Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Data detection method and device

A data detection and data technology, applied in the field of network security, can solve problems such as terminal malicious data intrusion, system or user data threats, etc., and achieve the effect of ensuring security and reliability

Inactive Publication Date: 2016-02-10
BEIJING QIHOO TECH CO LTD +1
View PDF4 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present invention provides a data detection method and device, which are used to solve the problem that the terminal is invaded by malicious data and poses a threat to the system or user data. The embodiment of the present invention checks the data packets entering or outputting the terminal in advance to prevent Discover malicious data in a timely manner to ensure the security and reliability of data interaction in the terminal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data detection method and device
  • Data detection method and device
  • Data detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0072] A) The hook program is used to capture the interface function of the terminal operating system to send or receive network data, and when the interface function is captured, the data packet to be sent or to be received pointed to by the interface function is intercepted.

[0073] The Hook mechanism allows applications to intercept operating system messages or specific events. It is a message processing mechanism in the operating system. Applications can set subroutines on it to monitor certain messages of specific interface functions provided by the operating system. , such as the interface function for sending and receiving network data, the implementation of the hook mechanism can be achieved by: obtaining a hook plug-in corresponding to a specific event behavior from a background sandbox HOOK framework, and using the hook plug-in to monitor the specific event behavior of the target application. Achieved. The background sandbox HOOK framework can be centrally managed o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention relates to a data detection method and a data detection device. The data detection method comprises the following steps: intercepting a data packet flowing through a network data transmission interface by monitoring a network data transmission interface of a terminal operating system; according to preset safety rules, scanning the data packet; if the data packet contains non-safe data content, processing the non-safe data content; and returning the processed data packet to the network data transmission interface for carrying out data transmission, so that the problems that a terminal is invaded by malicious data and a system or user data is threaten are solved, early inspection of the data packet which enters or is output from the terminal is realized, and the malicious data is timely found, so that security and reliability of data interaction in the terminal are guaranteed.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of network security, and in particular, to a data detection method and device. Background technique [0002] With the popularity of smart mobile terminals, the types and quantities of smart mobile terminal applications are becoming more and more abundant. [0003] The ensuing problem is that hackers and virus makers attach web crawlers or malicious plug-ins to various user-interactive network data such as web pages, applications, and text messages, resulting in leakage of user information, reception of spam or fraudulent text messages, virus planting, etc. Instabilities or crashes of the system caused by entering the operating system, additional costs caused by users accidentally clicking on phishing websites or malicious links, etc. All of the above problems make users more worried about their mobile devices while enjoying the convenience and entertainment brought by smart mobile t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1425H04L63/0272
Inventor 万仁国
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products