Social software monitoring system and social software protection method
A social software and monitoring system technology, applied in transmission systems, electrical components, etc., can solve problems such as easy to be exploited, lack of monitoring protection, and threats to user information and property security, so as to ensure security, privacy security, and information security Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0028] Example one, please refer to Figure 1~2 And 4. A monitoring system for social software. The software monitoring system 1 includes a DNS identification module 10, an API reading module 20, a security analysis module 30, a software association identification module 40, and a database 50; the DNS identification module 10 is used Identify the DNS location data for data transmission between the software and the Internet to determine whether the DNS is a normal DNS list. The DNS list includes a white list, a black list, and a gray list. The white list is a verified, safe and problem-free DNS directory. A blacklist is a DNS directory that has been verified and has security issues. Security issues include but are not limited to causing privacy data leakage, account stolen, software Trojan horse virus implantation, or excessive and abnormal occupation of system space. The graylist has not yet passed The verified DNS directory is verified, and operation prompts are taken for the D...
Example Embodiment
[0036] Example two, please refer to Figure 1~4 , A social software monitoring system, the software monitoring system 1 includes a DNS identification module 10, an API reading module 20, a security analysis module 30, a software association identification module 40 and a database 50; the DNS identification module 10 is used to identify DNS location data for data transmission between the software and the Internet to determine whether the DNS is a normal DNS list. The DNS list includes a white list, a black list and a gray list. The white list is a verified and verified DNS directory and black list. That is, the DNS directory that has been verified and verified to have security issues. Security issues include but are not limited to causing privacy data leakage, account theft, software Trojan horse virus implantation, or excessive and abnormal occupation of system space. The graylist has not been verified yet. In the DNS directory of, take action prompts for the DNS in the graylis...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap