Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

48results about How to "Prevent Malicious Behavior" patented technology

Application running device and terminal device

An embodiment of the invention provides an application running device and a terminal device. The application running device comprises a scanning module, a starting operation detection module, a first safety detection module, a starting module, an event detection module and a second safety detection module; the scanning module is used for scanning a specified type of application in the current operation system; the starting operation detection module is used for detecting the starting operation of the specified type of application; the first safety detection module is used for performing the first safety detection on the running environment of the application before the application is started; the starting module is used for starting the application after a result of the first safety detection indicates that the running environment is safe; the event detection module is used for detecting a preset event in the running process of the application; the second safety detection module is used for triggering the second safety detection on the preset event in the application. According to the application running device and the terminal device, the safety of the running environment when the application is started is effectively ensured and the safety of the application in the running process is effectively ensured.
Owner:BEIJING QIHOO TECH CO LTD

Application running method

An embodiment of the invention provides an application running method. The application running method comprises scanning a specified type of application in the current operation system; detecting the starting operation of the specified type of application; performing the first safety detection on the running environment of the application before the application is started; starting the application after a result of the first safety detection indicates that the running environment is safe; detecting a preset event in the running process of the application and triggering the second safety detection on the preset event in the application. According to the application running method, the safety of the running environment when the application is started is effectively ensured, the safety of the application in the running process is effectively ensured, the comprehensive safety protection is provided for the application, and the safe starting and running of the application can be achieved.
Owner:360 TECH GRP CO LTD

Method, system and device for controlling resource release in P2P

InactiveCN101753596APrevent DDOS attackStrong controlData switching networksClient-side
The embodiment of the invention discloses a method for controlling resource release in a P2P network. The P2P network is formed by believable nodes. The method is that the authority information and / or reputation information of a client are obtained from the P2P network; and the behavior of the client releasing resources is controlled according to the authority information and / or reputation information. In the embodiment of the invention, since the resources released by the client are inspected at an accessed Peer node, the malicious behaviors of the client are prevented. Moreover, the Peer releases the relevant client information on an Overlay. When a client node is shifted to the Peer, a newly accessed Peer node obtains the authority information of the client from the Overlay and inspects and controls the accessed client releasing and obtaining resources.
Owner:HUAWEI TECH CO LTD

Method for sensing abnormal behavior of passenger by wireless technology

The invention discloses a method for sensing an abnormal behavior of a passenger by a wireless technology. The method comprises the following steps: a single carriage AP (Access Point) collects STA (Spanning Tree Algorithm) data; the data is summarized and stored in a control center; analyze the data and match a processing model; predefine a normal / abnormal model matched with a predefined normal / abnormal model; and alarm about the abnormal user. The method provided by the invention is based on the vehicle-mounted internet to identify and predict the theft in advance, is low in cost and high intimeliness, and saves plenty of costs of manpower and material resources.
Owner:成都天佑飞天科技有限公司

Secure lightpath establishment method based on automatically switching optical network (ASON)

The invention provides a secure lightpath establishment method based on an automatically switching optical network (ASON), relating to the establishment of lightpaths or light connection in a control plane of the ASON. The method can prevent malevolence or selfishness of internal nodes by employing the comprehensive wavelength reservation strategy to carry out integrity protection on the important objects in the GMPLS RSVP-TE message through the security mechanisms such as digital signature and message feedback. In addition, the method designs a corresponding key management mechanism according to the characteristic of close coupling between a routing module and a signaling module in the ASON and distributes a node public key certificate needed in the process of establishing the lightpath by adopting the PKLSA message of OSPF-TE. The method has the characteristics of fast lightpath establishment, short attack detection and low message load while ensuring secure establishment of the lightpaths, and is especially suitable for secure establishment of light connection in the control plane in the ASON.
Owner:UNIV OF SCI & TECH BEIJING

Combined verification method of product labels with two-dimensional codes and feature codes in bottle caps

The present invention discloses a combined verification method of product labels with two-dimensional codes and feature codes in bottle caps. The method comprises the following steps: a, a uniquely identified two-dimensional code is arranged at the right side of a product label, and a feature code is arranged in a bottle cap; b, the two-dimensional code on the product label and the feature code in the bottle cap are identified on a packing line in the process of product package through adoption of the visual identification technology, and the incidence relation therebetween is formed and is stored in the APP background database; c, a consumer buys a product and uses a hand-held terminal to scan the two-dimensional at the right side of the product label to enter an APP interface; d, the bottle cap is opened, the feature code is inputted in the hand-held terminal according to the notice of the APP interface; and e, the feature code is compared with pre-storing data at package at the APP background, and the verification passes if the comparison is successful. The combined verification method of product labels with two-dimensional codes and feature codes in bottle caps is able to improve the consumer's consumption experience of reading two-dimensional codes when the consumer is buying products, and avoid the malicious behavior that a consumer only scans two-dimensional codes and does not really buy the products.
Owner:上海凌脉网络科技股份有限公司

Anti-channel conflict method for electronic business

InactiveCN108229977APrevent cross-sellingConvenient and quick automatic identificationProgramme controlComputer controlOrder formBlack list
The invention discloses an anti-channel conflict method for electronic business. The anti-channel conflict method comprises the following steps: S1, ordering by customers and obtaining order information by background; S2, comparing keywords in the order information with a blacklist in a database; S3, if no keywords exist in the blacklist in the comparison in the S2, extracting address characters;S4, combining the characters in the S3 to obtain combined words, and then comparing the combined characters with addresses in an address base; S5, comparing the keywords in the S4 to obtain one part;determining whether suspicion indexes need to be manually reviewed or not when whether the compared part belongs to the sales scope of dealers cannot be determined; S6, if the suspicion indexes in theS5 are not up to standard, packing and delivering by adopting packing containers. By use of the method disclosed by the invention, the channel conflict risk in an electronic business system can be quickly and automatically identified; even if the dealers maliciously change the addresses of recipients, a system can recognize the address change by similarity matching, so that the malicious channelconflict behavior of the dealers can be effectively inhibited.
Owner:脉度(上海)电子商务有限公司 +1

TEE-based software behavior active measurement method and system

The invention discloses a TEE-based software behavior active measurement method and system. The method comprises the following steps executed in the operation process of a measurement object in an REEenvironment: an active measurement agent in the REE environment monitors and acquires behavior characteristics of the measurement object, and sends the behavior characteristics of the measurement object to an active measurement module in a TEE environment; the active measurement module in the TEE environment measures the behavior characteristics of the measurement object according to the active measurement strategy library to obtain a corresponding active measurement result, and returns the active measurement result to the active measurement agent in the REE environment; and the active measurement agent in the REE environment receives the returned active measurement result. Compared with a traditional measurement method, the method has higher software behavior measurement capability, better operation efficiency and better security strength, can guarantee credible operation of the software, supports initiative measurement of real-time operation behaviors of the software, and has highermeasurement capability compared with an existing method.
Owner:NAT UNIV OF DEFENSE TECH

Verification method, device and system for image-text click data and mobile terminal

The invention discloses a verification method, device and system for image-text click data and a mobile terminal, and the method comprises the steps: transmitting image-text click data to a user terminal; receiving screen clicking position information corresponding to the image-text clicking data from the user terminal and movement information of the user terminal in the image-text clicking data verification process wherein the movement information comprises direction information, inclination information, rotation information and gravitational acceleration information; judging whether the image-text click data verification succeeds or not according to the click screen position information and the movement information; and in response to the fact that the click screen position information is located in the preset position area and the mobile information is located in the preset threshold, generating verification success information corresponding to the image-text click data and sendingthe verification success information to the user terminal. According to the invention, whether an operator is a person or a machine can be analyzed more accurately, and malicious behaviors of ticket refreshing through the machine or a program can be avoided.
Owner:INDUSTRIAL AND COMMERCIAL BANK OF CHINA

Tracking method and device for Linux application layer to monitor process generation and process behavior in real time

The invention relates to the technical field of computers, and discloses a tracking method for a Linux application layer to monitor process generation and process behaviors in real time. The method comprises the following steps: S1, establishing a relation between the application layer and a kernel layer based on a netlink socker technology of a Linux system; S2, on the basis of netlink socker communication, obtaining events related to the process in the whole Linux system a through cn_proc, wherein process generation time exists, and then a newly-generated process PID can be obtained; and S3, then by using a ptrace technology provided by the Linux system, tracking, monitoring and specifying the newly generated process PID. According to the application layer process monitoring method, the error-tolerant rate is very high, even if the program crashes due to the internal running error of the program, the whole system crashes, the application layer monitoring process uses a connector mechanism provided by a Linux kernel, and the generation of the Linux process can be obtained by driving ten pieces through cn_proc in real time, and then the conditions of delay and inaccuracy caused by acquiring the generation condition of the Linux process by reading a / proc / PID catalog are avoided.
Owner:罗强

Automatic safety detection method for mobile application

PendingCN113360905APrevent being piratedStable market returnsPlatform integrity maintainanceData integrationSystems engineering
The invention discloses an automatic safety detection method for mobile applications. The method comprises the following steps: S1, selecting an APP sample needing to be detected; s2, performing static analysis on the APP program file; s3, analyzing related data integration conditions in the APP program, and checking whether the related data integration conditions accord with vulnerability conditions or not with a public CVE vulnerability library; s4, the APP program is installed on the mobile phone; s5, running the APP program on the mobile phone, and monitoring sensitive behavior sources and communication data in the mobile phone so as to discover whether the APP program has sensitive behaviors and whether the communication data is safe; s6, illegal operation is conducted on the APP program, and whether the APP program has the corresponding defense capacity or not is judged. According to the method, great convenience can be provided for developers, certain manpower, material resource cost and time cost can be saved for the developers, and great economic benefits are brought to the developers.
Owner:上海蛮犀科技有限公司

Blockchain fragment enabling knowledge graph file storage method

The invention relates to a blockchain fragment enabling knowledge graph file storage method, and belongs to the technical field of blockchain application. According to the method, the knowledge graph file is stored in the blockchain, so that the problems of safe storage and traceability of the knowledge graph construction file are solved. When a reasoning error or a file security problem occurs in the knowledge graph, the corresponding process file can be obtained from the blockchain according to a demand, and a repetitive construction process can be avoided. The method is based on an inter-fragment communication confirmation mechanism, and double-pattern attacks aiming at different fragments are prevented. Through a random verification function, asset mortgage and an improved practical Byzantine fault-tolerant mechanism, malicious behaviors of nodes are prevented, and transaction security in fragments is ensured. According to the method, the throughput of a blockchain system is improved by adopting an optimized fragmentation scheme, and under multiple constraint conditions, an optimal transaction selection scheme is given based on a dynamic programming algorithm to maximize the income of the fragmentation, so that efficient and reasonable transaction fragmentation is realized.
Owner:BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products