Security attribute identification method and device for application program

A technology of application programs and security attributes, applied in the Internet field, can solve problems such as the lack of cognition of programs, the inability to judge, and the inability to reliably identify the security attributes of files, etc., to achieve the effect of establishing an effective and perfect private library

Active Publication Date: 2016-09-28
BEIJING QIANXIN TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The problem in the above prior art is that the private library of the private cloud may not be perfect, especially when the private cloud has just been deployed, there may not be a program that the user requests to access in the private library, and it is impossible to judge whether to execute the program; Although manual judgment can be made, since managers are usually not familiar with the business and have no knowledge of these programs, it is impossible to reliably identify the security attributes of the file

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security attribute identification method and device for application program
  • Security attribute identification method and device for application program

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0078] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0079] Embodiments of the invention may be applied to computer systems / servers that are operational with numerous other general purpose or special purpose computing system environments or configurations. Examples of well-known computing systems, environments and / or configurations suitable for use with computer systems / servers include, but are not limited to: personal computer systems, server computer systems, thin clients, thick cli...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a reliable method and device for identifying security attributes of application programs. The device comprises a feature file receiving module, a judging module, a second service end identifying module and a reference database identifying module, wherein the feature file receiving module is suitable for receiving feature files of the application program submitted by a terminal; the judging module is suitable for judging whether a second service end can be connected or not in current, if so, the second service end identifying module is executed, and if not, the reference database identifying module is executed; the second service end identifying module is suitable for acquiring the security attributes corresponding to the application program according to the feature files through accessing the second service end; and the reference database identifying module is suitable for accessing a reference database preset at a first service end, and acquiring the security attributes corresponding to the application program according to the feature files. The reference database is preset by the following modules: a loading module and a storing module, wherein the loading module is suitable for accessing the second service end and loading the reference database; the storing module is suitable for storing the reference database at the first service end; and the reference database is updated by means of offline loading.

Description

technical field [0001] The present application relates to the technical field of the Internet, in particular to a security attribute identification method and device for application programs. Background technique [0002] Cloud is a metaphor for the Internet and the network. It represents the abstraction of the Internet and the underlying infrastructure. It can be roughly divided into public clouds and private clouds. [0003] A public cloud usually refers to a cloud that a third-party provider directly provides services to external users through its own infrastructure. As long as they are registered users and paid users, they can access the public cloud through the Internet to obtain corresponding network services, but they do not own cloud computing resources. [0004] A private cloud is placed in a private environment, such as an organization such as an enterprise or a government that establishes itself in a computer room, or is built by an operator but leased to a certa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F17/30H04L29/08H04L29/06
Inventor 张家柱
Owner BEIJING QIANXIN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products