Software behavior monitoring method and terminal

A technology of software and behavior, applied in the field of communication, can solve the problems that software cannot and cannot flexibly modify software attributes, isolation and early warning, etc., and achieve the effect of improving security performance

Inactive Publication Date: 2014-03-26
SHENZHEN COOLPAD SOFTWARE TECH +1
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, few terminals have integrated seLinux technology. Even if seLinux technology is integrated, it is only a fixed monitoring solution. When an application software is detected to be operating illegally, the current operation is only prohibited, and the user will not be prompted for the software. Behaviors and existing risks, and the properties of the software in the seLinux system cannot be flexibly modified, and risky software cannot be completely isolated and warned

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software behavior monitoring method and terminal
  • Software behavior monitoring method and terminal
  • Software behavior monitoring method and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to understand the above-mentioned purpose, features and advantages of the present invention more clearly, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. It should be noted that, in the case of no conflict, the embodiments of the present application and the features in the embodiments can be combined with each other.

[0030] In the following description, many specific details are set forth in order to fully understand the present invention. However, the present invention can also be implemented in other ways different from those described here. Therefore, the protection scope of the present invention is not limited by the specific details disclosed below. EXAMPLE LIMITATIONS.

[0031] figure 1 A flow chart of a software behavior monitoring method according to an embodiment of the present invention is shown.

[0032] Such as figure 1 As shown, the software behavior monito...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a software behavior monitoring method and a terminal. The software behavior monitoring method includes the steps of recording the number of violation operations of software, judging whether the number of the violation operations is larger than a threshold value, and reminding a user to uninstall the software when the number of the violation operations is larger than the threshold value. A security-enhanced Linux subsystem is transplanted on the terminal so as to monitor violation operation behaviors of the software according to a set authority strategy, when the number of the violation operations is larger than the threshold value, the user is reminded of software behaviors, pre-warning and collection of rogue software are achieved, and safety performance of the terminal is improved.

Description

technical field [0001] The present invention relates to the technical field of communications, in particular, to a software behavior monitoring method and a terminal. Background technique [0002] The SELinux (Security Enhanced Linux) security subsystem was originally started by the NSA (National Security Agency) and added to a set of core components and user tools in the Linux subsystem, allowing applications to run on the minimum privileges they need . At present, few terminals have integrated seLinux technology. Even if seLinux technology is integrated, it is only a fixed monitoring solution. When an application software is detected to be operating illegally, the current operation is only prohibited, and the user will not be prompted for the software. Behaviors and existing risks, and the properties of the software in the seLinux system cannot be flexibly modified, and risky software cannot be completely isolated and warned. [0003] Therefore, how to realize the early ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/566G06F2221/2135
Inventor 刘惠盛
Owner SHENZHEN COOLPAD SOFTWARE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products