Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Social software monitoring system and social software protection method

A social software and monitoring system technology, applied in transmission systems, electrical components, etc., can solve problems such as easy to be exploited, lack of monitoring protection, and threats to user information and property security, so as to ensure security, privacy security, and information security Effect

Inactive Publication Date: 2020-02-28
NANJING CHENXIAO SOFTWARE TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the present invention is to provide a social software monitoring system and protection method in order to solve the problem that existing design software lacks monitoring protection and is easily exploited to threaten the security of user information and property

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Social software monitoring system and social software protection method
  • Social software monitoring system and social software protection method
  • Social software monitoring system and social software protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0028] Example 1, please refer to Figure 1~2 And 4, a kind of monitoring system of social software, this software monitoring system 1 comprises DNS identification module 10, API reading module 20, safety analysis module 30, software association identification module 40 and database 50 constitute; Described DNS identification module 10 uses The DNS location data for data transmission between the identification software and the Internet is used to judge whether the DNS is a normal DNS list. The DNS list includes white list, black list and gray list. The white list is the DNS directory that has been verified and verified to be safe and problem-free. The blacklist is a DNS directory that has been verified and has security problems. Security problems include but are not limited to leakage of private data, account theft, software Trojan horse virus implantation, or excessive and abnormal occupation of system space. Verify the verified DNS directory, take operation prompts for the D...

Embodiment 2

[0036] Example 2, please refer to Figure 1~4 , a monitoring system for social software, the software monitoring system 1 includes a DNS identification module 10, an API reading module 20, a security analysis module 30, a software association identification module 40 and a database 50; the DNS identification module 10 is used to identify DNS location data for data transmission between the software and the Internet to determine whether the DNS is a normal DNS list. The DNS list includes whitelist, blacklist and graylist. The whitelist is the DNS directory that has been verified and verified to be safe and problem-free. That is, the DNS directory that has been verified and has security problems. Security problems include but are not limited to leakage of private data, account theft, software Trojan virus implantation, or excessive abnormal occupation of system space. The gray list has not been verified. The DNS directory in the gray list takes an operation prompt for the DNS in ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a monitoring system of social software. The software monitoring system comprises a DNS recognition module, an API reading module, a safety analysis module and a software association recognition module. The DNS recognition module is used for identifying DNS position data for data transmission between the software and the Internet and judging whether the DNS is a normal DNS list or not; the API reading module is used for reading an API function of the software; the safety analysis module is used for analyzing the external safety condition of the software according to theidentified DNS and API; and the software association recognition module is used for carrying out association relationship recognition on the software in the system and the software and the third-partysoftware. In the present invention, the method comprises the following steps: recording, analyzing and identifying DNS and API accessed when software is used; according to the method, whether the software is in access connection with the abnormal DNS or not is judged, privacy information is prevented from being stolen. Meanwhile, whether illegal programs exist in the software or excessive information collection is conducted or not is judged by recording API running conditions, and therefore privacy safety of a user is guaranteed.

Description

technical field [0001] The invention belongs to the technical field of software, in particular to a monitoring system and protection method of social software. Background technique [0002] With the continuous enrichment of network life, social software has become an indispensable part of people's daily life. At present, the social software market is large and there are many user groups, resulting in different levels and purposes of companies entering the market. Many social software not only excessively obtain users' private content, but also sell it online for profit, which greatly damages the rights and interests of user groups. At the same time, the security judgment ability of users' social software is limited, so that some software carrying Trojan horses and viruses are downloaded by users, resulting in the theft of user account information, which seriously threatens the safety of users' property. Therefore, we propose a social software monitoring system and Protectio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/12
CPCH04L63/1416H04L63/1425H04L63/1441H04L63/145H04L61/4511
Inventor 刘欢余宏家
Owner NANJING CHENXIAO SOFTWARE TECH CO LTD
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More