Sandbox based two-dimensional code detection method and system

A two-dimensional code and sandbox technology, applied in the field of information security, can solve problems such as insufficient maintenance of two-dimensional code security, and achieve the effect of avoiding opening malicious two-dimensional codes, assisting judgment and decision-making, and accurate detection results.

Inactive Publication Date: 2016-06-29
HARBIN ANTIY TECH
View PDF3 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] There is no perfect method for detecting malicious QR codes, but there are various forms of malicious QR codes. Currently, static detection methods based on black and white lists and signature codes are not enough to maintain the security of QR codes.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sandbox based two-dimensional code detection method and system
  • Sandbox based two-dimensional code detection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The present invention provides a sandbox-based two-dimensional code detection method and system embodiments, in order to enable those skilled in the art to better understand the technical solutions in the embodiments of the present invention, and to make the above-mentioned purpose and characteristics of the present invention And advantage can be more obvious and easy to understand, below in conjunction with accompanying drawing technical scheme in the present invention is described in further detail:

[0027] The present invention first provides an embodiment of a sandbox-based two-dimensional code detection method, such as figure 1 shown, including:

[0028] S101 When it is found that the code scanning tool is scanning the two-dimensional code, put the two-dimensional code into the simulation sandbox for operation;

[0029] Among them, use the simulated sandbox to open the QR code without worrying about endangering system security;

[0030] S102 Acquiring relevant b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a sandbox based two-dimensional code detection method. The sandbox based two-dimensional code detection method comprises the following steps of inputting a two-dimensional code to a simulation sandbox for running when a scanning tool is scanning the two-dimensional code; acquiring correlation behavior information of the two-dimensional code, and judging whether the correlation behavior information is possessed with a threat, if yes, giving out a threat level; monitoring the stability of the simulation sandbox in real time, and giving out an abnormal level if abnormality occurs; and comprehensively judging whether the two-dimensional code is malicious or not according to the thread level and the abnormal level, if yes, intercepting the two-dimensional code and generating a behavior report, otherwise allowing a terminal to open the two-dimensional code. The invention also discloses a sandbox based two-dimensional code detection system. With the technical scheme disclosed by the invention, the limitation of static detection can be made up, and a better detection effect can be achieved.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a sandbox-based two-dimensional code detection method and system. Background technique [0002] At present, the usage rate of QR code is getting higher and higher, and it can be seen almost everywhere. The more common QR code content is generally URL, file (download app), WIFI login, etc., but in fact, ordinary text, personal business card, picture, text message, phone call, etc. can be made into QR code, and the production threshold is very high. Low. [0003] There is no perfect method for detecting malicious QR codes, but there are various forms of malicious QR codes. Currently, static detection methods based on black and white lists and signature codes are not enough to maintain the security of QR codes. Contents of the invention [0004] The technical solution of the present invention puts the scanned two-dimensional code into the simulated sandbox for opera...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/53G06F21/56
CPCG06F21/53G06F21/566
Inventor 王聪李柏松
Owner HARBIN ANTIY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products