Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

63results about "Platform integrity maintainance" patented technology

Application program control method based on two-time signature verification technology

An application program control method based on a two-time signature verification technology is achieved by performing two times of signing and two times of signature verification on application programs on an android terminal. Security detection is performed on the application programs through a reliable third-party security detection mechanism, the application programs passing the detection will be signed by the third-party security detection mechanism, and then the signed applications are returned to developers. When the application programs are installed on the intelligent android terminal, security detection is performed on the application programs first to see whether the application programs are signed by the third-party security detection mechanism or not, and signatures are verified; if signatures of the third-party detection mechanism do not exist or the signatures cannot pass verification, installation of the application programs is refused. Through the technical scheme, the application program control method based on the two-time signature verification technology has the advantages that signature information is fixed through introduction of the third-party detection signatures and a security control module of the android terminal so that secure application programs can be downloaded and installed in an android system through multiple channels, and while security of the android terminal is guaranteed, a flexible and efficient application program verification scheme is provided.
Owner:INST OF INFORMATION ENG CHINESE ACAD OF SCI +1

Abnormality detection method and device based on log graph modeling

The invention provides an abnormality detection method and device based on log graph modeling. The method and the device are applied to a nonsocial network. The method particularly includes: buildinga bipartite graph according to a key field of abnormal data annotated in advance in the nonsocial network, wherein left-side nodes of the bipartite graph correspond to multiple user accounts while right-side nodes of the same correspond to parameter combinations during business interface requesting; extracting features from the bipartite graph, and splicing the extracted features to form a featurevector; performing k-means cluster processing on the basis of the abnormal data and the feature vector to acquire optimal cluster number; according to the optimal cluster number, using a Gaussian mixing model to fit dark industry feature probability distribution; when receiving incoming data, calculating dark industry probability of the data according to feature vector of the incoming data and the Gaussian mixing model, and judging whether the data are abnormal or not according to the dark industry probability and the dark industry feature probability distribution. When the data are judged abnormal, access behaviors of users can be intervened timely, so that network attacks by hackers can be avoided.
Owner:BEIJING QIYI CENTURY SCI & TECH CO LTD

Android application safety analysis method based on sensitive behavior identification

InactiveCN105335655AImprove accuracyImprove detection accuracyPlatform integrity maintainanceTraining data setsBehavior recognition
The invention provides an Android application safety analysis method based on sensitive behavior identification. The Android application safety analysis method comprises the following steps: 1) obtaining and analyzing a source code; 2) obtaining sensitive behaviors; 3) extracting a UI (User Interface) text; 4) processing sensitive behavior data; 5) extracting feature values; 6) forming a training data set; and 7) analyzing safety. A relationship between the UI text and a sensitive API (Application Program Interface) is taken as the characteristics of machine learning, and accuracy for detecting the malicious applications of an Android platform is effectively improved.
Owner:NANJING UNIV

Method and device for intercepting malicious advertisements of application program

ActiveCN103065090AUse will not affectTroubleshoot background issuesPlatform integrity maintainanceComputer terminalApplication software
The invention is applicable to the technical field of mobile terminals and provides a method and a device for intercepting malicious advertisements of an application program. The method includes scanning an application program installed on a mobile terminal; judging whether malicious advertisement platform codes are inlaid in the application program; and isolating a malicious advertisement platform in the application program when the malicious advertisement platform codes are inlaid in the application program so that the malicious advertisement platform codes are invalidated and the malicious advertisement platform can not operate. According to the method and the device for intercepting the malicious advertisements of the application program, when the malicious advertisement platform codes are detected to be inlaid in the application program, the malicious advertisement platform is isolated by means of a technical means so that when the application program is operated, code sections corresponding to the malicious advertisement platform are not executed, the problems of automatic networking and popping up of the malicious advertisements can be prevented, simultaneously, using of the application program can not be influenced, problems existing in background operation of the malicious advertisements are thoroughly solved, and a good using environment of the mobile terminal is provided for a user.
Owner:GUANGDONG OPPO MOBILE TELECOMM CORP LTD

Malicious software API call sequence detection method based on graph convolution

ActiveCN111259388AImprove bindingFlexible organizational structurePlatform integrity maintainanceNeural architecturesCall graphAlgorithm
The invention provides a malicious software API (Application Program Interface) call sequence detection method based on graph convolution. The method comprises the following steps: acquiring and recording API call sequence information of processes and sub-processes when a large number of software samples run; performing vectorization processing on the API calling sequence information; extracting aparameter relationship, a dependency relationship and a sequence relationship of the API function; establishing an API call graph; inputting the API call graph into a graph convolutional neural network for training to obtain a malicious software detection network model; collecting API calling sequence information of processes and sub-processes when the executable file to be detected runs; constructing an API call graph of the executable file to be detected, then inputting the API call graph of the executable file to be detected into the malicious software detection network model, If the output result of the malicious software detection network model is 1, indicating that the judgment result is malicious software; If the output result of the malicious software detection network model is 0,indicating that the judgment result is normal software.
Owner:SUN YAT SEN UNIV

Method for controlling single board to be safely started and method and device for upgrading software package

ActiveCN105117651AStartup does not affectImprove securityVersion controlPlatform integrity maintainanceElectricitySingle plate
The invention discloses a method for controlling a single board to be safely started. The method comprises the steps that after the single board is powered on, the resigned name of a software package to be loaded to the single board is acquired, the resigned name of the software package is obtained by using a single plate private key of the single board for resigning the software package, and is made after the original signature of the software package passes verification through a software package public key of the software package, and the original signature is obtained by signing the software package through a software package private key of the software package; the resigned name of the software package is verified through a single board public key paired with the single board private key; after the resigned name passes verification, the single board is started. According to the method for controlling the single board to be safely started, it can be guaranteed that the single board can still be safely started when the private key of the software package is leaked.
Owner:SHANGHAI HUAWEI TECH CO LTD

Mobile operation and maintenance management platform safe operation and big data application system under cloud environment

The invention discloses a mobile operation and maintenance management platform safe operation and big data application system under cloud environment, comprising a cloud operation and maintenance service resource integration layer for integrating various network resources, a cloud operation and maintenance service technical support layer for providing technology and security as a service, and a cloud operation and maintenance service management support layer for providing management as a service to manage and monitor various resources; the cloud operation and maintenance service resource integration layer comprises a cloud operation and maintenance service resource integration layer for integrating various network resources, a cloud operation and maintenance service technical support layerfor providing technology and security as a service, and a cloud operation and maintenance service management support layer for providing management as a service to monitor various resources; Using Searchable public key encryption scheme, sandbox mechanism, identity authentication service and other security measures; provide cloud service whole process management, including cloud service deliverymanagement, real-time monitoring and management, cloud service billing and pricing support. Through the modular software system structure, the robustness, maintainability and scalability of the systemare enhanced, and the application system can be quickly built and deployed according to the user's needs, so that the public, private or hybrid cloud computing environment can be automatically deployed; Using virtualization investments and traditional IT service applications, you can increase agility and reduce costs and increase server utilization.
Owner:金税信息技术服务股份有限公司

Apparatus and method for blocking ransome ware using access control to the contents file

The present application relates to the apparatus for blocking Ransome ware using access control to the contents file, it includes an access permission program checking unit for checking whether a program of a process detected as being started in an user's computer is a reliable program, checking whether a parent process of the program is a reliable program, and determining whether the program is the program that is allowed to access the contents file; a whitelist registration unit for registering information of the contents file to be protected; and a contents file access control unit for allowing the process to access the contents file registered in the whitelist registration unit when the program of the process is the program that is allowed to access the contents file determined by the access permission program checking unit, and blocking the process from accessing the contents file registered in the whitelist registration unit when the program of the process is not the program that is allowed to access the contents file determined by the access permission program checking unit.
Owner:WITHNETWORKS CO LTD

Intelligent malicious code fragment evidence obtaining method and system

The invention belongs to the technical field of digital forensics, and particularly relates to a malicious code fragment intelligent forensics method and system, and the method comprises the steps: constructing a code fragment training set and a code fragment test set for training and testing through extracting the underlying data features of a storage medium; training the set full-connection neural network model by using the data in the code fragment training set, the input being a feature vector, and the output being a normal or malicious prediction result; for the code fragment test set, performing test output by utilizing the trained full-connection neural network model to judge whether model input is a malicious code fragment; and performing feature extraction on the target code snippets, and inputting the target code snippets into a fully-connected neural network model generated through training and testing to obtain an intelligent malicious code recognition result of the targetcode snippets. According to the method, malicious code fragments in storage media such as computers, mobile phones and tablets and evidence containers such as RAW, E01 and AFF can be recognized, and the method has a good application prospect in the field of digital evidence collection such as crime event evidence underlying data automatic analysis.
Owner:PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU +1

Ransomware detection method and device

InactiveCN110941822ARealize detectionDoes not affect operating speedPlatform integrity maintainanceComputer hardwareRansomware
The embodiment of the invention provides a ransomware detection method. The ransomware detection method comprises the following steps: determining a sequence of traversing terminal files by historicalransomware; deploying a stain file on the terminal according to the determined sequence of traversing the terminal file by the historical ransomware so as to ensure that the stain file is traversed before any important file of the terminal is traversed by the ransomware; when it is monitored that the operation state of the stain file is abnormal, obtaining all processes of the terminal at present; and if a certain process meets any specific attribute of the ransomware library, determining a fact that the software corresponding to the process is ransomware. Compared with a method of deployinga stain file on a terminal device and monitoring the ransomware through the API interfaces and monitoring the API interfaces corresponding to the I/O operations, on one hand, when the operation stateof the stain file is monitored, the frequency of obtaining the operation state of the stain file is far lower than the frequency of the I/O operations, so that the monitoring cost is low, and the system operation loss is low; and on the other hand, the operation state monitoring and I/O operation of the taint file are mutually independent, the I/O operation speed is not influenced, and the methodhas relatively high feasibility and is suitable for popularization and application.
Owner:WUHAN ANTIY MOBILE SECURITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products