Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Intrusion prevention device and method based on security policy

A security strategy and intrusion prevention technology, applied in the direction of computer security devices, instruments, platform integrity maintenance, etc., can solve problems affecting user operation experience, monitoring code is difficult to cover suspicious API, technology is difficult to achieve defense, etc., to achieve blocking Effects of privacy theft

Inactive Publication Date: 2017-09-01
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF7 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] This type of intrusion prevention technology is easily bypassed by malicious attacks, because it is difficult for the monitoring code to cover all suspicious APIs; if a privacy theft attack is implemented by injecting so library, this type of technology is difficult to achieve defense; every time a suspicious API call When discovered, users need to participate in judging whether the current behavior of obtaining privacy or sending privacy behavior is led by themselves, which will affect the user's operating experience to a certain extent

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intrusion prevention device and method based on security policy
  • Intrusion prevention device and method based on security policy
  • Intrusion prevention device and method based on security policy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are the Some, but not all, embodiments are invented. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0049] see figure 1 , this embodiment discloses an intrusion prevention device based on a security policy, including:

[0050] Privacy acquisition API monitoring module 1, privacy sending API monitoring module 2, application status library module 3, security policy library module 4, control module 5 and alarm module 6; wherein,

[0051] The privacy acquisition class A...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an intrusion prevention device and method based on a security policy. A private steal behavior can be effectively blocked and a private steal application can be effectively detected under the condition of not modifying an operating system, not influencing the normal operation of a mobile phone security application and not participating in decision by a user frequently. The device comprises a private obtaining class API monitoring module which is used for starting a private sending class API monitoring module if it is monitored that a mobile smart terminal application calls an API in a private sending class API database; the private sending class API monitoring module which is used for starting a control module when it is monitored that the mobile smart terminal application calls the API in a private sending class API database; the control module which is used for interrupting the operation of a first application and blocking the operation of the first application if it is judged that a behavior mode of the first application does not satisfy all security polices stored in a security policy library module; and an alarm module which is used for popping up a window to remind a user after the control module blocks the operation of the first application.

Description

technical field [0001] The invention relates to the technical field of privacy protection and intrusion prevention of mobile intelligent terminals, and in particular to an intrusion prevention device and method based on a security policy. Background technique [0002] With the popularization of mobile smart terminals, more and more mobile smart terminal users store personal information on their devices, so privacy theft attacks and intrusion prevention technologies on smart phones have become a hot topic in the field of mobile Internet security. [0003] For different privacy data, there are currently five types of privacy theft attacks. Privacy theft attack 1 mainly focuses on the identifiers of mobile smart terminals, including IMEI, IMSI, ICCID, and mobile phone numbers. These identifiers are used as mobile phone signs and are often bound to personal accounts or other user personal information by applications. Privacy stealing attack 2 mainly focuses on the user's locati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/55G06F21/56
CPCH04L63/20G06F21/552G06F21/566H04L63/1416H04L63/145
Inventor 朱大立金昊杨莹
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products