Unlock instant, AI-driven research and patent intelligence for your innovation.

Application reinforcement method and apparatus

An installation package and configuration file technology, applied in the field of communication, can solve problems such as low security, high security risk, and security risk enterprise damage, and achieve the effect of improving safety factor and reducing security risk

Active Publication Date: 2016-04-06
ZTE CORP
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the popularization of mobile devices and mobile applications has brought more convenience and efficiency improvements to the business and office of enterprises, it has also brought a large number of security risks and risks.
Especially as some mobile applications enter the core business of the enterprise, for example, because some applications can obtain or access information such as the core business of the enterprise or trade secrets, once the security of the application itself is too low, it is relatively easy to If it is cracked by lawbreakers, the company's core business or business secrets and other information will be exposed. This security risk may bring huge damage and loss to the company.
[0005] Aiming at the problem that there are still relatively large security risks in the application of related technologies, no effective solution has been proposed so far

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application reinforcement method and apparatus
  • Application reinforcement method and apparatus
  • Application reinforcement method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] Hereinafter, the present invention will be described in detail with reference to the drawings and examples. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

[0031] In this embodiment, an application reinforcement method is provided, figure 1 is a flow chart of an applied hardening method according to an embodiment of the present invention, such as figure 1 As shown, the method includes the following steps:

[0032] Step S102, determining the security features that the application lacks;

[0033] Step S104, performing security hardening on the application according to the missing security features.

[0034] In this embodiment, through the above steps, in order to meet the security needs of different users in different scenarios, determine the security features that the current application lacks, and strengthen the application according to the missing o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an application reinforcement method and apparatus. The method comprises: determining a missing security feature of an application; and performing security reinforcement on the application according to the missing security feature. Through the application reinforcement method and apparatus, the problem that applications still have relatively high security risk in related technologies is solved and the security coefficient of using the application is increased; and with the application reinforcement method provided by an embodiment of the invention, the application can be updated and perfected along with the updating and perfecting of security features in a security feature library, so that the security risk of using the application is greatly lowered.

Description

technical field [0001] The present invention relates to the communication field, in particular, to an application reinforcement method and device. Background technique [0002] Under the current form of globalized economic development, information management plays an important role in the development and construction of enterprises, and information security management is an important guarantee for information construction. Therefore, enterprise application security as an information carrier is particularly important. [0003] On the one hand, although traditional enterprise applications use different technologies at all levels to ensure security—for example, in order to protect the security of client PCs, users will install anti-virus software; in order to ensure the security of user data transmission, the communication layer usually uses SSL technology encrypts data; enterprises will use firewalls and IDS / IPS to ensure that only specific access is allowed; enterprises use ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/12
Inventor 董劲付光
Owner ZTE CORP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More