[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

WO2016062193A1 - 基于环境检测的动态应用功能控制方法 - Google Patents

基于环境检测的动态应用功能控制方法 Download PDF

Info

Publication number
WO2016062193A1
WO2016062193A1 PCT/CN2015/091424 CN2015091424W WO2016062193A1 WO 2016062193 A1 WO2016062193 A1 WO 2016062193A1 CN 2015091424 W CN2015091424 W CN 2015091424W WO 2016062193 A1 WO2016062193 A1 WO 2016062193A1
Authority
WO
WIPO (PCT)
Prior art keywords
application
client
function
disabled
threshold
Prior art date
Application number
PCT/CN2015/091424
Other languages
English (en)
French (fr)
Inventor
刘发章
Original Assignee
中国银联股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中国银联股份有限公司 filed Critical 中国银联股份有限公司
Priority to EP15852204.5A priority Critical patent/EP3211557B1/en
Priority to US15/518,340 priority patent/US10719605B2/en
Publication of WO2016062193A1 publication Critical patent/WO2016062193A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/561Virus type analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/67Risk-dependent, e.g. selecting a security level depending on risk profiles

Definitions

  • the invention relates to a method for dynamically loading an application function, and more particularly to a dynamic application function control method based on environment detection.
  • the present invention invents a mobile platform environment detection and a method for dynamically loading an application function according to an environmental detection result.
  • the environment security is first detected, and the current environment is detected according to the detection situation. The rating is performed, and the application function of the corresponding level is loaded. If the environment is judged to be dangerous, the financial transaction is involved, and the payment and other functions will refuse to load and prompt the user to clean up the environment to ensure application security.
  • a method for dynamically controlling an application function on a client includes: launching an application, the application only includes a framework function code; after launching the application, loading a security module, where The security module sends a request for scanning the configuration file to the server; performs scanning on the application environment of the client according to the configuration file received from the server, and sends the scan result to the server to generate a risk score. And receiving, from the server side, a function code that is allowed to be loaded in the current application environment, the function code being generated by the server side based on the generated risk score.
  • the application has one or more functions, and wherein the application is disabled for one or more of its functions when the application environment of the client is at risk.
  • the scan configuration file is periodically updated or maintained by the operation and maintenance management terminal.
  • the application when the generated risk score is greater than the first threshold but less than the second threshold, the application is disabled for its first function; and when the generated risk score is greater than the second threshold but less than the third threshold, The application is disabled for its first and second functions.
  • a method of dynamically controlling an application function on a server side comprising: receiving a request from a security module of a client, the request being related to providing a scan profile; and returning the configuration according to the request a file for the client to perform a scan; receiving a scan result from the client and evaluating it to generate a risk score; determining that a portion of the function of the application needs to be disabled based on the scan result and the generated risk score And, based on the determined result, generate a function code that is compatible with the client's current application environment and send it to the client for loading.
  • the application has one or more functions, and wherein the application is disabled for one or more of its functions when the application environment of the client is at risk.
  • the client when the application environment of the client is at risk, the client guides the user to repair the system.
  • the scan configuration file is periodically updated or maintained by the operation and maintenance management terminal.
  • the first function of the application is disabled when the generated risk score is greater than the first threshold but less than the second threshold; and disabled when the generated risk score is greater than the second threshold but less than the third threshold.
  • the application environment of the client is Android.
  • FIG. 1 is a schematic diagram of a dynamic application function control method based on environment detection according to an embodiment of the present application.
  • the basic idea of the present application is to disable the relevant important functions, refuse to serve the user, and prompt the user to upgrade or repair the system before using it if it is known that the current environment may be threatened or unsafe. This method increases security by losing a certain user experience and ensures transaction security.
  • the application is first launched by the user, which application only contains the framework function code. Then, the application loads the security scan module, and the security scan module requests the server to scan the configuration file (the configuration file specifies the scan-related configuration information such as the detection object and the detection mode). Then, the server receives the application request, reads the local configuration file (the configuration file can be modified by the operation and maintenance personnel through the background management page), and returns to the client application.
  • the security scan module requests the server to scan the configuration file (the configuration file specifies the scan-related configuration information such as the detection object and the detection mode). Then, the server receives the application request, reads the local configuration file (the configuration file can be modified by the operation and maintenance personnel through the background management page), and returns to the client application.
  • the configuration file contents can be exemplified as follows:
  • a malicious APP may read information such as a transaction SMS, prompting the user to uninstall the relevant APP);
  • the security module After receiving the scan configuration file from the server, the security module scans the system according to the scan configuration file and generates a scan result. Then, the client sends the scan result to the server, and the server evaluates each scan result according to the current background rules (the rule can be dynamically adjusted by the operation and maintenance personnel through the background management interface), and generates a risk score.
  • the rule can be dynamically adjusted by the operation and maintenance personnel through the background management interface, and generates a risk score.
  • an example of a rule is as follows:
  • the server then disables the relevant functionality based on the scan results and risk scores. Assume that the current application has five functions: login, query, purchase of products, in-row transfer, and inter-bank transfer. In the case of considering the risk value factor, when the risk value is greater than 20, the “cross-row” transfer is disabled; when the risk value is greater than 40, the “transfer” function is disabled; when the risk value is greater than 60, the “purchase” function is disabled; the risk value is greater than 80. When disabled, the Query feature is disabled. In one embodiment, additional functional disables need to be considered. For example, when a version of the "buy" feature is known to be vulnerable, other features are normal.
  • the server dynamically generates a loadable function code for the client to run. After the client receives the function code, it loads and runs. For the disabled function, there is no relevant code, so the corresponding function cannot be executed.
  • the client can direct the user to repair the system based on the risk value.
  • the application can clearly understand the security threats to the payment and the transaction in the current operating environment.
  • Applications can effectively load or disable related features to reduce the risk of environmental threats.
  • the background server can dynamically adjust the policy and modify the application loading function according to the recent security trend changes. For example, Android 4.4.1 is relatively safe for mainstream versions, but by 2017, Android 4.4.1 may have more security vulnerabilities.
  • the un-upgraded system has problems affecting transaction security.
  • the background can disable related functions. If only the inquiry is allowed, the transfer is not allowed and the transaction risk is reduced.
  • the application can guide users to repair the system in a targeted manner to improve security.
  • the technical solution of the present application can also consider collecting the security status of each system in the current region, and is used for reference of subsequent product design, product development, product promotion, security research, and the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Stored Programmes (AREA)
  • Information Transfer Between Computers (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

一种在客户端动态控制应用功能的方法,包括:启动应用程序,该应用程序仅包含框架功能代码;在启动所述应用程序后,加载安全模块,其中所述安全模块向服务器端发送关于扫描配置文件的请求;根据从服务器端接收的所述配置文件对所述客户端的应用环境执行扫描,并将所述扫描结果发送给服务器端,以生成风险分值;以及从服务器端接收在当前应用环境下允许加载的功能代码,所述功能代码基于所生成的风险分值而由服务器端产生。还公开了一种在服务器端动态控制应用功能的方法。

Description

基于环境检测的动态应用功能控制方法 技术领域
本发明涉及动态加载应用功能的方法,更具体来说,涉及一种基于环境检测的动态应用功能控制方法。
背景技术
在Android平台上,目前面临较严峻的安全威胁,病毒、漏洞、木马等严重影响应用尤其是支付应用的安全性。目前的各类Android客户端已具备一定的自我保护功能,但仍局限于增强应用复杂度、加大破解难度的思路,对于已知不安全的环境,并未进行根本上的保护。
发明内容
为了解决上述问题,本申请发明了一种移动平台环境检测及根据环境检测结果动态加载应用功能的方法,对于涉及隐私、交易等较为敏感的应用,先检测环境安全性,根据检测情况对当前环境进行评级,并加载对应等级的应用功能,若环境判定为危险,则涉及金融交易,支付等功能将拒绝加载并提示用户清理环境,保障应用安全。
根据本申请的一个方面,提供了一种在客户端动态控制应用功能的方法,包括:启动应用程序,该应用程序仅包含框架功能代码;在启动所述应用程序后,加载安全模块,其中所述安全模块向服务器端发送关于扫描配置文件的请求;根据从服务器端接收的所述配置文件对所述客户端的应用环境执行扫描,并将所述扫描结果发送给服务器端,以生成风险分值;以及从服务器端接收在当前应用环境下允许加载的功能代码,所述功能代码基于所生成的风险分值而由服务器端产生。
在上述方法中,所述应用程序存在一个或多个功能,并且其中,在所述客户端的应用环境存在风险时,所述应用程序被禁用其所有功能中的一个或多个。
在上述方法中,在所述客户端的应用环境存在风险时,引导用户修复系统。
在上述方法中,所述扫描配置文件由运营维护管理端定期更新或维护。
在上述方法中,当所生成的风险分值大于第一阈值但小于第二阈值时,所述应用程序被禁用其第一功能;而当所生成风险分值大于第二阈值但小于第三阈值时,所述应用程序被禁用其第一功能和第二功能。
根据本申请的另一个方面,提供了一种在服务器端动态控制应用功能的方法,包括:接收来自客户端的安全模块的请求,所述请求与提供扫描配置文件相关;根据所述请求,返回配置文件以供客户端执行扫描;接收来自客户端的扫描结果,并对其进行评估,以生成风险分值;根据所述扫描结果和所生成的风险分值,确定需要禁用所述应用程序的一部分功能;以及基于确定的结果,生成与客户端的当前应用环境相适应的功能代码,并发送给客户端以供其进行加载。
在上述方法中,所述应用程序存在一个或多个功能,并且其中,在所述客户端的应用环境存在风险时,所述应用程序被禁用其所有功能中的一个或多个。
在上述方法中,在所述客户端的应用环境存在风险时,所述客户端引导用户修复系统。
在上述方法中,所述扫描配置文件由运营维护管理端定期更新或维护。
在上述方法中,当所生成的风险分值大于第一阈值但小于第二阈值时,禁用所述应用程序的第一功能;而当所生成风险分值大于第二阈值但小于第三阈值时,禁用所述应用程序的第一功能和第二功能。
在上述方法中,所述客户端的应用环境为Android。
附图说明
在参照附图阅读了本发明的具体实施方式以后,本领域技术人员 将会更清楚地了解本发明的各个方面。本领域技术人员应当理解的是:这些附图仅仅用于配合具体实施方式说明本发明的技术方案,而并非意在对本发明的保护范围构成限制。
图1是根据本申请的实施例基于环境检测的动态应用功能控制方法的示意图。
具体实施方式
下面介绍的是本发明的多个可能实施例中的一些,旨在提供对本发明的基本了解,并不旨在确认本发明的关键或决定性的要素或限定所要保护的范围。容易理解,根据本发明的技术方案,在不变更本发明的实质精神下,本领域的一般技术人员可以提出可相互替换的其它实现方式。因此,以下具体实施方式以及附图仅是对本发明的技术方案的示例性说明,而不应当视为本发明的全部或者视为对本发明技术方案的限定或限制。
如在背景技术中所述,目前的各类Android客户端的保护措施局限于增强应用复杂度、加大破解难度的思路,对于已知不安全的环境,并未进行根本上的保护。
为解决该问题,本申请的基本思路是,若已知当前环境可能存在威胁、不安全,那么将相关重要功能禁用、拒绝向用户服务,并提示用户升级或修复系统后再使用。该方法通过损失一定的用户体验来增加安全性,保障交易安全。
在一个具体的实施例中,参考图1所示,首先由用户启动应用程序,该应用仅包含框架功能代码。接着,应用加载安全扫描模块,安全扫描模块向服务器端请求扫描配置文件(配置文件指定了检测对象,检测方式等扫描相关的配置信息)。然后,服务器端接收应用请求,读取本地的配置文件(配置文件可由运维人员通过后台管理页面进行修改),并返回客户端应用。
配置文件内容可示例如下:
1)系统是否root?(如果存在root则说明应用可能被恶意读取相关数据);
2)系统中是否存在用户信任证书?(当用户连接外部WIFI时,可能存在HTTPS欺骗);
3)系统当前版本是否存在已知影响安全性漏洞?(如果存在已知漏洞应提示用户升级,并关闭漏洞影响的相关功能);
4)系统存在恶意APP?(恶意APP可能读取交易短信等信息,提示用户卸载相关APP);
5)应用是不是最新版本?(应用原版本可能存在相关漏洞,提示用户升级,示版本情况而定变更风险分数);
6)系统已接入WIFI?(用户接入WIFI时,可能存在钓鱼情况,可作为综合考虑项);
7)系统中存在不明APP?(系统中不明APP可能是恶意的,可作为综合考虑项);
在从服务器端收到扫描配置文件后,安全模块根据该扫描配置文件,对系统进行扫描检测,并生成扫描结果。然后,客户端将扫描结果发送到服务器端,而服务器根据当前后台的规则(此处规则可由运维人员通过后台管理界面动态调整),评估各项扫描结果,并生成风险分值。在一个具体的示例中,规则示例如下:
Figure PCTCN2015091424-appb-000001
接着,服务器根据扫描结果与风险分值,禁用相关功能。假定当前应用具备登录、查询、购买产品,行内转账,跨行转账5项功能。在考虑风险值因素的情况下,当风险值大于20时,禁用“跨行”转账;风险值大于40时,禁用“转账”功能;风险值大于60时,禁用“购买”功能;风险值大于80时,禁用“查询”功能。在一个实施例中,需另外考虑指定功能禁用项。例如,当已知某版本“购买”功能存在漏洞,其他功能正常。又例如,当某客户端上报的版本存在漏洞时,虽然此时风险值不高,但需要禁用“购买”功能,此种情况下,不能上调漏洞版本对应的风险值,因为其他功能是可以正常使用的。本领域技术人员可以理解,禁用哪些功能可根据当前安全形势动态调整。
随后,根据功能禁用情况,服务器动态生成可加载功能代码,用于客户端运行。客户端收到功能代码后,加载运行,对于已禁用功能,不存在相关代码,所以不能执行相应功能。优选地,客户端可根据风险值,引导用户修复系统。
与现有技术相比,在本申请中,应用可明确了解当前运行环境对支付、对交易的安全威胁。应用可有效加载或禁用相关功能,降低由于环境威胁带来的风险。后台服务器可根据最近安全趋势变化,动态调整策略,修改应用加载功能项。例如,目前Android 4.4.1为主流版本相对安全,但到2017年时,Android 4.4.1版本可能已公开较多安全漏洞,未升级的系统存在影响交易安全的问题,后台可适当禁用相关功能,如只允许查询,不允许转账,减少交易风险。应用可针对性地引导用户修复系统,提升安全性。此外,本申请的技术方案还可考虑收集当前地区各系统安全状态,用于后续产品设计、产品研发、产品推广、安全研究等参考。
上文中,参照附图描述了本发明的具体实施方式。但是,本领域中的普通技术人员能够理解,在不偏离本发明的精神和范围的情况 下,还可以对本发明的具体实施方式作各种变更和替换。这些变更和替换都落在本发明权利要求书所限定的范围内。

Claims (11)

  1. 一种在客户端动态控制应用功能的方法,包括:
    启动应用程序,该应用程序仅包含框架功能代码;
    在启动所述应用程序后,加载安全模块,其中所述安全模块向服务器端发送关于扫描配置文件的请求;
    根据从服务器端接收的所述配置文件对所述客户端的应用环境执行扫描,并将所述扫描结果发送给服务器端,以生成风险分值;以及
    从服务器端接收在当前应用环境下允许加载的功能代码,所述功能代码基于所生成的风险分值而由服务器端产生。
  2. 如权利要求1所述的方法,其中,所述应用程序存在一个或多个功能,并且其中,在所述客户端的应用环境存在风险时,所述应用程序被禁用其所有功能中的一个或多个。
  3. 如权利要求1所述的方法,其中,在所述客户端的应用环境存在风险时,引导用户修复系统。
  4. 如权利要求1所述的方法,其中,所述扫描配置文件由运营维护管理端定期更新或维护。
  5. 如权利要求2所述的方法,其中,当所生成的风险分值大于第一阈值但小于第二阈值时,所述应用程序被禁用其第一功能;而当所生成风险分值大于第二阈值但小于第三阈值时,所述应用程序被禁用其第一功能和第二功能。
  6. 一种在服务器端动态控制应用功能的方法,包括:
    接收来自客户端的安全模块的请求,所述请求与提供扫描配置文件相关;
    根据所述请求,返回配置文件以供客户端执行扫描;
    接收来自客户端的扫描结果,并对其进行评估,以生成风险分值;
    根据所述扫描结果和所生成的风险分值,确定需要禁用所述应用程序的一部分功能;以及
    基于确定的结果,生成与客户端的当前应用环境相适应的功能代码,并发送给客户端以供其进行加载。
  7. 如权利要求6所述的方法,其中,所述应用程序存在一个或多个功能,并且其中,在所述客户端的应用环境存在风险时,所述应用程序被禁用其所有功能中的一个或多个。
  8. 如权利要求6所述的方法,其中,在所述客户端的应用环境存在风险时,所述客户端引导用户修复系统。
  9. 如权利要求6所述的方法,其中,所述扫描配置文件由运营维护管理端定期更新或维护。
  10. 如权利要求7所述的方法,其中,当所生成的风险分值大于第一阈值但小于第二阈值时,禁用所述应用程序的第一功能;而当所生成风险分值大于第二阈值但小于第三阈值时,禁用所述应用程序的第一功能和第二功能。
  11. 如权利要求1-10中任一项所述的方法,其中,所述客户端的应用环境为Android。
PCT/CN2015/091424 2014-10-22 2015-10-06 基于环境检测的动态应用功能控制方法 WO2016062193A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP15852204.5A EP3211557B1 (en) 2014-10-22 2015-10-06 Method for dynamically controlling application function based on environment detection
US15/518,340 US10719605B2 (en) 2014-10-22 2015-10-06 Method for dynamically controlling application function based on environment detection

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410565859.7A CN105590056B (zh) 2014-10-22 2014-10-22 基于环境检测的动态应用功能控制方法
CN201410565859.7 2014-10-22

Publications (1)

Publication Number Publication Date
WO2016062193A1 true WO2016062193A1 (zh) 2016-04-28

Family

ID=55760276

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/091424 WO2016062193A1 (zh) 2014-10-22 2015-10-06 基于环境检测的动态应用功能控制方法

Country Status (5)

Country Link
US (1) US10719605B2 (zh)
EP (1) EP3211557B1 (zh)
CN (1) CN105590056B (zh)
TW (1) TW201617956A (zh)
WO (1) WO2016062193A1 (zh)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107292613B (zh) * 2017-06-27 2020-10-20 Oppo广东移动通信有限公司 移动支付防护方法、装置及移动终端
CN112363771B (zh) * 2019-07-24 2024-05-28 腾讯科技(深圳)有限公司 应用程序的处理方法及相关产品
CN113590101B (zh) * 2021-08-20 2024-04-09 深圳市欧瑞博科技股份有限公司 智能设备功能页面配置方法、服务器及客户端
US20230214822A1 (en) * 2022-01-05 2023-07-06 Mastercard International Incorporated Computer-implemented methods and systems for authentic user-merchant association and services

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1547364A (zh) * 2003-12-04 2004-11-17 中国科学院计算技术研究所 一种实现网络客户端应用动态部署的方法
CN102760219A (zh) * 2011-12-20 2012-10-31 北京安天电子设备有限公司 一种Android平台软件保护系统、方法及设备
CN103440168A (zh) * 2013-09-09 2013-12-11 中国农业银行股份有限公司 一种程序变更方法及系统

Family Cites Families (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2002304334A1 (en) * 2002-03-27 2003-10-08 Nokia Corporation Multiple security level mobile telecommunications device, system and method
US8122499B2 (en) * 2003-04-16 2012-02-21 Hobnob, Inc. Network security apparatus and method
EP2140393A1 (en) * 2007-03-20 2010-01-06 Dmvich Software, Llc Refreshing software licenses
CN101682626A (zh) * 2007-05-24 2010-03-24 爱维技术解决方案私人有限公司 用于模拟对网络的黑客攻击的方法和系统
US20080301796A1 (en) 2007-05-31 2008-12-04 Microsoft Corporation Adjusting the Levels of Anti-Malware Protection
US8799450B2 (en) 2008-10-14 2014-08-05 Mcafee, Inc. Server-based system, method, and computer program product for scanning data on a client using only a subset of the data
CN101753554B (zh) 2008-12-02 2014-05-07 卡巴斯基实验室 一种具有可动态配置的安全保护的信息装置以及对信息装置进行自动配置的方法
US20100332236A1 (en) * 2009-06-25 2010-12-30 Blueant Wireless Pty Limited Voice-triggered operation of electronic devices
US8495747B1 (en) * 2010-03-31 2013-07-23 Mcafee, Inc. Prioritizing asset remediations
CN101894230B (zh) * 2010-07-14 2013-04-10 国网电力科学研究院 一种基于静态和动态分析技术的主机系统安全评估方法
EP2609538B1 (en) 2010-08-25 2016-10-19 Lookout Inc. System and method for server-coupled malware prevention
CN102479097B (zh) * 2010-11-26 2014-06-11 中国科学院声学研究所 一种支持多级加载的安全嵌入式操作系统
CN102768743B (zh) * 2011-05-06 2017-04-12 百度在线网络技术(北京)有限公司 在线支付系统的账户安全评级方法及装置
US8949993B2 (en) * 2011-10-17 2015-02-03 Mcafee Inc. Mobile risk assessment
US8918881B2 (en) 2012-02-24 2014-12-23 Appthority, Inc. Off-device anti-malware protection for mobile devices
US8713684B2 (en) * 2012-02-24 2014-04-29 Appthority, Inc. Quantifying the risks of applications for mobile devices
CN103379112A (zh) * 2012-04-30 2013-10-30 刘宝旭 一种云计算环境安全量化评估系统
CN103853942A (zh) * 2012-12-04 2014-06-11 中山大学深圳研究院 基于域的应用程序功能
US9027086B2 (en) * 2013-02-01 2015-05-05 Vidder, Inc. Securing organizational computing assets over a network using virtual domains
US20140359777A1 (en) * 2013-05-31 2014-12-04 Fixmo, Inc. Context-aware risk measurement mobile device management system
CN103577750B (zh) 2013-11-15 2016-08-17 北京奇虎科技有限公司 隐私权限管理方法和装置
CN103973679B (zh) * 2014-04-29 2017-02-15 重庆邮电大学 一种基于安全等级的传感网安全测评系统

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1547364A (zh) * 2003-12-04 2004-11-17 中国科学院计算技术研究所 一种实现网络客户端应用动态部署的方法
CN102760219A (zh) * 2011-12-20 2012-10-31 北京安天电子设备有限公司 一种Android平台软件保护系统、方法及设备
CN103440168A (zh) * 2013-09-09 2013-12-11 中国农业银行股份有限公司 一种程序变更方法及系统

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3211557A4 *

Also Published As

Publication number Publication date
TW201617956A (zh) 2016-05-16
CN105590056B (zh) 2019-01-18
US10719605B2 (en) 2020-07-21
TWI562014B (zh) 2016-12-11
EP3211557B1 (en) 2021-12-29
EP3211557A4 (en) 2018-05-30
EP3211557A1 (en) 2017-08-30
US20170308702A1 (en) 2017-10-26
CN105590056A (zh) 2016-05-18

Similar Documents

Publication Publication Date Title
US9898739B2 (en) System and method for ensuring safety of online transactions
RU2610254C2 (ru) Система и способ определения измененных веб-страниц
EP2755157B1 (en) Detecting undesirable content
US7650639B2 (en) System and method for protecting a limited resource computer from malware
US8578496B1 (en) Method and apparatus for detecting legitimate computer operation misrepresentation
US8499350B1 (en) Detecting malware through package behavior
US9542683B2 (en) System and method for protecting electronic money transactions
US20210312077A1 (en) Securing sensitive user data stored locally by an application
US10482250B1 (en) Using a common account to block malware on multiple devices
US20230021885A1 (en) Phishing Mitigation Service
WO2016062193A1 (zh) 基于环境检测的动态应用功能控制方法
US9275231B1 (en) Method and apparatus for securing a computer using an optimal configuration for security software based on user behavior
Jafari et al. Designing a comprehensive security framework for smartphones and mobile devices
US9384336B1 (en) Systems and methods for modifying security based on reputation information
US20230319112A1 (en) Admission control in a containerized computing environment
US20190163905A1 (en) System, Method, and Apparatus for Preventing Execution of Malicious Scripts
US8266704B1 (en) Method and apparatus for securing sensitive data from misappropriation by malicious software
KR101126532B1 (ko) 평판 정보를 이용한 포지티브 보안 기반의 악성코드 실행 방지 방법 및 이를 이용한 악성코드 실행 방지 시스템
US8832837B2 (en) Preventing attacks on devices with multiple CPUs
US8566950B1 (en) Method and apparatus for detecting potentially misleading visual representation objects to secure a computer
US20190334930A1 (en) Mobile device and method for isolating and protecting a computer, networks, and devices from viruses and cyber attacks
KR101465691B1 (ko) 금융사기 피싱과 파밍에 따른 공격 차단시스템
KR102574384B1 (ko) 블록체인 기술을 이용한 분산 구조의 엔드포인트 보안 방법 및 그 장치
US9350755B1 (en) Method and apparatus for detecting malicious software transmission through a web portal
MX2008000513A (es) Seguridad de servicios de red de utilizando listas de control de accion de red.

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15852204

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 15518340

Country of ref document: US

REEP Request for entry into the european phase

Ref document number: 2015852204

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: DE