Social software monitoring system and social software protection method

A social software and monitoring system technology, applied in transmission systems, electrical components, etc., can solve problems such as easy to be exploited, lack of monitoring protection, and threats to user information and property security, so as to ensure security, privacy security, and information security Effect

Inactive Publication Date: 2020-02-28
NANJING CHENXIAO SOFTWARE TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the present invention is to provide a social software monitoring system and protection method in order to solve the prob

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Social software monitoring system and social software protection method
  • Social software monitoring system and social software protection method
  • Social software monitoring system and social software protection method

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0028] Example one, please refer to Figure 1~2 And 4. A monitoring system for social software. The software monitoring system 1 includes a DNS identification module 10, an API reading module 20, a security analysis module 30, a software association identification module 40, and a database 50; the DNS identification module 10 is used Identify the DNS location data for data transmission between the software and the Internet to determine whether the DNS is a normal DNS list. The DNS list includes a white list, a black list, and a gray list. The white list is a verified, safe and problem-free DNS directory. A blacklist is a DNS directory that has been verified and has security issues. Security issues include but are not limited to causing privacy data leakage, account stolen, software Trojan horse virus implantation, or excessive and abnormal occupation of system space. The graylist has not yet passed The verified DNS directory is verified, and operation prompts are taken for the D...

Example Embodiment

[0036] Example two, please refer to Figure 1~4 , A social software monitoring system, the software monitoring system 1 includes a DNS identification module 10, an API reading module 20, a security analysis module 30, a software association identification module 40 and a database 50; the DNS identification module 10 is used to identify DNS location data for data transmission between the software and the Internet to determine whether the DNS is a normal DNS list. The DNS list includes a white list, a black list and a gray list. The white list is a verified and verified DNS directory and black list. That is, the DNS directory that has been verified and verified to have security issues. Security issues include but are not limited to causing privacy data leakage, account theft, software Trojan horse virus implantation, or excessive and abnormal occupation of system space. The graylist has not been verified yet. In the DNS directory of, take action prompts for the DNS in the graylis...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a monitoring system of social software. The software monitoring system comprises a DNS recognition module, an API reading module, a safety analysis module and a software association recognition module. The DNS recognition module is used for identifying DNS position data for data transmission between the software and the Internet and judging whether the DNS is a normal DNS list or not; the API reading module is used for reading an API function of the software; the safety analysis module is used for analyzing the external safety condition of the software according to theidentified DNS and API; and the software association recognition module is used for carrying out association relationship recognition on the software in the system and the software and the third-partysoftware. In the present invention, the method comprises the following steps: recording, analyzing and identifying DNS and API accessed when software is used; according to the method, whether the software is in access connection with the abnormal DNS or not is judged, privacy information is prevented from being stolen. Meanwhile, whether illegal programs exist in the software or excessive information collection is conducted or not is judged by recording API running conditions, and therefore privacy safety of a user is guaranteed.

Description

technical field [0001] The invention belongs to the technical field of software, in particular to a monitoring system and protection method of social software. Background technique [0002] With the continuous enrichment of network life, social software has become an indispensable part of people's daily life. At present, the social software market is large and there are many user groups, resulting in different levels and purposes of companies entering the market. Many social software not only excessively obtain users' private content, but also sell it online for profit, which greatly damages the rights and interests of user groups. At the same time, the security judgment ability of users' social software is limited, so that some software carrying Trojan horses and viruses are downloaded by users, resulting in the theft of user account information, which seriously threatens the safety of users' property. Therefore, we propose a social software monitoring system and Protectio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/12
CPCH04L63/1416H04L63/1425H04L63/1441H04L63/145H04L61/4511
Inventor 刘欢余宏家
Owner NANJING CHENXIAO SOFTWARE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products