Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

178 results about "Software behavior" patented technology

Malicious software detection system based on P2P dynamic cloud and malicious software detection method

The invention relates to a malicious software detection system based on P2P dynamic cloud and a malicious software detection method. The system comprises a single solid cloud server, multiple dynamic cloud servers and multiple distributed terminals, wherein the multiple dynamic cloud servers form a P2P network, the single solid cloud server and the multiple dynamic cloud servers form a C/S network, the dynamic cloud servers and the distributed terminals form a C/S network, the distributed terminals are used for monitoring abnormality of software behaviors in the network to acquire abnormal behavior characteristics, and the abnormal behavior characteristics are uploaded to the dynamic cloud servers, the dynamic cloud servers are used for analyzing the abnormal behavior characteristics and feeding back the analysis result to the distributed terminals or the solid cloud server, and the solid cloud server is used for carrying out further analysis on the abnormal behavior characteristics uploaded by the dynamic cloud servers and feeding back the analysis result to the distributed terminals through the dynamic cloud servers. Through the system, load of the cloud servers is mitigated, a speed of response to a client request is improved, and precision of detection on the malicious software is improved.
Owner:重庆巴陆科技有限公司

Data monitoring method and data monitoring system for software behavior of mobile terminal

The invention discloses a data monitoring method and a data monitoring system for software behavior of a mobile terminal. The data monitoring method comprises the following steps: (1) monitoring the events that application software of the mobile terminal triggers a hardware device to start or close, and recording a trigger, a triggered object and time of each event, (2) constructing an operation state diagram of one hardware device serving as the triggered object within a preset time period, (3) extracting the triggers corresponding to specified time on the operation state diagram to form a display table, and (4) counting the total duration respectively occupying each hardware device of the application software serving as the trigger in the preset time period to form a display table. By means of the data monitoring method and the data monitoring system for the software behavior of the mobile terminal, a user can well master the specific behavior of each application software of the mobile terminal, data statistics of the software behavior is formed, so that the user is helped to analyze abnormal software behavior, various rogue software is found out, the safety of user information of the mobile terminal is guaranteed, and power consumption caused by back-stage operation of various software is reduced.
Owner:GUANGDONG OPPO MOBILE TELECOMM CORP LTD

Abnormal behavior detection system of Android platform software

ActiveCN105956474AEffective Abnormal BehaviorEffectively identify abnormal behaviorPlatform integrity maintainanceOperational systemComputer module
The invention discloses an abnormal behavior detection system of Android platform software, and belongs to the technical field of the intelligent mobile terminal. The system comprises an Android mobile terminal and a software behavior monitoring database, wherein the Android mobile terminal and the software behavior monitoring database are mutually communicated; the Android mobile terminal comprises a kernel Hook module, a data analysis module and a Hook log module; the kernel Hook module comprises a System_server process, a libbind.so library and an ioctl function, wherein the System_server process, the libbind.so library and the ioctl function are successively interacted to realize the extraction of kernel Hook information; the data analysis module comprises a resource monitoring process, a state monitoring process, a data analysis engine and a data processing process, and carries out the definition writing of software behavior abnormality. The abnormal behavior detection system has the advantages of advancement, accuracy and comprehensiveness, combines the advantages of dynamic detection and static detection, effectively detects the abnormal behavior of app software through the Hook of a sensitive API (Application Program Interface) function, and effectively carries out statistics on the operating system behavior characteristics of the software.
Owner:WUHAN HONGXU INFORMATION TECH

Active defense system based on Android platform software behavior detection

The invention relates to an active defense system based on Android platform software behavior detection. The active defense system based on Android platform software behavior detection is used for actively defending mobile phone security threats. According to the active defense system, process data are collected by using a top command or a PS command, and ActivityManager.MemoryInfo () and ActivityManager.AppProcessInfo () which are provided by an API (Application Programming Interface) of Android; the collected data are analyzed by using a PCA (Principal Component Analysis) method, features which best reflect samples are extracted, and the samples are loaded to a neural network model; and partial samples are randomly selected for learning so as to obtain model parameters which serve as model parameters of an evaluation portion, thus, the samples to be detected are evaluated, whether the samples are normal or not is judged, and then, whether some process is abnormal or not is judged. According to the active defense system, PCA dimensionality reduction is introduced into mobile phones in a manner of being combined with a BP (Back Propagation) neural network, so that the traditional computation amount and memory capacity of the BP neural network are reduced, the active defense system can be excellently implemented on mobile devices with limited computing power and storage capacity, such as the mobile phones, and the security of the mobile phones is guaranteed.
Owner:JIANGNAN UNIV

Virtual machine measurement method and apparatus

The invention provides a virtual machine measurement method and apparatus. The method comprises: configuring a to-be-measured file and a white list; constructing a behavior information base corresponding to each piece of white list software located in the white list; by measuring a kernel file and the to-be-measured file in a virtual machine starting process, judging whether the kernel file and the to-be-measured file are trusted; at a set first time interval, obtaining a process currently in a running state and memory information in a virtual machine; according to the process currently in the running state and the memory information, judging whether software located outside the white list runs in the virtual machine; and at a set second time interval, obtaining a software behavior of each piece of white list software in a running state, and by comparison with the corresponding behavior information base, judging whether each piece of white list software runs normally. The apparatus comprises a configuration unit, a construction unit, a first measurement unit, an acquisition unit, a second measurement unit and a third measurement unit. According to the scheme, the security of the virtual machine can be improved.
Owner:LANGCHAO ELECTRONIC INFORMATION IND CO LTD

System and method for detecting dynamic malicious behaviors of application program in mobile terminal

The invention provides a system and method for detecting dynamic malicious behaviors of an application program in a mobile terminal. The system comprises a software behavior extraction module, a dynamic stain tracking module, a dynamic behavior recognition module and a driving module, wherein the software behavior extraction module dynamically extracts software behaviors of the application program running on the mobile terminal; the dynamic stain tracking module receives the software behaviors and monitors a data transmission behavior among the software behaviors to judge whether the data transmission behavior is a malicious behavior; the dynamic behavior recognition module receives the software behaviors and recognizes a software system calling behavior among the software behaviors to judge whether the software system calling behavior is a malicious behavior; the driving module receives judgment results of the dynamic stain tracking module and the dynamic behavior recognition module and conducts processing. By means of the system and method, a dynamic detection technology for the application program in the running process is provided, the ability of the system to detect malicious software is improved, and information security of users is guaranteed.
Owner:合肥小刺猬信息科技有限公司

Software behavior monitor and verification system

ActiveCN103714456AFull monitoring of interactive processReal-time alertComputer security arrangementsTransmissionData packEngineering
The invention relates to a software behavior monitor and verification system which is composed of a soft behavior certificate, three-party software behavior monitoring units and a software behavior real-time verification system. The soft behavior certificate is a three-party communication data packet according to a user, an e-commerce website and a third-party payment platform in the correct transaction process. The three-party software behavior monitoring units are data packet monitor units installed on the e-commerce website, the third-party payment platform and a user client side. The software behavior real-time verification system receives transaction interaction information data packets submitted by the three-party monitoring units respectively and extracts and integrates key sequences and information in the transaction interaction information data packets, a user behavior interaction sequence and a software behavior model are compared in real time according to a global unique order number, and once the out-of-order phenomenon, fake identities and other illegal behaviors occur, an alarm is given out, and the transaction is closed. Three-party interaction url and other key parameters are used, the legal and normal transaction interaction process of the three parties is described, and the soft behavior certificate is provided.
Owner:TONGJI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products