Malicious SP subscription verification method

The present invention discloses a malicious SP subscription verification method. The method includes the following steps that: S1, a malicious program feature library is established, malicious mastercontrol features are extracted, data packets are captured at a network side, the data packets are par...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: WANG HANWEI, CHEN HAIJIAN, WU LINHUI, TANG GUYAO, HUANG HONGCHANG, LI WEIHANG, ZHU YUJIA, LIU XIAOKUN, CHEN QING
Format: Patent
Sprache:chi ; eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator WANG HANWEI
CHEN HAIJIAN
WU LINHUI
TANG GUYAO
HUANG HONGCHANG
LI WEIHANG
ZHU YUJIA
LIU XIAOKUN
CHEN QING
description The present invention discloses a malicious SP subscription verification method. The method includes the following steps that: S1, a malicious program feature library is established, malicious mastercontrol features are extracted, data packets are captured at a network side, the data packets are parsed, so that a suspected malicious SP subscription user is searched; S2, the access domain name orIP of the suspected malicious SP subscription user is collected, malicious SP subscription analysis is performed, whether the suspected malicious SP subscription user is a malicious SP subscription user is judged, if the suspected malicious SP subscription user is a malicious SP subscription user, a step S3 is executed; and S3, the behavioral log data, malicious subscription data and SP short message sending records of the malicious subscription user are verified, evidences of malicious SP subscription are collected. According to the malicious SP subscription verification method of the invention adopted, packet capture
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CN107835190A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CN107835190A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CN107835190A3</originalsourceid><addsrcrecordid>eNrjZND1TczJTM7MLy1WCA5QKC5NKk4uyiwoyczPUyhLLcpMy0xOBHNyU0sy8lN4GFjTEnOKU3mhNDeDoptriLOHbmpBfnxqcUFicmpeakm8s5-hgbmFsamhpYGjMTFqAOuaKoo</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Malicious SP subscription verification method</title><source>esp@cenet</source><creator>WANG HANWEI ; CHEN HAIJIAN ; WU LINHUI ; TANG GUYAO ; HUANG HONGCHANG ; LI WEIHANG ; ZHU YUJIA ; LIU XIAOKUN ; CHEN QING</creator><creatorcontrib>WANG HANWEI ; CHEN HAIJIAN ; WU LINHUI ; TANG GUYAO ; HUANG HONGCHANG ; LI WEIHANG ; ZHU YUJIA ; LIU XIAOKUN ; CHEN QING</creatorcontrib><description>The present invention discloses a malicious SP subscription verification method. The method includes the following steps that: S1, a malicious program feature library is established, malicious mastercontrol features are extracted, data packets are captured at a network side, the data packets are parsed, so that a suspected malicious SP subscription user is searched; S2, the access domain name orIP of the suspected malicious SP subscription user is collected, malicious SP subscription analysis is performed, whether the suspected malicious SP subscription user is a malicious SP subscription user is judged, if the suspected malicious SP subscription user is a malicious SP subscription user, a step S3 is executed; and S3, the behavioral log data, malicious subscription data and SP short message sending records of the malicious subscription user are verified, evidences of malicious SP subscription are collected. According to the malicious SP subscription verification method of the invention adopted, packet capture</description><language>chi ; eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2018</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20180323&amp;DB=EPODOC&amp;CC=CN&amp;NR=107835190A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,778,883,25547,76298</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20180323&amp;DB=EPODOC&amp;CC=CN&amp;NR=107835190A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>WANG HANWEI</creatorcontrib><creatorcontrib>CHEN HAIJIAN</creatorcontrib><creatorcontrib>WU LINHUI</creatorcontrib><creatorcontrib>TANG GUYAO</creatorcontrib><creatorcontrib>HUANG HONGCHANG</creatorcontrib><creatorcontrib>LI WEIHANG</creatorcontrib><creatorcontrib>ZHU YUJIA</creatorcontrib><creatorcontrib>LIU XIAOKUN</creatorcontrib><creatorcontrib>CHEN QING</creatorcontrib><title>Malicious SP subscription verification method</title><description>The present invention discloses a malicious SP subscription verification method. The method includes the following steps that: S1, a malicious program feature library is established, malicious mastercontrol features are extracted, data packets are captured at a network side, the data packets are parsed, so that a suspected malicious SP subscription user is searched; S2, the access domain name orIP of the suspected malicious SP subscription user is collected, malicious SP subscription analysis is performed, whether the suspected malicious SP subscription user is a malicious SP subscription user is judged, if the suspected malicious SP subscription user is a malicious SP subscription user, a step S3 is executed; and S3, the behavioral log data, malicious subscription data and SP short message sending records of the malicious subscription user are verified, evidences of malicious SP subscription are collected. According to the malicious SP subscription verification method of the invention adopted, packet capture</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2018</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZND1TczJTM7MLy1WCA5QKC5NKk4uyiwoyczPUyhLLcpMy0xOBHNyU0sy8lN4GFjTEnOKU3mhNDeDoptriLOHbmpBfnxqcUFicmpeakm8s5-hgbmFsamhpYGjMTFqAOuaKoo</recordid><startdate>20180323</startdate><enddate>20180323</enddate><creator>WANG HANWEI</creator><creator>CHEN HAIJIAN</creator><creator>WU LINHUI</creator><creator>TANG GUYAO</creator><creator>HUANG HONGCHANG</creator><creator>LI WEIHANG</creator><creator>ZHU YUJIA</creator><creator>LIU XIAOKUN</creator><creator>CHEN QING</creator><scope>EVB</scope></search><sort><creationdate>20180323</creationdate><title>Malicious SP subscription verification method</title><author>WANG HANWEI ; CHEN HAIJIAN ; WU LINHUI ; TANG GUYAO ; HUANG HONGCHANG ; LI WEIHANG ; ZHU YUJIA ; LIU XIAOKUN ; CHEN QING</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CN107835190A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>chi ; eng</language><creationdate>2018</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>WANG HANWEI</creatorcontrib><creatorcontrib>CHEN HAIJIAN</creatorcontrib><creatorcontrib>WU LINHUI</creatorcontrib><creatorcontrib>TANG GUYAO</creatorcontrib><creatorcontrib>HUANG HONGCHANG</creatorcontrib><creatorcontrib>LI WEIHANG</creatorcontrib><creatorcontrib>ZHU YUJIA</creatorcontrib><creatorcontrib>LIU XIAOKUN</creatorcontrib><creatorcontrib>CHEN QING</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>WANG HANWEI</au><au>CHEN HAIJIAN</au><au>WU LINHUI</au><au>TANG GUYAO</au><au>HUANG HONGCHANG</au><au>LI WEIHANG</au><au>ZHU YUJIA</au><au>LIU XIAOKUN</au><au>CHEN QING</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Malicious SP subscription verification method</title><date>2018-03-23</date><risdate>2018</risdate><abstract>The present invention discloses a malicious SP subscription verification method. The method includes the following steps that: S1, a malicious program feature library is established, malicious mastercontrol features are extracted, data packets are captured at a network side, the data packets are parsed, so that a suspected malicious SP subscription user is searched; S2, the access domain name orIP of the suspected malicious SP subscription user is collected, malicious SP subscription analysis is performed, whether the suspected malicious SP subscription user is a malicious SP subscription user is judged, if the suspected malicious SP subscription user is a malicious SP subscription user, a step S3 is executed; and S3, the behavioral log data, malicious subscription data and SP short message sending records of the malicious subscription user are verified, evidences of malicious SP subscription are collected. According to the malicious SP subscription verification method of the invention adopted, packet capture</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language chi ; eng
recordid cdi_epo_espacenet_CN107835190A
source esp@cenet
subjects ELECTRIC COMMUNICATION TECHNIQUE
ELECTRICITY
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title Malicious SP subscription verification method
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-16T09%3A52%3A52IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=WANG%20HANWEI&rft.date=2018-03-23&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECN107835190A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true