Malicious device identification method and apparatus, server and storage medium

A device identification and malicious technology, applied in computer security devices, instruments, special data processing applications, etc., can solve the problems of low identification efficiency, consume more time, and a large amount of memory space, and achieve the effect of improving identification efficiency and accuracy.

Pending Publication Date: 2021-10-01
PINGAN PUHUI ENTERPRISE MANAGEMENT CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the case of millions of table data, directly looking up the table will cons

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious device identification method and apparatus, server and storage medium
  • Malicious device identification method and apparatus, server and storage medium
  • Malicious device identification method and apparatus, server and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Next, the technical scheme in the present application will be clear and completely, and the embodiments described herein are described herein, and not all of the embodiments of the present disclosure, not all of the embodiments of the present application. Based on the embodiments in the present application, all other embodiments obtained by those of ordinary skill in the art without making creative labor premises, all of the present application protected.

[0029] The flowchart shown in the drawings is merely illustrative, and it is not necessary to include all content and operation / steps, nor must be performed in the described order. For example, some operations / steps can also be decomposed, combined, or partially combined, so the order actually performed may change according to the actual situation. Further, although the functional module is divided in the apparatus, in some cases, in some cases, the module different from the apparatus is divided into modules.

[0030...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to security detection, and provides a malicious device identification method and apparatus, a server and a storage medium. The method comprises the following steps of: obtaining first identification codes of a plurality of malicious devices, the malicious devices being devices installed with malicious programs used for cracking software or tampering with user data; generating a bit array according to a preset Bloom algorithm and the plurality of first identification codes, the bit array comprising a plurality of bit values; receiving an access request sent by a terminal device, the access request carrying a second identification code of the terminal device; determining a plurality of target bit values from the bit array according to the second identification code; and identifying whether the terminal device is a malicious device according to the plurality of target bit values. The invention also relates to a block chain technology, which can improve the identification efficiency and accuracy of malicious devices.

Description

Technical field [0001] The present application relates to the technical field of safety tests, and more particularly to a malware identification method, apparatus, server, and storage medium. Background technique [0002] With the development of information technology, laptop, computers, smart phones, etc., can be installed in a variety of applications, and various malicious programs have emerged. Malicious procedures are usually in order to achieve some purpose. When performing files, the malicious program will load its malicious content from other sources to escape the existing defense mechanism. Malicious procedures will cause great risks to users, organizations, and developers, therefore, terminal devices that install these malicious programs are defined as malicious devices. In recent years, with the increase in malicious program, the mission of detecting malware has become a major problem with the increase in malicious program. [0003] In the field of traditional malware d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56G06F16/901G06F16/903
CPCG06F21/563G06F16/9014G06F16/903
Inventor 陈晟豪
Owner PINGAN PUHUI ENTERPRISE MANAGEMENT CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products