Mobile application security analysis method based on block chain technology

A mobile application and security analysis technology, applied in transmission systems, electrical components, etc., can solve problems such as user and social losses, low processing efficiency, and processing capacity limitations, so as to reduce user and social losses, improve processing efficiency, The effect of improving safety

Pending Publication Date: 2019-10-18
JIANGSU NANGONG TECH GRP CO LTD
View PDF8 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the rapid development of social economy, network technology is also constantly improving, and security incidents occur frequently when people use mobile applications, such as data leakage, hacker attacks, infrastructure attacks, security vulnerability discovery, malware, industry financing investment Acquisitions, etc. Traditionally, network security incidents are dealt with independently, which will limit the processing speed and processing capacity. At the same time, there is also a lack of supervision over the processing process, resulting in unhandled network security incidents. When or when the processing efficiency is low, it will bring huge losses to users and society

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0019] The present invention provides a technical solution: a mobile application security analysis method based on block chain technology, comprising the following steps:

[0020] S1, user registration, the system automatically generates a login ID when registering an account, and the user sets a password by himself. After the registration is completed, real-name authentication is required, and real-name authentication requires real personal information of the user level;

[0021] S2, identity verification. The user logs in to the personal account on the login interface. After the user logs in, the identity authentication module is started to accept the user's access request, and the user is authenticated based on the traditional method. If the authentication is passed, the user's risk is evaluated based on the risk threshold. During evaluation, request that if the user's risk value is within the threshold range, the user passes the authentication and can continue to visit the ...

Embodiment 2

[0029] The present invention provides a technical solution: a mobile application security analysis method based on block chain technology, comprising the following steps:

[0030] S1, identity verification, the user logs in the personal account on the login interface, if there is no account, step 2 is required; after the user logs in, the identity authentication module is started, and the user's access request is accepted, and the user is authenticated based on the traditional method. If the authentication fails, the user If the user fails to pass the authentication, this visit is rejected; forcible intrusion login triggers the abnormal warning module;

[0031] S2, user registration, the system automatically generates a login ID when registering an account, and the user sets a password by himself. After the registration is completed, real-name authentication is required, and real-name authentication requires real personal information of the user level;

[0032] S3, network dat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a mobile application security analysis method based on a block chain technology. The mobile application security analysis method comprises the following steps of identity authentication, user registration, network data acquisition, user feedback, exception early warning processing, new network security event establishment and security accident emergency processing. The method has the advantages that according to the mobile application security analysis method based on the blockchain technology, a part of harassment users can be filtered out from a login interface, an intruder is warned, a processing method is generated according to an entry record and a browsing record of the intruder and resource library analogy, linkage of warning and processing is achieved, and the login security is improved; new network security events are published in the whole network and co-processed in the whole network, compared with traditional independent processing, the technology ismore comprehensive, the processing efficiency of the network security events is improved, and losses of users and the society are reduced to the maximum extent.

Description

technical field [0001] The invention relates to the technical field of mobile application security analysis, in particular to a mobile application security analysis method based on block chain technology. Background technique [0002] With the rapid development of social economy, network technology is also constantly improving, and security incidents occur frequently when people use mobile applications, such as data leakage, hacker attacks, infrastructure attacks, security vulnerability discovery, malware, industry financing investment Acquisitions, etc. Traditionally, network security incidents are dealt with independently, which will limit the processing speed and processing capacity. At the same time, there is a lack of supervision over the processing process, resulting in network security incidents that cannot be handled. When or the processing efficiency is low, it will bring huge losses to users and society. Contents of the invention [0003] The purpose of the pres...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/08H04L63/20H04L67/1097
Inventor 吴雪峰陈俊桦夏鸣
Owner JIANGSU NANGONG TECH GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products