Supercharge Your Innovation With Domain-Expert AI Agents!

Mobile terminal system security automatic evaluation system and method based on attack

A mobile terminal and system security technology, applied in the field of mobile information security, can solve the problems of difficult implementation of security assessment system, high repetition rate of test operations, cumbersome test process, etc., and achieve easy security assessment, accurate security assessment, and simple test process. Effect

Inactive Publication Date: 2013-08-28
SICHUAN HENGJINYI SCI & TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In practice, the system is not always in a constant security state due to the different strengths of security settings at different times and scenarios of the system, and the traditional test method lacks test analysis for the system in different security states, and the test process is cumbersome. Operation repetition rate is high and subjectivity is strong
And due to the resource limitation of the mobile terminal platform, it is difficult to realize the security evaluation system based on the security function testing method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile terminal system security automatic evaluation system and method based on attack
  • Mobile terminal system security automatic evaluation system and method based on attack
  • Mobile terminal system security automatic evaluation system and method based on attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The technical solution of the present invention will be further described below in conjunction with the accompanying drawings, but the content protected by the present invention is not limited to the following description.

[0025] Such as figure 1 As shown, the attack-based mobile terminal system security automatic evaluation system includes a computer terminal and a plurality of mobile terminals, and the computer terminal includes the following modules:

[0026] Safety state space module: According to the needs of the test, design and customize the safety state space required by each test and store it;

[0027] Security state generation module: take out the space to be tested from the state space module, generate a security state vector and send it to the security state setting module of each mobile terminal respectively, accept the feedback information of each terminal at the same time, and be responsible for the collaborative attack vector generation;

[0028] Inte...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a mobile terminal system security automatic evaluation system and method based on attack. The evaluation system comprises a computer terminal and a plurality of mobile terminals. The computer terminal comprises a safe state space module, a safe state generating module, a centralized attack base, an attack vector generating module, an attack driving module and a result analysis module. Each mobile terminal comprises a module safe state setting module and an attack testing module. The mobile terminal system security automatic evaluation system and method based on the attack can conduct test analysis of a mobile terminal system in different safe states, can objectively and accurately conduct safety evaluation on the mobile terminal system, is free of limitation caused by mobile terminal platform resources, and enables the safety evaluation of a mobile terminal to be easily achieved. In addition, the mobile terminal system security automatic evaluation system and method based on the attack has the advantages of being simple in testing process and low in repetition rate of operation.

Description

technical field [0001] The invention belongs to the field of mobile information security, relates to security automatic testing, and particularly designs an attack-based mobile terminal system security automatic testing system and method. Background technique [0002] Mobile smart terminal security has become a hot spot in the industry, and evaluating the security of mobile smart terminal systems is the basis for ensuring mobile information security. Existing security evaluation methods and tools are mainly based on standard security function tests and lack objective anti-attack performance tests. In practice, the system is not always in a constant security state due to the different strengths of security settings at different times and scenarios of the system, and the traditional test method lacks test analysis for the system in different security states, and the test process is cumbersome. Operation repetition rate is high and subjectivity is strong. And due to the resou...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00
Inventor 唐杰文红禄全芳
Owner SICHUAN HENGJINYI SCI & TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More