Safety software processing method and user terminal

A technology of software and security information, applied in the field of communication, can solve the problems of unrecognizable dangerous software and waste of resources, and achieve the effect of improving operating efficiency and strengthening monitoring

Inactive Publication Date: 2015-07-08
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF7 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention provides a software-based security processing method and a user terminal, which are used to solve the waste of resources caused by the use of a unified security monitoring and protection strategy in the prior art, and cause certain potentially dangerous software to be unable to be accurately identified by the user terminal The problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety software processing method and user terminal
  • Safety software processing method and user terminal
  • Safety software processing method and user terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0020] figure 1 A flow chart of the software-based security processing method provided in Embodiment 1 of the present invention, such as figure 1 As shown, the method of the present embodiment includes:

[0021] Step 101. Obtain software to be downloaded, and obtain source information and security information corresponding to the software t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a safety software processing method and a user terminal. The software processing method comprises the steps that the software to be downloaded is obtained, and source information and safety information which correspond to the software to be downloaded are obtained; the corresponding safety level of the software to be downloaded is determined according to the source information and the safety information which correspond to the software to be downloaded; the software to be downloaded is processed in the monitoring way and the resource scheduling mode which correspond to the safety level. According to the software processing method and the user terminal, the safety of software in the user terminal is graded by the user terminal, the monitoring strength and management resources which correspond to the safety levels are provided according to the different safety levels, in this way, monitoring and resource scheduling can be conducted on different software flexibly, and the operating efficiency of the software with the high safety level can be effectively improved; meanwhile, the monitoring strength of the software with the low safety level is improved, and the software which is potentially dangerous can be effectively recognized.

Description

technical field [0001] The present invention relates to communication technology, in particular to a software-based security processing method and a user terminal. Background technique [0002] With the rapid development of communication technology and computer technology, the number of various software that users run on user terminals is also becoming more and more diverse. However, at present, some software in the user terminal may be embedded with some malicious codes, thus becoming attack software, and then causing damage to the system of the user terminal or leakage of user information. For example: at present, the main source of mobile phone software used by users Different from different software malls, many regular software will be implanted with one or more pieces of malicious code by criminals with ulterior motives, and they will also be sold on the software mall. These so-called formal softwares continue to be placed on the software malls to lure mobile phone use...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04M1/725G06F21/57G06F21/56
Inventor 曹万鹏
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products