Number Publication Date
WO2020000753A1 true WO2020000753A1 (zh) 2020-01-02

Family

ID=64539711

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/108887 WO2020000753A1 (zh) 2018-06-30 2018-09-29 一种设备安全监控方法和装置

Country Status (2)

Country Link
CN (1) CN108989298B (zh)
WO (1) WO2020000753A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110601894B (zh) * 2019-09-18 2023-07-25 中国工商银行股份有限公司 告警处理方法和装置、以及电子设备和可读存储介质
CN111242770B (zh) * 2020-01-08 2023-04-07 贵阳货车帮科技有限公司 风险设备识别方法、装置、电子设备及可读存储介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103813335A (zh) * 2014-03-05 2014-05-21 上海优思通信科技有限公司 移动通讯终端安全保护方法
CN106651374A (zh) * 2016-12-23 2017-05-10 上海成业智能科技股份有限公司 移动安全结算网络的构建系统及使用方法
CN107239691A (zh) * 2017-05-12 2017-10-10 北京知道创宇信息技术有限公司 对接入计算设备的外置设备进行控制的方法、装置及系统
CN107612889A (zh) * 2017-08-23 2018-01-19 四川长虹电器股份有限公司 防止用户信息泄露的方法
US9917832B2 (en) * 2013-01-31 2018-03-13 Netiq Corporation Remote keychain for mobile devices

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102982264B (zh) * 2012-12-24 2017-06-16 上海斐讯数据通信技术有限公司 一种嵌入式设备软件保护方法
US10178164B2 (en) * 2015-08-31 2019-01-08 Visa International Service Association Secure binding of software application to communication device
CN105391705A (zh) * 2015-10-29 2016-03-09 青岛海尔智能家电科技有限公司 一种对应用服务进行认证的方法及装置
CN113014568B (zh) * 2016-10-10 2023-06-30 创新先进技术有限公司 账户登录方法、设备和服务器

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9917832B2 (en) * 2013-01-31 2018-03-13 Netiq Corporation Remote keychain for mobile devices
CN103813335A (zh) * 2014-03-05 2014-05-21 上海优思通信科技有限公司 移动通讯终端安全保护方法
CN106651374A (zh) * 2016-12-23 2017-05-10 上海成业智能科技股份有限公司 移动安全结算网络的构建系统及使用方法
CN107239691A (zh) * 2017-05-12 2017-10-10 北京知道创宇信息技术有限公司 对接入计算设备的外置设备进行控制的方法、装置及系统
CN107612889A (zh) * 2017-08-23 2018-01-19 四川长虹电器股份有限公司 防止用户信息泄露的方法

Also Published As

Publication number Publication date
CN108989298B (zh) 2021-04-27
CN108989298A (zh) 2018-12-11

Similar Documents

Publication Publication Date Title
USRE48669E1 (en) System and method for identifying and [assessing] remediating vulnerabilities on a mobile communications device
US9491182B2 (en) Methods and systems for secure internet access and services
US9098707B2 (en) Mobile device application interaction reputation risk assessment
CN110417778B (zh) 访问请求的处理方法和装置
US20140380478A1 (en) User centric fraud detection
WO2019200799A1 (zh) 短信验证码的推送方法、电子装置及可读存储介质
US10769045B1 (en) Measuring effectiveness of intrusion detection systems using cloned computing resources
US10616221B2 (en) Systems and methods for online fraud detection
WO2019153857A1 (zh) 一种数字钱包资产保护方法、装置、电子设备及存储介质
EP3270318B1 (en) Dynamic security module terminal device and method for operating same
EP3497917B1 (en) Detection of bulk operations associated with remotely stored content
WO2014172956A1 (en) Login method,apparatus, and system
EP3501158B1 (en) Interrupt synchronization of content between client device and cloud-based storage service
CN111131221A (zh) 接口校验的装置、方法及存储介质
US20150067772A1 (en) Apparatus, method and computer-readable storage medium for providing notification of login from new device
CN112150113A (zh) 档案数据的借阅方法、装置和系统、资料数据的借阅方法
JP7401288B2 (ja) ユーザデータへの不正アクセスの脅威下でアカウントレコードのパスワードを変更するシステムおよび方法
WO2020000753A1 (zh) 一种设备安全监控方法和装置
US11411947B2 (en) Systems and methods for smart contract-based detection of authentication attacks
US10032022B1 (en) System and method for self-protecting code
US8266704B1 (en) Method and apparatus for securing sensitive data from misappropriation by malicious software
CN109145602B (zh) 一种勒索软件攻击的防护方法及装置
US11671422B1 (en) Systems and methods for securing authentication procedures
CN113596600B (zh) 直播嵌入程序的安全管理方法、装置、设备及存储介质
CN116611058A (zh) 一种勒索病毒检测方法及相关系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18924027

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18924027

Country of ref document: EP

Kind code of ref document: A1