Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network data control device and network data control method for controling network data that generates malicious code in mobile equipment

A technology for network data and control devices, which is applied in security devices, electrical components, transmission systems, etc., and can solve problems such as network data occupation bandwidth, Internet network bandwidth loss, and network speed reduction.

Inactive Publication Date: 2013-04-10
FRONS
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] According to this previous method, it takes a lot of time and effort to start from judging the attack, extract the signature, generate and verify the attack detection rule, and apply it to the network protection system.
In addition, the time gap from the identification of the attack to the application in the defense system is the cause of the initial failure to suppress the network attack, and there is a problem of causing a lot of losses.
[0006] In addition, most network protection systems are located directly in front of the system to be protected or the local area network to be protected. The location limitation of this protection system makes a lot of attack traffic form a defense after passing through the so-called public network of the Internet. Attacks on the Internet occupy a lot of bandwidth with network data
[0007] The physical location of such a network protection system has a problem of inducing losses such as distributed denial of service attacks (DDoS) and other attacks on the Internet network caused by a large amount of attack traffic generated from multiple zombie (zombie) systems at the command of the attacker. bandwidth loss
The loss of Internet bandwidth will bring direct economic losses to the operators who organize and manage the Internet network, and it will bring the loss of network speed reduction to ordinary users who join the operators' services and use Internet services
[0008] Recently, mobile phones capable of accessing the Internet, such as smartphones, are rapidly becoming popular, and the number of electronic devices infected with malicious codes and capable of generating offensive network data is rapidly increasing. In particular, most mobile phones use The paid network that charges a fee generates a large amount of offensive network data on the user's mobile phone infected with malicious codes and transmits it to the network when the user is not aware of it, and makes a call to a specific phone number, causing economic losses to the user, etc. Under such circumstances, it will directly bring huge economic losses to the user, and the personal information stored on the mobile phone will be transmitted to a specific person, so that the loss caused by the leakage of personal information will occur, and its seriousness is obvious

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network data control device and network data control method for controling network data that generates malicious code in mobile equipment
  • Network data control device and network data control method for controling network data that generates malicious code in mobile equipment
  • Network data control device and network data control method for controling network data that generates malicious code in mobile equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] Hereinafter, preferred embodiments of the present invention will be described with reference to the accompanying drawings.

[0048] figure 1 It is a diagram illustrating the concept of a network data control method executed by a network data control device (hereinafter, simply referred to as "network data control device") that controls network data generated by malicious code in a mobile phone according to a preferred embodiment of the present invention.

[0049] The network data control device of the present invention can be implemented on the mobile phone 100 through software, or can be implemented on the mobile phone 100 after being implemented in hardware such as an ASIC chip.

[0050] refer to figure 1 (a) Observing the normal network data processing process, it can be seen that when the legitimate user 10 uses the mobile phone input device to input information, the information processing unit 110 that realizes the original function of the mobile phone 100 execute...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Disclosed are a device and method for controling network data that induces malicious code in mobile equipment. In the present invention, an analysis is conducted of information entered by a user who is using the input means of an article of mobile equipment, thereby assessing whether network data produced from the article of mobile equipment is network data produced according to the user's intentions, such that network data that has been produced according to the user's intentions is output to an external communication network, while network data that has been produced regardless of the user's intentions is blocked from being transmitted to the external communication network, under the assessment that the same constitutes network data which has been produced by malicous code residing in the article of mobile equipment or by external attackers, and which leaks the user's personal information or attacks outside communication networks. In this way, the present invention makes it possible to efficiently prevent the leakage of users' personal information and network attacks by ensuring that the network data produced in mobile equipment is controlled according to the user's intentions, thereby effectively blocking the transmission of network data induced by malicous code residing in the article of mobile equipment or by external attackers.

Description

technical field [0001] The present invention relates to a network data control device and method, in particular to a network data control device and network data control method for controlling network data induced by malicious codes of mobile phones. Background technique [0002] Among the recent network attack types, the losses caused by the "zero-day" attacks of worms (Worm) and fly maggots (Bot) most often occur, and the losses are continuously increasing. The characteristic of this kind of attack is that it automatically finds vulnerabilities and propagates itself through the network, and spreads at a high speed through many vulnerable systems connected by the Internet. [0003] However, the previous network attack detection technology based on signatures has limited defense against unknown new attacks because it uses known signatures to judge whether it is malicious code. [0004] Most of today's network protection systems are equipped with attack detection rules based...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/12
CPCH04L63/0227H04L63/145H04L63/1425H04L63/1441H04W12/128
Inventor 朴灿郑德基
Owner FRONS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products