Threat perception method and system based on operating scenario analysis

A technology of operating scenarios and operating data, applied in the field of threat perception methods and systems based on analysis of operating scenarios, can solve problems such as the inability to identify potential security risks, improve the ability to identify and predict, reduce the probability of potential security risks, and improve users The effect of experience

Active Publication Date: 2019-02-12
北京智游网安科技有限公司
View PDF10 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Based on this, in order to solve the technical problem that the traditional technology cannot effectively and predictively iden...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Threat perception method and system based on operating scenario analysis
  • Threat perception method and system based on operating scenario analysis
  • Threat perception method and system based on operating scenario analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] In order to facilitate the understanding of the present invention, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only part of the embodiments of the present invention, rather than Full examples. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0050] Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the technical field of the invention. The terminology used herein in the description of the invention is for the purpose of describing specific embodiments only, and is not intended to limit the present invention. As used here...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiments of the invention disclose a threat perception method based on operating scenario analysis, based on a system comprising at least one client and a server. The method comprises: the server receiving operating data, application matching result data and/or control trigger data uploaded by the client, analyzing the operating data, the application matching result data and/or the controltrigger data to determine whether a preset operating scenario that matches the operating data, the application matching result data and/or the control trigger data is present, using the matching operating scenario as a target operating scenario, determining a target execution strategy corresponding to the target operating scenario, and transmitting a target execution instruction included in the target execution strategy to the client by an operation assistance system; and the client executing a response operation included in the target execution instruction after receiving the target executioninstruction. The method and the system can improve the recognition efficiency of the security risk of an application during use, and improve the defense ability against the unknown threat.

Description

technical field [0001] The present invention relates to the fields of big data technology and terminal security technology, in particular to a threat perception method and system based on analysis of running scenarios. Background technique [0002] With the popularization of Internet applications and the increasing dependence of users on the Internet in daily life, Internet security issues have become increasingly prominent. For example, more and more customers install and use various applications on personal terminals such as mobile phones and computers. However, during the use of various applications, they may be subject to security threats, business threats, and operational threats from various parties. , and whether these threats and potential safety hazards can be detected and dealt with accordingly is a very important part of the user experience during use, which puts forward higher requirements for application developers. [0003] In the existing technology, the moni...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06F21/56
CPCH04L63/1416H04L63/1441G06F21/566
Inventor 段湛洋舒虹鑫
Owner 北京智游网安科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products