Malicious SP subscription verification method
The present invention discloses a malicious SP subscription verification method. The method includes the following steps that: S1, a malicious program feature library is established, malicious mastercontrol features are extracted, data packets are captured at a network side, the data packets are par...
Gespeichert in:
Hauptverfasser: | , , , , , , , , |
---|---|
Format: | Patent |
Sprache: | chi ; eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | WANG HANWEI CHEN HAIJIAN WU LINHUI TANG GUYAO HUANG HONGCHANG LI WEIHANG ZHU YUJIA LIU XIAOKUN CHEN QING |
description | The present invention discloses a malicious SP subscription verification method. The method includes the following steps that: S1, a malicious program feature library is established, malicious mastercontrol features are extracted, data packets are captured at a network side, the data packets are parsed, so that a suspected malicious SP subscription user is searched; S2, the access domain name orIP of the suspected malicious SP subscription user is collected, malicious SP subscription analysis is performed, whether the suspected malicious SP subscription user is a malicious SP subscription user is judged, if the suspected malicious SP subscription user is a malicious SP subscription user, a step S3 is executed; and S3, the behavioral log data, malicious subscription data and SP short message sending records of the malicious subscription user are verified, evidences of malicious SP subscription are collected. According to the malicious SP subscription verification method of the invention adopted, packet capture |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CN107835190A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CN107835190A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CN107835190A3</originalsourceid><addsrcrecordid>eNrjZND1TczJTM7MLy1WCA5QKC5NKk4uyiwoyczPUyhLLcpMy0xOBHNyU0sy8lN4GFjTEnOKU3mhNDeDoptriLOHbmpBfnxqcUFicmpeakm8s5-hgbmFsamhpYGjMTFqAOuaKoo</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Malicious SP subscription verification method</title><source>esp@cenet</source><creator>WANG HANWEI ; CHEN HAIJIAN ; WU LINHUI ; TANG GUYAO ; HUANG HONGCHANG ; LI WEIHANG ; ZHU YUJIA ; LIU XIAOKUN ; CHEN QING</creator><creatorcontrib>WANG HANWEI ; CHEN HAIJIAN ; WU LINHUI ; TANG GUYAO ; HUANG HONGCHANG ; LI WEIHANG ; ZHU YUJIA ; LIU XIAOKUN ; CHEN QING</creatorcontrib><description>The present invention discloses a malicious SP subscription verification method. The method includes the following steps that: S1, a malicious program feature library is established, malicious mastercontrol features are extracted, data packets are captured at a network side, the data packets are parsed, so that a suspected malicious SP subscription user is searched; S2, the access domain name orIP of the suspected malicious SP subscription user is collected, malicious SP subscription analysis is performed, whether the suspected malicious SP subscription user is a malicious SP subscription user is judged, if the suspected malicious SP subscription user is a malicious SP subscription user, a step S3 is executed; and S3, the behavioral log data, malicious subscription data and SP short message sending records of the malicious subscription user are verified, evidences of malicious SP subscription are collected. According to the malicious SP subscription verification method of the invention adopted, packet capture</description><language>chi ; eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2018</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20180323&DB=EPODOC&CC=CN&NR=107835190A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,778,883,25547,76298</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20180323&DB=EPODOC&CC=CN&NR=107835190A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>WANG HANWEI</creatorcontrib><creatorcontrib>CHEN HAIJIAN</creatorcontrib><creatorcontrib>WU LINHUI</creatorcontrib><creatorcontrib>TANG GUYAO</creatorcontrib><creatorcontrib>HUANG HONGCHANG</creatorcontrib><creatorcontrib>LI WEIHANG</creatorcontrib><creatorcontrib>ZHU YUJIA</creatorcontrib><creatorcontrib>LIU XIAOKUN</creatorcontrib><creatorcontrib>CHEN QING</creatorcontrib><title>Malicious SP subscription verification method</title><description>The present invention discloses a malicious SP subscription verification method. The method includes the following steps that: S1, a malicious program feature library is established, malicious mastercontrol features are extracted, data packets are captured at a network side, the data packets are parsed, so that a suspected malicious SP subscription user is searched; S2, the access domain name orIP of the suspected malicious SP subscription user is collected, malicious SP subscription analysis is performed, whether the suspected malicious SP subscription user is a malicious SP subscription user is judged, if the suspected malicious SP subscription user is a malicious SP subscription user, a step S3 is executed; and S3, the behavioral log data, malicious subscription data and SP short message sending records of the malicious subscription user are verified, evidences of malicious SP subscription are collected. According to the malicious SP subscription verification method of the invention adopted, packet capture</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2018</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZND1TczJTM7MLy1WCA5QKC5NKk4uyiwoyczPUyhLLcpMy0xOBHNyU0sy8lN4GFjTEnOKU3mhNDeDoptriLOHbmpBfnxqcUFicmpeakm8s5-hgbmFsamhpYGjMTFqAOuaKoo</recordid><startdate>20180323</startdate><enddate>20180323</enddate><creator>WANG HANWEI</creator><creator>CHEN HAIJIAN</creator><creator>WU LINHUI</creator><creator>TANG GUYAO</creator><creator>HUANG HONGCHANG</creator><creator>LI WEIHANG</creator><creator>ZHU YUJIA</creator><creator>LIU XIAOKUN</creator><creator>CHEN QING</creator><scope>EVB</scope></search><sort><creationdate>20180323</creationdate><title>Malicious SP subscription verification method</title><author>WANG HANWEI ; CHEN HAIJIAN ; WU LINHUI ; TANG GUYAO ; HUANG HONGCHANG ; LI WEIHANG ; ZHU YUJIA ; LIU XIAOKUN ; CHEN QING</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CN107835190A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>chi ; eng</language><creationdate>2018</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>WANG HANWEI</creatorcontrib><creatorcontrib>CHEN HAIJIAN</creatorcontrib><creatorcontrib>WU LINHUI</creatorcontrib><creatorcontrib>TANG GUYAO</creatorcontrib><creatorcontrib>HUANG HONGCHANG</creatorcontrib><creatorcontrib>LI WEIHANG</creatorcontrib><creatorcontrib>ZHU YUJIA</creatorcontrib><creatorcontrib>LIU XIAOKUN</creatorcontrib><creatorcontrib>CHEN QING</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>WANG HANWEI</au><au>CHEN HAIJIAN</au><au>WU LINHUI</au><au>TANG GUYAO</au><au>HUANG HONGCHANG</au><au>LI WEIHANG</au><au>ZHU YUJIA</au><au>LIU XIAOKUN</au><au>CHEN QING</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Malicious SP subscription verification method</title><date>2018-03-23</date><risdate>2018</risdate><abstract>The present invention discloses a malicious SP subscription verification method. The method includes the following steps that: S1, a malicious program feature library is established, malicious mastercontrol features are extracted, data packets are captured at a network side, the data packets are parsed, so that a suspected malicious SP subscription user is searched; S2, the access domain name orIP of the suspected malicious SP subscription user is collected, malicious SP subscription analysis is performed, whether the suspected malicious SP subscription user is a malicious SP subscription user is judged, if the suspected malicious SP subscription user is a malicious SP subscription user, a step S3 is executed; and S3, the behavioral log data, malicious subscription data and SP short message sending records of the malicious subscription user are verified, evidences of malicious SP subscription are collected. According to the malicious SP subscription verification method of the invention adopted, packet capture</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | chi ; eng |
recordid | cdi_epo_espacenet_CN107835190A |
source | esp@cenet |
subjects | ELECTRIC COMMUNICATION TECHNIQUE ELECTRICITY TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
title | Malicious SP subscription verification method |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-16T09%3A52%3A52IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=WANG%20HANWEI&rft.date=2018-03-23&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECN107835190A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |