Security estimation method and device

A security assessment and technology to be assessed, applied in the communication field, can solve problems such as inability to assess security accurately, and achieve the effect of accurate security assessment

Active Publication Date: 2015-09-30
TENCENT TECH (SHENZHEN) CO LTD +1
View PDF6 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] With the ever-changing development of the Internet, the above solutions can only identify terminals that send malicious codes (such

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security estimation method and device
  • Security estimation method and device
  • Security estimation method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings. Obviously, the described embodiments are only some embodiments of the present invention, rather than all embodiments . Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0025] Compared with PCs, mobile terminals have an inherent advantage in terms of security, that is, the devices are relatively fixed. If a method can be used to classify the security of the device corresponding to a number, then this is undoubtedly an effective evaluation latitude.

[0026] The embodiment of the present invention aims to propose a method of rating a device according to the credibility of the operation type based on the op...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a security estimation method and device. The realization of the method, for example, comprises the steps that the operation behavior set of an object to be evaluated is acquired, and the operation behavior set is a set including operation items corresponding to the object to be evaluated; all the operation items in the operation behavior set are compared with the preset operation item scoring rule, and the scores of the operation items in the operation behavior set are calculated; and the security level of the object to the evaluated is confirmed according to the scores. The operation behavior set of the evaluation object is acquired, all the operation items in the operation behavior set are compared with the preset operation item scoring rule, and the scores of the operation items in the operation behavior set are calculated so that the security level of the object to be evaluated is confirmed through a scoring mode based on statistics of the operation behaviors, and thus accurate security evaluation can be realized.

Description

technical field [0001] The present invention relates to the technical field of communications, in particular to a security assessment method and device. Background technique [0002] Judging from the current development of the Internet, the user's operation scene has gradually shifted from the PC (personal computer, personal computer) terminal to the mobile terminal. However, the security assessment of mobile devices has become a new challenge for the mobile Internet. [0003] At present, whether the PC-side device is a safe device or not, the commonly used method is to receive various data sent by it after establishing a communication connection with the device, and determine whether the data sent by it contains malicious codes, malicious links, etc. To determine whether it is a safe device. [0004] With the ever-changing development of the Internet, the above solutions can only identify terminals that send malicious codes (such as Trojan horse programs), but for those t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/00
CPCH04L63/10H04L63/1416H04L63/1441
Inventor 董梁陈梦陈荣李德春唐艳平孙增昕刘飞飞陈远斌
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products