Automatic verification method for security of communication software

An automatic verification and communication software technology, applied in the field of communication security verification, can solve problems such as leakage of real information and potential safety hazards, and achieve the effects of ensuring normal use, improving accuracy, transparency and openness

Pending Publication Date: 2022-07-05
XIAN AERONAUTICAL UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] For the security of communication software, before the security breach is detected, the real personal information is still used, which leads to the fact that once the communication software has a security breach, even if the user stops using the communication software in time, some information will still be leaked. Real information has certain security risks. For this reason, an automatic verification method for the securi

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Automatic verification method for security of communication software
  • Automatic verification method for security of communication software
  • Automatic verification method for security of communication software

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0045] An automatic verification method for communication software security, which specifically includes the following steps:

[0046]Step 1. Vulnerability integration: Summarize and classify the currently discovered vulnerability principles and vulnerability patterns through the vulnerability integration unit 1, summarize and classify the patterns according to the frequency of security vulnerability patterns, and summarize the needs for judging various vulnerabilities. relevant information and discrimination mode;

[0047] Step 2. Requirement verification: The required authority for the operation of the communication software is displayed to the user through the requirement verification unit 2, and the authority determined by the user to grant the communication software is recorded as a comparison standard, and the authority after the authorization of the user is analyzed. The user displays it in detail, and at the same time records the transmission data during the operation ...

Embodiment 2

[0051] The present embodiment is an improvement of the first embodiment, an automatic verification method for the security of communication software, which specifically includes the following steps:

[0052] Step 1. Vulnerability integration: Summarize and classify the currently discovered vulnerability principles and vulnerability patterns through the vulnerability integration unit 1, summarize and classify the patterns according to the frequency of security vulnerability patterns, and summarize the needs for judging various vulnerabilities. The relevant information and discrimination mode of the figure 2 As shown, the vulnerability integration unit 1 includes a summary and classification module 5 and an information identification module 6. The summary and classification module 5 is connected with the information identification module 6. The summary and classification module 5 is used for the current discovered vulnerability principles and vulnerability patterns. Summarize a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an automatic verification method for communication software security. The method specifically comprises the following steps: step 1, vulnerability integration; step 2, demand verification; 3, carrying out replacement verification; 4, performing communication analysis; the invention relates to the technical field of communication security verification. According to the automatic verification method for the security of the communication software, by summarizing and concluding the principles and modes of security vulnerabilities and related information judgment modes required for judging vulnerability simulation, and then verifying and analyzing the security of the communication software in an information simulation conversion mode, the security of the communication software is ensured to be effectively verified, and the security of the communication software is improved. According to the method, the security of the real information of the user is guaranteed, and after the security of the communication software passes verification, the real information of the user replaces the virtual information, so that the effective storage of the information is achieved, the use of the communication software by the user and the detailed analysis of the authority authorized by the user are ensured, and the transparency and the openness of the information are further improved.

Description

technical field [0001] The invention relates to the technical field of communication security verification, in particular to an automatic verification method for communication software security. Background technique [0002] Vulnerabilities are flaws in the specific implementation of hardware, software, protocols, or system security policies that allow attackers to gain unauthorized access to or damage the system, a restricted computer, component, application, or other online An inadvertently left unprotected entry point to a resource. [0003] For the security of communication software, before the security loophole is detected, the real personal information is still used, which leads to that once the communication software has a security loophole, even if the user stops the use of the communication software in time, part of it will still be leaked. Real information has certain security risks. Therefore, an automatic verification method for the security of communication sof...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/57G06F21/10
CPCG06F21/577G06F21/105
Inventor 肖军王琳
Owner XIAN AERONAUTICAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products