Terminal attack defense method and device, terminal and cloud server

A terminal and cloud technology, applied in the computer field, can solve problems such as unstoppable repeated attempts by hackers

Pending Publication Date: 2020-04-21
HUAWEI TECH CO LTD
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] This application provides a terminal attack defense method, device, terminal and cloud server to solve the problem that

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal attack defense method and device, terminal and cloud server
  • Terminal attack defense method and device, terminal and cloud server
  • Terminal attack defense method and device, terminal and cloud server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to enable those skilled in the art to better understand the technical solutions in the embodiments of the present application, the technical solutions in the embodiments of the present application will be further described in detail below in conjunction with the accompanying drawings.

[0038] In order to better explain the technical solution provided by the embodiment of the present application, firstly explain the secure execution environment and the general execution environment (rich execution environment, REE). The secure execution environment in this embodiment includes the trusted execution environment (trust execution environment) environment, TEE) and cloud security environment, REE generally refers to the general operating system execution environment, and the application program in REE is a common customer application CA. The cloud security environment is a virtual security execution environment on the network side, which can be generated by a securit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a terminal attack defense method and device, a terminal and a cloud server. Before CA and TA communicate, scene feature information, such as screen click information, corresponding to a current CA operation is verified by a safety execution environment, such as TEE, so that whether the current CA operation is a real operation of a user or an attack behavior of a hacker is determined, and if the current CA operation is the attack behavior of the hacker, the screen click information does not exist. If the risk of hacker attack exists, communication between the CA and theTA is not established, so that the CA cannot run normally, and heuristics initiated by the hacker for discovering system vulnerabilities are blocked.

Description

technical field [0001] The present application relates to computer technology, and in particular to an attack defense technology and various computer devices applying the attack defense technology. Background technique [0002] Hacking, to put it simply, is a technique in which hackers discover flaws in terminal systems or networks, and attack these flaws. The defects mentioned here include software defects, hardware defects, network protocol defects and management defects. [0003] In order to defend against hacker attacks in traditional technologies, there are generally the following defense methods: address space layout randomization (address apace layout randomization, ASLR) defense methods, such as figure 1 As shown, the ASLR defense method uses a random address generator to change the original memory address on the stack into a randomized address. When a hacker finds a stack overflow vulnerability, he searches for the address of the corresponding stack and implants th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56G06F21/57G06Q20/38H04L29/06
CPCG06F21/566G06F21/577G06Q20/382H04L63/08G06F2221/034G06Q20/38G06F21/74G06F21/83G06F2221/2133H04L9/40G06F21/53G06F21/554
Inventor 亢治徐洋姚英亮王濯尘
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products