Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

75 results about "Software classification" patented technology

There are three broad classifications: Application software is the general designation of computer programs for performing tasks. Application software may be general purpose (word processing, web browsers, etc.) or have a specific purpose (accounting, truck scheduling, etc.).

Methods to dynamically establish overall national security or sensitivity classification for information contained in electronic documents; to provide control for electronic document/information access and cross domain document movement; to establish virtual security perimeters within or among computer networks for electronic documents/information; to enforce physical security perimeters for electronic documents between or among networks by means of a perimeter breach alert system

The invention is an a document classification and marking engine/method that functions in a real-time compatible mode with off-the-shelf word processors, e-mail programs and presentation or other document development software applications. The software engine is used for the security classification of sensitive or national security classified information in electronic format and is enhanced by methods and processes that ensure that the software classification engine considers all document informational elements regardless of attributes assigned to the text that may hide text from the user. The software engine provides a complete and reliable document classification determination interface method based on user selections and uniquely codes the full text classification determination in a persistent manner within the electronic shell of the document in real-time and dynamically displays the text based full classification determination in the banner of the host document development application. The unique codes of the full classification embedded in the electronic shell of the document enable effective and reliable software processes and methods that establish controls for access, movement, storage etc. for electronic documents, as well as virtual electronic security perimeters, on a computer, networks of computers and/or among computer networks and domains of networks. The full or complete and persistent classification codes embedded in the document shell also enables reliable software processes and methods that immediately warn or alert security personnel of a beach of a physical security perimeter between or among computers networks or domains of networks established to protect the information contained in electronic document format.
Owner:TURNER JAMES LUKE +1

Malicious program recognition method and device based on icon representation and software behavior consistency analysis

The invention belongs to the technical field of network security. The invention particularly relates to a malicious program recognition method and device based on icon representation and software behavior consistency analysis. The method comprises the following steps of: obtaining a sample; collecting known classification normal software data; extracting known normal software icon resource data and import table API data, constructing a CNN deep learning model, respectively training icons and import table API information, establishing an icon classification model and a software classification model, and obtaining a software program routine information base according to icon classification and software behavior classification information; Performing structure analysis on the sample to be tested, extracting icon resource data and import table API function data, testing through a CNN deep learning model, and obtaining icon classification and software behavior classification information ofthe sample to be tested; And judging the behavior consistency of the classification of the to-be-tested sample icons and the software behavior classification according to the test result. Automatic and batched malicious program rapid detection is achieved, and malicious program codes disguised through software similar icons and the like are effectively recognized.
Owner:PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU

Software vulnerability classification method and system

The invention provides a software vulnerability classification method and system. Skip-is used in the classification method. The classification method comprises the following steps: training and generating vulnerability word vectors by using a Skip-gram language model; mapping words in each vulnerability text into a space with a limited dimension, to represent semantic information, thereby reducing the sparsity of the word vector; then, fully using the advantages of feature extraction and semantic information representation of the convolutional neural network and the recurrent neural network;constructing a C-GRU neural network model, using a convolutional neural network to extract local features of text vectors, using a GRU to extract global features related to text contexts, and fusing the features extracted by the two complementary models. According to the method, the technical defects that an automatic vulnerability classification method based on a machine learning algorithm is poor in effect of processing high-dimensional and sparse problems, text features and representation semantic information cannot be well extracted, and specific vulnerability information is ignored are overcome, and the software classification accuracy is improved.
Owner:YANSHAN UNIV

Large-scale malicious software classification system and method based on deep learning

The invention discloses a large-scale malicious software classification system and method based on deep learning, and relates to the technical field of computer information security. The large-scale malicious software classification system comprises a database module, a disassembling module, a malicious software embedding module and a deep learning module, and the database module is configured toperiodically and automatically collect malicious software information from a network space, especially each large open-source malicious software platform; the disassembling module performs disassembling analysis on the malicious software; the malicious software embedding module comprises a malicious software embedding method, maps a malicious software disassembling file to a vector space and outputs a malicious software vector; the deep learning module is used for learning on the supervised malicious software sample set to obtain a mature model in a training stage; in the detection stage, vectors of the malicious software are input into the mature model, family information of the malicious software is output, a classification result is obtained. Through implementation of the scheme, the classification efficiency and robustness of the large-scale malicious software are improved.
Owner:SHANGHAI JIAO TONG UNIV

Multi-dimensional information based activation code data processing system and method

The present invention provides a multi-dimensional information based activation code data processing system and method. The system comprises an activation code generation sub-system for generating an activation code, an activation code verification activation sub-system for implementing security defense, activation code verification and activation code provisioning, and an activation code management sub-system for statistic management of the activation code. The system has the following advantages of being convenient for statistics and analysis, that is, the activation code has a large amount of information, and static analysis can be performed on the information conveniently according to marketing channels and software classification; being convenient for management and maintenance, that is, activated service logic verification is carried out at a service side, and when the activated service logic verification needs to be adjusted, the service side only needs to be modified and a client side is not modified, thereby facilitating maintenance and management; and being safer, that is, the activation code verification activation sub-system is added, thereby effectively preventing malicious attack, and preventing the activation code from being cracked violently.
Owner:GUANGXI YINGTENG EDUCATION & TECHNOLOGY CO LTD

Computer software protection system

The invention provides a computer software protection system. The system comprises a software monitoring module, a software classification module, a software encryption module, a user information acquisition module and a software comprehensive management and control module; the software monitoring module is used for detecting the software category, downloading time and use frequency of softwares in a computer; the software classification module is used for performing classification processing on the softwares according to the software category, downloading time and use frequency of the softwares and distributing classification results to the software comprehensive management and control module; the software encryption module is used for calling a classification result from the software comprehensive management and control module to classify and encrypt software; the user information acquisition module is used for acquiring login information and fingerprint information of a user and sending the login information and the fingerprint information to the software comprehensive management and control module; and the software comprehensive management and control module is used for confirming the use permission of the user to the software according to the login information and the fingerprint information of the user and decrypting the softwares in the use permission range.
Owner:LUOYANG INST OF SCI & TECH

Malicious software classification method and system based on dual-channel convolutional neural network

The invention discloses a malicious software classification method and system based on a dual-channel convolutional neural network, and the system comprises: a training sample processing module and anoperation code extraction module which are used for decompiling a training sample, and obtaining an operation code sequence of an application program; an API feature extraction module which is used for obtaining sensitive API features of the training sample; a dual-channel convolutional neural network training module which is used for training by using the operation code sequence and the sensitive API feature sequence and obtaining a dual-channel convolutional neural network of which the output is accurate; an accuracy judgment module and a detection module which are used for judging whetherthe accuracy output by the dual-channel convolutional neural network reaches a set value or not, and detecting the to-be-identified software when the accuracy reaches the set value; and a probabilityoutput module which is used for outputting a probability value that the to-be-identified software is malicious software. According to the method, the advantages of the operation code sequence of the application program and the sensitive API feature detection are combined, and the accuracy and the data processing are greatly improved.
Owner:东北大学秦皇岛分校
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products