Operation behavior interception method and device, storage medium and electronic device

A technology of behavior and operation authority, applied in the field of information network security, can solve problems such as undiscovered solutions, achieve the effect of reducing risks and losses, and solving weak equipment security

Active Publication Date: 2019-05-17
QI AN XIN SECURITY TECH ZHUHAI CO LTD +1
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The security detection subject and detection method in the related technology have the following defects: the black feature matching needs to have collected the characteristics of this malicious program in advance before it can be stored in the database and provide detection basis
Therefore, whether it is black matching or white matching, once a trusted program is controlled to do evil, it is a problem that current security technologies cannot solve
[0007] For the above-mentioned problems existing in related technologies, no effective solution has been found yet

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Operation behavior interception method and device, storage medium and electronic device
  • Operation behavior interception method and device, storage medium and electronic device
  • Operation behavior interception method and device, storage medium and electronic device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, a server or a similar computing device. Take running on the terminal as an example, figure 1 It is a block diagram of the hardware structure of an intercepting terminal of an operation behavior in the embodiment of the present invention. Such as figure 1 As shown, the terminal 10 may include one or more ( figure 1 Only one is shown in ) processor 102 (processor 102 may include but not limited to processing devices such as microprocessor MCU or programmable logic device FPGA) and memory 104 for storing data. Optionally, the above-mentioned terminal can also be A transmission device 106 for communication functions and an input and output device 108 are included. Those of ordinary skill in the art can understand that, figure 1 The shown structure is only for illustration, and does not limit the structure of the above-mentioned terminal. ...

Embodiment 2

[0226] In this embodiment, a device for intercepting operation behaviors is also provided, which may be a terminal or a server. The device is used to implement the above embodiments and preferred implementation modes, and those that have already been explained will not be repeated. As used below, the term "module" may be a combination of software and / or hardware that realizes a predetermined function. Although the devices described in the following embodiments are preferably implemented in software, implementations in hardware, or a combination of software and hardware are also possible and contemplated.

[0227] Figure 9 is a structural block diagram of an intercepting device for operating behavior according to an embodiment of the present invention, which can be applied in a client or a server, such as Figure 9 As shown, the device includes: distribution module 90, monitoring module 92, interception module 94, wherein,

[0228] Assignment module 90, configured to assign ...

Embodiment 3

[0237] An embodiment of the present invention also provides a storage medium, in which a computer program is stored, wherein the computer program is set to execute the steps in any one of the above method embodiments when running.

[0238] Optionally, in this embodiment, the above-mentioned storage medium may be configured to store a computer program for performing the following steps:

[0239] S1. Assigning operation rights to the behavior subject according to the scope of duties, wherein the behavior subject includes at least one of the following: programs, equipment, and users;

[0240] S2, monitoring whether the subject of the behavior is maliciously controlled according to the memory sequence, and initiating an operation within the operation authority;

[0241] S3. Intercepting the operation behavior when it is detected that the behavior subject initiates the operation behavior within the operation authority under malicious control.

[0242] Optionally, in this embodimen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an operation behavior interception method and device, a storage medium and an electronic device, and the method comprises the steps of allocating operation authorities to a behavior subject according to a responsibility range, wherein the behavior subject comprises at least one of the following items of a program, equipment and a user; monitoring whether the behavior subjectis maliciously controlled or not according to the memory sequence, and initiating an operation behavior within the operation authority; and when it is monitored that the behavior subject initiates the operation behavior within the operation authority in the malicious control state, intercepting the operation behavior. Through the present invention, the risk that the system is maliciously controlled and the loss are prevented or reduced, and the technical problem of weak equipment safety in the prior art is solved.

Description

technical field [0001] The present invention relates to the field of information network security, in particular to a method and device for intercepting operational behavior, a storage medium, and an electronic device. Background technique [0002] The security protection methods in related technologies all block malicious operations through black and white lists or behavioral characteristics. The security company collects and organizes the program whitelist, and builds the whitelist database of the program features that are confirmed to be normal. The programs in the whitelist are considered trusted programs. At the same time, the effective digital signatures of all formal companies are collected, a digital signature library is established, and programs with formal company signatures are processed according to trusted procedures. For example: the services and programs of the operating system itself are naturally trusted by security companies because they have the signature...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/577
Inventor 徐贵斌
Owner QI AN XIN SECURITY TECH ZHUHAI CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products