WO2016062193A1 - 基于环境检测的动态应用功能控制方法 - Google Patents
基于环境检测的动态应用功能控制方法 Download PDFInfo
- Publication number
- WO2016062193A1 WO2016062193A1 PCT/CN2015/091424 CN2015091424W WO2016062193A1 WO 2016062193 A1 WO2016062193 A1 WO 2016062193A1 CN 2015091424 W CN2015091424 W CN 2015091424W WO 2016062193 A1 WO2016062193 A1 WO 2016062193A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- application
- client
- function
- disabled
- threshold
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/561—Virus type analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/67—Risk-dependent, e.g. selecting a security level depending on risk profiles
Definitions
- the invention relates to a method for dynamically loading an application function, and more particularly to a dynamic application function control method based on environment detection.
- the present invention invents a mobile platform environment detection and a method for dynamically loading an application function according to an environmental detection result.
- the environment security is first detected, and the current environment is detected according to the detection situation. The rating is performed, and the application function of the corresponding level is loaded. If the environment is judged to be dangerous, the financial transaction is involved, and the payment and other functions will refuse to load and prompt the user to clean up the environment to ensure application security.
- a method for dynamically controlling an application function on a client includes: launching an application, the application only includes a framework function code; after launching the application, loading a security module, where The security module sends a request for scanning the configuration file to the server; performs scanning on the application environment of the client according to the configuration file received from the server, and sends the scan result to the server to generate a risk score. And receiving, from the server side, a function code that is allowed to be loaded in the current application environment, the function code being generated by the server side based on the generated risk score.
- the application has one or more functions, and wherein the application is disabled for one or more of its functions when the application environment of the client is at risk.
- the scan configuration file is periodically updated or maintained by the operation and maintenance management terminal.
- the application when the generated risk score is greater than the first threshold but less than the second threshold, the application is disabled for its first function; and when the generated risk score is greater than the second threshold but less than the third threshold, The application is disabled for its first and second functions.
- a method of dynamically controlling an application function on a server side comprising: receiving a request from a security module of a client, the request being related to providing a scan profile; and returning the configuration according to the request a file for the client to perform a scan; receiving a scan result from the client and evaluating it to generate a risk score; determining that a portion of the function of the application needs to be disabled based on the scan result and the generated risk score And, based on the determined result, generate a function code that is compatible with the client's current application environment and send it to the client for loading.
- the application has one or more functions, and wherein the application is disabled for one or more of its functions when the application environment of the client is at risk.
- the client when the application environment of the client is at risk, the client guides the user to repair the system.
- the scan configuration file is periodically updated or maintained by the operation and maintenance management terminal.
- the first function of the application is disabled when the generated risk score is greater than the first threshold but less than the second threshold; and disabled when the generated risk score is greater than the second threshold but less than the third threshold.
- the application environment of the client is Android.
- FIG. 1 is a schematic diagram of a dynamic application function control method based on environment detection according to an embodiment of the present application.
- the basic idea of the present application is to disable the relevant important functions, refuse to serve the user, and prompt the user to upgrade or repair the system before using it if it is known that the current environment may be threatened or unsafe. This method increases security by losing a certain user experience and ensures transaction security.
- the application is first launched by the user, which application only contains the framework function code. Then, the application loads the security scan module, and the security scan module requests the server to scan the configuration file (the configuration file specifies the scan-related configuration information such as the detection object and the detection mode). Then, the server receives the application request, reads the local configuration file (the configuration file can be modified by the operation and maintenance personnel through the background management page), and returns to the client application.
- the security scan module requests the server to scan the configuration file (the configuration file specifies the scan-related configuration information such as the detection object and the detection mode). Then, the server receives the application request, reads the local configuration file (the configuration file can be modified by the operation and maintenance personnel through the background management page), and returns to the client application.
- the configuration file contents can be exemplified as follows:
- a malicious APP may read information such as a transaction SMS, prompting the user to uninstall the relevant APP);
- the security module After receiving the scan configuration file from the server, the security module scans the system according to the scan configuration file and generates a scan result. Then, the client sends the scan result to the server, and the server evaluates each scan result according to the current background rules (the rule can be dynamically adjusted by the operation and maintenance personnel through the background management interface), and generates a risk score.
- the rule can be dynamically adjusted by the operation and maintenance personnel through the background management interface, and generates a risk score.
- an example of a rule is as follows:
- the server then disables the relevant functionality based on the scan results and risk scores. Assume that the current application has five functions: login, query, purchase of products, in-row transfer, and inter-bank transfer. In the case of considering the risk value factor, when the risk value is greater than 20, the “cross-row” transfer is disabled; when the risk value is greater than 40, the “transfer” function is disabled; when the risk value is greater than 60, the “purchase” function is disabled; the risk value is greater than 80. When disabled, the Query feature is disabled. In one embodiment, additional functional disables need to be considered. For example, when a version of the "buy" feature is known to be vulnerable, other features are normal.
- the server dynamically generates a loadable function code for the client to run. After the client receives the function code, it loads and runs. For the disabled function, there is no relevant code, so the corresponding function cannot be executed.
- the client can direct the user to repair the system based on the risk value.
- the application can clearly understand the security threats to the payment and the transaction in the current operating environment.
- Applications can effectively load or disable related features to reduce the risk of environmental threats.
- the background server can dynamically adjust the policy and modify the application loading function according to the recent security trend changes. For example, Android 4.4.1 is relatively safe for mainstream versions, but by 2017, Android 4.4.1 may have more security vulnerabilities.
- the un-upgraded system has problems affecting transaction security.
- the background can disable related functions. If only the inquiry is allowed, the transfer is not allowed and the transaction risk is reduced.
- the application can guide users to repair the system in a targeted manner to improve security.
- the technical solution of the present application can also consider collecting the security status of each system in the current region, and is used for reference of subsequent product design, product development, product promotion, security research, and the like.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Virology (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Stored Programmes (AREA)
- Information Transfer Between Computers (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
一种在客户端动态控制应用功能的方法,包括:启动应用程序,该应用程序仅包含框架功能代码;在启动所述应用程序后,加载安全模块,其中所述安全模块向服务器端发送关于扫描配置文件的请求;根据从服务器端接收的所述配置文件对所述客户端的应用环境执行扫描,并将所述扫描结果发送给服务器端,以生成风险分值;以及从服务器端接收在当前应用环境下允许加载的功能代码,所述功能代码基于所生成的风险分值而由服务器端产生。还公开了一种在服务器端动态控制应用功能的方法。
Description
本发明涉及动态加载应用功能的方法,更具体来说,涉及一种基于环境检测的动态应用功能控制方法。
在Android平台上,目前面临较严峻的安全威胁,病毒、漏洞、木马等严重影响应用尤其是支付应用的安全性。目前的各类Android客户端已具备一定的自我保护功能,但仍局限于增强应用复杂度、加大破解难度的思路,对于已知不安全的环境,并未进行根本上的保护。
发明内容
为了解决上述问题,本申请发明了一种移动平台环境检测及根据环境检测结果动态加载应用功能的方法,对于涉及隐私、交易等较为敏感的应用,先检测环境安全性,根据检测情况对当前环境进行评级,并加载对应等级的应用功能,若环境判定为危险,则涉及金融交易,支付等功能将拒绝加载并提示用户清理环境,保障应用安全。
根据本申请的一个方面,提供了一种在客户端动态控制应用功能的方法,包括:启动应用程序,该应用程序仅包含框架功能代码;在启动所述应用程序后,加载安全模块,其中所述安全模块向服务器端发送关于扫描配置文件的请求;根据从服务器端接收的所述配置文件对所述客户端的应用环境执行扫描,并将所述扫描结果发送给服务器端,以生成风险分值;以及从服务器端接收在当前应用环境下允许加载的功能代码,所述功能代码基于所生成的风险分值而由服务器端产生。
在上述方法中,所述应用程序存在一个或多个功能,并且其中,在所述客户端的应用环境存在风险时,所述应用程序被禁用其所有功能中的一个或多个。
在上述方法中,在所述客户端的应用环境存在风险时,引导用户修复系统。
在上述方法中,所述扫描配置文件由运营维护管理端定期更新或维护。
在上述方法中,当所生成的风险分值大于第一阈值但小于第二阈值时,所述应用程序被禁用其第一功能;而当所生成风险分值大于第二阈值但小于第三阈值时,所述应用程序被禁用其第一功能和第二功能。
根据本申请的另一个方面,提供了一种在服务器端动态控制应用功能的方法,包括:接收来自客户端的安全模块的请求,所述请求与提供扫描配置文件相关;根据所述请求,返回配置文件以供客户端执行扫描;接收来自客户端的扫描结果,并对其进行评估,以生成风险分值;根据所述扫描结果和所生成的风险分值,确定需要禁用所述应用程序的一部分功能;以及基于确定的结果,生成与客户端的当前应用环境相适应的功能代码,并发送给客户端以供其进行加载。
在上述方法中,所述应用程序存在一个或多个功能,并且其中,在所述客户端的应用环境存在风险时,所述应用程序被禁用其所有功能中的一个或多个。
在上述方法中,在所述客户端的应用环境存在风险时,所述客户端引导用户修复系统。
在上述方法中,所述扫描配置文件由运营维护管理端定期更新或维护。
在上述方法中,当所生成的风险分值大于第一阈值但小于第二阈值时,禁用所述应用程序的第一功能;而当所生成风险分值大于第二阈值但小于第三阈值时,禁用所述应用程序的第一功能和第二功能。
在上述方法中,所述客户端的应用环境为Android。
在参照附图阅读了本发明的具体实施方式以后,本领域技术人员
将会更清楚地了解本发明的各个方面。本领域技术人员应当理解的是:这些附图仅仅用于配合具体实施方式说明本发明的技术方案,而并非意在对本发明的保护范围构成限制。
图1是根据本申请的实施例基于环境检测的动态应用功能控制方法的示意图。
下面介绍的是本发明的多个可能实施例中的一些,旨在提供对本发明的基本了解,并不旨在确认本发明的关键或决定性的要素或限定所要保护的范围。容易理解,根据本发明的技术方案,在不变更本发明的实质精神下,本领域的一般技术人员可以提出可相互替换的其它实现方式。因此,以下具体实施方式以及附图仅是对本发明的技术方案的示例性说明,而不应当视为本发明的全部或者视为对本发明技术方案的限定或限制。
如在背景技术中所述,目前的各类Android客户端的保护措施局限于增强应用复杂度、加大破解难度的思路,对于已知不安全的环境,并未进行根本上的保护。
为解决该问题,本申请的基本思路是,若已知当前环境可能存在威胁、不安全,那么将相关重要功能禁用、拒绝向用户服务,并提示用户升级或修复系统后再使用。该方法通过损失一定的用户体验来增加安全性,保障交易安全。
在一个具体的实施例中,参考图1所示,首先由用户启动应用程序,该应用仅包含框架功能代码。接着,应用加载安全扫描模块,安全扫描模块向服务器端请求扫描配置文件(配置文件指定了检测对象,检测方式等扫描相关的配置信息)。然后,服务器端接收应用请求,读取本地的配置文件(配置文件可由运维人员通过后台管理页面进行修改),并返回客户端应用。
配置文件内容可示例如下:
1)系统是否root?(如果存在root则说明应用可能被恶意读取相关数据);
2)系统中是否存在用户信任证书?(当用户连接外部WIFI时,可能存在HTTPS欺骗);
3)系统当前版本是否存在已知影响安全性漏洞?(如果存在已知漏洞应提示用户升级,并关闭漏洞影响的相关功能);
4)系统存在恶意APP?(恶意APP可能读取交易短信等信息,提示用户卸载相关APP);
5)应用是不是最新版本?(应用原版本可能存在相关漏洞,提示用户升级,示版本情况而定变更风险分数);
6)系统已接入WIFI?(用户接入WIFI时,可能存在钓鱼情况,可作为综合考虑项);
7)系统中存在不明APP?(系统中不明APP可能是恶意的,可作为综合考虑项);
在从服务器端收到扫描配置文件后,安全模块根据该扫描配置文件,对系统进行扫描检测,并生成扫描结果。然后,客户端将扫描结果发送到服务器端,而服务器根据当前后台的规则(此处规则可由运维人员通过后台管理界面动态调整),评估各项扫描结果,并生成风险分值。在一个具体的示例中,规则示例如下:
接着,服务器根据扫描结果与风险分值,禁用相关功能。假定当前应用具备登录、查询、购买产品,行内转账,跨行转账5项功能。在考虑风险值因素的情况下,当风险值大于20时,禁用“跨行”转账;风险值大于40时,禁用“转账”功能;风险值大于60时,禁用“购买”功能;风险值大于80时,禁用“查询”功能。在一个实施例中,需另外考虑指定功能禁用项。例如,当已知某版本“购买”功能存在漏洞,其他功能正常。又例如,当某客户端上报的版本存在漏洞时,虽然此时风险值不高,但需要禁用“购买”功能,此种情况下,不能上调漏洞版本对应的风险值,因为其他功能是可以正常使用的。本领域技术人员可以理解,禁用哪些功能可根据当前安全形势动态调整。
随后,根据功能禁用情况,服务器动态生成可加载功能代码,用于客户端运行。客户端收到功能代码后,加载运行,对于已禁用功能,不存在相关代码,所以不能执行相应功能。优选地,客户端可根据风险值,引导用户修复系统。
与现有技术相比,在本申请中,应用可明确了解当前运行环境对支付、对交易的安全威胁。应用可有效加载或禁用相关功能,降低由于环境威胁带来的风险。后台服务器可根据最近安全趋势变化,动态调整策略,修改应用加载功能项。例如,目前Android 4.4.1为主流版本相对安全,但到2017年时,Android 4.4.1版本可能已公开较多安全漏洞,未升级的系统存在影响交易安全的问题,后台可适当禁用相关功能,如只允许查询,不允许转账,减少交易风险。应用可针对性地引导用户修复系统,提升安全性。此外,本申请的技术方案还可考虑收集当前地区各系统安全状态,用于后续产品设计、产品研发、产品推广、安全研究等参考。
上文中,参照附图描述了本发明的具体实施方式。但是,本领域中的普通技术人员能够理解,在不偏离本发明的精神和范围的情况
下,还可以对本发明的具体实施方式作各种变更和替换。这些变更和替换都落在本发明权利要求书所限定的范围内。
Claims (11)
- 一种在客户端动态控制应用功能的方法,包括:启动应用程序,该应用程序仅包含框架功能代码;在启动所述应用程序后,加载安全模块,其中所述安全模块向服务器端发送关于扫描配置文件的请求;根据从服务器端接收的所述配置文件对所述客户端的应用环境执行扫描,并将所述扫描结果发送给服务器端,以生成风险分值;以及从服务器端接收在当前应用环境下允许加载的功能代码,所述功能代码基于所生成的风险分值而由服务器端产生。
- 如权利要求1所述的方法,其中,所述应用程序存在一个或多个功能,并且其中,在所述客户端的应用环境存在风险时,所述应用程序被禁用其所有功能中的一个或多个。
- 如权利要求1所述的方法,其中,在所述客户端的应用环境存在风险时,引导用户修复系统。
- 如权利要求1所述的方法,其中,所述扫描配置文件由运营维护管理端定期更新或维护。
- 如权利要求2所述的方法,其中,当所生成的风险分值大于第一阈值但小于第二阈值时,所述应用程序被禁用其第一功能;而当所生成风险分值大于第二阈值但小于第三阈值时,所述应用程序被禁用其第一功能和第二功能。
- 一种在服务器端动态控制应用功能的方法,包括:接收来自客户端的安全模块的请求,所述请求与提供扫描配置文件相关;根据所述请求,返回配置文件以供客户端执行扫描;接收来自客户端的扫描结果,并对其进行评估,以生成风险分值;根据所述扫描结果和所生成的风险分值,确定需要禁用所述应用程序的一部分功能;以及基于确定的结果,生成与客户端的当前应用环境相适应的功能代码,并发送给客户端以供其进行加载。
- 如权利要求6所述的方法,其中,所述应用程序存在一个或多个功能,并且其中,在所述客户端的应用环境存在风险时,所述应用程序被禁用其所有功能中的一个或多个。
- 如权利要求6所述的方法,其中,在所述客户端的应用环境存在风险时,所述客户端引导用户修复系统。
- 如权利要求6所述的方法,其中,所述扫描配置文件由运营维护管理端定期更新或维护。
- 如权利要求7所述的方法,其中,当所生成的风险分值大于第一阈值但小于第二阈值时,禁用所述应用程序的第一功能;而当所生成风险分值大于第二阈值但小于第三阈值时,禁用所述应用程序的第一功能和第二功能。
- 如权利要求1-10中任一项所述的方法,其中,所述客户端的应用环境为Android。
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP15852204.5A EP3211557B1 (en) | 2014-10-22 | 2015-10-06 | Method for dynamically controlling application function based on environment detection |
US15/518,340 US10719605B2 (en) | 2014-10-22 | 2015-10-06 | Method for dynamically controlling application function based on environment detection |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410565859.7A CN105590056B (zh) | 2014-10-22 | 2014-10-22 | 基于环境检测的动态应用功能控制方法 |
CN201410565859.7 | 2014-10-22 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2016062193A1 true WO2016062193A1 (zh) | 2016-04-28 |
Family
ID=55760276
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2015/091424 WO2016062193A1 (zh) | 2014-10-22 | 2015-10-06 | 基于环境检测的动态应用功能控制方法 |
Country Status (5)
Country | Link |
---|---|
US (1) | US10719605B2 (zh) |
EP (1) | EP3211557B1 (zh) |
CN (1) | CN105590056B (zh) |
TW (1) | TW201617956A (zh) |
WO (1) | WO2016062193A1 (zh) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107292613B (zh) * | 2017-06-27 | 2020-10-20 | Oppo广东移动通信有限公司 | 移动支付防护方法、装置及移动终端 |
CN112363771B (zh) * | 2019-07-24 | 2024-05-28 | 腾讯科技(深圳)有限公司 | 应用程序的处理方法及相关产品 |
CN113590101B (zh) * | 2021-08-20 | 2024-04-09 | 深圳市欧瑞博科技股份有限公司 | 智能设备功能页面配置方法、服务器及客户端 |
US20230214822A1 (en) * | 2022-01-05 | 2023-07-06 | Mastercard International Incorporated | Computer-implemented methods and systems for authentic user-merchant association and services |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1547364A (zh) * | 2003-12-04 | 2004-11-17 | 中国科学院计算技术研究所 | 一种实现网络客户端应用动态部署的方法 |
CN102760219A (zh) * | 2011-12-20 | 2012-10-31 | 北京安天电子设备有限公司 | 一种Android平台软件保护系统、方法及设备 |
CN103440168A (zh) * | 2013-09-09 | 2013-12-11 | 中国农业银行股份有限公司 | 一种程序变更方法及系统 |
Family Cites Families (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AU2002304334A1 (en) * | 2002-03-27 | 2003-10-08 | Nokia Corporation | Multiple security level mobile telecommunications device, system and method |
US8122499B2 (en) * | 2003-04-16 | 2012-02-21 | Hobnob, Inc. | Network security apparatus and method |
EP2140393A1 (en) * | 2007-03-20 | 2010-01-06 | Dmvich Software, Llc | Refreshing software licenses |
CN101682626A (zh) * | 2007-05-24 | 2010-03-24 | 爱维技术解决方案私人有限公司 | 用于模拟对网络的黑客攻击的方法和系统 |
US20080301796A1 (en) | 2007-05-31 | 2008-12-04 | Microsoft Corporation | Adjusting the Levels of Anti-Malware Protection |
US8799450B2 (en) | 2008-10-14 | 2014-08-05 | Mcafee, Inc. | Server-based system, method, and computer program product for scanning data on a client using only a subset of the data |
CN101753554B (zh) | 2008-12-02 | 2014-05-07 | 卡巴斯基实验室 | 一种具有可动态配置的安全保护的信息装置以及对信息装置进行自动配置的方法 |
US20100332236A1 (en) * | 2009-06-25 | 2010-12-30 | Blueant Wireless Pty Limited | Voice-triggered operation of electronic devices |
US8495747B1 (en) * | 2010-03-31 | 2013-07-23 | Mcafee, Inc. | Prioritizing asset remediations |
CN101894230B (zh) * | 2010-07-14 | 2013-04-10 | 国网电力科学研究院 | 一种基于静态和动态分析技术的主机系统安全评估方法 |
EP2609538B1 (en) | 2010-08-25 | 2016-10-19 | Lookout Inc. | System and method for server-coupled malware prevention |
CN102479097B (zh) * | 2010-11-26 | 2014-06-11 | 中国科学院声学研究所 | 一种支持多级加载的安全嵌入式操作系统 |
CN102768743B (zh) * | 2011-05-06 | 2017-04-12 | 百度在线网络技术(北京)有限公司 | 在线支付系统的账户安全评级方法及装置 |
US8949993B2 (en) * | 2011-10-17 | 2015-02-03 | Mcafee Inc. | Mobile risk assessment |
US8918881B2 (en) | 2012-02-24 | 2014-12-23 | Appthority, Inc. | Off-device anti-malware protection for mobile devices |
US8713684B2 (en) * | 2012-02-24 | 2014-04-29 | Appthority, Inc. | Quantifying the risks of applications for mobile devices |
CN103379112A (zh) * | 2012-04-30 | 2013-10-30 | 刘宝旭 | 一种云计算环境安全量化评估系统 |
CN103853942A (zh) * | 2012-12-04 | 2014-06-11 | 中山大学深圳研究院 | 基于域的应用程序功能 |
US9027086B2 (en) * | 2013-02-01 | 2015-05-05 | Vidder, Inc. | Securing organizational computing assets over a network using virtual domains |
US20140359777A1 (en) * | 2013-05-31 | 2014-12-04 | Fixmo, Inc. | Context-aware risk measurement mobile device management system |
CN103577750B (zh) | 2013-11-15 | 2016-08-17 | 北京奇虎科技有限公司 | 隐私权限管理方法和装置 |
CN103973679B (zh) * | 2014-04-29 | 2017-02-15 | 重庆邮电大学 | 一种基于安全等级的传感网安全测评系统 |
-
2014
- 2014-10-22 CN CN201410565859.7A patent/CN105590056B/zh active Active
-
2015
- 2015-10-06 EP EP15852204.5A patent/EP3211557B1/en active Active
- 2015-10-06 US US15/518,340 patent/US10719605B2/en active Active
- 2015-10-06 TW TW104132844A patent/TW201617956A/zh unknown
- 2015-10-06 WO PCT/CN2015/091424 patent/WO2016062193A1/zh active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1547364A (zh) * | 2003-12-04 | 2004-11-17 | 中国科学院计算技术研究所 | 一种实现网络客户端应用动态部署的方法 |
CN102760219A (zh) * | 2011-12-20 | 2012-10-31 | 北京安天电子设备有限公司 | 一种Android平台软件保护系统、方法及设备 |
CN103440168A (zh) * | 2013-09-09 | 2013-12-11 | 中国农业银行股份有限公司 | 一种程序变更方法及系统 |
Non-Patent Citations (1)
Title |
---|
See also references of EP3211557A4 * |
Also Published As
Publication number | Publication date |
---|---|
TW201617956A (zh) | 2016-05-16 |
CN105590056B (zh) | 2019-01-18 |
US10719605B2 (en) | 2020-07-21 |
TWI562014B (zh) | 2016-12-11 |
EP3211557B1 (en) | 2021-12-29 |
EP3211557A4 (en) | 2018-05-30 |
EP3211557A1 (en) | 2017-08-30 |
US20170308702A1 (en) | 2017-10-26 |
CN105590056A (zh) | 2016-05-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9898739B2 (en) | System and method for ensuring safety of online transactions | |
RU2610254C2 (ru) | Система и способ определения измененных веб-страниц | |
EP2755157B1 (en) | Detecting undesirable content | |
US7650639B2 (en) | System and method for protecting a limited resource computer from malware | |
US8578496B1 (en) | Method and apparatus for detecting legitimate computer operation misrepresentation | |
US8499350B1 (en) | Detecting malware through package behavior | |
US9542683B2 (en) | System and method for protecting electronic money transactions | |
US20210312077A1 (en) | Securing sensitive user data stored locally by an application | |
US10482250B1 (en) | Using a common account to block malware on multiple devices | |
US20230021885A1 (en) | Phishing Mitigation Service | |
WO2016062193A1 (zh) | 基于环境检测的动态应用功能控制方法 | |
US9275231B1 (en) | Method and apparatus for securing a computer using an optimal configuration for security software based on user behavior | |
Jafari et al. | Designing a comprehensive security framework for smartphones and mobile devices | |
US9384336B1 (en) | Systems and methods for modifying security based on reputation information | |
US20230319112A1 (en) | Admission control in a containerized computing environment | |
US20190163905A1 (en) | System, Method, and Apparatus for Preventing Execution of Malicious Scripts | |
US8266704B1 (en) | Method and apparatus for securing sensitive data from misappropriation by malicious software | |
KR101126532B1 (ko) | 평판 정보를 이용한 포지티브 보안 기반의 악성코드 실행 방지 방법 및 이를 이용한 악성코드 실행 방지 시스템 | |
US8832837B2 (en) | Preventing attacks on devices with multiple CPUs | |
US8566950B1 (en) | Method and apparatus for detecting potentially misleading visual representation objects to secure a computer | |
US20190334930A1 (en) | Mobile device and method for isolating and protecting a computer, networks, and devices from viruses and cyber attacks | |
KR101465691B1 (ko) | 금융사기 피싱과 파밍에 따른 공격 차단시스템 | |
KR102574384B1 (ko) | 블록체인 기술을 이용한 분산 구조의 엔드포인트 보안 방법 및 그 장치 | |
US9350755B1 (en) | Method and apparatus for detecting malicious software transmission through a web portal | |
MX2008000513A (es) | Seguridad de servicios de red de utilizando listas de control de accion de red. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15852204 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 15518340 Country of ref document: US |
|
REEP | Request for entry into the european phase |
Ref document number: 2015852204 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |