Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Software security detection method, client, system and storage medium

A software security and detection method technology, applied in the computer field, can solve problems such as difficult malicious behaviors, corporate information security threats, lack of protection methods, etc., and achieve the effect of preventing malicious manipulation

Active Publication Date: 2022-04-22
QI AN XIN SECURITY TECH ZHUHAI CO LTD +1
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For this situation, the existing technology lacks relevant protection methods, and it is difficult to prevent malicious behaviors in time, which poses a serious threat to the information security of enterprises.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software security detection method, client, system and storage medium
  • Software security detection method, client, system and storage medium
  • Software security detection method, client, system and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] Hereinafter, the present application will be described in detail with reference to the drawings and embodiments. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

[0030] In this embodiment, a software security detection method is provided, such as figure 1 As shown, the method includes:

[0031] Step 101 , after monitoring the software behavior of the software to be detected, acquiring a behavior record corresponding to the software behavior of the software to be detected.

[0032] In the embodiment of this application, the operating system monitors the software behavior of the software in the system in real time. Specifically, a function call monitoring tool can be used to track and monitor the program of the software to be evaluated, and form a record of each time the program runs. The monitoring log of the behavior records under the monitoring log, s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application discloses a software security detection method, a client, a system and a storage medium. The method includes: after monitoring the software behavior of the software to be detected, obtaining a behavior record corresponding to the software behavior of the software to be detected; , extract the call entry function of the software to be detected and the system call sequence corresponding to the call entry function; according to the call entry function of the software to be detected, obtain the standard call matching the call entry function of the software to be detected from the preset standard call sequence table sequence; if the system call sequence is inconsistent with the standard call sequence, the software behavior of the software to be detected is terminated. The application can prevent software from being manipulated maliciously, and protect information in the client from being manipulated maliciously.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a software security detection method, client, system and storage medium. Background technique [0002] Malware is any application that performs malicious tasks on a computer system. If an enterprise's computer equipment is installed with malware, the malware will steal terminal information or send fraudulent information, seriously affecting the information security of the enterprise. Preventing malicious software from performing malicious operations on computer equipment is one of the key issues to be solved in improving enterprise information security. [0003] At present, in the detection of malware, it is judged whether the software to be detected is malware by judging the software behavior of the software to be detected. If the software behavior of the software to be detected exceeds its execution authority, the software is considered to be malware, and the soft...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56
Inventor 刘明陈俊儒杨小波李阳
Owner QI AN XIN SECURITY TECH ZHUHAI CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products