Unlock instant, AI-driven research and patent intelligence for your innovation.
Behavior-based mobile terminal security protection system and method
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A technology of behavior and terminal equipment, applied in the direction of transmission system, computer security device, platform integrity maintenance, etc., can solve the problems of large monitoring granularity, difficult to accurately distinguish, low efficiency and accuracy of killing, and achieve damage prevention and saving cost, efficiency and accuracy improvements
Inactive Publication Date: 2011-06-01
BEIJING BANGCLE TECH CO LTD
View PDF3 Cites 45 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
The monitoring objects of the firewall are ports and protocols, and users need to set whether to allow them to pass through, requiring users to have professional familiarity with the system, and the granularity of monitoring is too large to be accurately distinguished
[0003] The second killing method is based on the virus definition library. This method requires the establishment of a large-scale malwaremonitoring system, and requires a huge amount of manpower and material resources to define, make and maintain the virus definition library.
Direct scanning and killing on mobile terminals such as mobile phones requires too much processing power and storage capacity of terminal equipment. Under the current technology, the efficiency and accuracy of scanning and killing are low
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention provides a program behavior-based mobile equipment security protection system and a program behavior-based mobile equipment security protection method. The program behavior-based mobile equipment security protection system comprises terminal equipment and a server, wherein the server comprises a receiving module, a distribution module, a detection module and a report generation module; the receiving module is used for receiving a software program from the terminal equipment; the distribution module is used for distributing the received software program to a simulator in cloud consisting of processors; the detection module is used for detecting and recording the execution behaviors of the software program or other files run in an hourglass model of the server; and the report generation module is used for evaluating the friendliness or hazard level of the software program or the other files according to the execution behaviors of the software program in the hourglass model, and providing an analysis report for the terminal equipment.
Description
technical field [0001] 本申请涉及移动终端设备的安全技术,更具体地,本发明涉及一种基于程序行为的移动终端的安全防护系统和方法,其中,本发明所涉及的移动终端设备包括但不限于移动通信设备(诸如手持电话、智能电话)、便携式娱乐设备(诸如苹果公司的IPAD、三星公司的GALAXY、索尼公司的PS系列的平板电脑或者影音播放设备)等等。 Background technique [0002] 目前在病毒查杀领域,主要包括两种技术。第一种是防火墙技术,是针对Internet网络不安全因素所采取的一种保护措施。防火墙是用来阻挡外部不安全因素影响的内部网络屏障,其目的就是防止外部网络用户未经授权的访问。防火墙主要由服务访问政策、验证工具、包过滤和应用网关4个部分组成,是一个位于计算机和它所连接的网络之间的软件或硬件。防火墙的监控对象是端口和协议,需要用户自己设置是否允许通过,要求用户对系统具有专业性的熟悉程度,而且监控的粒度太大,难以准确区分。 [0003] 第二种查杀方法是基于病毒定义库来完成,这种方法需要建立大规模的恶意软件监测系统,并且需要花费巨大人力物力来定义、制作和维护病毒定义库。另外,这种杀毒软件只有捕获到病毒样本后,才能提取到病毒的特征码,而且对于新出现的未知病毒无法防范,病毒库也需要实时更新、升级才能即时跟踪。随着恶意软件数量的指数倍增长,这种方法越来越不能满足实际应用的需要。 [0004] 对于诸如手机的移动通信领域,目前的恶意软件查杀方法都是从计算机领域学习过来的,也存在与计算机领域相同的问题。另外,由于手机上的恶意软件的性质与计算机上的恶意软件存在很大不同,手机上的恶意软件在定义上与计算机上是不完全相同的,恶意软件在手机上很难进行大规模的传播。手机上的恶意软件的目的主要是窃取个人资料与信息、盗取银行账号、窃听电话等犯罪行为。在诸如手机的移动终端直接进行查杀,对终端设备的处理能力和存储量要求过高,在目前的技术下,查杀效率和准确度都较低。 Contents of the invention [0005] 为克服现有技术中的上述缺陷,本发明提供一种基于程序行为的移动设备的安全防护系统和方法。 [0006] 根据本发明的一个方面,提供了一种基于程序行为的移动通信设备的安全防护系统,包括终端设备和服务...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.