Unlock instant, AI-driven research and patent intelligence for your innovation.

Information risk prevention and control method, device and equipment

A risk, prevention and control technology, applied in the computer field

Pending Publication Date: 2021-06-08
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the rapid development of Internet technology, applications installed in terminal devices (especially APPs installed in mobile phones) and services running in applications have penetrated more and more fully into users' lives. Terminal devices (especially mobile terminal devices) and IoT devices, etc.) while providing convenience to users, it also brings a series of security and user privacy related issues. One of the more prominent security and user privacy issues is the large number of second-party and third-party code, which increases the chances of malicious code execution

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information risk prevention and control method, device and equipment
  • Information risk prevention and control method, device and equipment
  • Information risk prevention and control method, device and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0019] Such as figure 1 As shown, the embodiment of this specification provides a method for information risk prevention and control. The execution body of the method can be a server or a terminal device, wherein the terminal device can be a computer device such as a laptop or a desktop computer, or a mobile phone or Tablet PC and other mobile terminal equipment. The server may be a server for a certain business (such as transaction business or financial business, etc.) or a server that needs to prevent and control the risk of the code contained in the specified application program. Specifically, the server may be a payment business server, or It can be a server related to business such as finance or instant messaging. The execution subject in this embodiment is described by taking a terminal device as an example. For a case where the execution subject is a server, reference may be made to the following relevant content, and details are not repeated here. The method specific...

Embodiment 2

[0032] Such as image 3 As shown, the embodiment of this specification provides a method for information risk prevention and control. The execution body of the method can be a server or a terminal device, wherein the terminal device can be a computer device such as a laptop or a desktop computer, or a mobile phone or Tablet PC and other mobile terminal equipment. The server may be a server for a certain business (such as transaction business or financial business, etc.) or a server that needs to prevent and control the risk of the code contained in the specified application program. Specifically, the server may be a payment business server, or It can be a server related to business such as finance or instant messaging. The execution subject in this embodiment is described by taking a terminal device as an example. For a case where the execution subject is a server, reference may be made to the following relevant content, and details are not repeated here. The method specific...

Embodiment 3

[0053] The above is the information risk prevention and control method provided by the embodiment of this specification. Based on the same idea, the embodiment of this specification also provides an information risk prevention and control device, such as Figure 4 shown.

[0054] The risk prevention and control device for this information includes: a dynamic code acquisition module 401, a risk scanning module 402 and an unloading module 403, wherein:

[0055] The dynamic code obtaining module 401, when detecting that the interface for loading the dynamic code in the terminal device is called, obtains the target dynamic code to be loaded;

[0056] The risk scanning module 402 performs risk scanning on the target dynamic code to determine whether the target dynamic code can trigger a predetermined risk operation, and obtains a corresponding risk scanning result;

[0057] The unloading module 403, if the risk scanning result indicates that the target dynamic code can trigger a p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an information risk prevention and control method, device and equipment, and the method comprises the steps: obtaining a to-be-loaded target dynamic code when an interface used for loading a dynamic code in terminal equipment is detected to be called; performing risk scanning on the target dynamic code to determine whether the target dynamic code can trigger a predetermined risk operation or not, and obtaining a corresponding risk scanning result; and if the risk scanning result indicates that the target dynamic code can trigger the predetermined risk operation, canceling loading of the target dynamic code.

Description

technical field [0001] This specification relates to the field of computer technology, and in particular to an information risk prevention and control method, device and equipment. Background technique [0002] With the rapid development of Internet technology, applications installed in terminal devices (especially APPs installed in mobile phones) and services running in applications have penetrated more and more fully into users' lives. Terminal devices (especially mobile terminal devices) and IoT devices) while providing convenience to users, it also brings a series of security and user privacy related issues. One of the more prominent security and user privacy issues is the large number of second-party applications introduced due to the open ecology of applications. and third-party code, thereby increasing the chances of malicious code execution. [0003] For malicious third-party SDKs, risk scanning is usually performed on third-party SDKs before they are integrated int...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/51
CPCG06F21/51G06F2221/033
Inventor 赵豪乜聚虎
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD