A method for operating platform data

An operation method and platform technology, applied in the fields of electrical digital data processing, platform integrity maintenance, instruments, etc., can solve the problems of not necessarily protecting the platform, large strategies, and unpredictable eavesdropping methods.

Active Publication Date: 2020-06-30
华讯高科股份有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the pertinence of this method is sometimes not strong. From the perspective of efficiency, it may not be able to achieve the effect of an effective protection platform
In addition, with the variation of malicious applications, their lurking methods are becoming more and more hidden, and the means of eavesdropping are becoming more and more unpredictable, which brings more and more difficulties to the attack strategy.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for operating platform data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In the following description, reference is made to the accompanying drawings, which illustrate several specific embodiments by way of illustration. It will be understood that other embodiments can be conceived and can be made without departing from the scope or spirit of the present disclosure. Therefore, the following detailed description should not be considered in a limiting sense.

[0021] According to an exemplary embodiment of the present invention, figure 1 A flowchart illustrating a method for operating platform data.

[0022] In step S1, the feature is acquired during the running of the application on the platform;

[0023]In step S2, the platform analyzes the profile type and interacts with the remote device to determine consistency;

[0024] In step S3, for target applications that do not conform to consistency, the platform conducts preliminary screening of suspicious target applications through local comparison;

[0025] In step S4, for the target appli...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a platform data operation method. The method comprises the steps of obtaining features in running of applications in a platform; analyzing profile types by the platform, interacting with a remote device, and determining the consistency; for target applications not conforming to the consistency, performing primary screening of suspicious target applications through local comparison by the platform; for the target applications not conforming to the primary screening, performing behavior evaluation of the applications by the platform; determining malicious applications, performing local searching and killing, and reporting to the remote device; performing verification and restoration on corrupted platform data; running the restored platform data, and checking whether profiles of the searched and killed applications exist or not; if the profiles of the searched and killed applications exist, repeatedly executing the step until the profiles of the searched and killed applications no longer exist; and if the profiles of the searched and killed applications no longer exist, setting timing, and subsequently continuing to repeatedly execute the step. According to the method, information of the malicious applications running or trying to run in the computer platform can be obtained and the malicious applications are searched and killed timely, accurately and completely.

Description

technical field [0001] The present invention generally relates to the field of computer data security, and more specifically, relates to a method for operating computer platform data. Background technique [0002] With the rapid development of communication technology, the application of terminals such as terminals, clients, smart phones, and tablet computers has become more and more common. These terminals have become platforms for loading applications. The continuous increase of these platforms has promoted the prosperity of the market , The applications on the platform have greatly enriched people's spiritual life, provided traversal to people's lives, but also brought security issues. In order to achieve illegal purposes, some criminals will release malicious software on the network, or actively implant applications into the platform, or launch attacks on the platform. These applications are disguised as normal applications and appear on the network or platform through ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56G06F21/57
CPCG06F21/566G06F21/57G06F21/577
Inventor 王大林刘颖
Owner 华讯高科股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products