CN102932782A - Mobile intelligent terminal leak inquiring and pushing method based on two-dimensional code under cloud environment - Google Patents

Mobile intelligent terminal leak inquiring and pushing method based on two-dimensional code under cloud environment Download PDF

Info

Publication number
CN102932782A
CN102932782A CN2012103875114A CN201210387511A CN102932782A CN 102932782 A CN102932782 A CN 102932782A CN 2012103875114 A CN2012103875114 A CN 2012103875114A CN 201210387511 A CN201210387511 A CN 201210387511A CN 102932782 A CN102932782 A CN 102932782A
Authority
CN
China
Prior art keywords
information
vulnerability database
vulnerability
intelligent terminal
mobile intelligent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2012103875114A
Other languages
Chinese (zh)
Inventor
吴敬征
武延军
武志飞
杨牧天
赵琛
李明树
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Institute of Software of CAS
Original Assignee
Institute of Software of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Institute of Software of CAS filed Critical Institute of Software of CAS
Priority to CN2012103875114A priority Critical patent/CN102932782A/en
Publication of CN102932782A publication Critical patent/CN102932782A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Information Transfer Between Computers (AREA)

Abstract

The invention provides a mobile intelligent terminal leak inquiring and pushing method based on a two-dimensional code under a cloud environment. The mobile intelligent terminal leak inquiring and pushing method comprises the following steps: a user installs a leak library client on a mobile intelligent terminal and registers in a cloud leak library management system; the leak library client collects information of the mobile intelligent terminal and encrypts the information of the mobile intelligent terminal and then generates the two-dimensional code; the cloud leak library management system decrypts the two-dimensional code, leak information matched with the information of the mobile intelligent terminal is searched in a leak library, and then the leak information is encrypted and a two-dimensional code is generated, and the leak information is pushed to the leak library client and a user account of the cloud leak library management system; and the leak library client decrypts the leak information in the two-dimensional code, and safe recovery is carried out. The mobile intelligent terminal leak inquiring and pushing method provided by the invention improves the existing fussy leak information inquiring manner, meets the requirements of a mobile intelligent terminal manufacturer and the user for quickly inquiring a safe leak and maintaining the terminal to be safe and improves user experience.

Description

Mobile intelligent terminal leak based on two-dimension code under the cloud environment is inquired about and method for pushing
Technical field
The invention belongs to the network security technology field, relate to inquiry and the push technology of mobile intelligent terminal security breaches, be specifically related under a kind of cloud computing environment of practicality the inquiry of mobile intelligent terminal safety loophole information and method for pushing based on two-dimension code.
Background technology
The concept of traditional computer has been expanded in the appearance of mobile intelligent terminal, and the several functions such as office, amusement, life, communication, leisure are integrated in the portable mobile device, has spatially expanded the scope of application of computer equipment.Yet, bring convenience efficiently simultaneously at mobile intelligent terminal, because the potential safety hazard that the software and hardware leak causes also becomes the matter of utmost importance of developer, mobile service provider, terminal use's concern.
Security breaches are the defectives that exist in the specific implementation of computer system hardware, software, agreement or the security strategy, cause the assailant to access or the destruction system in undelegated situation.Along with popularizing of mobile intelligent terminal, also emerge in an endless stream for the security breaches of mobile intelligent terminal.The root authority of the android mobile phone that for example, is caused by security breaches cracks problem; Because the program running background problem that the inadequate refinement of authority dynamics causes; And authorized the transitive trust problem cause etc. by the developer, all be that the important safety of mobile intelligent terminal threatens.
For fear of the hidden danger that security breaches are brought, under the present circumstances, the frequent login of terminal use's needs vulnerability database website is looked into and is seen if there is new leak, needs simultaneously to judge whether new leak affects the terminal equipment of oneself; If equipment is influenced, then need further query safe restoration information.This leak inquiry mode difficulty is loaded down with trivial details, needs the user to have certain computer use experience, can not give full play to the advantage of mobile intelligent terminal.
The invention provides a kind of inquiry of mobile intelligent terminal safety loophole information and method for pushing based on two-dimension code.Two-dimension code is a kind of information recording/mode based on the black and white rectangular patterns, can be by the image input device automatically identifying and reading data message of mobile intelligent terminal.Two-dimension code can be encoded to information such as picture, sound, literal, signature, fingerprints, can hold at most 1850 capitalizations or 2710 numerals or 1108 bytes or more than 500 Chinese character.
Summary of the invention
The object of the invention is to for the loaded down with trivial details present situation of mobile intelligent terminal user query safe leak difficulty, the inquiry of mobile intelligent terminal safety loophole information and method for pushing based on two-dimension code are proposed under a kind of cloud environment, for portable terminal manufacturer and user provide the targetedly functions such as security breaches quick search, propelling movement, security service, to improve user's experience.
For achieving the above object, the present invention adopts following technical scheme:
The inquiry of mobile intelligent terminal vulnerability information and method for pushing under a kind of cloud environment may further comprise the steps:
1) user installs the vulnerability database client at mobile intelligent terminal, and the vulnerability database management system is registered beyond the clouds;
2) the vulnerability database client is collected mobile intelligent terminal information, and this information is encrypted and generates two-dimension code, then is sent to high in the clouds vulnerability database management system;
3) vulnerability database management system in high in the clouds is decrypted described two-dimension code, retrieves the vulnerability information that is complementary with it according to the mobile intelligent terminal information that obtains in vulnerability database; Then the vulnerability information that retrieves is encrypted and generates two-dimension code, the two-dimension code of this generation is pushed to the user account of vulnerability database client and high in the clouds vulnerability database management system;
4) the vulnerability database client is deciphered the vulnerability information in the two-dimension code, and automatically jumps to the safety reparation page according to the security service information in the vulnerability database management system of high in the clouds, realizes the safety reparation.
In the step 1), the user downloads and installs the vulnerability database client by mobile intelligent terminal, and the user can select voluntarily by the client registration or pass through to login the mode of the website registration of high in the clouds vulnerability database management system.
Step 2) in, described mobile intelligent terminal information comprises operating system version information, the information etc. of installation procedure.
Further, in the vulnerability database management system after the registration, high in the clouds vulnerability database management system generates unsymmetrical key to KeysServer to the user beyond the clouds, and the PKI of KeysServer is sent to client; The vulnerability database client generates unsymmetrical key to KeysEnd, and the PKI of KeysEnd is sent to high in the clouds vulnerability database management system; The PKI of vulnerability database customer end adopted KeysServer is encrypted mobile intelligent terminal information, and high in the clouds vulnerability database management system adopts the private key of KeysServer that mobile intelligent terminal information is decrypted; High in the clouds vulnerability database management system adopts the PKI of KeysEnd that the vulnerability information that finds is encrypted, and the private key of vulnerability database customer end adopted KeysEnd is decrypted vulnerability information.
Further, the vulnerability database client judges whether mobile intelligent terminal information changes after generating two-dimension code last time, and according to the mobile intelligent terminal information updating step 2 after changing) described two-dimension code.Guarantee that thus the user profile of preserving in the vulnerability database management system beyond the clouds is up-to-date.
Further, step 4) can realize in the following manner:
A) user starts the vulnerability database client, the vulnerability information that this vulnerability database client automatic reception high in the clouds vulnerability database management system pushes, enciphered message in the decode two dimensional codes, and the vulnerability information in the private key of the Automatically invoked keysEnd deciphering two-dimension code, and then carry out the leak reparation.
B) user uses vulnerability database account login high in the clouds vulnerability database management system, and use the vulnerability database client to scan one by one the vulnerability information two-dimension code that pushes among the account, obtain the enciphered message in the decoded two-dimension code, then the private key of Automatically invoked keysEnd is decrypted, and then carries out the leak reparation.
When step 4) was carried out the leak reparation, for the leak of application program, the vulnerability database client was upgraded or is unloaded this program; For the security breaches of mobile intelligent terminal operating system grade, then upgrade according to the security bulletin of manufacturer, realize safety reparation.
The inquiry of mobile intelligent terminal safety loophole information and method for pushing based on two-dimension code under the cloud computing environment provided by the invention, use two-dimension code to represent the vulnerability database clauses and subclauses, the user uses vulnerability database client scan two-dimension code, thereby obtains vulnerability information and corresponding safe Push Service; On the other hand, vulnerability database management system in high in the clouds is pushed to user's vulnerability database client and user's network account with user-dependent security breaches.Mobile intelligent terminal obtains vulnerability information and security service fast by the recognition two-dimension code, mode and step that the user inquires about leak have been simplified, for portable terminal manufacturer and user provide the targetedly functions such as security breaches quick search, propelling movement, security service, improved user's experience.
The present invention has improved the loaded down with trivial details inquiry mode of existing vulnerability information, based on the Techniques For Reducing of cloud computing the operating lag under the large-scale concurrent user, take full advantage of the function of mobile intelligent terminal, satisfied the demand of mobile intelligent terminal manufacturer and user's quick search security breaches, maintenance terminal security.
Description of drawings
Fig. 1 is the schematic flow sheet that cloud environment moves down moving intelligent terminal leak inquiry and method for pushing among the embodiment;
Fig. 2 is that the vulnerability database client of mobile intelligent terminal is installed and vulnerability database website user register flow path figure;
Fig. 3 is vulnerability database client collection mobile intelligent terminal information and the flow chart that generates two-dimension code;
Fig. 4 is the two-dimension code schematic diagram according to the mobile intelligent terminal Information generation;
Fig. 5 is the two-dimension code schematic diagram that high in the clouds vulnerability database management system generates according to vulnerability information;
Fig. 6 is the schematic diagram that high in the clouds vulnerability database management system is pushed to vulnerability information the vulnerability database client;
Fig. 7 is the schematic diagram that high in the clouds vulnerability database management system is pushed to vulnerability information the vulnerability database user account;
Fig. 8 is that mobile intelligent terminal high in the clouds vulnerability database Management System Data pushes flow chart;
Fig. 9 is that vulnerability information inquiry and mobile intelligent terminal are repaired safely flow chart;
Figure 10 is the enforcement schematic diagram of mobile intelligent terminal leak inquiry and method for pushing among the embodiment.
Embodiment
Below by embodiment, and by reference to the accompanying drawings, the invention will be further described.
Based on the overview flow chart of the inquiry of the mobile intelligent terminal safety loophole information of two-dimension code and method for pushing as shown in Figure 1, it implements schematic diagram as shown in figure 10 under the cloud environment of the present embodiment.Concrete steps comprise:
1. the vulnerability database client of mobile intelligent terminal is installed and high in the clouds vulnerability database management system user registration.
The user downloads and installs the vulnerability database client by mobile intelligent terminal; The user can select voluntarily by the client registration or pass through to login the mode of the website registration of high in the clouds vulnerability database management system.After the registration, high in the clouds vulnerability database management system generates unsymmetrical key to KeysServer, and the PKI of KeysServer is sent to client; The vulnerability database client generates unsymmetrical key to KeysEnd, and the PKI of KeysEnd is sent to high in the clouds vulnerability database management system.Fig. 2 is the implementing procedure figure of this step, specifically describes as follows:
1a) for the user who uses first mobile intelligent terminal high in the clouds vulnerability database management system, need to the vulnerability database client be installed at mobile intelligent terminal; Then carry out 1b).
1b) whether the user can select to use the vulnerability database client to register voluntarily, if do not use the client registration, then turns to 1c); Otherwise turn to 1d).
1c) user's Website login is registered, and turns to 1d).
1d) after user's registration, the PKI among the public private key pair KeysServer that Security Vulnerability Database client high in the clouds vulnerability database management system generates; Then carry out 1e).
1e) client generates public private key pair KeysEnd voluntarily, and the PKI of cipher key pair is sent to high in the clouds security breaches base management system; Then carry out 1f).
1f) user uses the account login vulnerability database management system of this registration.
2. the vulnerability database client is collected mobile intelligent terminal information and is generated two-dimension code.
Mobile intelligent terminal user running client, the operating system version information of scanning mobile intelligent terminal behind the client terminal start-up, the information etc. of installation procedure, with regeneration two-dimension code behind the public key encryption of these information uses KeysServer, at last the two-dimension code that generates is sent to the vulnerability database server.
At first check the operating system version of terminal system during each client terminal start-up, whether the information of installation procedure changes, if compare with the information that preserved last time, variation has occured, then reuse this information of public key encryption of KeysServer, generate two-dimension code, two-dimension code is sent to the vulnerability database server; Guarantee that thus the user profile of preserving in the vulnerability database management system beyond the clouds is up-to-date.
Fig. 3 is the implementing procedure figure of this step, specifically describes as follows:
2a) during each vulnerability database client terminal start-up, at first whether inquiry has generated the two-dimension code of system information, if generated, forwards 2b to); Otherwise, forward 2c to).
2b) judge whether the operating system of mobile intelligent terminal and software systems variation has occured, and whether needs to upgrade this system information two-dimension code after generating two-dimension code last time, if need to upgrade, turn to 2c); Otherwise turn to 2g) finish.
2c) mobile intelligent terminal client scan system operating system version information, the information etc. of installation procedure are carried out 2d).
2d) use the PKI among the KeysServer that the information that scans is encrypted, carry out 2e).
2e) to the Information generation two-dimension code after encrypting, carry out 2f).
2f) two-dimension code that generates is sent to high in the clouds vulnerability database management system, forwards 2g to) finish.
2g) the vulnerability database client is collected the end of mobile intelligent terminal Information generation two-dimension code.
Typical mobile intelligent terminal information is as shown in table 1, and the two-dimension code of this Information generation as shown in Figure 4.
Table 1. mobile intelligent terminal information
3. the vulnerability information of high in the clouds vulnerability database management system pushes
High in the clouds vulnerability database management system adopts the framework of cloud computing, if a large number of users Concurrency Access causes operating lag to surpass a Preset Time, such as 2 seconds, then vulnerability database management system in high in the clouds is applied for new computational resource automatically in cloud platform resource pond, carries out load balancing, reduces operating lag.High in the clouds vulnerability database management system is collected both at home and abroad the openly data of vulnerability database automatically, and uses suitable Hole Detection instrument that the mobile intelligent terminal system is detected, to improve the vulnerability database data.
For the client two-dimension code that the vulnerability database terminal use provides, high in the clouds vulnerability database management system uses the KeysServer private key to be decrypted, and obtains the operating system version of client, the information of installation procedure.System information for each user, in vulnerability database, search the vulnerability information that is complementary with it, every result is used the public key encryption of KeysEnd, then generate two-dimension code, be pushed to the client of mobile intelligent terminal, be pushed to simultaneously in the user account of high in the clouds vulnerability database management system.
High in the clouds vulnerability database management system is that every vulnerability information generates 2 D code information, take typical android leak data CVE-2011-3901 as example, comprises leak title, affected systems and detailed url information in the two-dimension code, and is as follows:
Leak title: Android information leakage leak
Affect system: Android2.3.7
Detailed url:http: //www.openhandsetalliance.com/android_overview.html
The two-dimension code that generates as shown in Figure 5.
High in the clouds vulnerability database management system pushes relevant vulnerability information for each vulnerability database user, is pushed to the vulnerability database client, as shown in Figure 6.High in the clouds vulnerability database management system pushes relevant vulnerability information for each vulnerability database user, is pushed to the vulnerability information of vulnerability database user account as shown in Figure 7.
Fig. 8 is the implementing procedure figure of this step, specifically describes as follows:
3a) high in the clouds vulnerability database management system decoding client two-dimension code uses the keysServer private key to be decrypted to the information that solves, and finally obtains client operating system and the information of mounting software; Then carry out 3b).
3b) vulnerability database management system in high in the clouds reaches the information of mounting software according to client operating system, the corresponding vulnerability information of retrieval in vulnerability database, and record every result for retrieval; Then carry out 3c).
3c) vulnerability database management system in high in the clouds is used every record of KeysEnd public key encryption result; And be that every record generates two-dimension code; Then carry out 3d).
3d) vulnerability database management system in high in the clouds compares the vulnerability information result for retrieval, judges whether the vulnerability information that did not push; If have, then turn to 3e); Otherwise, turn to 3i) finish.
3e) judge whether this vulnerability information that did not push has been pushed to the vulnerability database client; If do not push, turn to 3f); If be pushed to the vulnerability database client, turned to 3g).
3f) vulnerability database management system in high in the clouds is to the vulnerability database client active push vulnerability information relevant with user's mobile intelligent terminal; Then carry out 3g).
3g) judge whether this vulnerability information that did not push has been pushed to the user account of high in the clouds vulnerability database management system; If do not push, turn to 3h); If be pushed to the user account of high in the clouds vulnerability database management system, turned to 3i).
3h) vulnerability database management system in high in the clouds is to the user account active push vulnerability information relevant with user's mobile intelligent terminal, and every information is presented in the user account interface in the mode of two-dimension code; Then carry out 3i).
3i) vulnerability database Management System Data in mobile intelligent terminal high in the clouds pushes and finishes.
4. vulnerability information inquiry and mobile intelligent terminal are repaired safely.
The vulnerability database client is resolved the information in the two-dimension code, and upgrades according to the security bulletin of safety recommendation upgrading or unloading application program or access manufacturer, thereby realizes safety reparation.
After the vulnerability database client terminal start-up, the pushed information of automatic reception vulnerability database.The safety loophole information clauses and subclauses that each propelling movement is obtained, vulnerability information in the client Automatically invoked KeysEnd private key deciphering two-dimension code, and according to the security service information in the vulnerability database management system of high in the clouds, client automatically jumps to the safety upgrade page or safety is repaired the page, realizes the safety reparation.
The client also can adopt the mode of login high in the clouds vulnerability database management system account to inquire about.The user signs in to after the vulnerability database management system of high in the clouds, and the personal account interface presents the 2 D code information of each relevant vulnerability, and the client can use the vulnerability database client to scan one by one the leak two-dimension code, and enters into the safety upgrade page or the safety reparation page.
For the leak of application program, if application developers provides corresponding safety upgrade information, then this application program of vulnerability database Client Auto Update realizes safety reparation; Otherwise the vulnerability database client advises that then the user unloads this application program.For the security breaches of mobile intelligent terminal operating system grade, vulnerability database client suggestion user pays close attention to manufacturer's upgrading bulletin, upgrades according to the information that manufacturer provides; Thereby realize safety reparation.
Fig. 9 is the implementing procedure figure of this step, specifically describes as follows:
4a) judge whether to have started the vulnerability database client; If started client, turn to 4b); Otherwise, turn to 4d).
4b) the pushed information of vulnerability database client automatic reception high in the clouds vulnerability database management system; Then carry out 4c).
4c) the leak two-dimension code of propelling movement is decoded, deciphered to client one by one; Then carry out 4f).
4d) the mobile intelligent terminal user uses vulnerability database account login high in the clouds vulnerability database management system, checks the vulnerability information of propelling movement in personal account; Then carry out 4e).
4e) user's vulnerability information two-dimension code of using the vulnerability database client to scan one by one to push among the account obtains the enciphered message in the decoded two-dimension code; Then carry out 4f).
4f) the vulnerability information in the private key of the vulnerability database client Automatically invoked keysEnd cipher key pair deciphering two-dimension code; Then carry out 4g).
4g) the security service information that provides according to the vulnerability information automatic access vulnerability database in the two-dimension code of vulnerability database client.For the leak of application program, the vulnerability database client is upgraded or is unloaded this program; For the security breaches of mobile intelligent terminal operating system grade, then upgrade according to the security bulletin of manufacturer, thereby realize safety reparation.Then carry out 4h).
4h) high in the clouds vulnerability database management system client inquiry and the safe repair process of mobile intelligent terminal finish.
Above embodiment is only in order to technical scheme of the present invention to be described but not limit it; those of ordinary skill in the art can make amendment or is equal to replacement technical scheme of the present invention; and not breaking away from the spirit and scope of the present invention, protection scope of the present invention should be as the criterion so that claim is described.

Claims (10)

1. the inquiry of mobile intelligent terminal vulnerability information and method for pushing under the cloud environment, its step comprises:
1) user installs the vulnerability database client at mobile intelligent terminal, and the vulnerability database management system is registered beyond the clouds;
2) the vulnerability database client is collected mobile intelligent terminal information, and this information is encrypted and generates two-dimension code, then is sent to high in the clouds vulnerability database management system;
3) vulnerability database management system in high in the clouds is decrypted described two-dimension code, retrieves the vulnerability information that is complementary with it according to the mobile intelligent terminal information that obtains in vulnerability database; Then the vulnerability information that retrieves is encrypted and generates two-dimension code, the two-dimension code of this generation is pushed to the user account of vulnerability database client and high in the clouds vulnerability database management system;
4) the vulnerability database client is deciphered the vulnerability information in the two-dimension code, and automatically jumps to the safety reparation page according to the security service information in the vulnerability database management system of high in the clouds, realizes the safety reparation.
2. the method for claim 1 is characterized in that: in the vulnerability database management system after the registration, high in the clouds vulnerability database management system generates unsymmetrical key to KeysServer to the user beyond the clouds, and the PKI of KeysServer is sent to client; The vulnerability database client generates unsymmetrical key to KeysEnd, and the PKI of KeysEnd is sent to high in the clouds vulnerability database management system; The PKI of vulnerability database customer end adopted KeysServer is encrypted mobile intelligent terminal information, and high in the clouds vulnerability database management system adopts the private key of KeysServer that mobile intelligent terminal information is decrypted; High in the clouds vulnerability database management system adopts the PKI of KeysEnd that the vulnerability information that finds is encrypted, and the private key of vulnerability database customer end adopted KeysEnd is decrypted vulnerability information.
3. method as claimed in claim 1 or 2, it is characterized in that: the user carries out described registration by the website of vulnerability database client or high in the clouds vulnerability database management system.
4. method as claimed in claim 1 or 2 is characterized in that: described mobile intelligent terminal information comprises operating system version information, the information of installation procedure.
5. method as claimed in claim 1 or 2 is characterized in that: the vulnerability database client judges whether mobile intelligent terminal information changes after generating two-dimension code last time, and according to the mobile intelligent terminal information updating step 2 after changing) described two-dimension code.
6. method as claimed in claim 2, it is characterized in that, the implementation of described step 4) is: the user starts the vulnerability database client, the vulnerability information that this vulnerability database client automatic reception high in the clouds vulnerability database management system pushes, enciphered message in the decode two dimensional codes, and the vulnerability information in the private key of the Automatically invoked keysEnd deciphering two-dimension code, and then carry out the leak reparation.
7. method as claimed in claim 2, it is characterized in that, the implementation of described step 4) is: the user uses vulnerability database account login high in the clouds vulnerability database management system, and use the vulnerability database client to scan one by one the vulnerability information two-dimension code that pushes among the account, obtain the enciphered message in the decoded two-dimension code, then the private key of Automatically invoked keysEnd is decrypted, and then carries out the leak reparation.
8. such as claim 6 or 7 described methods, it is characterized in that: for the leak of application program, the vulnerability database client is upgraded or is unloaded this program; For the security breaches of mobile intelligent terminal operating system grade, then upgrade according to the security bulletin of manufacturer, realize safety reparation.
9. method as claimed in claim 1 or 2, it is characterized in that: high in the clouds vulnerability database management system adopts the cloud computing framework, when a large number of users Concurrency Access causes operating lag to surpass a Preset Time, high in the clouds vulnerability database management system is automatically applied for new computational resource and is carried out load balancing in cloud platform resource pond, to reduce operating lag.
10. method as claimed in claim 9, it is characterized in that: described Preset Time is 2 seconds.
CN2012103875114A 2012-10-12 2012-10-12 Mobile intelligent terminal leak inquiring and pushing method based on two-dimensional code under cloud environment Pending CN102932782A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2012103875114A CN102932782A (en) 2012-10-12 2012-10-12 Mobile intelligent terminal leak inquiring and pushing method based on two-dimensional code under cloud environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2012103875114A CN102932782A (en) 2012-10-12 2012-10-12 Mobile intelligent terminal leak inquiring and pushing method based on two-dimensional code under cloud environment

Publications (1)

Publication Number Publication Date
CN102932782A true CN102932782A (en) 2013-02-13

Family

ID=47647461

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2012103875114A Pending CN102932782A (en) 2012-10-12 2012-10-12 Mobile intelligent terminal leak inquiring and pushing method based on two-dimensional code under cloud environment

Country Status (1)

Country Link
CN (1) CN102932782A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104038472A (en) * 2014-04-29 2014-09-10 广州华多网络科技有限公司 Information transmission method and device
CN104125222A (en) * 2014-07-18 2014-10-29 国网上海市电力公司 Information intranet security hole monitoring processing method
CN110555308A (en) * 2018-06-01 2019-12-10 北京安天网络安全技术有限公司 Terminal application behavior tracking and threat risk assessment method and system
CN112668025A (en) * 2020-12-30 2021-04-16 北京永信至诚科技股份有限公司 Vulnerability mining management method, system, equipment and readable storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1766776A (en) * 2005-09-28 2006-05-03 珠海金山软件股份有限公司 Computer software security loophole repairing apparatus and method
CN101231727A (en) * 2008-02-20 2008-07-30 深圳矽感科技有限公司 Electric cheque paying method and implementing system thereof
US20110191855A1 (en) * 2010-01-29 2011-08-04 International Business Machines Corporation In-development vulnerability response management

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1766776A (en) * 2005-09-28 2006-05-03 珠海金山软件股份有限公司 Computer software security loophole repairing apparatus and method
CN101231727A (en) * 2008-02-20 2008-07-30 深圳矽感科技有限公司 Electric cheque paying method and implementing system thereof
US20110191855A1 (en) * 2010-01-29 2011-08-04 International Business Machines Corporation In-development vulnerability response management

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
LEIBING8912: "《百度文库》", 29 December 2011, article "操作***漏洞" *
S5223364: "《百度知道》", 30 January 2010, article "360安全卫士检测***漏洞的原理是什么" *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104038472A (en) * 2014-04-29 2014-09-10 广州华多网络科技有限公司 Information transmission method and device
CN104125222A (en) * 2014-07-18 2014-10-29 国网上海市电力公司 Information intranet security hole monitoring processing method
CN110555308A (en) * 2018-06-01 2019-12-10 北京安天网络安全技术有限公司 Terminal application behavior tracking and threat risk assessment method and system
CN110555308B (en) * 2018-06-01 2021-11-12 北京安天网络安全技术有限公司 Terminal application behavior tracking and threat risk assessment method and system
CN112668025A (en) * 2020-12-30 2021-04-16 北京永信至诚科技股份有限公司 Vulnerability mining management method, system, equipment and readable storage medium

Similar Documents

Publication Publication Date Title
US8560648B2 (en) Location control service
CN108124480B (en) Software authorization method, system and equipment
CN103037312B (en) Information push method and device
CN106487743B (en) Method and apparatus for supporting multi-user cluster identity verification
KR100944065B1 (en) System and method for providing a multi-credential authentication protocol
US9325683B2 (en) Mobile application management framework
CN103744686B (en) Control method and the system of installation is applied in intelligent terminal
US20070186115A1 (en) Dynamic Password Authentication System and Method thereof
CN104604198A (en) Securing databases against piracy attacks
CN102932793A (en) Wireless network authentication method and system based on two-dimension code
CN103155513A (en) Method and apparatus for accelerated authentication
CN103295046A (en) Method and device for generating and using safe two-dimensional codes
CN104079409A (en) Account login method and device
CN109033857B (en) Method, device and equipment for accessing data and readable storage medium
WO2007061255A1 (en) Method for providing location-based service using location token
CN102945351A (en) Security vulnerability fixing method based on two-dimensional code for mobile intelligent terminal in cloud environment
US8638932B2 (en) Security method and system and computer-readable medium storing computer program for executing the security method
CN104519490A (en) WIFI (wireless fidelity) connection method, WIFI connection device, mobile terminal and system
CN102932782A (en) Mobile intelligent terminal leak inquiring and pushing method based on two-dimensional code under cloud environment
CN103581441A (en) Mobile terminal tracking anti-theft system and method
CN109639419A (en) Cryptographic key protection method, cipher key storage device and terminal device
CN103501307A (en) Safety certification method and system for intelligent television software based on android operation system
CN112348996A (en) Device binding method, user terminal and device to be bound
CN1750462A (en) Method for realizing identity identification by mobile terminal
CN102622251A (en) Method and server for managing navigation software upgrading

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130213