Trusted policy update method and device, trusted security management platform
A technology of a security management platform and an update method, applied in the update method and device of a trusted policy, and the field of a trusted security management platform, can solve the problems of low update efficiency and the like
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0027] According to an embodiment of the present invention, an embodiment of a method for updating a trusted policy is provided. It should be noted that the steps shown in the flowcharts of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and , although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.
[0028] figure 1 is a flow chart of an optional trusted policy update method according to an embodiment of the present invention, such as figure 1 As shown, the method includes the following steps:
[0029] Step S102, counting the abnormal behavior rate of the target application in each of the first k cycles, wherein the abnormal behavior rate is the ratio of the number of abnormal behaviors to the total number of behaviors, and the abnormal behavior refers to the set of behaviors except those indicate...
Embodiment 2
[0058] figure 2 is a schematic diagram of an optional trusted policy update device according to an embodiment of the present invention, such as figure 2 As shown, the update device may include: a statistical unit 21, a calculation unit 23, a first determination unit 25, a second determination unit 27,
[0059] The statistical unit 21 is used to count the abnormal behavior rate of the target application program in each cycle in the first k cycles, wherein the abnormal behavior rate is the ratio of the number of abnormal behaviors to the total number of behaviors, and the abnormal behavior refers to Behaviors other than the indicated behavior set, the trusted strategy is the strategy learned from the access behavior data of the target application program in the previous k cycles;
[0060] Calculation unit 23, for calculating the mean value and variance value of the abnormal behavior rate of each cycle;
[0061] The first determination unit 25 is configured to determine a tar...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

