Unlock instant, AI-driven research and patent intelligence for your innovation.

Intelligent device file authentication method

An authentication method and technology for smart devices, applied in the fields of instruments, digital data processing, platform integrity maintenance, etc., can solve the problems of low recognition rate of malicious script codes, high consumption of computing resources on mobile devices, and inability to be recognized by ordinary users. Achieve the effect of preventing camouflage and improving the success rate of detection

Inactive Publication Date: 2016-01-06
SICHUAN CINGHOO TECH
View PDF2 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Intruders take advantage of this vulnerability to tamper or disguise webpage files in mobile devices, making ordinary users unable to identify them, and taking the opportunity to execute or distribute illegal programs
Existing web file detection includes static detection and dynamic detection, but they all involve monitoring the functions and events triggered when the file is running, without considering the obfuscation technology used by intruders, so the recognition rate of malicious script code is very low, and the existing The detection model uses simulation technology, which consumes too much computing resources on the mobile device side

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intelligent device file authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The following and accompanying appendices illustrating the principles of the invention Figure 1 A detailed description of one or more embodiments of the invention is provided together. The invention is described in connection with such embodiments, but the invention is not limited to any embodiment. The scope of the invention is limited only by the claims and the invention encompasses numerous alternatives, modifications and equivalents. In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. These details are provided for the purpose of example and the invention may be practiced according to the claims without some or all of these specific details.

[0022] One aspect of the present invention provides a smart device file authentication method. figure 1 It is a flow chart of the smart device file authentication method according to the embodiment of the present invention.

[0023] T...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an intelligent device file authentication method. The method includes the steps that feature vectors of script codes in webpage files are extracted and classified, and whether malicious codes exist in the webpage files or not is recognized according to the classification result. A file detection and recognition method is provided, different invasion modes are detected in different classification modes, fuzzy processing is introduced to prevent disguise of the malicious codes, and the detection success rate is increased.

Description

technical field [0001] The invention relates to computer data security, in particular to an intelligent device file authentication method. Background technique [0002] With the continuous development and popularization of the Internet, various network security incidents emerge in an endless stream, and the entire mobile Internet environment has been seriously threatened, which has brought huge losses to the society. Network security incidents are mostly caused by hackers, and the internal reason is the security loopholes of software or documents themselves. Intruders take advantage of this vulnerability to tamper or disguise webpage files in mobile devices, making it impossible for ordinary users to identify them, and take the opportunity to execute or distribute illegal programs. Existing web file detection includes static detection and dynamic detection, but they all involve monitoring the functions and events triggered when the file is running, without considering the o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/56
CPCG06F21/563
Inventor 陈虹宇罗阳苗宁
Owner SICHUAN CINGHOO TECH