CN103632096B - A kind of method and apparatus that safety detection is carried out to equipment - Google Patents
A kind of method and apparatus that safety detection is carried out to equipment Download PDFInfo
- Publication number
- CN103632096B CN103632096B CN201310632733.2A CN201310632733A CN103632096B CN 103632096 B CN103632096 B CN 103632096B CN 201310632733 A CN201310632733 A CN 201310632733A CN 103632096 B CN103632096 B CN 103632096B
- Authority
- CN
- China
- Prior art keywords
- mobile device
- device side
- detection
- security
- computing device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000001514 detection method Methods 0.000 title claims abstract description 733
- 238000000034 method Methods 0.000 title claims abstract description 101
- 238000009434 installation Methods 0.000 claims description 192
- 238000004140 cleaning Methods 0.000 claims description 124
- 230000008439 repair process Effects 0.000 claims description 79
- 230000006870 function Effects 0.000 claims description 55
- 230000007123 defense Effects 0.000 claims description 48
- 238000012360 testing method Methods 0.000 claims description 43
- 238000007689 inspection Methods 0.000 claims description 40
- 241000700605 Viruses Species 0.000 claims description 39
- 238000005457 optimization Methods 0.000 claims description 37
- 238000013507 mapping Methods 0.000 claims description 31
- ZXQYGBMAQZUVMI-GCMPRSNUSA-N gamma-cyhalothrin Chemical compound CC1(C)[C@@H](\C=C(/Cl)C(F)(F)F)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 ZXQYGBMAQZUVMI-GCMPRSNUSA-N 0.000 claims description 23
- 238000009781 safety test method Methods 0.000 claims 2
- 230000008569 process Effects 0.000 description 30
- 230000006399 behavior Effects 0.000 description 21
- 230000010460 detection of virus Effects 0.000 description 6
- 238000012545 processing Methods 0.000 description 5
- 230000006854 communication Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 230000008520 organization Effects 0.000 description 4
- 238000011895 specific detection Methods 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 230000002155 anti-virotic effect Effects 0.000 description 3
- 230000008901 benefit Effects 0.000 description 3
- 238000004891 communication Methods 0.000 description 3
- 238000012544 monitoring process Methods 0.000 description 3
- 241000283086 Equidae Species 0.000 description 2
- 230000004913 activation Effects 0.000 description 2
- 238000012790 confirmation Methods 0.000 description 2
- 238000013519 translation Methods 0.000 description 2
- 238000000429 assembly Methods 0.000 description 1
- 230000003542 behavioural effect Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000000903 blocking effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000011900 installation process Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 208000008918 voyeurism Diseases 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/85—Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Alarm Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
本发明公开了一种对设备进行安全检测的方法和装置,其中所述方法包括:当移动设备连接至计算设备时,在所述移动设备侧接收所述计算设备侧发出的对移动设备的安全检测请求,所述安全检测请求中包括指定检测对象;在所述移动设备侧获取与所述指定检测对象对应的安全检测结果信息,并将所述安全检测结果信息发送至计算设备侧;在所述移动设备侧接收计算设备侧发送的执行指令,所述执行指令为计算设备依据所述安全检测结果信息生成;在所述移动设备侧执行所述执行指令。本发明可以使得用户在计算设备侧即可实现对移动设备的安全检测,从而提高移动设备的安全性。
The invention discloses a method and device for security detection of equipment, wherein the method includes: when the mobile equipment is connected to the computing equipment, receiving the mobile equipment security information sent by the computing equipment on the side of the mobile equipment; A detection request, wherein the safety detection request includes a designated detection object; obtaining safety detection result information corresponding to the designated detection object on the mobile device side, and sending the safety detection result information to the computing device side; The mobile device side receives the execution instruction sent by the computing device side, the execution instruction is generated by the computing device according to the security detection result information; and the execution instruction is executed on the mobile device side. The invention can enable the user to realize the safety detection of the mobile device on the computing device side, thereby improving the safety of the mobile device.
Description
技术领域technical field
本发明涉及设备安全检测技术领域,具体涉及一种对设备进行安全检测的方法,以及一种对设备进行安全检测的装置。The invention relates to the technical field of equipment safety detection, in particular to a method for safety detection of equipment and a device for safety detection of equipment.
背景技术Background technique
随着信息化程度的提高以及各种适用性技术的不断推出,计算机或手机等智能终端已经广泛应用在学习、娱乐、工作等方面,在人们的日常生活中扮演着越来越重要的角色。然而,智能终端的广泛应用也对智能终端在垃圾数据清理、安全防护等方面提出了更高要求。With the improvement of informatization and the continuous introduction of various applicable technologies, smart terminals such as computers or mobile phones have been widely used in learning, entertainment, work, etc., and are playing an increasingly important role in people's daily life. However, the wide application of smart terminals also puts forward higher requirements for smart terminals in terms of garbage data cleaning and security protection.
针对上述需求,很多第三方安全应用厂商开发出了针对智能终端安全应用,所述安全应用可以在智能终端侧对智能终端进行体检,并依据体检结果进行一系列的修复操作,以保证智能终端的性能和安全性。针对移动设备而言,虽然有些移动设备上预先安装了一些杀毒软件,但是往往用户未在其上安装手机卫士的时候,容易感染病毒,尤其是在访问了应用市场下载一些应用的时候,很容易被捆绑或者是下载到安装有恶意应用、插件、或者是广告应用之类的软件,往往导致用户在不能感知的情况下,遭受移动设备流量被偷跑、被窃取隐私、或者是恶意扣费等损失,所以有必要从各个渠道对用户的移动设备的安全进行防护。In response to the above requirements, many third-party security application manufacturers have developed security applications for smart terminals. The security applications can perform physical examinations on the smart terminals on the side of the smart terminals, and perform a series of repair operations based on the results of the physical examinations to ensure the security of the smart terminals. performance and security. As far as mobile devices are concerned, although some anti-virus software is pre-installed on some mobile devices, it is easy to be infected with viruses when users do not install Mobile Guard on them, especially when they visit the application market and download some applications. Being bundled or downloaded to install software such as malicious applications, plug-ins, or advertising applications often causes users to suffer from mobile device traffic being stolen, privacy being stolen, or malicious deductions, etc. loss, so it is necessary to protect the security of the user's mobile device from various channels.
发明内容Contents of the invention
鉴于上述问题,提出了本发明以便提供一种克服上述问题或者至少部分地解决上述问题的一种对设备进行安全检测的方法和相应的一种对设备进行安全检测的装置。In view of the above problems, the present invention is proposed to provide a method for performing security detection on equipment and a corresponding device for performing security detection on equipment, which overcome the above problems or at least partially solve the above problems.
依据本发明的一个方面,提供了一种对设备进行安全检测的方法,包括:According to one aspect of the present invention, a method for safety detection of equipment is provided, including:
当移动设备连接至计算设备时,在所述移动设备侧接收所述计算设备侧发出的对移动设备的安全检测请求,所述安全检测请求中包括指定检测对象;When the mobile device is connected to the computing device, a security detection request for the mobile device sent by the computing device side is received at the mobile device side, and the security detection request includes a specified detection object;
在所述移动设备侧获取与所述指定检测对象对应的安全检测结果信息,并将所述安全检测结果信息发送至计算设备侧;Obtaining security detection result information corresponding to the specified detection object at the mobile device side, and sending the security detection result information to the computing device side;
在所述移动设备侧接收计算设备侧发送的执行指令,所述执行指令为计算设备依据所述安全检测结果信息生成;receiving, at the mobile device side, an execution instruction sent by the computing device side, the execution instruction being generated by the computing device according to the security detection result information;
在所述移动设备侧执行所述执行指令。Executing the execution instruction at the mobile device side.
可选地,在所述移动设备侧接收所述计算设备侧发出的对移动设备的安全检测请求的步骤之前,还包括:Optionally, before the mobile device side receives the mobile device security detection request sent by the computing device side, it may further include:
所述移动设备侧接收所述计算设备侧发送的第三方应用安装包,所述第三方应用安装包为所述计算设备侧在检测到所述移动设备侧没有安装第三方应用时,从服务器中下载得到;The mobile device side receives the third-party application installation package sent by the computing device side, and the third-party application installation package is sent from the server when the computing device side detects that no third-party application is installed on the mobile device side. downloaded;
所述移动设备侧依据所述第三方应用安装包安装第三方应用。The mobile device side installs a third-party application according to the third-party application installation package.
可选地,在所述移动设备侧接收所述计算设备侧发出的对移动设备的安全检测请求的步骤之前,还包括:Optionally, before the mobile device side receives the mobile device security detection request sent by the computing device side, it may further include:
建立所述移动设备与所述计算设备的SOCKET连接通道,所述移动设备通过所述SOCKET连接通道接收安全检测请求、以及发送安全检测结果信息、以及接收执行指令。A SOCKET connection channel between the mobile device and the computing device is established, and the mobile device receives a security detection request, sends security detection result information, and receives an execution instruction through the SOCKET connection channel.
可选地,所述在所述移动设备侧接收所述计算设备侧发出的对移动设备的安全检测请求的步骤为:Optionally, the step of receiving, at the mobile device side, a security detection request for the mobile device sent by the computing device side is:
在所述移动设备侧采用所述第三方应用接收所述计算设备侧发出的对移动设备的安全检测请求;Using the third-party application on the mobile device side to receive a security detection request for the mobile device sent by the computing device side;
所述在所述移动设备侧获取与所述指定检测对象对应的安全检测结果信息,并将所述安全检测结果信息发送至计算设备侧的步骤包括:The step of obtaining the safety detection result information corresponding to the specified detection object at the mobile device side, and sending the safety detection result information to the computing device side includes:
在所述移动设备侧采用所述第三方应用依据所述安全检测请求执行对指定检测对象的安全检测操作,获得安全检测结果信息;Using the third-party application on the mobile device side to perform a security testing operation on a designated testing object according to the security testing request, and obtain security testing result information;
由所述第三方应用将所述安全检测结果信息返回至所述计算设备侧;returning the security detection result information to the computing device side by the third-party application;
所述在所述移动设备侧接收计算设备侧发送的执行指令的步骤为:The step of receiving, at the mobile device side, the execution instruction sent by the computing device side is:
在所述移动设备侧采用所述第三方应用接收计算设备侧发送的执行指令;Using the third-party application on the mobile device side to receive the execution instruction sent by the computing device side;
所述在所述移动设备侧执行所述执行指令的步骤为:The step of executing the execution instruction on the mobile device side is:
在所述移动设备侧采用所述第三方应用执行所述执行指令。The execution instruction is executed by using the third-party application on the mobile device side.
可选地,所述移动设备侧安装有第一客户端程序,所述在所述移动设备侧接收所述计算设备侧发出的对移动设备的安全检测请求的步骤为:Optionally, a first client program is installed on the mobile device side, and the step of receiving, at the mobile device side, a security detection request for the mobile device sent by the computing device side is:
在所述移动设备侧采用所述第一客户端程序接收所述计算设备侧发出的对移动设备的安全检测请求;Using the first client program on the mobile device side to receive a security detection request for the mobile device sent by the computing device side;
所述在所述移动设备侧获取与所述指定检测对象对应的安全检测结果信息,并将所述安全检测结果信息发送至计算设备侧的步骤包括:The step of obtaining the safety detection result information corresponding to the specified detection object at the mobile device side, and sending the safety detection result information to the computing device side includes:
在所述移动设备侧采用所述第一客户端程序将所述安全检测请求发送至所述第三方应用,由所述第三方医用依据所述安全检测请求执行对指定检测对象的安全检测操作,获得安全检测结果信息并返回第一客户端程序中;On the mobile device side, the first client program is used to send the safety detection request to the third-party application, and the third-party medical device performs a safety detection operation on a designated detection object according to the safety detection request, Obtain the security detection result information and return it to the first client program;
所述第一客户端程序将所述安全检测结果信息返回至所述计算设备侧;The first client program returns the security detection result information to the computing device side;
所述在所述移动设备侧接收计算设备侧发送的执行指令的步骤为:The step of receiving, at the mobile device side, the execution instruction sent by the computing device side is:
在所述移动设备侧采用所述第一客户端程序接收计算设备侧发送的执行指令;Using the first client program on the mobile device side to receive an execution instruction sent by the computing device side;
所述在所述移动设备侧执行所述执行指令的步骤为:The step of executing the execution instruction on the mobile device side is:
在所述移动设备侧采用所述第一客户端程序将所述执行指令发送至第三方应用,由所述第三方应用执行所述执行指令。The first client program is used on the mobile device side to send the execution instruction to a third-party application, and the third-party application executes the execution instruction.
可选地,所述第一客户端程序将所述安全检测请求发送至所述第三方应用的步骤包括:Optionally, the step of the first client program sending the security detection request to the third-party application includes:
所述第一客户端程序依据所述指定检测对象调用所述第三方应用的服务的接口,将所述安全检测请求发送至所述第三方应用。The first client program calls the service interface of the third-party application according to the specified detection object, and sends the security detection request to the third-party application.
可选地,所述指定检测对象包括针对移动设备的如下服务的一项或多项:移动设备挂马漏洞检测、检测是否开启云查杀、检测是否存在危险软件、检测是否更新过病毒库、检测安全服务是否开启、检测移动设备是否有山寨应用、检测移动设备上是否有恶意广告应用、主动防御功能开启检测。Optionally, the specified detection object includes one or more of the following services for mobile devices: mobile device hanging horse vulnerability detection, detection of whether cloud scanning and killing is enabled, detection of dangerous software, detection of virus database update, Detect whether the security service is enabled, detect whether the mobile device has counterfeit applications, detect whether there are malicious advertising applications on the mobile device, and detect whether the active defense function is enabled.
可选地,所述指定检测对象包括针对移动设备的如下服务的一项或多项:内存优化检测、检测是否存在后台软件、自动启动的软件检测、垃圾数据清理检测、清理缓存检测、清理应用卸载后存在的残留文件检测、安装包清理检测、大文件整理、隐私痕迹清理检测。Optionally, the specified detection object includes one or more of the following services for mobile devices: memory optimization detection, detection of background software, automatic startup software detection, garbage data cleaning detection, cache cleaning detection, application cleaning Residual file detection after uninstallation, installation package cleaning detection, large file cleaning, and privacy trace cleaning detection.
可选地,所述安全检测结果信息包括安全检测进度信息,相应地,所述执行指令包括停止指令、暂停指令、继续执行指令。Optionally, the safety detection result information includes safety detection progress information, and correspondingly, the execution instruction includes a stop instruction, a pause instruction, and a continue execution instruction.
可选地,所述安全检测结果信息包括安全检测结果,相应地,所述执行指令包括以下的一项或多项:移动设备挂马漏洞修复、开启云查杀、危险软件修复、病毒库更新、开启安全服务、山寨应用修复、恶意广告应用修复、开启主动防御功能。Optionally, the security detection result information includes the security detection result, and correspondingly, the execution instruction includes one or more of the following: mobile device hanging horse vulnerability repair, cloud scanning and killing, risk software repair, virus database update , Enable security services, repair counterfeit apps, repair malicious advertising apps, and enable active defense functions.
可选地,所述安全检测结果信息包括安全检测结果,相应地,所述执行指令包括以下的一项或多项:内存优化、后台软件关闭、关闭自动启动的软件、垃圾数据清理、清理缓存、清理应用卸载后存在的残留文件、安装包清理、大文件整理、隐私痕迹清理。Optionally, the security detection result information includes the security detection result, and correspondingly, the execution instruction includes one or more of the following: memory optimization, background software shutdown, automatic startup software shutdown, garbage data cleaning, cache cleaning , Clean up residual files that exist after app uninstallation, clean up installation packages, clean up large files, and clean up privacy traces.
依据本发明的另一个方面,提供了一种对设备进行安全检测的方法,包括:According to another aspect of the present invention, a method for security detection of equipment is provided, including:
当计算设备侧安全检测到有移动设备接入时,在计算设备侧向所述移动设备侧发出对移动设备的安全检测请求,所述安全检测请求包括指定检测对象;When the computing device side detects that there is a mobile device access, the computing device side sends a security detection request to the mobile device to the mobile device side, and the security detection request includes a designated detection object;
在所述计算设备侧接收所述移动设备侧返回的针对所述安全检测请求的安全检测结果信息,所述安全检测结果信息由所述移动设备侧依据所述指定检测对象获得;receiving, at the computing device side, security detection result information for the security detection request returned by the mobile device side, where the security detection result information is obtained by the mobile device side according to the designated detection object;
在计算设备侧依据所述安全检测结果信息生成对应的执行指令并发送至所述移动设备侧,由所述移动设备侧执行所述执行指令。A corresponding execution instruction is generated on the computing device side according to the security detection result information and sent to the mobile device side, and the execution instruction is executed by the mobile device side.
可选地,在所述计算设备侧向所述移动设备侧发出对移动设备的安全检测请求的步骤之前,还包括:Optionally, before the step of the computing device side sending the mobile device security detection request to the mobile device side, it may further include:
在计算设备侧读取所述移动设备侧中所有已安装应用的安装包信息,所述安装包信息包括安装包标识;Reading installation package information of all installed applications on the mobile device side at the computing device side, where the installation package information includes an installation package identifier;
在计算设备侧判断所述安装包标识中不存在第三方应用安装包标识时,从服务器中获取所述第三方应用安装包的下载地址;When the computing device side judges that there is no third-party application installation package identification in the installation package identification, obtain the download address of the third-party application installation package from the server;
在计算设备侧依据所述第三方应用安装包的下载地址下载所述第三方应用安装包并发送至移动设备侧。The computing device side downloads the third-party application installation package according to the download address of the third-party application installation package and sends it to the mobile device side.
可选地,在所述计算设备侧向所述移动设备侧发出对移动设备的安全检测请求的步骤之前,还包括:Optionally, before the step of the computing device side sending the mobile device security detection request to the mobile device side, it may further include:
建立所述移动设备与所述计算设备的SOCKET连接通道,所述计算设备通过所述连接通道发送安全检测请求、以及接收安全检测结果信息、以及发送执行指令。A SOCKET connection channel between the mobile device and the computing device is established, and the computing device sends a security detection request, receives security detection result information, and sends an execution instruction through the connection channel.
可选地,所述安全检测结果信息具有类型标识的信息,所述在计算设备侧依据所述安全检测结果信息生成对应的执行指令并发送至所述移动设备侧的步骤包括:Optionally, the security detection result information has type identification information, and the step of generating a corresponding execution instruction according to the security detection result information on the computing device side and sending it to the mobile device side includes:
计算设备侧在预设映射表中查找所述类型标识对应的执行建议信息,所述预设映射表中存储有计算设备与移动设备预先约定的类型标识与执行建议信息的映射关系;The computing device side looks up the execution suggestion information corresponding to the type identifier in a preset mapping table, and the preset mapping table stores a mapping relationship between the type identifier and the execution suggestion information pre-agreed between the computing device and the mobile device;
在计算设备侧展示所述安全检测结果信息以及对应的执行建议信息;Displaying the security detection result information and corresponding execution suggestion information on the computing device side;
在计算设备侧接收用户对所述一个或多个执行建议信息的选定指令;receiving, at the computing device side, user selected instructions for the one or more implementation suggestion messages;
依据所述选定指令生成一个或多个执行建议信息对应的执行指令并发送至移动设备侧。One or more execution instructions corresponding to the execution suggestion information are generated according to the selected instruction and sent to the mobile device side.
可选地,所述指定检测对象包括针对移动设备的如下服务的一项或多项:移动设备挂马漏洞检测、检测是否开启云查杀、检测是否存在危险软件、检测是否更新过病毒库、检测安全服务是否开启、检测移动设备是否有山寨应用、检测移动设备上是否有恶意广告应用、主动防御功能开启检测。Optionally, the specified detection object includes one or more of the following services for mobile devices: mobile device hanging horse vulnerability detection, detection of whether cloud scanning and killing is enabled, detection of dangerous software, detection of virus database update, Detect whether the security service is enabled, detect whether the mobile device has counterfeit applications, detect whether there are malicious advertising applications on the mobile device, and detect whether the active defense function is enabled.
可选地,所述指定检测对象包括针对移动设备的如下服务的一项或多项:内存优化检测、检测是否存在后台软件、自动启动的软件检测、垃圾数据清理检测、清理缓存检测、清理应用卸载后存在的残留文件检测、安装包清理检测、大文件整理、隐私痕迹清理检测。Optionally, the specified detection object includes one or more of the following services for mobile devices: memory optimization detection, detection of background software, automatic startup software detection, garbage data cleaning detection, cache cleaning detection, application cleaning Residual file detection after uninstallation, installation package cleaning detection, large file cleaning, and privacy trace cleaning detection.
可选地,所述安全检测结果信息包括安全检测进度信息,相应地,所述执行指令包括停止指令、暂停指令、继续执行指令。Optionally, the safety detection result information includes safety detection progress information, and correspondingly, the execution instruction includes a stop instruction, a pause instruction, and a continue execution instruction.
可选地,所述安全检测结果信息包括安全检测结果,相应地,所述执行指令包括以下的一项或多项:移动设备挂马漏洞修复、开启云查杀、危险软件修复、病毒库更新、开启安全服务、山寨应用修复、恶意广告应用修复、开启主动防御功能。Optionally, the security detection result information includes the security detection result, and correspondingly, the execution instruction includes one or more of the following: mobile device hanging horse vulnerability repair, cloud scanning and killing, risk software repair, virus database update , Enable security services, repair counterfeit apps, repair malicious advertising apps, and enable active defense functions.
可选地,所述安全检测结果信息包括安全检测结果,相应地,所述执行指令包括以下的一项或多项:内存优化、后台软件关闭、关闭自动启动的软件、垃圾数据清理、清理缓存、清理应用卸载后存在的残留文件、安装包清理、大文件整理、隐私痕迹清理。Optionally, the security detection result information includes the security detection result, and correspondingly, the execution instruction includes one or more of the following: memory optimization, background software shutdown, automatic startup software shutdown, garbage data cleaning, cache cleaning , Clean up residual files that exist after app uninstallation, clean up installation packages, clean up large files, and clean up privacy traces.
依据本发明的另一个方面,提供了一种对设备进行安全检测的装置,包括:According to another aspect of the present invention, a device for safety detection of equipment is provided, including:
安全检测请求接收模块,适于在移动设备连接至计算设备时,在所述移动设备侧接收所述计算设备侧发出的对移动设备的安全检测请求,所述安全检测请求包括指定检测对象;The security detection request receiving module is adapted to receive, on the mobile device side, a security detection request for the mobile device sent by the computing device side when the mobile device is connected to the computing device, and the security detection request includes a designated detection object;
安全检测结果信息发送模块,适于在所述移动设备侧获取与所述指定检测对象对应的安全检测结果信息,并将所述安全检测结果信息发送至计算设备侧;The safety detection result information sending module is adapted to obtain the safety detection result information corresponding to the specified detection object on the mobile device side, and send the safety detection result information to the computing device side;
执行指令接收模块,适于在所述移动设备侧接收计算设备侧发送的执行指令,所述执行指令为计算设备依据所述安全检测结果信息生成;The execution command receiving module is adapted to receive the execution command sent by the computing device side at the mobile device side, the execution command is generated by the computing device according to the security detection result information;
执行指令执行模块,适于在所述移动设备侧执行所述执行指令。The execution instruction execution module is adapted to execute the execution instruction on the side of the mobile device.
可选地,所述装置还包括:Optionally, the device also includes:
安装包接收模块,适于在所述移动设备侧接收所述计算设备侧发出的对移动设备的安全检测请求的之前,所述移动设备侧接收所述计算设备侧发送的第三方应用安装包,所述第三方应用安装包为所述计算设备侧在检测到所述移动设备侧没有安装第三方应用时,从服务器中下载得到;The installation package receiving module is adapted to receive the third-party application installation package sent by the computing device side before the mobile device side receives the security detection request for the mobile device sent by the computing device side, The third-party application installation package is downloaded from the server when the computing device side detects that no third-party application is installed on the mobile device side;
安装包安装模块,适于所述移动设备侧依据所述第三方应用安装包安装第三方应用。The installation package installation module is adapted to install a third-party application on the mobile device side according to the third-party application installation package.
可选地,所述装置还包括:Optionally, the device also includes:
通道建立模块,适于在所述移动设备侧接收所述计算设备侧发出的对移动设备的安全检测请求之前,建立所述移动设备与所述计算设备的 SOCKET连接通道,所述移动设备通过所述SOCKET连接通道接收安全检测请求、以及发送安全检测结果信息、以及接收执行指令。The channel establishment module is adapted to establish a SOCKET connection channel between the mobile device and the computing device before the mobile device side receives the security detection request for the mobile device sent by the computing device side, and the mobile device passes through the The SOCKET connection channel receives security testing requests, sends security testing result information, and receives execution instructions.
可选地,所述安全检测请求接收模块还适于:Optionally, the safety detection request receiving module is also adapted to:
在所述移动设备侧采用所述第三方应用接收所述计算设备侧发出的对移动设备的安全检测请求;Using the third-party application on the mobile device side to receive a security detection request for the mobile device sent by the computing device side;
所述安全检测结果信息发送模块还适于:The described safety detection result information sending module is also suitable for:
在所述移动设备侧采用所述第三方应用依据所述安全检测请求执行对指定检测对象的安全检测操作,获得安全检测结果信息;Using the third-party application on the mobile device side to perform a security testing operation on a designated testing object according to the security testing request, and obtain security testing result information;
由所述第三方应用将所述安全检测结果信息返回至所述计算设备侧;returning the security detection result information to the computing device side by the third-party application;
所述执行指令接收模块还适于:The execution instruction receiving module is also suitable for:
在所述移动设备侧采用所述第三方应用接收计算设备侧发送的执行指令;Using the third-party application on the mobile device side to receive the execution instruction sent by the computing device side;
所述执行指令执行模块还适于:The execution instruction execution module is also suitable for:
在所述移动设备侧采用所述第三方应用执行所述执行指令。The execution instruction is executed by using the third-party application on the mobile device side.
可选地,所述安全检测请求接收模块还适于:Optionally, the safety detection request receiving module is also adapted to:
在所述移动设备侧采用所述第一客户端程序接收所述计算设备侧发出的对移动设备的安全检测请求;Using the first client program on the mobile device side to receive a security detection request for the mobile device sent by the computing device side;
所述安全检测结果信息发送模块还适于:The described safety detection result information sending module is also suitable for:
在所述移动设备侧采用所述第一客户端程序将所述安全检测请求发送至所述第三方应用,由所述第三方医用依据所述安全检测请求执行对指定检测对象的安全检测操作,获得安全检测结果信息并返回第一客户端程序中;On the mobile device side, the first client program is used to send the safety detection request to the third-party application, and the third-party medical device performs a safety detection operation on a designated detection object according to the safety detection request, Obtain the security detection result information and return it to the first client program;
所述第一客户端程序将所述安全检测结果信息返回至所述计算设备侧;The first client program returns the security detection result information to the computing device side;
所述执行指令接收模块还适于:The execution instruction receiving module is also suitable for:
在所述移动设备侧采用所述第一客户端程序接收计算设备侧发送的执行指令;Using the first client program on the mobile device side to receive an execution instruction sent by the computing device side;
所述执行指令执行模块还适于:The execution instruction execution module is also suitable for:
在所述移动设备侧采用所述第一客户端程序将所述执行指令发送至第三方应用,由所述第三方应用执行所述执行指令。The first client program is used on the mobile device side to send the execution instruction to a third-party application, and the third-party application executes the execution instruction.
可选地,所述第一客户端程序将所述安全检测请求发送至所述第三方应用,具体为:Optionally, the first client program sends the security detection request to the third-party application, specifically:
所述第一客户端程序依据所述指定检测对象调用所述第三方应用的服务的接口,将所述安全检测请求发送至所述第三方应用。The first client program calls the service interface of the third-party application according to the specified detection object, and sends the security detection request to the third-party application.
可选地,所述指定检测对象包括针对移动设备的如下服务的一项或多项:移动设备挂马漏洞检测、检测是否开启云查杀、检测是否存在危险软件、检测是否更新过病毒库、检测安全服务是否开启、检测移动设备是否有山寨应用、检测移动设备上是否有恶意广告应用、主动防御功能开启检测。Optionally, the specified detection object includes one or more of the following services for mobile devices: mobile device hanging horse vulnerability detection, detection of whether cloud scanning and killing is enabled, detection of dangerous software, detection of virus database update, Detect whether the security service is enabled, detect whether the mobile device has counterfeit applications, detect whether there are malicious advertising applications on the mobile device, and detect whether the active defense function is enabled.
可选地,所述指定检测对象包括针对移动设备的如下服务的一项或多项:内存优化检测、检测是否存在后台软件、自动启动的软件检测、垃圾数据清理检测、清理缓存检测、清理应用卸载后存在的残留文件检测、安装包清理检测、大文件整理、隐私痕迹清理检测。Optionally, the specified detection object includes one or more of the following services for mobile devices: memory optimization detection, detection of background software, automatic startup software detection, garbage data cleaning detection, cache cleaning detection, application cleaning Residual file detection after uninstallation, installation package cleaning detection, large file cleaning, and privacy trace cleaning detection.
可选地,所述安全检测结果信息包括安全检测进度信息,相应地,所述执行指令包括停止指令、暂停指令、继续执行指令。Optionally, the safety detection result information includes safety detection progress information, and correspondingly, the execution instruction includes a stop instruction, a pause instruction, and a continue execution instruction.
可选地,所述安全检测结果信息包括安全检测结果,相应地,所述执行指令包括以下的一项或多项:移动设备挂马漏洞修复、开启云查杀、危险软件修复、病毒库更新、开启安全服务、山寨应用修复、恶意广告应用修复、开启主动防御功能。Optionally, the security detection result information includes the security detection result, and correspondingly, the execution instruction includes one or more of the following: mobile device hanging horse vulnerability repair, cloud scanning and killing, risk software repair, virus database update , Enable security services, repair counterfeit apps, repair malicious advertising apps, and enable active defense functions.
可选地,所述安全检测结果信息包括安全检测结果,相应地,所述执行指令包括以下的一项或多项:内存优化、后台软件关闭、关闭自动启动的软件、垃圾数据清理、清理缓存、清理应用卸载后存在的残留文件、安装包清理、大文件整理、隐私痕迹清理。Optionally, the security detection result information includes the security detection result, and correspondingly, the execution instruction includes one or more of the following: memory optimization, background software shutdown, automatic startup software shutdown, garbage data cleaning, cache cleaning , Clean up residual files that exist after app uninstallation, clean up installation packages, clean up large files, and clean up privacy traces.
依据本发明的另一个方面,提供了一种对设备进行安全检测的装置,包括:According to another aspect of the present invention, a device for safety detection of equipment is provided, including:
安全检测请求发送模块,适于在计算设备侧安全检测到有移动设备接入时,在计算设备侧向所述移动设备侧发出对移动设备的安全检测请求,所述安全检测请求包括指定检测对象;The security detection request sending module is adapted to send a security detection request to the mobile device from the computing device side to the mobile device side when the computing device side safely detects that there is a mobile device access, and the security detection request includes a specified detection object ;
安全检测结果信息接收模块,适于在所述计算设备侧接收所述移动设备侧返回的针对所述安全检测请求的安全检测结果信息,所述安全检测结果信息由所述移动设备侧依据所述指定检测对象获得;The safety inspection result information receiving module is adapted to receive, on the computing device side, the safety inspection result information for the safety inspection request returned by the mobile device, and the safety inspection result information is sent by the mobile device according to the Obtained by specifying the detection object;
执行指令发送模块,适于在计算设备侧依据所述安全检测结果信息生成对应的执行指令并发送至所述移动设备侧,由所述移动设备侧执行所述执行指令。The execution instruction sending module is adapted to generate a corresponding execution instruction according to the security detection result information on the computing device side and send it to the mobile device side, and the mobile device side executes the execution instruction.
可选地,所述装置还包括:Optionally, the device also includes:
安装包信息获取模块,适于在所述计算设备侧向所述移动设备侧发出对移动设备的安全检测请求之前,在计算设备侧读取所述移动设备侧中所有已安装应用的安装包信息,所述安装包信息包括安装包标识;The installation package information acquisition module is adapted to read the installation package information of all installed applications on the mobile device side before the computing device side sends a security detection request to the mobile device side to the mobile device side , the installation package information includes an installation package identifier;
查找模块,适于在计算设备侧判断所述安装包标识中不存在第三方应用安装包标识时,从服务器中获取所述第三方应用安装包的下载地址;The search module is adapted to obtain the download address of the third-party application installation package from the server when the computing device side judges that there is no third-party application installation package identification in the installation package identification;
安装包发送模块,适于在计算设备侧依据所述第三方应用安装包的下载地址下载所述第三方应用安装包并发送至移动设备侧。The installation package sending module is adapted to download the third-party application installation package on the computing device side according to the download address of the third-party application installation package and send it to the mobile device side.
可选地,所述装置还包括:Optionally, the device also includes:
连接通道建立模块,适于在所述计算设备侧向所述移动设备侧发出对移动设备的安全检测请求之前,建立所述移动设备与所述计算设备的 SOCKET连接通道,所述计算设备通过所述连接通道发送安全检测请求、以及接收安全检测结果信息、以及发送执行指令。A connection channel establishment module, adapted to establish a SOCKET connection channel between the mobile device and the computing device before the computing device side sends a security detection request to the mobile device side, and the computing device passes the The above connection channel sends a security detection request, receives security detection result information, and sends an execution instruction.
可选地,所述安全检测结果信息具有类型标识的信息,所述执行指令发送模块还适于:Optionally, the security detection result information has type identification information, and the execution instruction sending module is further adapted to:
计算设备侧在预设映射表中查找所述类型标识对应的执行建议信息,所述预设映射表中存储有计算设备与移动设备预先约定的类型标识与执行建议信息的映射关系;The computing device side looks up the execution suggestion information corresponding to the type identifier in a preset mapping table, and the preset mapping table stores a mapping relationship between the type identifier and the execution suggestion information pre-agreed between the computing device and the mobile device;
在计算设备侧展示所述安全检测结果信息以及对应的执行建议信息;Displaying the security detection result information and corresponding execution suggestion information on the computing device side;
在计算设备侧接收用户对所述一个或多个执行建议信息的选定指令;receiving, at the computing device side, user selected instructions for the one or more implementation suggestion messages;
依据所述选定指令生成一个或多个执行建议信息对应的执行指令并发送至移动设备侧。One or more execution instructions corresponding to the execution suggestion information are generated according to the selected instruction and sent to the mobile device side.
可选地,所述指定检测对象包括针对移动设备的如下服务的一项或多项:移动设备挂马漏洞检测、检测是否开启云查杀、检测是否存在危险软件、检测是否更新过病毒库、检测安全服务是否开启、检测移动设备是否有山寨应用、检测移动设备上是否有恶意广告应用、主动防御功能开启检测。Optionally, the specified detection object includes one or more of the following services for mobile devices: mobile device hanging horse vulnerability detection, detection of whether cloud scanning and killing is enabled, detection of dangerous software, detection of virus database update, Detect whether the security service is enabled, detect whether the mobile device has counterfeit applications, detect whether there are malicious advertising applications on the mobile device, and detect whether the active defense function is enabled.
可选地,所述指定检测对象包括针对移动设备的如下服务的一项或多项:内存优化检测、检测是否存在后台软件、自动启动的软件检测、垃圾数据清理检测、清理缓存检测、清理应用卸载后存在的残留文件检测、安装包清理检测、大文件整理、隐私痕迹清理检测。Optionally, the specified detection object includes one or more of the following services for mobile devices: memory optimization detection, detection of background software, automatic startup software detection, garbage data cleaning detection, cache cleaning detection, application cleaning Residual file detection after uninstallation, installation package cleaning detection, large file cleaning, and privacy trace cleaning detection.
可选地,所述安全检测结果信息包括安全检测进度信息,相应地,所述执行指令包括停止指令、暂停指令、继续执行指令。Optionally, the safety detection result information includes safety detection progress information, and correspondingly, the execution instruction includes a stop instruction, a pause instruction, and a continue execution instruction.
可选地,所述安全检测结果信息包括安全检测结果,相应地,所述执行指令包括以下的一项或多项:移动设备挂马漏洞修复、开启云查杀、危险软件修复、病毒库更新、开启安全服务、山寨应用修复、恶意广告应用修复、开启主动防御功能。Optionally, the security detection result information includes the security detection result, and correspondingly, the execution instruction includes one or more of the following: mobile device hanging horse vulnerability repair, cloud scanning and killing, risk software repair, virus database update , Enable security services, repair counterfeit apps, repair malicious advertising apps, and enable active defense functions.
可选地,所述安全检测结果信息包括安全检测结果,相应地,所述执行指令包括以下的一项或多项:内存优化、后台软件关闭、关闭自动启动的软件、垃圾数据清理、清理缓存、清理应用卸载后存在的残留文件、安装包清理、大文件整理、隐私痕迹清理。Optionally, the security detection result information includes the security detection result, and correspondingly, the execution instruction includes one or more of the following: memory optimization, background software shutdown, automatic startup software shutdown, garbage data cleaning, cache cleaning , Clean up residual files that exist after app uninstallation, clean up installation packages, clean up large files, and clean up privacy traces.
与背景技术相比,本发明具有如下有益效果:Compared with the background technology, the present invention has the following beneficial effects:
在本发明中,当移动设备连接至计算设备时,在计算设备侧即可实现对移动设备的指定检测对象的安全检测,并在计算设备接收移动设备返回的安全检测结果时可以对在计算设备侧向移动设备发出执行指令促使移动设备针对安全检测结果执行相关的操作,使得用户在计算设备侧即可实现对移动设备的安全检测,从而提高移动设备的安全性。In the present invention, when the mobile device is connected to the computing device, the security detection of the specified detection object of the mobile device can be realized on the computing device side, and when the computing device receives the security detection result returned by the mobile device, the computing device can Sending an execution command to the mobile device prompts the mobile device to perform relevant operations on the security detection result, so that the user can implement security detection on the mobile device at the computing device side, thereby improving the security of the mobile device.
上述说明仅是本发明技术方案的概述,为了能够更清楚了解本发明的技术手段,而可依照说明书的内容予以实施,并且为了让本发明的上述和其它目的、特征和优点能够更明显易懂,以下特举本发明的具体实施方式。The above description is only an overview of the technical solution of the present invention. In order to better understand the technical means of the present invention, it can be implemented according to the contents of the description, and in order to make the above and other purposes, features and advantages of the present invention more obvious and understandable , the specific embodiments of the present invention are enumerated below.
附图说明Description of drawings
通过阅读下文优选实施方式的详细描述,各种其他的优点和益处对于本领域普通技术人员将变得清楚明了。附图仅用于示出优选实施方式的目的,而并不认为是对本发明的限制。而且在整个附图中,用相同的参考符号表示相同的部件。在附图中:Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiment. The drawings are only for the purpose of illustrating a preferred embodiment and are not to be considered as limiting the invention. Also throughout the drawings, the same reference numerals are used to designate the same parts. In the attached picture:
图1示出了本发明的一种对设备进行安全检测的方法实施例一的步骤流程图;FIG. 1 shows a flow chart of the steps of Embodiment 1 of a method for safety detection of equipment according to the present invention;
图2示出了本发明的一种对设备进行安全检测的方法实施例二的步骤流程图;Fig. 2 shows a flow chart of the steps of Embodiment 2 of a method for safety detection of equipment according to the present invention;
图3示出了本发明的一种对设备进行安全检测的方法实施例三的步骤流程图;FIG. 3 shows a flow chart of steps in Embodiment 3 of a method for safety detection of equipment according to the present invention;
图4示出了本发明的一种对设备进行安全检测的方法实施例四的步骤流程图;FIG. 4 shows a flow chart of the steps of Embodiment 4 of a method for safety detection of equipment according to the present invention;
图5示出了本发明的一种对设备进行安全检测的装置实施例一的结构框图;FIG. 5 shows a structural block diagram of Embodiment 1 of an apparatus for safety detection of equipment according to the present invention;
图6示出了本发明的一种对设备进行安全检测的装置实施例二的结构框图。FIG. 6 shows a structural block diagram of Embodiment 2 of an apparatus for safety detection of equipment according to the present invention.
具体实施方式Detailed ways
下面将参照附图更详细地描述本公开的示例性实施例。虽然附图中显示了本公开的示例性实施例,然而应当理解,可以以各种形式实现本公开而不应被这里阐述的实施例所限制。相反,提供这些实施例是为了能够更透彻地理解本公开,并且能够将本公开的范围完整的传达给本领域的技术人员。Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.
参照图1,示出了本发明的一种对设备进行安全检测的方法实施例一的步骤流程图,本发明实施例从移动设备侧进行说明,可以包括如下步骤:Referring to FIG. 1 , it shows a flow chart of the steps of Embodiment 1 of a method for security detection of a device according to the present invention. The embodiment of the present invention is described from the side of the mobile device, and may include the following steps:
步骤101,当移动设备连接至计算设备时,在所述移动设备侧接收所述计算设备侧发出的对移动设备的安全检测请求,所述安全检测请求包括指定检测对象;Step 101, when the mobile device is connected to the computing device, receiving a security detection request for the mobile device sent by the computing device side at the mobile device side, the security detection request including a specified detection object;
在本发明的一种优选实施例中,所述指定检测对象包括针对移动设备的如下服务的一项或多项:移动设备挂马漏洞检测、检测是否开启云查杀、检测是否存在危险软件、检测是否更新过病毒库、检测安全服务是否开启、检测移动设备是否有山寨应用、检测移动设备上是否有恶意广告应用、主动防御功能开启检测、内存优化检测、检测是否存在后台软件、自动启动的软件检测、垃圾数据清理检测、清理缓存检测、清理应用卸载后存在的残留文件检测、安装包清理检测、大文件整理、隐私痕迹清理检测。In a preferred embodiment of the present invention, the specified detection object includes one or more of the following services for mobile devices: detection of mobile device hanging horse vulnerabilities, detection of whether cloud scanning and killing is enabled, detection of dangerous software, Detect whether the virus database has been updated, detect whether the security service is enabled, detect whether there are counterfeit applications on the mobile device, detect whether there are malicious advertising applications on the mobile device, detect whether the active defense function is enabled, detect memory optimization, detect whether there is background software, and automatically start Software detection, junk data cleanup detection, cache cleanup detection, residual file detection after app uninstallation, installation package cleanup detection, large file cleanup, privacy trace cleanup detection.
步骤102,在所述移动设备侧获取与所述指定检测对象对应的安全检测结果信息,并将所述安全检测结果信息发送至计算设备侧;Step 102: Acquiring security testing result information corresponding to the specified testing object on the mobile device side, and sending the security testing result information to the computing device side;
步骤103,在所述移动设备侧接收计算设备侧发送的执行指令,所述执行指令为计算设备依据所述安全检测结果信息生成;Step 103, receiving, at the mobile device side, an execution instruction sent by the computing device side, the execution instruction being generated by the computing device according to the security detection result information;
在本发明的一种优选实施例中,所述安全检测结果信息可以包括安全检测进度信息,相应的,所述执行指令可以包括停止指令、暂停指令、继续执行指令。In a preferred embodiment of the present invention, the safety inspection result information may include safety inspection progress information, and correspondingly, the execution instruction may include a stop instruction, a pause instruction, and a continue execution instruction.
在本发明的另一种优选实施例中,所述安全检测结果信息包括安全检测结果,相应地,所述执行指令可以包括以下的一项或多项:移动设备挂马漏洞修复、开启云查杀、危险软件修复、病毒库更新、开启安全服务、山寨应用修复、恶意广告应用修复、开启主动防御功能、内存优化、后台软件关闭、关闭自动启动的软件、垃圾数据清理、清理缓存、清理应用卸载后存在的残留文件、安装包清理、大文件整理、隐私痕迹清理。In another preferred embodiment of the present invention, the security detection result information includes the security detection result, and correspondingly, the execution instruction may include one or more of the following: mobile device hanging horse vulnerability repair, enabling cloud checking Kill, repair dangerous software, update virus database, enable security services, repair copycat apps, repair malicious advertising apps, enable active defense, optimize memory, close background software, turn off auto-starting software, clean junk data, clear cache, clean apps Residual files after uninstallation, installation package cleanup, large file cleanup, and privacy trace cleanup.
步骤104,在所述移动设备侧执行所述执行指令。Step 104, execute the execution instruction on the mobile device side.
在本发明的一种优选实施例中,在所述步骤101之前,还可以包括:In a preferred embodiment of the present invention, before the step 101, it may also include:
所述移动设备侧接收所述计算设备侧发送的第三方应用安装包,所述第三方应用安装包为所述计算设备侧在检测到所述移动设备侧没有安装第三方应用时,从服务器中下载得到;The mobile device side receives the third-party application installation package sent by the computing device side, and the third-party application installation package is sent from the server when the computing device side detects that no third-party application is installed on the mobile device side. downloaded;
所述移动设备侧依据所述第三方应用安装包安装第三方应用。The mobile device side installs a third-party application according to the third-party application installation package.
在本发明的一种优选实施例中,在所述步骤101之前,还可以包括:In a preferred embodiment of the present invention, before the step 101, it may also include:
建立所述移动设备与所述计算设备的SOCKET连接通道,所述移动设备通过所述SOCKET连接通道接收安全检测请求、以及发送安全检测结果信息、以及接收执行指令。A SOCKET connection channel between the mobile device and the computing device is established, and the mobile device receives a security detection request, sends security detection result information, and receives an execution instruction through the SOCKET connection channel.
在本发明的一种优选实施例中,所述步骤101具体可以为:In a preferred embodiment of the present invention, the step 101 may specifically be:
在所述移动设备侧采用所述第三方应用接收所述计算设备侧发出的对移动设备的安全检测请求;Using the third-party application on the mobile device side to receive a security detection request for the mobile device sent by the computing device side;
所述步骤102可以包括如下子步骤:The step 102 may include the following sub-steps:
在所述移动设备侧采用所述第三方应用依据所述安全检测请求执行对指定检测对象的安全检测操作,获得安全检测结果信息;Using the third-party application on the mobile device side to perform a security testing operation on a designated testing object according to the security testing request, and obtain security testing result information;
由所述第三方应用将所述安全检测结果信息返回至所述计算设备侧;returning the security detection result information to the computing device side by the third-party application;
所述步骤103具体可以为:The step 103 may specifically be:
在所述移动设备侧采用所述第三方应用接收计算设备侧发送的执行指令;Using the third-party application on the mobile device side to receive the execution instruction sent by the computing device side;
所述步骤104具体可以为:The step 104 may specifically be:
在所述移动设备侧采用所述第三方应用执行所述执行指令。The execution instruction is executed by using the third-party application on the mobile device side.
具体而言,所述移动设备侧可以通过所述第三方应用接收计算设备侧发出的对移动设备的安全检测请求,所述第三方应用依据所述安全检测请求执行对指定检测对象的安全检测操作,获得安全检测结果信息并返回所述计算设备侧。Specifically, the mobile device side may receive a security detection request for the mobile device from the computing device side through the third-party application, and the third-party application performs a security detection operation on a specified detection object according to the security detection request , obtain the security detection result information and return to the computing device side.
在本发明的另一种优选实施例中,所述移动设备侧安装有第一客户端程序,所述步骤101可以为:In another preferred embodiment of the present invention, the first client program is installed on the mobile device side, and the step 101 may be:
在所述移动设备侧采用所述第一客户端程序接收所述计算设备侧发出的对移动设备的安全检测请求;Using the first client program on the mobile device side to receive a security detection request for the mobile device sent by the computing device side;
所述步骤102可以包括如下子步骤:The step 102 may include the following sub-steps:
在所述移动设备侧采用所述第一客户端程序将所述安全检测请求发送至所述第三方应用,由所述第三方应用依据所述安全检测请求执行对指定检测对象的安全检测操作,获得安全检测结果信息并返回第一客户端程序中;Using the first client program on the mobile device side to send the security detection request to the third-party application, and the third-party application performs a security detection operation on a designated detection object according to the security detection request, Obtain the security detection result information and return it to the first client program;
所述第一客户端程序将所述安全检测结果信息返回至所述计算设备侧;The first client program returns the security detection result information to the computing device side;
所述步骤103可以为:The step 103 can be:
在所述移动设备侧采用所述第一客户端程序接收计算设备侧发送的执行指令;Using the first client program on the mobile device side to receive an execution instruction sent by the computing device side;
所述步骤104可以为:The step 104 can be:
在所述移动设备侧采用所述第一客户端程序将所述执行指令发送至第三方应用,由所述第三方应用执行所述执行指令。The first client program is used on the mobile device side to send the execution instruction to a third-party application, and the third-party application executes the execution instruction.
具体而言,所述移动设备可以通过所述第一客户端程序接收计算设备侧发出的对移动设备的安全检测请求,所述第一客户端程序将所述安全检测请求发送至所述第三方应用,接收所述第三方应用返回的安全检测结果信息并返回计算设备侧,其中,所述安全检测结果信息由所述第三方应用依据所述安全检测请求执行对指定检测对象的安全检测操作获得。Specifically, the mobile device may receive a security detection request for the mobile device from the computing device side through the first client program, and the first client program sends the security detection request to the third party application, receiving the security detection result information returned by the third-party application and returning it to the computing device side, wherein the security detection result information is obtained by the third-party application performing a security detection operation on a specified detection object according to the security detection request .
在本发明的一种优选实施例中,所述第一客户端程序将所述安全检测请求发送至所述第三方应用的步骤可以包括:In a preferred embodiment of the present invention, the step of the first client program sending the security detection request to the third-party application may include:
所述第一客户端程序依据所述指定检测对象调用所述第三方应用的服务的接口,将所述安全检测请求发送至所述第三方应用。The first client program calls the service interface of the third-party application according to the specified detection object, and sends the security detection request to the third-party application.
在本发明实施例中,当移动设备连接至计算设备时,在计算设备侧即可实现对移动设备的指定检测对象的安全检测,并在计算设备接收在移动设备返回的安全检测结果时可以对在计算设备侧向移动设备发出执行指令促使移动设备针对安全检测结果执行相关的操作,使得用户在计算设备侧即可实现对移动设备的安全检测,从而提高移动设备的安全性。In the embodiment of the present invention, when the mobile device is connected to the computing device, the security detection of the designated detection object of the mobile device can be realized on the computing device side, and when the computing device receives the security detection result returned by the mobile device, it can The computing device side issues an execution command to the mobile device to prompt the mobile device to perform related operations on the security detection result, so that the user can implement the security detection of the mobile device on the computing device side, thereby improving the security of the mobile device.
参照图2,示出了本发明的一种对设备进行安全检测的方法实施例二的步骤流程图,本发明实施例从计算设备侧进行说明,本发明实施例可以包括如下步骤:Referring to FIG. 2 , it shows a flow chart of the steps of Embodiment 2 of a method for security detection of equipment according to the present invention. The embodiment of the present invention is described from the side of the computing device. The embodiment of the present invention may include the following steps:
步骤201,当计算设备侧安全检测到有移动设备接入时,在计算设备侧向所述移动设备侧发出对移动设备的安全检测请求,所述安全检测请求包括指定检测对象;Step 201, when the computing device side detects that there is a mobile device access, the computing device side sends a security detection request to the mobile device to the mobile device side, and the security detection request includes a specified detection object;
在本发明的一种优选实施例中,所述指定检测对象可以包括针对移动设备的如下服务的一项或多项:移动设备挂马漏洞检测、检测是否开启云查杀、检测是否存在危险软件、检测是否更新过病毒库、检测安全服务是否开启、检测移动设备是否有山寨应用、检测移动设备上是否有恶意广告应用、主动防御功能开启检测、内存优化检测、检测是否存在后台软件、自动启动的软件检测、垃圾数据清理检测、清理缓存检测、清理应用卸载后存在的残留文件检测、安装包清理检测、大文件整理、隐私痕迹清理检测。In a preferred embodiment of the present invention, the specified detection object may include one or more of the following services for mobile devices: detection of mobile device hanging horse vulnerabilities, detection of whether cloud scanning and killing is enabled, detection of dangerous software , Detect whether the virus database has been updated, detect whether the security service is enabled, detect whether there are counterfeit applications on the mobile device, detect whether there are malicious advertising applications on the mobile device, detect whether the active defense function is enabled, detect memory optimization, detect whether there is background software, and automatically start Software detection, junk data cleanup detection, cache cleanup detection, residual file detection after app uninstallation, installation package cleanup detection, large file cleanup, privacy trace cleanup detection.
步骤202,在所述计算设备侧接收所述移动设备侧返回的针对所述安全检测请求的安全检测结果信息,所述安全检测结果信息由所述移动设备侧依据所述指定检测对象获得;Step 202, receiving, on the computing device side, security testing result information for the security testing request returned by the mobile device side, the security testing result information being obtained by the mobile device side according to the designated testing object;
步骤203,在计算设备侧依据所述安全检测结果信息生成对应的执行指令并发送至所述移动设备侧,由所述移动设备侧执行所述执行指令。Step 203: Generate a corresponding execution instruction on the computing device side according to the security detection result information and send it to the mobile device side, and the mobile device side executes the execution instruction.
在本发明的一种优选实施例中,所述安全检测结果信息可以包括安全检测进度信息,相应地,所述执行指令可以包括停止指令、暂停指令、继续执行指令。In a preferred embodiment of the present invention, the safety detection result information may include safety detection progress information, and correspondingly, the execution instruction may include a stop instruction, a pause instruction, and a continue execution instruction.
在本发明的一种优选实施例中,所述安全检测结果信息可以包括安全检测结果,相应地,所述可以执行指令包括以下的一项或多项:移动设备挂马漏洞修复、开启云查杀、危险软件修复、病毒库更新、开启安全服务、山寨应用修复、恶意广告应用修复、开启主动防御功能、内存优化、后台软件关闭、关闭自动启动的软件、垃圾数据清理、清理缓存、清理应用卸载后存在的残留文件、安装包清理、大文件整理、隐私痕迹清理。In a preferred embodiment of the present invention, the security detection result information may include the security detection result, and correspondingly, the executable instruction includes one or more of the following: mobile device hanging horse vulnerability repair, enabling cloud checking Kill, repair dangerous software, update virus database, enable security services, repair copycat apps, repair malicious advertising apps, enable active defense, optimize memory, close background software, turn off auto-starting software, clean junk data, clear cache, clean apps Residual files after uninstallation, installation package cleanup, large file cleanup, and privacy trace cleanup.
在本发明的一种优选实施例中,在所述步骤201之前,还可以包括:In a preferred embodiment of the present invention, before the step 201, it may also include:
在计算设备侧读取所述移动设备侧中所有已安装应用的安装包信息,所述安装包信息包括安装包标识;Reading installation package information of all installed applications on the mobile device side at the computing device side, where the installation package information includes an installation package identifier;
在计算设备侧判断所述安装包标识中不存在第三方应用安装包标识时,从服务器中获取所述第三方应用安装包的下载地址;When the computing device side judges that there is no third-party application installation package identification in the installation package identification, obtain the download address of the third-party application installation package from the server;
在计算设备侧依据所述第三方应用安装包的下载地址下载所述第三方应用安装包并发送至移动设备侧。The computing device side downloads the third-party application installation package according to the download address of the third-party application installation package and sends it to the mobile device side.
在本发明的一种优选实施例中,在所述步骤201之前,还可以包括:In a preferred embodiment of the present invention, before the step 201, it may also include:
建立所述移动设备与所述计算设备的SOCKET连接通道,所述计算设备通过所述连接通道发送安全检测请求、以及接收安全检测结果信息、以及发送执行指令。A SOCKET connection channel between the mobile device and the computing device is established, and the computing device sends a security detection request, receives security detection result information, and sends an execution instruction through the connection channel.
在本发明的一种优选实施例中,所述安全检测结果信息具有类型标识的信息,所述步骤203可以包括如下子步骤:In a preferred embodiment of the present invention, the security detection result information has type identification information, and the step 203 may include the following sub-steps:
子步骤S11,计算设备侧在预设映射表中查找所述类型标识对应的执行建议信息,所述预设映射表中存储有计算设备与移动设备预先约定的, 类型标识与执行建议信息的映射关系;In sub-step S11, the computing device side looks up the execution suggestion information corresponding to the type identifier in the preset mapping table, and the preset mapping table stores the mapping between the type identifier and the execution suggestion information pre-agreed between the computing device and the mobile device relation;
子步骤S12,在计算设备侧展示所述安全检测结果信息以及对应的执行建议信息;Sub-step S12, displaying the safety detection result information and corresponding execution suggestion information on the computing device side;
子步骤S13,在计算设备侧接收用户对所述一个或多个执行建议信息的选定指令;Sub-step S13, receiving a user's selected instruction on the one or more execution suggestion information at the computing device side;
子步骤S14,依据所述选定指令生成一个或多个执行建议信息对应的执行指令并发送至移动设备侧。In sub-step S14, one or more execution instructions corresponding to the execution suggestion information are generated according to the selected instruction and sent to the mobile device side.
参照图3,示出了本发明的一种对设备进行安全检测的方法实施例三的步骤流程图,其中,所述计算设备是一种能够按照程序运行,自动、高速处理海量数据的智能电子设备,如台式电脑、笔记本电脑等。所述移动设备是一种可以在移动中使用的计算设备,如手机。本实施例以安装有安卓操作系统的移动设备为例,当然,本发明并不限于安装有安卓系统的移动设备,本发明的原理同样适用于安装有其他操作系统的移动设备。Referring to FIG. 3 , it shows a flow chart of steps in Embodiment 3 of a method for safety detection of equipment according to the present invention, wherein the computing equipment is an intelligent electronic device capable of running according to a program and processing massive amounts of data automatically and at high speed. Devices such as desktops, laptops, etc. The mobile device is a computing device that can be used on the move, such as a mobile phone. This embodiment takes a mobile device installed with an Android operating system as an example. Of course, the present invention is not limited to a mobile device installed with an Android system, and the principles of the present invention are also applicable to mobile devices installed with other operating systems.
在本发明实施例中,移动设备侧安装有第一客户端程序,计算设备侧安装有第二客户端程序,所述移动设备与所述计算设备通过所述第一客户端程序以及所述第二客户端程序进行通信,当所述第一客户端程序没有启动时,第二客户端程序可以通过向第一客户端程序发送启动指令来启动所述第一客户端程序,进而开启两者间的通信过程。In this embodiment of the present invention, a first client program is installed on the mobile device side, a second client program is installed on the computing device side, and the mobile device and the computing device pass the first client program and the second client program The two client programs communicate, and when the first client program is not started, the second client program can start the first client program by sending an activation command to the first client program, thereby opening the communication between the two. communication process.
所述方法可以包括如下步骤:The method may include the steps of:
步骤301,当移动设备连接至计算设备时,第二客户端程序检测所述移动设备是否安装有第三方应用,若否,则执行步骤302,若是,则执行步骤304;Step 301, when the mobile device is connected to the computing device, the second client program detects whether the mobile device has a third-party application installed, if not, execute step 302, and if yes, execute step 304;
在具体实现中,计算设备侧的第二客户端程序在检测到移动设备成功连接至计算设备时,可以读取移动设备侧中所有已安装应用的安装包信息,其中所述安装包信息携带有安装包标识。第二客户端程序在所述所有安装包标识中查找是否存在第三方应用的安装包标识,若存在,则说明移动设备侧安装有第三方应用,否则,则说明移动设备侧没有安装有第三方应用。In a specific implementation, when the second client program on the computing device side detects that the mobile device is successfully connected to the computing device, it can read the installation package information of all installed applications on the mobile device side, wherein the installation package information carries Package ID. The second client program searches all the installation package identifiers for the installation package identifier of the third-party application. If it exists, it means that the third-party application is installed on the mobile device side; otherwise, it means that the third-party application is not installed on the mobile device side. application.
进一步的,所述安装包信息还可以携带有各应用的版本号,若计算设备查找发现所述移动设备安装有第三方应用,但所述第三方应用的版本号小于计算设备侧存储的第三方应用的最新版本号,则计算设备同样判定所述移动设备侧没有安装第三方应用。Further, the installation package information may also carry the version number of each application. If the computing device searches and finds that the mobile device has a third-party application installed, but the version number of the third-party application is smaller than the third-party application stored on the computing device side. The latest version number of the application, the computing device also determines that no third-party application is installed on the mobile device side.
步骤302,第二客户端程序下载所述第三方应用安装包发送至移动设备侧;Step 302, the second client program downloads the third-party application installation package and sends it to the mobile device;
在具体实现中,移动设备可以通过数据线或者无线(如无线网路通信技术WIFI)等形式连接到计算设备,当移动设备通过数据线接入计算设备时,若第二客户端程序检测到所述移动设备没有安装有第三方应用,则在服务器中查找所述第三方应用的安装包标识,在找到所述第三方应用的安装包标识时获取所述第三方应用安装包的下载地址,从所述下载地址中下载第三方应用安装包并将所述第三方应用安装包通过数据线传送至移动设备侧。In a specific implementation, the mobile device can be connected to the computing device through a data line or wirelessly (such as wireless network communication technology WIFI). When the mobile device accesses the computing device through a data line, if the second client program detects that the If the mobile device does not have a third-party application installed, then search the server for the installation package identification of the third-party application, and obtain the download address of the third-party application installation package when the installation package identification of the third-party application is found, from The third-party application installation package is downloaded from the download address, and the third-party application installation package is transmitted to the mobile device side through a data cable.
更进一步地,在所述移动设备为安装有安卓系统的安卓设备时,所述第二客户端程序可以通过ADB(Android Debug Bridge,就是起到调试桥的作用)驱动将第三方应用安装包发送至移动设备侧,其中,ADB是一个客户端-服务器端程序,其中客户端是计算设备,服务器端是安卓设备,而ADB驱动就是计算设备与安卓设备的通信的客户端驱动程序,ADB是androidsdk里的一个工具,用这个工具可以直接操作管理安卓模拟器或者真实的安卓设备(如手机)。它的主要功能有:运行设备的shell(命令行);管理模拟器或设备的端口映射;计算设备和安卓设备之间上传/下载文件;将本地安卓安装包apk安装至模拟器或安卓设备等。Furthermore, when the mobile device is an Android device with an Android system installed, the second client program can drive the third-party application installation package through ADB (Android Debug Bridge, which acts as a debug bridge) To the mobile device side, wherein, ADB is a client-server program, wherein the client is a computing device, the server is an Android device, and the ADB driver is the client driver for the communication between the computing device and the Android device, and ADB is the androidsdk A tool in , with which you can directly operate and manage Android emulators or real Android devices (such as mobile phones). Its main functions are: run the shell (command line) of the device; manage the port mapping of the emulator or device; upload/download files between the computing device and the Android device; install the local Android installation package apk to the emulator or Android device, etc. .
当移动设备以无线的方式与计算设备建立连接时,若第二客户端程序检测到所述移动设备没有安装有第三方应用,则在服务器中查找所述第三方应用的安装包标识,在找到所述第三方应用的安装包标识时获取所述第三方应用安装包的下载地址,从所述下载地址中下载第三方应用安装包并将所述第三方应用安装包通过无线通道传送至移动设备侧。在实际中,第二客户端程序也可以直接将所述第三方应用安装包的下载地址将所述发送至移动设备侧,由移动设备侧进行下载安装。When the mobile device establishes a connection with the computing device in a wireless manner, if the second client program detects that the mobile device does not have a third-party application installed, it searches the server for the installation package identifier of the third-party application, and finds When the installation package of the third-party application is identified, the download address of the third-party application installation package is obtained, the third-party application installation package is downloaded from the download address, and the third-party application installation package is transmitted to the mobile device through a wireless channel side. In practice, the second client program may also directly send the download address of the third-party application installation package to the mobile device, and the mobile device may download and install it.
具体来说,移动设备以无线的方式与计算设备建立连接的过程,可以为:Specifically, the process of establishing a connection between a mobile device and a computing device in a wireless manner may be as follows:
当计算设备与移动设备要连接时,计算设备首先会发送连接请求给服务器。其中,所述连接请求中包括设备标识和请求连接的移动设备的终端数据。When the computing device is about to connect with the mobile device, the computing device will first send a connection request to the server. Wherein, the connection request includes the device identifier and the terminal data of the mobile device requesting the connection.
所述设备标识用于标识一个计算设备,如,计算设备的IP地址,网卡地址和MID值等。其中,MID(Mobile Internet Device,移动互联网设备)值是通过硬件的编号计算出的唯一的特征值。The device identifier is used to identify a computing device, such as the computing device's IP address, network card address, and MID value. Wherein, the MID (Mobile Internet Device, mobile Internet device) value is a unique feature value calculated through the serial number of the hardware.
所述终端数据是移动设备的相关数据,如移动设备的名称,移动设备的国际移动设备身份码(International Mobile Equipment Identity, IMEI),移动设备的型号等,此外,若移动设备是手机,则对应的终端数据还可以包括该手机的手机号码。其中,所述IMEI可以唯一标识一个移动设备。The terminal data is relevant data of the mobile device, such as the name of the mobile device, the International Mobile Equipment Identity (IMEI) of the mobile device, the model of the mobile device, etc. In addition, if the mobile device is a mobile phone, the corresponding The terminal data can also include the mobile phone number of the mobile phone. Wherein, the IMEI can uniquely identify a mobile device.
则服务器对应可以接收到所述连接请求,从所述连接请求中可以获取所述计算设备的设备标识,从而确定要连接的计算设备,并且获取所述计算设备请求连接的移动设备的终端数据。Then the server can receive the connection request, obtain the device identification of the computing device from the connection request, thereby determine the computing device to be connected, and obtain the terminal data of the mobile device that the computing device requests to connect.
而服务器记录与其通信过的移动设备(或计算设备)的终端数据(或设备数据),因此可以依据所述终端数据查找所述移动设备,即检测所述终端数据与服务器中存储的任一移动设备的终端数据是否匹配,若匹配,则说明可以查找到所述移动设备,则构建所述设备标识与所述终端数据的映射关系,以建立所述移动设备与所述计算设备的关联关系;若不匹配,则说明未查找到所述移动设备,即所述移动设备暂时未能与服务器通信。The server records the terminal data (or device data) of the mobile device (or computing device) that has communicated with it, so the mobile device can be searched based on the terminal data, that is, the terminal data and any mobile device stored in the server can be detected. Whether the terminal data of the device matches, if it matches, it means that the mobile device can be found, and then constructs a mapping relationship between the device identifier and the terminal data to establish an association between the mobile device and the computing device; If not, it means that the mobile device is not found, that is, the mobile device cannot communicate with the server temporarily.
步骤303,移动设备侧依据所述第三方应用安装包安装第三方应用,继续执行步骤304;Step 303, install the third-party application on the mobile device side according to the third-party application installation package, and continue to execute step 304;
具体而言,当移动设备接收到所述第三方应用安装包后即依据所述第三方应用安装包安装第三方应用;另一种情况下,当移动设备接收到的是第三方应用安装包的下载地址时,则依据所述第三方应用安装包的下载地址下载所述第三方应用安装包并进行第三方应用的安装,在第三方应用完成安装后,移动设备通过长连接返回安装完成消息至计算设备,以通知计算设备所述第三方应用已经安装完成。Specifically, after the mobile device receives the third-party application installation package, it installs the third-party application according to the third-party application installation package; in another case, when the mobile device receives the third-party application installation package When downloading the address, download the third-party application installation package according to the download address of the third-party application installation package and install the third-party application. After the third-party application is installed, the mobile device returns an installation completion message to The computing device is configured to notify the computing device that the third-party application has been installed.
在本发明实施例中,在计算设备侧可以检测移动设备侧是否安装有第三方应用,在检测到移动设备侧没有安装第三方应用时,计算设备则自动下载第三方应用安装包发送至移动设备进行安装,在这个过程中,移动设备在不需要联网的情况下也可以顺利安装第三方应用,节省移动设备的资源,丰富了对移动设备进行安全防护的渠道,提高了移动设备的安全性;并且用户不需要进行任何操作即可以在移动设备侧安装第三方应用(或其他应用),方便快捷,提高用户体验。In the embodiment of the present invention, whether a third-party application is installed on the mobile device side can be detected on the computing device side, and when no third-party application is installed on the mobile device side, the computing device automatically downloads the third-party application installation package and sends it to the mobile device Installing, in this process, the mobile device can successfully install the third-party application without connecting to the Internet, which saves the resources of the mobile device, enriches the channels for the security protection of the mobile device, and improves the security of the mobile device; Moreover, the user can install third-party applications (or other applications) on the mobile device side without any operation, which is convenient and quick, and improves user experience.
应用于本发明实施例,所述第三方应用可以为安全检测类服务应用,如360手机卫士,金山卫士等等,本发明实施例对第三方应用的具体类型无需加以限制。Applied to the embodiment of the present invention, the third-party application may be a security detection service application, such as 360 Mobile Guard, Jinshan Guardian, etc. The embodiment of the present invention does not need to limit the specific type of the third-party application.
步骤304,建立所述移动设备与所述计算设备的SOCKET连接通道;Step 304, establishing a SOCKET connection channel between the mobile device and the computing device;
具体而言,所述建立所述移动设备与所述计算设备的SOCKET(套接字)连接通道的过程,实际上是以所述移动设备作为服务器,以所述计算设备作为客户端的服务器-客户端SOCKET连接过程,该过程可以分为服务器监听、客户端请求、连接确认三个步骤,其中,服务器监听是指服务器端套接字并不定位具体的客户端套接字,而是处于等待连接的状态,实时监控网络状态;客户端请求是指由客户端的套接字提出连接请求,要连接的目标是服务器端的套接字。为此,客户端的套接字必须首先描述它要连接的服务器的套接字,指出服务器端套接字的地址和端口号,然后就向服务器端套接字提出连接请求;连接确认是指当服务器端套接字监听到或者说接收到客户端套接字的连接请求,它就响应客户端套接字的请求,建立一个新的线程,把服务器端套接字的描述发给客户端,一旦客户端确认了此描述,连接(或连接通道)就建立好了,此时便可以进行第一客户端程序与第二客户端程序间的一系列数据传输。Specifically, the process of establishing a SOCKET (socket) connection channel between the mobile device and the computing device actually uses the mobile device as the server and the computing device as the client server-client The end SOCKET connection process can be divided into three steps: server monitoring, client request, and connection confirmation. Among them, server monitoring means that the server-side socket does not locate a specific client socket, but is waiting for a connection. The state of the network is monitored in real time; the client request refers to the connection request made by the socket of the client, and the target to be connected is the socket of the server. To this end, the client's socket must first describe the socket of the server it wants to connect to, point out the address and port number of the server-side socket, and then make a connection request to the server-side socket; connection confirmation means when When the server-side socket listens to or receives the connection request of the client-side socket, it responds to the request of the client-side socket, creates a new thread, and sends the description of the server-side socket to the client. Once the client confirms the description, the connection (or connection channel) is established, and a series of data transmissions between the first client program and the second client program can be performed at this time.
在具体实现中,服务器通过调用socket函数,建立了监听连接的套接字,然后调用bind函数,将套接字与地址信息关联起来。调用listen 函数实现对该端口的监听,当有连接请求时,通过调用accept函数建立与客户端的连接,最后,调用read函数来读取客户端发送过来的消息,当然也可以使用recv函数实现相同的功能。In a specific implementation, the server establishes a socket for monitoring connections by calling the socket function, and then calls the bind function to associate the socket with address information. Call the listen function to monitor the port. When there is a connection request, establish a connection with the client by calling the accept function. Finally, call the read function to read the message sent by the client. Of course, you can also use the recv function to achieve the same Function.
步骤305,所述第二客户端程序通过所述SOCKET连接通道向所述第一客户端程序发出对移动设备的安全检测请求,所述安全检测请求包括指定检测对象;Step 305, the second client program sends a security detection request to the mobile device to the first client program through the SOCKET connection channel, and the security detection request includes a specified detection object;
所述安全检测请求为保证移动设备安全的检测请求,作为本实施例的一种优选示例,所述安全检测请求可以包括指定检测对象,所述指定检测对象为针对移动设备进行安全检测的项目,可以包括针对移动设备的如下服务的一项或多项:移动设备挂马漏洞检测、检测是否开启云查杀、检测是否存在危险软件、检测是否更新过病毒库、检测安全服务是否开启、检测移动设备是否有山寨应用、检测移动设备上是否有恶意广告应用、主动防御功能开启检测,等等。The security detection request is a detection request to ensure the security of the mobile device. As a preferred example of this embodiment, the security detection request may include a specified detection object, and the specified detection object is an item for security detection of the mobile device. It can include one or more of the following services for mobile devices: mobile device Trojan vulnerability detection, detection of cloud scanning and killing, detection of dangerous software, detection of virus database update, detection of security services, detection of mobile Whether the device has counterfeit applications, detect whether there are malicious advertising applications on the mobile device, detect whether the active defense function is enabled, and so on.
作为本实施例的另一种优选示例,所述安全检测请求可以包括指定检测对象,所述指定检测对象为针对移动设备进行优化和垃圾清理的项目,可以包括针对移动设备的如下服务的一项或多项:内存优化检测、检测是否存在后台软件、自动启动的软件检测、垃圾数据清理检测、清理缓存检测、清理应用卸载后存在的残留文件检测、安装包清理检测、大文件整理、隐私痕迹清理检测,等等。As another preferred example of this embodiment, the security detection request may include a specified detection object, and the specified detection object is an item for optimization and garbage cleaning for mobile devices, and may include one of the following services for mobile devices Or more: memory optimization detection, detection of background software, automatic startup software detection, junk data cleaning detection, cache cleaning detection, residual file detection after uninstalling applications, installation package cleaning detection, large file sorting, privacy traces Clean detection, etc.
步骤306,所述第一客户端程序将所述安全检测请求发送至第三方应用;Step 306, the first client program sends the security detection request to a third-party application;
在实际中,所述第三方应用在移动设备侧的安装过程中,可以建立多种服务(service),第一客户端程序在接收到安全检测请求后,根据所述指定检测对象定位第三方应用对应的服务,例如,若所述指定检测对象为垃圾数据安全检测,则其对应的第三方应用的服务为清理服务。第一客户端程序通过调用所述第三方应用对应的服务的接口来将所述安全检测请求发送至第三方应用中。In practice, during the installation process of the third-party application on the mobile device side, various services (services) can be established, and the first client program locates the third-party application according to the specified detection object after receiving the security detection request For the corresponding service, for example, if the specified detection object is junk data security detection, the corresponding service of the third-party application is a cleaning service. The first client program sends the security detection request to the third-party application by calling the interface of the service corresponding to the third-party application.
步骤307,所述第三方应用对所述指定检测对象执行对应的安全检测操作,获得安全检测结果信息;Step 307, the third-party application performs a corresponding security detection operation on the specified detection object, and obtains security detection result information;
具体而言,所述安全检测请求中的指定检测对象包括类型标识的信息,所述类型标识的信息为第三方应用与服务器约定的指示指定检测对象的检测类型的信息,不同的类型标识的信息标识不同的操作,通过所述类型标识的信息第三方应用可以知道该检测对象为哪种检测,从而执行对应的操作,获得安全检测结果信息。例如,Specifically, the specified detection object in the security detection request includes information of a type identification, the information of the type identification is the information indicating the detection type of the specified detection object agreed between the third-party application and the server, and the information of different type identifications Different operations are identified, and the third-party application can know what kind of detection the detection object is based on the information identified by the type, so as to perform corresponding operations and obtain security detection result information. E.g,
体检的类型标识的信息为CMD_SYSTEM_EXAM_SCAN;The type identification information of the physical examination is CMD_SYSTEM_EXAM_SCAN;
垃圾清理的类型标识的信息为CMD_CLEAR_GARBAGE_SCAN;The information identified by the type of garbage cleaning is CMD_CLEAR_GARBAGE_SCAN;
杀毒的类型标识的信息为CMD_SECURITY_SCAN。The information identified by the antivirus type is CMD_SECURITY_SCAN.
作为本发明实施例的一种优选示例,若所述检测对象为主动防御功能开启检测,其具体的检测规则可以为:第三方应用首先检测移动设备具备主动防御功能,若是,则检测所述主动防御功能是否开启;若否,则第三方设备检测所述第一客户端程序是否开启主动防御功能。As a preferred example of the embodiment of the present invention, if the detection object is the active defense function detection, the specific detection rule can be: the third-party application first detects that the mobile device has the active defense function, and if so, then detects the active defense function. Whether the defense function is enabled; if not, the third-party device detects whether the first client program has enabled the active defense function.
作为本实施例的另一种示例,若所述指定检测对象为检测移动设备是否有山寨应用,其具体的检测规则可以为:第三方应用扫描移动设备的APP(application,应用)列表,获取所述应用列表中的每个应用的开发者签名或MD5值,并将所述应用列表中的应用与应用白名单中的应用进行对比,如果某应用在应用白名单里,再将该应用的开发者签名或MD5值与白名单中对应的应用的开发者签名或MD5值进行比对,如果该应用的开发者签名或MD5值与白名单中的对应应用的开发者签名或MD5值不一致,则判定该应用属于山寨应用;如果某应用不在应用白名单里,则扫描病毒库或(进行云查杀),如果该应用在病毒库中,则报病毒或木马。As another example of this embodiment, if the specified detection object is to detect whether the mobile device has counterfeit applications, the specific detection rule may be: a third-party application scans the APP (application, application) list of the mobile device to obtain all The developer signature or MD5 value of each application in the above application list, and compare the application in the application list with the application in the application white list, if an application is in the application white list, then the development of the application Compare the developer signature or MD5 value with the developer signature or MD5 value of the corresponding application in the whitelist. If the developer signature or MD5 value of the application is inconsistent with the developer signature or MD5 value of the corresponding application in the whitelist, then It is determined that the application is a copycat application; if an application is not in the application whitelist, scan the virus database or (perform cloud scanning and killing), if the application is in the virus database, report a virus or Trojan horse.
作为本实施例的另一种示例,若所述指定检测对象为检测移动设备是否存在危险软件或是否有恶意广告应用,其具体的检测规则可以为:第三方应用扫描移动设备的APP(application,应用)列表,将应用列表中的应用与服务器中的黑白名单进行匹配。其中,白名单为记录安全进程的名单,黑名单为记录危险进程的名单。位于白名单中进程的类型为白进程,位于黑名单中进程的类型为黑进程,在白名单和黑名单之外的所有未知进程属于灰进程。当应用的进程为白进程(如360手机助手、 91手机助手或豌豆荚调用的进程等)时,确认该进程相关的应用为可信的应用(或安全应用),允许该进程的运行;当应用进程为黑进程时(如恶意推广APK的应用程序调用的进程等),确认该进程相关的应用程序为不可信的应用程序,在判断出该进程的类型后,立即拦截该进程的运行(如通过断开该进程与5037端口的连接来拦截该进程),禁止该进程相关的应用程序对移动设备进行任何操作(如枚举系统中连接的安卓设备),并将拦截成功的信息发送至第一客户端程序,由第一客户端程序返回计算设备侧。As another example of this embodiment, if the specified detection object is to detect whether there is dangerous software or malicious advertising application in the mobile device, the specific detection rule may be: a third-party application scans the APP (application, application) list, and match the applications in the application list with the black and white lists in the server. Wherein, the white list is a list for recording safe processes, and the black list is a list for recording dangerous processes. The type of process in the white list is a white process, the type of process in the black list is a black process, and all unknown processes outside the white list and black list are gray processes. When the process of the application is a white process (such as the process called by 360 mobile assistant, 91 mobile assistant or pea pod, etc.), confirm that the application related to the process is a trusted application (or safe application), and allow the operation of the process; When the application process is a black process (such as a process called by an application that maliciously promotes APK, etc.), confirm that the application related to the process is an untrusted application, and immediately block the operation of the process after judging the type of the process ( Such as intercepting the process by disconnecting the process from port 5037), prohibiting the application related to the process from performing any operations on the mobile device (such as enumerating Android devices connected to the system), and sending successful interception information to The first client program is returned to the computing device side by the first client program.
另外,本示例还可以通过客户端收集程序行为并关联到程序特征,从而在数据库中记录程序特征及其对应的程序行为,根据收集到的程序行为和程序特征的关联关系,可以在数据库中对样本进行分析归纳,从而有助于对软件或程序属于黑名单或者白名单的判断。由于在数据库中记录了程序特征及该特征对应的行为记录,因此可以结合已知白名单对未知程序进行分析。例如,如果未知程序特征与现有白名单中的已知程序特征相同,则将该未知程序特征及其程序行为都列入白名单。如果未知程序行为与现有白名单中的已知程序行为相同或近似,则将该未知程序行为及其程序特征都列入白名单。In addition, this example can also collect program behaviors through the client and associate them with program features, so as to record program features and their corresponding program behaviors in the database. According to the association between the collected program behaviors and program features, the The samples are analyzed and summarized, which helps to judge whether the software or program belongs to the blacklist or whitelist. Since the program characteristics and the corresponding behavior records of the characteristics are recorded in the database, unknown programs can be analyzed in combination with the known white list. For example, if the unknown program signature is the same as the known program signature in the existing whitelist, both the unknown program signature and its program behavior are whitelisted. If the unknown program behavior is the same as or similar to the known program behavior in the existing whitelist, the unknown program behavior and its program characteristics are both included in the whitelist.
例如,以杀毒为例,第三方应用(如手机卫士)通过以下方式获取病毒结果:For example, taking antivirus as an example, a third-party application (such as Mobile Defender) obtains virus results in the following ways:
(1)扫描Android安装包,并从所述Android安装包中提取出指定的特征信息;(1) Scan the Android installation package, and extract specified feature information from the Android installation package;
本例中提取的特征信息可以包括:The feature information extracted in this example may include:
1)Android安装包包名:packageName1) Android installation package name: packageName
2)Android安装包版本号:versionCode2) Android installation package version number: versionCode
3)Android安装包的数字签名的MD5:signature[0]3) MD5 of the digital signature of the Android installation package: signature[0]
4)Android组件receiver4) Android component receiver
5)classes.dex中的指令5) Instructions in classes.dex
6)ELF文件中的字符串6) Strings in the ELF file
7)assets,res,lib等目录下各文件的MD57) MD5 of each file in the assets, res, lib and other directories
8)Android组件service,activity8) Android component service, activity
(2)在预置的安全识别库中查找与指定的单个特征信息或其组合相匹配的特征记录;其中,所述安全识别库中包含特征记录及特征记录对应的安全级别,每条特征记录中包含单个特征信息或特征信息的组合;(2) Search for feature records that match the specified single feature information or its combination in the preset security identification library; wherein, the security identification library contains feature records and the security level corresponding to the feature records, and each feature record Contains a single feature information or a combination of feature information;
(3)将查找到的特征记录对应的安全级别包含在所述Android安装包的安全检测结果中显示。(3) Include and display the security level corresponding to the found feature record in the security detection result of the Android installation package.
本示例列举出安全、危险、谨慎和木马四个安全级别。其中,各种安全级别的定义如下:This example lists four security levels: Safe, Dangerous, Cautious, and Trojan. Among them, the definitions of various security levels are as follows:
安全:该应用是一个正常的应用,没有任何威胁用户手机安全的行为;Security: The application is a normal application, without any behavior that threatens the security of the user's mobile phone;
危险:该应用存在安全风险,有可能该应用本身就是恶意软件;也有可能该应用本来是正规公司发布的正常软件,但是因为存在安全漏洞,导致用户的隐私、手机安全受到威胁;Dangerous: This application has security risks. It is possible that the application itself is malicious software; it is also possible that the application is originally a normal software released by a regular company, but because of security holes, the user's privacy and mobile phone security are threatened;
谨慎:该应用是一个正常的应用,但是存在一些问题,例如会让用户不小心被扣费,或者有不友好的广告遭到投诉等;当发现这类应用之后,会提示用户谨慎使用并告知该应用可能的行为,但是由用户自行决定是否清除该应用;Cautious: The app is a normal app, but there are some problems, such as users being charged accidentally, or complaints about unfriendly advertisements, etc.; when such an app is found, the user will be prompted to use it with caution and inform possible behavior of the app, but it is at the user's discretion whether to clear the app;
木马:该应用是病毒、木马或者其他恶意软件,此处为了简单统称为木马,但并不表示该应用仅仅是木马。Trojan horse: The application is a virus, Trojan horse or other malicious software, which is collectively referred to as a Trojan horse here for simplicity, but it does not mean that the application is just a Trojan horse.
所以,在设置安全识别库时,可以将安全、危险、谨慎和木马四个级别下的Android安装包都作为样本Android安装包,从而由样本中的单个特征或特征组合得到的特征记录可分别对应着一种安全级别及相关的行为和描述等信息。Therefore, when setting up the security identification library, the Android installation packages under the four levels of security, danger, caution, and Trojan horses can be used as sample Android installation packages, so that the feature records obtained from a single feature or a combination of features in the sample can correspond to Information such as a security level and its associated behavior and description.
例如,安全识别库中的特征记录有四条,第一条特征记录和第四条特征记录分别对应的安全级别均为木马级别,第二条特征记录和第三条特征记录分别对应的安全级别均为安全级别。For example, there are four feature records in the security identification database, the security levels corresponding to the first feature record and the fourth feature record are both Trojan level, and the security levels corresponding to the second feature record and the third feature record are both for the security level.
当然,安全识别库中还可以设置一条特征记录,列出某种木马的 Android安装包版本号及其数字签名的MD5值,虽然这条特征记录使用的特征组合与第二条特征记录相同,都使用了版本号与数字签名MD5值的组合,但是这条特征记录对应的安全级别则为“木马”。Of course, a feature record can also be set in the security identification library to list the version number of the Android installation package of a certain Trojan horse and the MD5 value of its digital signature, although the feature combination used by this feature record is the same as that of the second feature record. The combination of version number and digital signature MD5 value is used, but the security level corresponding to this feature record is "Trojan horse".
所以,安全级别并不与某一种特定的特征或特征组合相对应,而是与具体的特征或特征组合的取值相对应。因此,对于相同的特征或特征组合,具体取值不同,对应的安全级别也是不同的。Therefore, the security level does not correspond to a specific feature or feature combination, but corresponds to the value of a specific feature or feature combination. Therefore, for the same feature or feature combination, the specific values are different, and the corresponding security levels are also different.
而且,上述安全、危险、谨慎和木马四个级别的定义仅作为举例说明,根据实际应用,当然也可以有其他的安全级别分类及定义,本示例的保护范围并不限定于此。Moreover, the definitions of the above four levels of security, danger, caution and Trojan horse are only for illustration. According to actual applications, of course, there may be other classifications and definitions of security levels, and the protection scope of this example is not limited thereto.
那么,所述在预置的安全识别库中查找与指定的单个特征信息或其组合相匹配的特征记录,并将查找到的特征记录对应的安全级别包含在所述Android安装包的安全检测结果的步骤,可以理解为:Then, the feature record matching the specified single feature information or its combination is searched in the preset security identification library, and the security level corresponding to the found feature record is included in the security detection result of the Android installation package. The steps can be understood as:
在安全识别库中查找特征记录,如果提取出的指定单个特征与第一条特征记录相匹配,则可以判定当前的Android安装包为木马级别;如果提取出的指定特征进行组合后与第二条特征记录或者第三条特征记录相匹配,则可以判定当前的Android安装包为安全级别;如果提取出的指定特征进行组合后与第四条特征记录相匹配,则可以判定当前的Android 安装包也为木马级别。Search the feature record in the security identification library. If the extracted specified single feature matches the first feature record, it can be determined that the current Android installation package is at the Trojan level; if the extracted specified feature is combined with the second feature record or the third feature record, it can be determined that the current Android installation package is a security level; if the extracted specified features are combined and matched with the fourth feature record, it can be determined that the current Android installation package is also safe. It is Trojan level.
所以,针对某个Android安装包的安全检测结果可以是包含安全、危险、谨慎或木马四个表示安全级别的信息,此外所述安全检测结果中还可以包括与安全级别相关的行为描述、软件描述、时间戳等至少一项提示信息,如对应“谨慎”级别的提示信息可以是“可能造成扣费,是否选择删除该应用”。Therefore, the security detection result for a certain Android installation package may contain four information indicating security levels: safety, danger, caution, or Trojan horse. In addition, the security detection result may also include behavior descriptions and software descriptions related to the security level. , timestamp and at least one item of prompt information, for example, the prompt information corresponding to the level of "cautious" may be "may result in fee deduction, whether to choose to delete the application".
更具体地,所述安全检测结果可以包含安全级别、行为描述信息、软件描述信息和时间戳信息。其中:More specifically, the security detection result may include security level, behavior description information, software description information and time stamp information. in:
安全级别:可以用32位整数表示,可表示安全、危险、谨慎或木马四个安全级别,每个安全级别的定义如上所述。Security level: It can be represented by a 32-bit integer, which can represent four security levels of security, danger, caution, or Trojan horse. The definition of each security level is as described above.
行为描述信息:也可以用32位(0~31)整数表示,可以表示出各个安全级别的软件行为描述。其中,可以选取一位表示标志位,标志位为0 表示没有恶意行为,如果有恶意行为,则可以定义:第1位代表“后台偷偷下载”,第2位代表“私自发送短信”,第3位代表“包含广告”,等等。即,每一位都可以单独表示一种软件的行为描述。Behavior description information: It can also be represented by a 32-bit (0-31) integer, which can represent the software behavior description of each security level. Among them, one bit can be selected to indicate the flag bit, and the flag bit is 0, which means there is no malicious behavior. If there is malicious behavior, you can define: the first bit represents "secretly downloading in the background", the second bit represents "privately sending SMS", and the third bit represents bit for "contains ads", etc. That is, each bit can independently represent a behavioral description of a software.
例如,对于检测为“木马级别”的Android应用程序,如果恶意行为 =3,翻译成二进制就是11,第1位=1,第2位=1,表示的恶意行为是:同时具有后台偷偷下载和私自发送短信的行为。For example, for an Android application detected as a "Trojan horse level", if the malicious behavior = 3, the binary translation is 11, the first bit = 1, and the second bit = 1, which means that the malicious behavior is: both secretly downloading in the background and The act of sending text messages privately.
再例如,对于检测为“谨慎级别”的Android应用程序,如果行为描述=4,翻译成二进制就是100,第1位=0,第2位=0,第2位=1,表示的行为是:包含广告。由于这个广告可能是用户允许的,也可能是用户不允许的,所以会提示用户谨慎使用,由用户自行决定是否清除。For another example, for an Android application detected as "cautious level", if the behavior description = 4, the binary translation is 100, the first bit = 0, the second bit = 0, the second bit = 1, and the indicated behavior is: Contains advertisements. Since this advertisement may or may not be allowed by the user, the user will be prompted to use it with caution, and it is up to the user to decide whether to clear it.
软件描述信息:通常表示为字符串,是对Android应用程序的说明,如发布者、发布时间等信息。Software description information: usually expressed as a character string, which is a description of the Android application, such as the publisher, release time and other information.
时间戳信息:表明Android应用程序的特征信息(如正常特征、木马特征等)是什么时候入库的。Timestamp information: indicates when the feature information (such as normal feature, Trojan horse feature, etc.) of the Android application was stored.
需要说明的是,上述主动防御功能开启检测、检测移动设备是否有山寨应用以及检测移动设备是否存在危险软件或是否有恶意广告应用的检测规则仅仅是本实施例的示例,本领域技术人员采用其他能达到检测移动设备是否存在危险软件或是否有恶意广告应用或是否存在山寨应用的目的的方法均是可以的,另外,对于其他指定检测对象的检测,本领域技术人员可以采用现有的能达到目的的任何技术进行检测,本发明对此无需加以限制。It should be noted that the detection rules for detecting whether the active defense function is turned on, detecting whether there are counterfeit applications on the mobile device, and detecting whether there are dangerous software or malicious advertising applications on the mobile device are only examples of this embodiment, and those skilled in the art can use other Any method that can achieve the purpose of detecting whether there is dangerous software or whether there is malicious advertising application or whether there is fake application in the mobile device is all possible. In addition, for the detection of other designated detection objects, those skilled in the art can use existing methods that can achieve The purpose of any technology for detection, the present invention need not be limited to this.
步骤308,第三方应用将所述安全检测结果信息返回第一客户端程序,由所述第一客户端程序将所述安全检测结果信息通过所述SOCKET 连接通道转发至第二客户端程序;Step 308, the third-party application returns the security detection result information to the first client program, and the first client program forwards the security detection result information to the second client program through the SOCKET connection channel;
具体而言,所述第三方应用执行相应的安全检测操作后,获得安全检测结果信息并返回第一客户端程序,在实际中,所述第三方应用可以通过调用所述第一客户端程序在先注册的回调函数将所述安全检测结果信息返回第一客户端程序。进一步地,第三方应用在将所述安全检测结果信息返回第一客户端程序时,可以对该安全检测结果信息标注类型标识,所述类型标识为第三方应用与第二客户端程序或与移动设备预先约定的用于标识安全检测结果信息类型的标识。Specifically, after the third-party application performs the corresponding security detection operation, it obtains the security detection result information and returns to the first client program. In practice, the third-party application can call the first client program in the The first registered callback function returns the security detection result information to the first client program. Further, when the third-party application returns the security detection result information to the first client program, it may mark the security detection result information with a type identifier, and the type identifier is the third-party application and the second client program or the mobile The identifier pre-agreed by the device to identify the information type of the security detection result.
步骤309,所述第二客户端程序依据所述安全检测结果信息获得对应的执行建议信息;Step 309, the second client program obtains corresponding execution suggestion information according to the security detection result information;
应用于本发明实施例,第二客户端程序接收到安全检测结果信息后,解析所述安全检测结果信息获得对应的类型标识,随后第二客户端程序在预设映射表中查找所述类型标识,获得与该类型标识对应的执行建议信息。其中,所述预设映射表中存储有每种类型标识与对应的一个或多个执行建议信息的映射关系。Applied to the embodiment of the present invention, after receiving the security detection result information, the second client program parses the security detection result information to obtain the corresponding type identifier, and then the second client program searches the preset mapping table for the type identifier , to obtain the execution suggestion information corresponding to the type identifier. Wherein, the preset mapping table stores a mapping relationship between each type identifier and corresponding one or more execution suggestion information.
在本发明的一种优选实施例中,所述安全检测结果信息可以包括安全检测进度信息。第三方应用对应的服务在对指定检测对象进行安全检测的过程中,可以将安全检测进度信息返回第一客户端程序,由第一客户端程序通过所述SOCKET连接通道将安全检测进度信息返回第二客户端程序。第二客户端程序接收到所述安全检测进度后,解析安全检测进度信息获取对应的类型标识以及安全检测进度,从预设映射表中查找所述类型标识,获得与所述安全检测进度对应的执行建议信息,其中,针对所述安全检测进度的类型标识所对应的执行建议信息可以有停止执行建议、暂停执行建议、继续执行建议等等。In a preferred embodiment of the present invention, the safety inspection result information may include safety inspection progress information. The service corresponding to the third-party application may return the security detection progress information to the first client program during the security detection process of the specified detection object, and the first client program returns the security detection progress information to the first client program through the SOCKET connection channel. Two client programs. After receiving the safety inspection progress, the second client program parses the safety inspection progress information to obtain the corresponding type identification and safety inspection progress, searches the type identification from the preset mapping table, and obtains the information corresponding to the safety inspection progress. Execution suggestion information, wherein the execution suggestion information corresponding to the type identifier of the security inspection progress may include a suggestion to stop execution, a suggestion to suspend execution, a suggestion to continue execution, and the like.
在本发明的另一种优选实施例中,所述安全检测结果信息可以包括安全检测结果,所述安全检测结果为针对指定检测对象安全检测完毕后得到的最终结果,第二客户端程序接收到所述安全检测结果后,解析安全检测结果获取对应的类型标识,从预设映射表中查找所述类型标识,获得与所述安全检测结果对应的执行建议信息,其中,针对所述安全检测结构的类型标识所对应的执行建议信息可以有移动设备挂马漏洞修复建议、开启云查杀建议、危险软件修复建议、病毒库更新建议、开启安全服务建议、山寨应用修复建议、恶意广告应用修复建议、内存优化建议、后台软件关闭建议、关闭自动启动的软件建议、垃圾数据清理建议、清理缓存建议、清理应用卸载后存在的残留文件建议、安装包清理建议、大文件整理建议、隐私痕迹清理建议。等等。In another preferred embodiment of the present invention, the safety detection result information may include the safety detection result, which is the final result obtained after the safety detection of the specified detection object is completed, and the second client program receives After the security detection result, analyze the security detection result to obtain the corresponding type identifier, search the type identifier from the preset mapping table, and obtain the execution suggestion information corresponding to the security detection result, wherein, for the security detection structure The execution suggestion information corresponding to the type identifier can include suggestions for repairing vulnerabilities in mobile devices, enabling cloud scanning and killing, suggestions for repairing risky software, suggestions for updating virus databases, suggestions for enabling security services, suggestions for repairing counterfeit applications, and suggestions for repairing malicious advertising applications. , suggestions for memory optimization, suggestions for closing background software, suggestions for disabling auto-start software, suggestions for cleaning junk data, suggestions for cleaning cache, suggestions for cleaning residual files after app uninstallation, suggestions for cleaning installation packages, suggestions for organizing large files, and suggestions for cleaning privacy traces . and many more.
步骤310,所述第二客户端程序展示所述安全检测结果信息以及对应的执行建议信息;Step 310, the second client program displays the security detection result information and corresponding execution suggestion information;
第二客户端程序在获得执行建议信息后,可以将所述安全检测结果信息以及其对应的执行建议信息在计算设备侧展示给用户。所述展示形式可以为以弹窗的形式进行展示,或直接在第二客户端程序的当前窗口中进行展示,展示的内容除了安全检测结果信息以及其对应的执行建议信息外,还可以包括移动设备的标识、文件路径、文件大小等等,本发明实施例对展示的形式无需加以限制。After obtaining the execution suggestion information, the second client program may display the security detection result information and its corresponding execution suggestion information to the user on the computing device side. The display form may be displayed in the form of a pop-up window, or directly displayed in the current window of the second client program, and the displayed content may include mobile The embodiment of the present invention does not need to limit the display form of the device identifier, file path, file size, and so on.
步骤311,所述第二客户端程序在接收到用户针对一个或多个执行建议信息的选定指令后,依据所述选定指令生成与所述一个或多个执行建议信息对应的执行指令并发送至第一客户端程序,由第一客户端程序将所述执行指令发送至第三应用中;Step 311: After receiving the user's selected instruction for one or more execution suggestion information, the second client program generates an execution instruction corresponding to the one or more execution suggestion information according to the selected instruction and sending to the first client program, and the first client program sends the execution instruction to the third application;
具体而言,用户可以通过选定一个或多个执行建议信息的方式来发出对安全检测结果的处理意愿,当用户选定一个或多个执行建议信息时即生成所述一个或多个执行建议信息选定指令,第二客户端程序接收到所述选定指令后,生成对应的执行指令通过所述SOCKET连接通道发送至第一客户端程序,由第一客户端程序发送至第三方应用中。Specifically, the user can issue a willingness to process the security inspection results by selecting one or more execution suggestion information, and the one or more execution suggestions will be generated when the user selects one or more execution suggestion information Information selection instruction, after the second client program receives the selection instruction, it generates a corresponding execution instruction and sends it to the first client program through the SOCKET connection channel, and the first client program sends it to a third-party application .
例如,所述停止执行建议对应的执行指令为停止执行指令、所述暂停执行建议对应的执行指令为暂停执行指令、所述继续执行建议对应的执行指令为继续执行指令;所述移动设备挂马漏洞修复建议、开启云查杀建议、危险软件修复建议、病毒库更新建议、开启安全服务建议、山寨应用修复建议、恶意广告应用修复建议、主动防御功能开启建议、内存优化建议、后台软件关闭建议、关闭自动启动的软件建议、垃圾数据清理建议、清理缓存建议、清理应用卸载后存在的残留文件建议、安装包清理建议、大文件整理建议、隐私痕迹清理建议对应的指令分别可以为移动设备挂马漏洞修复、开启云查杀、危险软件修复、病毒库更新、开启安全服务、山寨应用修复、恶意广告应用修复、开启主动防御功能、内存优化、后台软件关闭、关闭自动启动的软件、垃圾数据清理、清理缓存、清理应用卸载后存在的残留文件、安装包清理、大文件整理、隐私痕迹清理。For example, the execution instruction corresponding to the stop execution suggestion is a stop execution instruction, the execution instruction corresponding to the suspend execution suggestion is a suspend execution instruction, and the execution instruction corresponding to the continue execution suggestion is a continue execution instruction; Vulnerability repair advice, cloud scanning and killing advice, risk software repair advice, virus database update advice, security service advice, counterfeit application repair advice, malicious advertising application repair advice, active defense function enabling advice, memory optimization advice, background software closing advice , Suggestions for turning off auto-start software, suggestions for cleaning junk data, suggestions for cleaning cache, suggestions for cleaning residual files after app uninstallation, suggestions for cleaning installation packages, suggestions for organizing large files, and suggestions for cleaning privacy traces. Horse vulnerability repair, enable cloud scanning and killing, risk software repair, virus database update, enable security services, counterfeit application repair, malicious advertising application repair, enable active defense function, memory optimization, background software shutdown, turn off auto-start software, junk data Clean up, clean up cache, clean up residual files after app uninstallation, clean up installation packages, clean up large files, clean up privacy traces.
步骤312,第三方应用执行所述执行指令。Step 312, the third-party application executes the execution instruction.
具体而言,所述执行指令携带有指令标识,不同的指令标识指示第三方应用执行不同的操作,即第三方应用接收到执行指令后,依据所述指令标识执行相应的修复操作。Specifically, the execution instruction carries an instruction identifier, and different instruction identifiers instruct third-party applications to perform different operations, that is, after receiving the execution instruction, the third-party application executes a corresponding repair operation according to the instruction identifier.
例如,若第三方应用接收到的执行指令为开启主动防御功能,若移动设备上具备主动防御功能,则开启移动设备上的主动防御功能,否则,开启所述第一客户端程序的主动防御功能。具体来说,主动防御功能开启后,可以利用应用程序的名称或信息与预先定义的数据库中的信息进行比较来对所述应用程序的身份进行判断,进而采取相应的处理,其中,所述预先定义的数据库可以包含应用程序白名单、黑名单、以及特征数据。所述白名单可以包含已知的受信任的应用程序的名称(包括程序的 UID(唯一标识符)和程序的包名),所述黑名单可以包含已知的恶意应用程序的名称(包括程序的UID(唯一标识符)和程序的包名),所述特征数据可以包含已知的恶意特征(例如广告特征)的数据。For example, if the execution instruction received by the third-party application is to enable the active defense function, if the mobile device has the active defense function, then enable the active defense function on the mobile device; otherwise, enable the active defense function of the first client program . Specifically, after the active defense function is enabled, the identity of the application program can be judged by comparing the name or information of the application program with the information in the predefined database, and then corresponding processing can be taken, wherein the pre-defined The defined database can contain application whitelists, blacklists, and signature data. The white list may contain the names of known trusted applications (including the UID (unique identifier) of the program and the package name of the program), and the blacklist may contain the names of known malicious applications (including the program UID (Unique Identifier) and package name of the program), the feature data may contain data of known malicious features (such as advertising features).
在利用应用程序的名称来对所述应用程序的身份进行判断时:在所述应用程序的名称包含在所述预先定义的数据库中的白名单中时,根据应用程序调用的服务的地址执行所述调用,并向所述应用程序返回实际服务结果;或者,在所述应用程序的名称包含在预先定义的数据库中的黑名单中时,向所述应用程序返回预先定义的服务结果;或者,在所述应用程序的名称未包含在预先定义的数据库中的白名单和黑名单中时,显示所述应用程序的名称和信息和所述调用的信息,并且根据在移动设备上通过操作系统对于所述调用的选择来执行处理。When judging the identity of the application by using the name of the application: when the name of the application is included in the white list in the predefined database, execute the call according to the address of the service called by the application. the above call, and return the actual service result to the application; or, when the name of the application is included in the blacklist in the predefined database, return the predefined service result to the application; or, When the name of the application program is not included in the white list and black list in the predefined database, display the name and information of the application program and the information of the call, and according to the mobile device through the operating system for The selection of the call to perform processing.
也就是说,当应用程序的名称包含在白名单中时,判定该应用程序为受信任的应用程序,允许其对于服务的调用,从而根据所述服务的地址执行调用,并向该应用程序返回实际服务结果;当应用程序的名称包含在黑名单中时,判定该应用软件为恶意应用程序,拒绝其对于服务的调用,直接向其返回虚假的服务结果,使其认为调用已经成功;而当应用程序的名称既未包含在白名单、也未包含在黑名单中时,则显示所述应用程序的名称和信息和所述调用的信息,并且根据在移动设备上通过操作系统对于所述调用的选择来执行处理。具体而言,在选择了允许所述应用程序对所述服务的调用的情况下,根据所述服务的地址执行所述调用,并向所述应用程序返回实际服务结果;或者在选择了不允许所述应用程序对所述服务的调用的情况下,向所述应用程序返回预先定义的服务结果。That is to say, when the name of the application program is included in the white list, it is determined that the application program is a trusted application program, and its call to the service is allowed, so as to execute the call according to the address of the service, and return to the application program The actual service result; when the name of the application program is included in the blacklist, it is determined that the application software is a malicious application program, its call to the service is rejected, and a false service result is returned directly to it, making it think that the call has been successful; When the name of the application program is neither included in the white list nor in the black list, the name and information of the application program and the information of the call are displayed, and according to the call via the operating system on the mobile device option to perform processing. Specifically, in the case of allowing the application to call the service, execute the call according to the address of the service, and return the actual service result to the application; or choose not to allow When the application program calls the service, a predefined service result is returned to the application program.
而在利用应用程序的信息来对于所述应用程序的身份进行判断时:在所述应用程序的信息包含所述预先定义的数据库中的特征数据时,向所述应用程序返回预先定义的服务结果;或者,在所述应用程序的信息不包含所述预先定义的数据库中的特征数据时,显示所述应用程序的名称和信息和所述调用的信息,并且根据在移动设备上通过操作系统对于所述调用的选择来执行处理。When using the information of the application to judge the identity of the application: when the information of the application contains the feature data in the predefined database, return the predefined service result to the application or, when the information of the application program does not contain the feature data in the predefined database, display the name and information of the application program and the information of the call, and according to the mobile device through the operating system for The selection of the call to perform processing.
又如,当第三方应用接收到的执行指令为山寨应用修复指令,则第三方应用从服务器中匹配该山寨应用对应的官方应用安装包,并将匹配的官方应用安装包推送给用户,提示用户是否选择安装(即洗白);当执行指令为垃圾数据清理指令时,则第三方应用清理移动设备侧安全检测得到的垃圾数据;若所述执行指令为关闭后台软件或自动启动的软件时,则第三方应用关闭所述后台软件或自动启动的软件。For another example, when the execution instruction received by the third-party application is a counterfeit application repair instruction, the third-party application matches the official application installation package corresponding to the counterfeit application from the server, pushes the matching official application installation package to the user, and prompts the user Whether to choose to install (that is, whitewash); when the execution command is a garbage data cleaning command, the third-party application cleans up the junk data obtained by the security detection on the mobile device side; if the execution command is to close the background software or automatically start the software, Then the third-party application closes the background software or automatically started software.
需要说明的是,本发明实施例中在计算设备上对移动设备进行安全检测,是指在计算设备上对接入的移动设备进行安全检测,具体的检测操作以及执行操作是安全在移动设备上的安全类检测应用进行的,与在计算设备侧对u盘的安全检测并不相同。It should be noted that in the embodiment of the present invention, performing security detection on the mobile device on the computing device refers to performing security detection on the connected mobile device on the computing device, and the specific detection operation and execution operation are performed on the mobile device. The security detection application performed by the security detection application is not the same as the security detection of the USB disk on the computing device side.
本发明实施例通过在计算设备上对移动设备进行安全检测,可以拦截恶意应用偷窥移动设备用户的隐私信息(包括联系人信息、通话记录、短信、彩信、各种账户及密码等)的行为,防止恶意应用拨打扣费电话、发送扣费短信、访问耗费网络流量的网站,防止恶意应用安装木马和病毒程序,防止恶意应用记录用户的GPS或网络定位,拦截恶意应用弹出骚扰广告信息等等,可以对于任何恶意应用对于服务的调用进行拦截,从而提高了移动设备的安全性。In the embodiment of the present invention, by performing security detection on the mobile device on the computing device, it is possible to intercept malicious applications peeping at the mobile device user's private information (including contact information, call records, SMS, MMS, various accounts and passwords, etc.), Prevent malicious applications from making fee-deducting calls, sending fee-deducting text messages, visiting websites that consume network traffic, preventing malicious applications from installing Trojan horses and virus programs, preventing malicious applications from recording users' GPS or network location, blocking malicious applications from popping up harassing advertisements, etc. Any malicious application's call to the service can be intercepted, thereby improving the security of the mobile device.
此外,本发明实施例通过在计算设备上对移动设备进行安全检测,还可以在检测到有后台软件或自动启动的软件时,可以关闭所述后台软件或自动启动的软件,从而节省移动设备的网络流量;通过对移动设备进行内存优化、垃圾清理等可以提高移动设备的性能。In addition, in the embodiment of the present invention, by performing security detection on the mobile device on the computing device, when background software or automatically started software is detected, the background software or automatically started software can be closed, thereby saving the mobile device. Network traffic; the performance of mobile devices can be improved by memory optimization, garbage cleaning, etc. for mobile devices.
参照图4,示出了本发明的一种对设备进行安全检测的方法实施例四的步骤流程图,本实施例以安装有安卓操作系统的移动设备为例,当然,本发明并不限于安装有安卓系统的移动设备,本发明的原理同样适用于安装有其他操作系统的移动设备。Referring to FIG. 4 , it shows a flow chart of the steps of Embodiment 4 of a method for security detection of a device according to the present invention. This embodiment takes a mobile device installed with an Android operating system as an example. Of course, the present invention is not limited to the installation of For mobile devices with an Android system, the principle of the present invention is also applicable to mobile devices with other operating systems installed.
在本发明实施例中,若第三方应用中的服务中内嵌有第一客户端程序的服务时,则可以通过第三方应用直接与计算设备的第二客户端程序进行通信,所述方法可以包括如下步骤:In the embodiment of the present invention, if the service of the first client program is embedded in the service of the third-party application, the third-party application can directly communicate with the second client program of the computing device, and the method can Including the following steps:
步骤401,当移动设备连接至计算设备时,第二客户端程序检测所述移动设备是否安装有第三方应用,若否,则执行步骤402,若是,则执行步骤404;Step 401, when the mobile device is connected to the computing device, the second client program detects whether the mobile device has a third-party application installed, if not, execute step 402, and if yes, execute step 404;
步骤402,第二客户端程序下载所述第三方应用安装包发送至移动设备侧;Step 402, the second client program downloads the third-party application installation package and sends it to the mobile device;
步骤403,移动设备侧依据所述第三方应用安装包安装第三方应用,继续执行步骤404;Step 403, the mobile device side installs the third-party application according to the third-party application installation package, and proceeds to step 404;
应用于本发明实施例,所述第三方应用可以为安全安全检测类服务应用,如360手机卫士,金山卫士等等,本发明实施例对第三方应用的具体类型无需加以限制。Applied to the embodiment of the present invention, the third-party application may be a security detection service application, such as 360 Mobile Guardian, Jinshan Guardian, etc. The embodiment of the present invention does not need to limit the specific type of the third-party application.
步骤404,建立所述移动设备与所述计算设备的SOCKET连接通道;Step 404, establishing a SOCKET connection channel between the mobile device and the computing device;
步骤405,所述第二客户端程序SOCKET连接通道向所述第三方应用发出对移动设备的安全检测请求,所述安全检测请求包括指定检测对象;Step 405, the SOCKET connection channel of the second client program sends a security detection request to the mobile device to the third-party application, and the security detection request includes a specified detection object;
作为本实施例的一种优选示例,所述安全检测请求可以包括指定检测对象,所述指定检测对象为针对移动设备进行安全检测的项目,可以包括针对移动设备的如下服务的一项或多项:移动设备挂马漏洞检测、检测是否开启云查杀、检测是否存在危险软件、检测是否更新过病毒库、检测安全服务是否开启、检测移动设备是否有山寨应用、检测移动设备上是否有恶意广告应用、主动防御功能开启检测、内存优化检测、检测是否存在后台软件、自动启动的软件检测、垃圾数据清理检测、清理缓存检测、清理应用卸载后存在的残留文件检测、安装包清理检测、大文件整理、隐私痕迹清理检测,等等。As a preferred example of this embodiment, the security detection request may include a specified detection object, which is an item for security detection of mobile devices, and may include one or more of the following services for mobile devices : Mobile device hanging horse vulnerability detection, detection whether cloud scanning and killing is enabled, detection of dangerous software, detection of virus database update, detection of security service is enabled, detection of mobile devices with counterfeit applications, detection of malicious advertisements on mobile devices Application, active defense function activation detection, memory optimization detection, detection of background software, automatic startup software detection, junk data cleaning detection, cache cleaning detection, residual file detection after uninstalling applications, installation package cleaning detection, large files Organize, clean up and detect privacy traces, etc.
步骤406,所述第三方应用对所述指定检测对象执行对应的安全检测操作,获得安全检测结果信息;Step 406, the third-party application performs a corresponding security testing operation on the specified testing object, and obtains security testing result information;
步骤407,第三方应用将所述安全检测结果信息返回第二客户端程序;Step 407, the third-party application returns the security detection result information to the second client program;
步骤408,所述第二客户端程序依据所述安全检测结果信息获得对应的执行建议信息;Step 408, the second client program obtains corresponding execution suggestion information according to the security detection result information;
步骤409,所述第二客户端程序展示所述安全检测结果信息以及对应的执行建议信息;Step 409, the second client program displays the security detection result information and corresponding execution suggestion information;
步骤410,所述第二客户端程序在接收到用户针对一个或多个执行建议信息的选定指令后,依据所述选定指令生成与所述一个或多个执行建议信息对应的执行指令并发送至第三应用中;Step 410: After receiving the user's selected instruction for one or more execution suggestion information, the second client program generates an execution instruction corresponding to the one or more execution suggestion information according to the selected instruction and sent to the third application;
在本发明的一种优选实施例中,所述安全检测结果信息可以包括安全检测进度信息,相应的,所述执行指令可以包括停止指令、暂停指令、继续执行指令。In a preferred embodiment of the present invention, the safety inspection result information may include safety inspection progress information, and correspondingly, the execution instruction may include a stop instruction, a pause instruction, and a continue execution instruction.
在本发明的另一种优选实施例中,所述安全检测结果信息包括安全检测结果,相应地,所述执行指令可以包括以下的一项或多项:移动设备挂马漏洞修复、开启云查杀、危险软件修复、病毒库更新、开启安全服务、山寨应用修复、恶意广告应用修复、开启主动防御功能、内存优化、后台软件关闭、关闭自动启动的软件、垃圾数据清理、清理缓存、清理应用卸载后存在的残留文件、安装包清理、大文件整理、隐私痕迹清理。In another preferred embodiment of the present invention, the security detection result information includes the security detection result, and correspondingly, the execution instruction may include one or more of the following: mobile device hanging horse vulnerability repair, enabling cloud checking Kill, repair dangerous software, update virus database, enable security services, repair copycat apps, repair malicious advertising apps, enable active defense, optimize memory, close background software, turn off auto-starting software, clean junk data, clear cache, clean apps Residual files after uninstallation, installation package cleanup, large file cleanup, and privacy trace cleanup.
步骤411,第三方应用执行所述执行指令。Step 411, the third-party application executes the execution instruction.
对于图4的方法实施例而言,由于其与上述图3方法实施例基本相似,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。As for the method embodiment in FIG. 4 , since it is basically similar to the above method embodiment in FIG. 3 , the description is relatively simple, and for relevant parts, please refer to part of the description of the method embodiment.
对于方法实施例,为了简单描述,故将其都表述为一系列的动作组合,但是本领域技术人员应该知悉,本发明并不受所描述的动作顺序的限制,因为依据本发明,某些步骤可以采用其他顺序或者同时进行。其次,本领域技术人员也应该知悉,说明书中所描述的实施例均属于优选实施例,所涉及的动作和模块并不一定是本发明所必须的。For the method embodiment, for the sake of simple description, it is expressed as a series of action combinations, but those skilled in the art should know that the present invention is not limited by the described action sequence, because according to the present invention, certain steps Other sequences or concurrently may be used. Secondly, those skilled in the art should also know that the embodiments described in the specification belong to preferred embodiments, and the actions and modules involved are not necessarily required by the present invention.
参照图5,示出了本发明的一种对设备进行安全检测的装置实施例一的结构框图,所述的装置可以包括如下模块:Referring to FIG. 5 , it shows a structural block diagram of Embodiment 1 of an apparatus for safety detection of equipment according to the present invention. The apparatus may include the following modules:
安全检测请求接收模块501,适于在移动设备连接至计算设备时,在所述移动设备侧接收所述计算设备侧发出的对移动设备的安全检测请求,所述安全检测请求包括指定检测对象;The security detection request receiving module 501 is adapted to receive, on the mobile device side, a security detection request for the mobile device sent by the computing device side when the mobile device is connected to the computing device, and the security detection request includes a designated detection object;
安全检测结果信息发送模块502,适于在所述移动设备侧获取与所述指定检测对象对应的安全检测结果信息,并将所述安全检测结果信息发送至计算设备侧;The security detection result information sending module 502 is adapted to obtain the security detection result information corresponding to the specified detection object on the mobile device side, and send the security detection result information to the computing device side;
执行指令接收模块503,适于在所述移动设备侧接收计算设备侧发送的执行指令,所述执行指令为计算设备依据所述安全检测结果信息生成;The execution command receiving module 503 is adapted to receive the execution command sent by the computing device side at the mobile device side, the execution command is generated by the computing device according to the security detection result information;
执行指令执行模块504,适于在所述移动设备侧执行所述执行指令。The execution instruction execution module 504 is adapted to execute the execution instruction on the side of the mobile device.
在本发明的一种优选实施例中,所述装置还可以包括:In a preferred embodiment of the present invention, the device may also include:
安装包接收模块,适于在所述移动设备侧接收所述计算设备侧发出的对移动设备的安全检测请求的之前,所述移动设备侧接收所述计算设备侧发送的第三方应用安装包,所述第三方应用安装包为所述计算设备侧在检测到所述移动设备侧没有安装第三方应用时,从服务器中下载得到;The installation package receiving module is adapted to receive the third-party application installation package sent by the computing device side before the mobile device side receives the security detection request for the mobile device sent by the computing device side, The third-party application installation package is downloaded from the server when the computing device side detects that no third-party application is installed on the mobile device side;
安装包安装模块,适于所述移动设备侧依据所述第三方应用安装包安装第三方应用。The installation package installation module is adapted to install a third-party application on the mobile device side according to the third-party application installation package.
在本发明的一种优选实施例中,所述装置还可以包括:In a preferred embodiment of the present invention, the device may also include:
通道建立模块,适于在所述移动设备侧接收所述计算设备侧发出的对移动设备的安全检测请求之前,建立所述移动设备与所述计算设备的 SOCKET连接通道,所述移动设备通过所述SOCKET连接通道接收安全检测请求、以及发送安全检测结果信息、以及接收执行指令。The channel establishment module is adapted to establish a SOCKET connection channel between the mobile device and the computing device before the mobile device side receives the security detection request for the mobile device sent by the computing device side, and the mobile device passes through the The SOCKET connection channel receives security testing requests, sends security testing result information, and receives execution instructions.
在本发明的一种优选实施例中,所述安全检测请求接收模块501还适于:In a preferred embodiment of the present invention, the safety detection request receiving module 501 is also adapted to:
在所述移动设备侧采用所述第三方应用接收所述计算设备侧发出的对移动设备的安全检测请求;Using the third-party application on the mobile device side to receive a security detection request for the mobile device sent by the computing device side;
所述安全检测结果信息发送模块502还适于:The safety detection result information sending module 502 is also suitable for:
在所述移动设备侧采用所述第三方应用依据所述安全检测请求执行对指定检测对象的安全检测操作,获得安全检测结果信息;Using the third-party application on the mobile device side to perform a security testing operation on a designated testing object according to the security testing request, and obtain security testing result information;
由所述第三方应用将所述安全检测结果信息返回至所述计算设备侧;returning the security detection result information to the computing device side by the third-party application;
所述执行指令接收模块503还适于:The execution instruction receiving module 503 is also adapted to:
在所述移动设备侧采用所述第三方应用接收计算设备侧发送的执行指令;Using the third-party application on the mobile device side to receive the execution instruction sent by the computing device side;
所述执行指令执行模块504还适于:The execution instruction execution module 504 is also adapted to:
在所述移动设备侧采用所述第三方应用执行所述执行指令。The execution instruction is executed by using the third-party application on the mobile device side.
在本发明的另一种优选实施例中,所述移动设备侧安装有第一客户端程序,所述安全检测请求接收模块501还适于:In another preferred embodiment of the present invention, the first client program is installed on the mobile device side, and the safety detection request receiving module 501 is further adapted to:
在所述移动设备侧采用所述第一客户端程序接收所述计算设备侧发出的对移动设备的安全检测请求;Using the first client program on the mobile device side to receive a security detection request for the mobile device sent by the computing device side;
所述安全检测结果信息发送模块502还适于:The safety detection result information sending module 502 is also suitable for:
在所述移动设备侧采用所述第一客户端程序将所述安全检测请求发送至所述第三方应用,由所述第三方应用依据所述安全检测请求执行对指定检测对象的安全检测操作,获得安全检测结果信息并返回第一客户端程序中;Using the first client program on the mobile device side to send the security detection request to the third-party application, and the third-party application performs a security detection operation on a designated detection object according to the security detection request, Obtain the security detection result information and return it to the first client program;
所述第一客户端程序将所述安全检测结果信息返回至所述计算设备侧;The first client program returns the security detection result information to the computing device side;
所述执行指令接收模块503还适于:The execution instruction receiving module 503 is also adapted to:
在所述移动设备侧采用所述第一客户端程序接收计算设备侧发送的执行指令;Using the first client program on the mobile device side to receive an execution instruction sent by the computing device side;
所述执行指令执行模块504还适于:The execution instruction execution module 504 is also adapted to:
在所述移动设备侧采用所述第一客户端程序将所述执行指令发送至第三方应用,由所述第三方应用执行所述执行指令。The first client program is used on the mobile device side to send the execution instruction to a third-party application, and the third-party application executes the execution instruction.
在本发明的一种优选实施例中,所述第一客户端程序将所述安全检测请求发送至所述第三方应用,具体为:In a preferred embodiment of the present invention, the first client program sends the security detection request to the third-party application, specifically:
所述第一客户端程序依据所述指定检测对象调用所述第三方应用的服务的接口,将所述安全检测请求发送至所述第三方应用。The first client program calls the service interface of the third-party application according to the specified detection object, and sends the security detection request to the third-party application.
作为本发明实施例的一种优选示例,所述指定检测对象可以包括针对移动设备的如下服务的一项或多项:移动设备挂马漏洞检测、检测是否开启云查杀、检测是否存在危险软件、检测是否更新过病毒库、检测安全服务是否开启、检测移动设备是否有山寨应用、检测移动设备上是否有恶意广告应用、主动防御功能开启检测、内存优化检测、检测是否存在后台软件、自动启动的软件检测、垃圾数据清理检测、清理缓存检测、清理应用卸载后存在的残留文件检测、安装包清理检测、大文件整理、隐私痕迹清理检测。As a preferred example of the embodiment of the present invention, the specified detection object may include one or more of the following services for mobile devices: detection of mobile device hanging horse vulnerabilities, detection of whether cloud scanning and killing is enabled, detection of dangerous software , Detect whether the virus database has been updated, detect whether the security service is enabled, detect whether there are counterfeit applications on the mobile device, detect whether there are malicious advertising applications on the mobile device, detect whether the active defense function is enabled, detect memory optimization, detect whether there is background software, and automatically start Software detection, junk data cleanup detection, cache cleanup detection, residual file detection after app uninstallation, installation package cleanup detection, large file cleanup, privacy trace cleanup detection.
作为本发明实施例的一种优选示例,所述安全检测结果信息包括安全检测进度信息,相应地,所述执行指令包括停止指令、暂停指令、继续执行指令。As a preferred example of the embodiment of the present invention, the safety detection result information includes safety detection progress information, and correspondingly, the execution instruction includes a stop instruction, a pause instruction, and a continue execution instruction.
作为本发明实施例的另一种优选示例,所述安全检测结果信息包括安全检测结果,相应地,所述执行指令包括以下的一项或多项:移动设备挂马漏洞修复、开启云查杀、危险软件修复、病毒库更新、开启安全服务、山寨应用修复、恶意广告应用修复、开启主动防御功能、内存优化、后台软件关闭、关闭自动启动的软件、垃圾数据清理、清理缓存、清理应用卸载后存在的残留文件、安装包清理、大文件整理、隐私痕迹清理。As another preferred example of the embodiment of the present invention, the security detection result information includes the security detection result, and correspondingly, the execution instruction includes one or more of the following: mobile device hanging horse vulnerability repair, enabling cloud scanning and killing , Dangerous software repair, virus database update, enable security services, counterfeit application repair, malicious advertising application repair, enable active defense function, memory optimization, background software shutdown, turn off auto-start software, junk data cleaning, cache cleaning, app uninstall cleaning Clean up residual files, installation packages, large files, and privacy traces.
对于图5的装置实施例而言,由于其与上述方法实施例基本相似,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。As for the device embodiment in FIG. 5 , since it is basically similar to the method embodiment above, the description is relatively simple, and for relevant parts, please refer to part of the description of the method embodiment.
参照图6,示出了本发明的一种对设备进行安全检测的装置实施例二的结构框图,所述的装置可以包括如下模块:Referring to FIG. 6 , it shows a structural block diagram of Embodiment 2 of an apparatus for safety detection of equipment according to the present invention. The apparatus may include the following modules:
安全检测请求发送模块601,适于在计算设备侧安全检测到有移动设备接入时,在计算设备侧向所述移动设备侧发出对移动设备的安全检测请求,所述安全检测请求包括指定检测对象;The security detection request sending module 601 is adapted to send a security detection request to the mobile device from the computing device side to the mobile device side when the computing device side safely detects that there is a mobile device access, and the security detection request includes a specified detection object;
安全检测结果信息接收模块602,适于在所述计算设备侧接收所述移动设备侧返回的针对所述安全检测请求的安全检测结果信息,所述安全检测结果信息由所述移动设备侧依据所述指定检测对象获得;The security detection result information receiving module 602 is adapted to receive, on the computing device side, the security detection result information for the security detection request returned by the mobile device, and the security detection result information is provided by the mobile device according to the Obtain the designated test object mentioned above;
执行指令发送模块603,适于在计算设备侧依据所述安全检测结果信息生成对应的执行指令并发送至所述移动设备侧,由所述移动设备侧执行所述执行指令。The execution instruction sending module 603 is adapted to generate a corresponding execution instruction on the computing device side according to the security detection result information and send it to the mobile device side, and the mobile device side executes the execution instruction.
在本发明的一种优选实施例中,所述装置还可以包括:In a preferred embodiment of the present invention, the device may also include:
安装包信息获取模块,适于在所述计算设备侧向所述移动设备侧发出对移动设备的安全检测请求之前,在计算设备侧读取所述移动设备侧中所有已安装应用的安装包信息,所述安装包信息包括安装包标识;The installation package information acquisition module is adapted to read the installation package information of all installed applications on the mobile device side before the computing device side sends a security detection request to the mobile device side to the mobile device side , the installation package information includes an installation package identifier;
查找模块,适于在计算设备侧判断所述安装包标识中不存在第三方应用安装包标识时,从服务器中获取所述第三方应用安装包的下载地址;The search module is adapted to obtain the download address of the third-party application installation package from the server when the computing device side judges that there is no third-party application installation package identification in the installation package identification;
安装包发送模块,适于在计算设备侧依据所述第三方应用安装包的下载地址下载所述第三方应用安装包并发送至移动设备侧。The installation package sending module is adapted to download the third-party application installation package on the computing device side according to the download address of the third-party application installation package and send it to the mobile device side.
在本发明的一种优选实施例中,所述装置还可以包括:In a preferred embodiment of the present invention, the device may also include:
连接通道建立模块,适于在所述计算设备侧向所述移动设备侧发出对移动设备的安全检测请求之前,建立所述移动设备与所述计算设备的 SOCKET连接通道,所述计算设备通过所述连接通道发送安全检测请求、以及接收安全检测结果信息、以及发送执行指令。A connection channel establishment module, adapted to establish a SOCKET connection channel between the mobile device and the computing device before the computing device side sends a security detection request to the mobile device side, and the computing device passes the The above connection channel sends a security detection request, receives security detection result information, and sends an execution instruction.
在本发明的一种优选实施例中,所述安全检测结果信息具有类型标识的信息,所述执行指令发送模块603还适于:In a preferred embodiment of the present invention, the security detection result information has type identification information, and the execution instruction sending module 603 is further adapted to:
计算设备侧在预设映射表中查找所述类型标识对应的执行建议信息,所述预设映射表中存储有计算设备与移动设备预先约定的类型标识与执行建议信息的映射关系;The computing device side looks up the execution suggestion information corresponding to the type identifier in a preset mapping table, and the preset mapping table stores a mapping relationship between the type identifier and the execution suggestion information pre-agreed between the computing device and the mobile device;
在计算设备侧展示所述安全检测结果信息以及对应的执行建议信息;Displaying the security detection result information and corresponding execution suggestion information on the computing device side;
在计算设备侧接收用户对所述一个或多个执行建议信息的选定指令;receiving, at the computing device side, user selected instructions for the one or more implementation suggestion messages;
依据所述选定指令生成一个或多个执行建议信息对应的执行指令并发送至移动设备侧。One or more execution instructions corresponding to the execution suggestion information are generated according to the selected instruction and sent to the mobile device side.
作为本发明实施例的一种优选示例,所述指定检测对象可以包括针对移动设备的如下服务的一项或多项:移动设备挂马漏洞检测、检测是否开启云查杀、检测是否存在危险软件、检测是否更新过病毒库、检测安全服务是否开启、检测移动设备是否有山寨应用、检测移动设备上是否有恶意广告应用、主动防御功能开启检测、内存优化检测、检测是否存在后台软件、自动启动的软件检测、垃圾数据清理检测、清理缓存检测、清理应用卸载后存在的残留文件检测、安装包清理检测、大文件整理、隐私痕迹清理检测。As a preferred example of the embodiment of the present invention, the specified detection object may include one or more of the following services for mobile devices: detection of mobile device hanging horse vulnerabilities, detection of whether cloud scanning and killing is enabled, detection of dangerous software , Detect whether the virus database has been updated, detect whether the security service is enabled, detect whether there are counterfeit applications on the mobile device, detect whether there are malicious advertising applications on the mobile device, detect whether the active defense function is enabled, detect memory optimization, detect whether there is background software, and automatically start Software detection, junk data cleanup detection, cache cleanup detection, residual file detection after app uninstallation, installation package cleanup detection, large file cleanup, privacy trace cleanup detection.
在本发明的一种优选实施例中,所述安全检测结果信息可以包括安全检测进度信息,相应地,所述执行指令包括停止指令、暂停指令、继续执行指令。In a preferred embodiment of the present invention, the safety detection result information may include safety detection progress information, and correspondingly, the execution instruction includes a stop instruction, a pause instruction, and a continue execution instruction.
在本发明的另一种优选实施例中,所述安全检测结果信息包括安全检测结果,相应地,所述执行指令包括以下的一项或多项:移动设备挂马漏洞修复、开启云查杀、危险软件修复、病毒库更新、开启安全服务、山寨应用修复、恶意广告应用修复、开启主动防御功能、内存优化、后台软件关闭、关闭自动启动的软件、垃圾数据清理、清理缓存、清理应用卸载后存在的残留文件、安装包清理、大文件整理、隐私痕迹清理。对于图6的装置实施例而言,由于其与上述方法实施例基本相似,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。In another preferred embodiment of the present invention, the security detection result information includes the security detection result, and correspondingly, the execution instruction includes one or more of the following: mobile device hanging horse vulnerability repair, enabling cloud scanning and killing , Dangerous software repair, virus database update, enable security services, counterfeit application repair, malicious advertising application repair, enable active defense function, memory optimization, background software shutdown, turn off auto-start software, junk data cleaning, cache cleaning, app uninstall cleaning Clean up residual files, installation packages, large files, and privacy traces. As for the device embodiment in FIG. 6 , since it is basically similar to the method embodiment above, the description is relatively simple, and for the related parts, please refer to the part of the description of the method embodiment.
在此提供的算法和显示不与任何特定计算设备、虚拟系统或者其它设备固有相关。各种通用系统也可以与基于在此的示教一起使用。根据上面的描述,构造这类系统所要求的结构是显而易见的。此外,本发明也不针对任何特定编程语言。应当明白,可以利用各种编程语言实现在此描述的本发明的内容,并且上面对特定语言所做的描述是为了披露本发明的最佳实施方式。The algorithms and displays presented herein are not inherently related to any particular computing device, virtual system, or other device. Various generic systems can also be used with the teachings based on this. The structure required to construct such a system is apparent from the above description. Furthermore, the present invention is not specific to any particular programming language. It should be understood that various programming languages can be used to implement the content of the present invention described herein, and the above description of specific languages is for disclosing the best mode of the present invention.
在此处所提供的说明书中,说明了大量具体细节。然而,能够理解,本发明的实施例可以在没有这些具体细节的情况下实践。在一些实例中,并未详细示出公知的方法、结构和技术,以便不模糊对本说明书的理解。In the description provided herein, numerous specific details are set forth. However, it is understood that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure the understanding of this description.
类似地,应当理解,为了精简本公开并帮助理解各个发明方面中的一个或多个,在上面对本发明的示例性实施例的描述中,本发明的各个特征有时被一起分组到单个实施例、图、或者对其的描述中。然而,并不应将该公开的方法解释成反映如下意图:即所要求保护的本发明要求比在每个权利要求中所明确记载的特征更多的特征。更确切地说,如下面的权利要求书所反映的那样,发明方面在于少于前面公开的单个实施例的所有特征。因此,遵循具体实施方式的权利要求书由此明确地并入该具体实施方式,其中每个权利要求本身都作为本发明的单独实施例。Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, in order to streamline this disclosure and to facilitate an understanding of one or more of the various inventive aspects, various features of the invention are sometimes grouped together in a single embodiment, figure, or its description. This method of disclosure, however, is not to be interpreted as reflecting an intention that the claimed invention requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the Detailed Description are hereby expressly incorporated into this Detailed Description, with each claim standing on its own as a separate embodiment of this invention.
本领域那些技术人员可以理解,可以对实施例中的设备中的模块进行自适应性地改变并且把它们设置在与该实施例不同的一个或多个设备中。可以把实施例中的模块或单元或组件组合成一个模块或单元或组件,以及此外可以把它们分成多个子模块或子单元或子组件。除了这样的特征和/或过程或者单元中的至少一些是相互排斥之外,可以采用任何组合对本说明书(包括伴随的权利要求、摘要和附图)中公开的所有特征以及如此公开的任何方法或者设备的所有过程或单元进行组合。除非另外明确陈述,本说明书(包括伴随的权利要求、摘要和附图)中公开的每个特征可以由提供相同、等同或相似目的替代特征来代替。Those skilled in the art can understand that the modules in the device in the embodiment can be adaptively changed and arranged in one or more devices different from the embodiment. Modules or units or components in the embodiments may be combined into one module or unit or component, and furthermore may be divided into a plurality of sub-modules or sub-units or sub-assemblies. All features disclosed in this specification (including accompanying claims, abstract and drawings), as well as any method or method so disclosed, may be used in any combination, except that at least some of such features and/or processes or units are mutually exclusive. All processes or units of equipment are combined. Each feature disclosed in this specification (including accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
此外,本领域的技术人员能够理解,尽管在此所述的一些实施例包括其它实施例中所包括的某些特征而不是其它特征,但是不同实施例的特征的组合意味着处于本发明的范围之内并且形成不同的实施例。例如,在下面的权利要求书中,所要求保护的实施例的任意之一都可以以任意的组合方式来使用。Furthermore, those skilled in the art will understand that although some embodiments described herein include some features included in other embodiments but not others, combinations of features from different embodiments are meant to be within the scope of the invention. and form different embodiments. For example, in the following claims, any of the claimed embodiments may be used in any combination.
本发明的各个部件实施例可以以硬件实现,或者以在一个或者多个处理器上运行的软件模块实现,或者以它们的组合实现。本领域的技术人员应当理解,可以在实践中使用微处理器或者数字信号处理器(DSP)来实现根据本发明实施例的对设备进行安全检测设备中的一些或者全部部件的一些或者全部功能。本发明还可以实现为用于执行这里所描述的方法的一部分或者全部的设备或者装置程序(例如,计算设备程序和计算设备程序产品)。这样的实现本发明的程序可以存储在计算设备可读介质上,或者可以具有一个或者多个信号的形式。这样的信号可以从因特网网站上下载得到,或者在载体信号上提供,或者以任何其他形式提供。The various component embodiments of the present invention may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. Those skilled in the art should understand that a microprocessor or a digital signal processor (DSP) may be used in practice to implement some or all functions of some or all components in the device for performing security detection on the device according to the embodiment of the present invention. The present invention can also be implemented as an apparatus or apparatus program (eg, a computing device program and a computing device program product) for performing a part or all of the methods described herein. Such a program for realizing the present invention may be stored on a computing device readable medium, or may be in the form of one or more signals. Such a signal may be downloaded from an Internet site, or provided on a carrier signal, or provided in any other form.
应该注意的是上述实施例对本发明进行说明而不是对本发明进行限制,并且本领域技术人员在不脱离所附权利要求的范围的情况下可设计出替换实施例。在权利要求中,不应将位于括号之间的任何参考符号构造成对权利要求的限制。单词“包含”不排除存在未列在权利要求中的元件或步骤。位于元件之前的单词“一”或“一个”不排除存在多个这样的元件。本发明可以借助于包括有若干不同元件的硬件以及借助于适当编程的计算设备来实现。在列举了若干装置的单元权利要求中,这些装置中的若干个可以是通过同一个硬件项来具体体现。单词第一、第二、以及第三等的使用不表示任何顺序。可将这些单词解释为名称。It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention can be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computing device. In a unit claim enumerating several means, several of these means can be embodied by one and the same item of hardware. The use of the words first, second, and third, etc. does not indicate any order. These words can be interpreted as names.
本发明的实施例公开了A1、一种对设备进行安全检测的方法,包括:Embodiments of the present invention disclose A1, a method for safety detection of equipment, including:
当移动设备连接至计算设备时,在所述移动设备侧接收所述计算设备侧发出的对移动设备的安全检测请求,所述安全检测请求中包括指定检测对象;When the mobile device is connected to the computing device, a security detection request for the mobile device sent by the computing device side is received at the mobile device side, and the security detection request includes a specified detection object;
在所述移动设备侧获取与所述指定检测对象对应的安全检测结果信息,并将所述安全检测结果信息发送至计算设备侧;Obtaining security detection result information corresponding to the specified detection object at the mobile device side, and sending the security detection result information to the computing device side;
在所述移动设备侧接收计算设备侧发送的执行指令,所述执行指令为计算设备依据所述安全检测结果信息生成;receiving, at the mobile device side, an execution instruction sent by the computing device side, the execution instruction being generated by the computing device according to the security detection result information;
在所述移动设备侧执行所述执行指令。Executing the execution instruction at the mobile device side.
A2、如A1所述的方法,在所述移动设备侧接收所述计算设备侧发出的对移动设备的安全检测请求的步骤之前,还包括:A2. The method as described in A1, before the mobile device side receives the security detection request for the mobile device sent by the computing device side, it also includes:
所述移动设备侧接收所述计算设备侧发送的第三方应用安装包,所述第三方应用安装包为所述计算设备侧在检测到所述移动设备侧没有安装第三方应用时,从服务器中下载得到;The mobile device side receives the third-party application installation package sent by the computing device side, and the third-party application installation package is sent from the server when the computing device side detects that no third-party application is installed on the mobile device side. downloaded;
所述移动设备侧依据所述第三方应用安装包安装第三方应用。The mobile device side installs a third-party application according to the third-party application installation package.
A3、如A1或A2所述的方法,在所述移动设备侧接收所述计算设备侧发出的对移动设备的安全检测请求的步骤之前,还包括:A3. The method described in A1 or A2, before the mobile device side receives the security detection request for the mobile device sent by the computing device side, further includes:
建立所述移动设备与所述计算设备的SOCKET连接通道,所述移动设备通过所述SOCKET连接通道接收安全检测请求、以及发送安全检测结果信息、以及接收执行指令。A SOCKET connection channel between the mobile device and the computing device is established, and the mobile device receives a security detection request, sends security detection result information, and receives an execution instruction through the SOCKET connection channel.
A4、如A2所述的方法,所述在所述移动设备侧接收所述计算设备侧发出的对移动设备的安全检测请求的步骤为:A4. The method as described in A2, the step of receiving at the mobile device side the security detection request for the mobile device sent by the computing device side is:
在所述移动设备侧采用所述第三方应用接收所述计算设备侧发出的对移动设备的安全检测请求;Using the third-party application on the mobile device side to receive a security detection request for the mobile device sent by the computing device side;
所述在所述移动设备侧获取与所述指定检测对象对应的安全检测结果信息,并将所述安全检测结果信息发送至计算设备侧的步骤包括:The step of obtaining the safety detection result information corresponding to the specified detection object at the mobile device side, and sending the safety detection result information to the computing device side includes:
在所述移动设备侧采用所述第三方应用依据所述安全检测请求执行对指定检测对象的安全检测操作,获得安全检测结果信息;Using the third-party application on the mobile device side to perform a security testing operation on a designated testing object according to the security testing request, and obtain security testing result information;
由所述第三方应用将所述安全检测结果信息返回至所述计算设备侧;returning the security detection result information to the computing device side by the third-party application;
所述在所述移动设备侧接收计算设备侧发送的执行指令的步骤为:The step of receiving, at the mobile device side, the execution instruction sent by the computing device side is:
在所述移动设备侧采用所述第三方应用接收计算设备侧发送的执行指令;Using the third-party application on the mobile device side to receive the execution instruction sent by the computing device side;
所述在所述移动设备侧执行所述执行指令的步骤为:The step of executing the execution instruction on the mobile device side is:
在所述移动设备侧采用所述第三方应用执行所述执行指令。The execution instruction is executed by using the third-party application on the mobile device side.
A5、如A2所述的方法,所述移动设备侧安装有第一客户端程序,所述在所述移动设备侧接收所述计算设备侧发出的对移动设备的安全检测请求的步骤为:A5, the method as described in A2, the first client program is installed on the mobile device side, and the step of receiving at the mobile device side the security detection request for the mobile device sent by the computing device side is:
在所述移动设备侧采用所述第一客户端程序接收所述计算设备侧发出的对移动设备的安全检测请求;Using the first client program on the mobile device side to receive a security detection request for the mobile device sent by the computing device side;
所述在所述移动设备侧获取与所述指定检测对象对应的安全检测结果信息,并将所述安全检测结果信息发送至计算设备侧的步骤包括:The step of obtaining the safety detection result information corresponding to the specified detection object at the mobile device side, and sending the safety detection result information to the computing device side includes:
在所述移动设备侧采用所述第一客户端程序将所述安全检测请求发送至所述第三方应用,由所述第三方医用依据所述安全检测请求执行对指定检测对象的安全检测操作,获得安全检测结果信息并返回第一客户端程序中;On the mobile device side, the first client program is used to send the safety detection request to the third-party application, and the third-party medical device performs a safety detection operation on a designated detection object according to the safety detection request, Obtain the security detection result information and return it to the first client program;
所述第一客户端程序将所述安全检测结果信息返回至所述计算设备侧;The first client program returns the security detection result information to the computing device side;
所述在所述移动设备侧接收计算设备侧发送的执行指令的步骤为:The step of receiving, at the mobile device side, the execution instruction sent by the computing device side is:
在所述移动设备侧采用所述第一客户端程序接收计算设备侧发送的执行指令;Using the first client program on the mobile device side to receive an execution instruction sent by the computing device side;
所述在所述移动设备侧执行所述执行指令的步骤为:The step of executing the execution instruction on the mobile device side is:
在所述移动设备侧采用所述第一客户端程序将所述执行指令发送至第三方应用,由所述第三方应用执行所述执行指令。The first client program is used on the mobile device side to send the execution instruction to a third-party application, and the third-party application executes the execution instruction.
A6、如A5所述的方法,所述第一客户端程序将所述安全检测请求发送至所述第三方应用的步骤包括:A6, the method as described in A5, the step of the first client program sending the security detection request to the third-party application includes:
所述第一客户端程序依据所述指定检测对象调用所述第三方应用的服务的接口,将所述安全检测请求发送至所述第三方应用。The first client program calls the service interface of the third-party application according to the specified detection object, and sends the security detection request to the third-party application.
A7、如A1所述的方法,所述指定检测对象包括针对移动设备的如下服务的一项或多项:移动设备挂马漏洞检测、检测是否开启云查杀、检测是否存在危险软件、检测是否更新过病毒库、检测安全服务是否开启、检测移动设备是否有山寨应用、检测移动设备上是否有恶意广告应用、主动防御功能开启检测。A7. The method as described in A1, the specified detection object includes one or more of the following services for mobile devices: mobile device hanging horse vulnerability detection, detection of cloud scanning and killing, detection of dangerous software, detection of whether The virus database has been updated, whether the security service is enabled, whether the mobile device has counterfeit applications, whether there are malicious advertising applications on the mobile device, and whether the active defense function has been enabled.
A8、如A1所述的方法,所述指定检测对象包括针对移动设备的如下服务的一项或多项:内存优化检测、检测是否存在后台软件、自动启动的软件检测、垃圾数据清理检测、清理缓存检测、清理应用卸载后存在的残留文件检测、安装包清理检测、大文件整理、隐私痕迹清理检测。A8. The method as described in A1, the specified detection object includes one or more of the following services for mobile devices: memory optimization detection, detection of background software, automatic startup software detection, garbage data cleaning detection, cleaning Cache detection, cleaning residual file detection after app uninstallation, installation package cleaning detection, large file organization, privacy trace cleaning detection.
A9、如A7或A8所述的方法,所述安全检测结果信息包括安全检测进度信息,相应地,所述执行指令包括停止指令、暂停指令、继续执行指令。A9. The method described in A7 or A8, wherein the safety inspection result information includes safety inspection progress information, and correspondingly, the execution instruction includes a stop instruction, a pause instruction, and a continue execution instruction.
A10、如A7所述的方法,所述安全检测结果信息包括安全检测结果,相应地,所述执行指令包括以下的一项或多项:移动设备挂马漏洞修复、开启云查杀、危险软件修复、病毒库更新、开启安全服务、山寨应用修复、恶意广告应用修复、开启主动防御功能。A10, the method as described in A7, the safety detection result information includes the safety detection result, and correspondingly, the execution instruction includes one or more of the following: mobile device hanging horse vulnerability repair, opening cloud scanning and killing, dangerous software Repair, update the virus database, enable security services, repair counterfeit applications, repair malicious advertising applications, and enable active defense functions.
A11、如A8所述的方法,所述安全检测结果信息包括安全检测结果,相应地,所述执行指令包括以下的一项或多项:内存优化、后台软件关闭、关闭自动启动的软件、垃圾数据清理、清理缓存、清理应用卸载后存在的残留文件、安装包清理、大文件整理、隐私痕迹清理。A11. The method as described in A8, the safety detection result information includes the safety detection result, and correspondingly, the execution instruction includes one or more of the following: memory optimization, background software closing, closing automatically started software, garbage Data cleaning, cache cleaning, residual files after app uninstallation, installation package cleaning, large file cleaning, and privacy trace cleaning.
本发明的实施例还公开了B12、一种对设备进行安全检测的方法,包括:The embodiment of the present invention also discloses B12, a method for safety detection of equipment, including:
当计算设备侧安全检测到有移动设备接入时,在计算设备侧向所述移动设备侧发出对移动设备的安全检测请求,所述安全检测请求包括指定检测对象;When the computing device side detects that there is a mobile device access, the computing device side sends a security detection request to the mobile device to the mobile device side, and the security detection request includes a designated detection object;
在所述计算设备侧接收所述移动设备侧返回的针对所述安全检测请求的安全检测结果信息,所述安全检测结果信息由所述移动设备侧依据所述指定检测对象获得;receiving, at the computing device side, security detection result information for the security detection request returned by the mobile device side, where the security detection result information is obtained by the mobile device side according to the designated detection object;
在计算设备侧依据所述安全检测结果信息生成对应的执行指令并发送至所述移动设备侧,由所述移动设备侧执行所述执行指令。A corresponding execution instruction is generated on the computing device side according to the security detection result information and sent to the mobile device side, and the execution instruction is executed by the mobile device side.
B13、如B12所述的方法,在所述计算设备侧向所述移动设备侧发出对移动设备的安全检测请求的步骤之前,还包括:B13. The method as described in B12, before the step of sending the security detection request to the mobile device from the computing device side to the mobile device side, further comprising:
在计算设备侧读取所述移动设备侧中所有已安装应用的安装包信息,所述安装包信息包括安装包标识;Reading installation package information of all installed applications on the mobile device side at the computing device side, where the installation package information includes an installation package identifier;
在计算设备侧判断所述安装包标识中不存在第三方应用安装包标识时,从服务器中获取所述第三方应用安装包的下载地址;When the computing device side judges that there is no third-party application installation package identification in the installation package identification, obtain the download address of the third-party application installation package from the server;
在计算设备侧依据所述第三方应用安装包的下载地址下载所述第三方应用安装包并发送至移动设备侧。The computing device side downloads the third-party application installation package according to the download address of the third-party application installation package and sends it to the mobile device side.
B14、如B12或13所述的方法,在所述计算设备侧向所述移动设备侧发出对移动设备的安全检测请求的步骤之前,还包括:B14. The method as described in B12 or 13, before the step of sending the security detection request to the mobile device from the computing device side to the mobile device side, further comprising:
建立所述移动设备与所述计算设备的SOCKET连接通道,所述计算设备通过所述连接通道发送安全检测请求、以及接收安全检测结果信息、以及发送执行指令。A SOCKET connection channel between the mobile device and the computing device is established, and the computing device sends a security detection request, receives security detection result information, and sends an execution instruction through the connection channel.
B15、如B12所述的方法,所述安全检测结果信息具有类型标识的信息,所述在计算设备侧依据所述安全检测结果信息生成对应的执行指令并发送至所述移动设备侧的步骤包括:B15. The method as described in B12, wherein the safety detection result information has type identification information, and the step of generating a corresponding execution instruction according to the safety detection result information on the computing device side and sending it to the mobile device side includes :
计算设备侧在预设映射表中查找所述类型标识对应的执行建议信息,所述预设映射表中存储有计算设备与移动设备预先约定的类型标识与执行建议信息的映射关系;The computing device side looks up the execution suggestion information corresponding to the type identifier in a preset mapping table, and the preset mapping table stores a mapping relationship between the type identifier and the execution suggestion information pre-agreed between the computing device and the mobile device;
在计算设备侧展示所述安全检测结果信息以及对应的执行建议信息;Displaying the security detection result information and corresponding execution suggestion information on the computing device side;
在计算设备侧接收用户对所述一个或多个执行建议信息的选定指令;receiving, at the computing device side, user selected instructions for the one or more implementation suggestion messages;
依据所述选定指令生成一个或多个执行建议信息对应的执行指令并发送至移动设备侧。One or more execution instructions corresponding to the execution suggestion information are generated according to the selected instruction and sent to the mobile device side.
B16、如B12所述的方法,所述指定检测对象包括针对移动设备的如下服务的一项或多项:移动设备挂马漏洞检测、检测是否开启云查杀、检测是否存在危险软件、检测是否更新过病毒库、检测安全服务是否开启、检测移动设备是否有山寨应用、检测移动设备上是否有恶意广告应用、主动防御功能开启检测。B16, the method as described in B12, the specified detection object includes one or more of the following services for mobile devices: mobile device hanging horse vulnerability detection, detection of whether to open cloud killing, detection of dangerous software, detection of whether The virus database has been updated, whether the security service is enabled, whether the mobile device has counterfeit applications, whether there are malicious advertising applications on the mobile device, and whether the active defense function has been enabled.
B17、如B12所述的方法,所述指定检测对象包括针对移动设备的如下服务的一项或多项:内存优化检测、检测是否存在后台软件、自动启动的软件检测、垃圾数据清理检测、清理缓存检测、清理应用卸载后存在的残留文件检测、安装包清理检测、大文件整理、隐私痕迹清理检测。B17, the method as described in B12, the specified detection object includes one or more of the following services for mobile devices: memory optimization detection, detection of background software, automatic startup software detection, garbage data cleaning detection, cleaning Cache detection, cleaning residual file detection after app uninstallation, installation package cleaning detection, large file organization, privacy trace cleaning detection.
B18、如B16或B17所述的方法,所述安全检测结果信息包括安全检测进度信息,相应地,所述执行指令包括停止指令、暂停指令、继续执行指令。B18. The method as described in B16 or B17, the safety detection result information includes safety detection progress information, and correspondingly, the execution instruction includes a stop instruction, a pause instruction, and a continue execution instruction.
B19、如B16所述的方法,所述安全检测结果信息包括安全检测结果,相应地,所述执行指令包括以下的一项或多项:移动设备挂马漏洞修复、开启云查杀、危险软件修复、病毒库更新、开启安全服务、山寨应用修复、恶意广告应用修复、开启主动防御功能。B19, the method as described in B16, the safety detection result information includes the safety detection result, and correspondingly, the execution instruction includes one or more of the following: mobile device hanging horse vulnerability repair, opening cloud scanning and killing, dangerous software Repair, update the virus database, enable security services, repair counterfeit applications, repair malicious advertising applications, and enable active defense functions.
B20、如B17所述的方法,所述安全检测结果信息包括安全检测结果,相应地,所述执行指令包括以下的一项或多项:内存优化、后台软件关闭、关闭自动启动的软件、垃圾数据清理、清理缓存、清理应用卸载后存在的残留文件、安装包清理、大文件整理、隐私痕迹清理。B20, the method as described in B17, the safety detection result information includes the safety detection result, and correspondingly, the execution instruction includes one or more of the following: memory optimization, background software closing, closing automatically started software, garbage Data cleaning, cache cleaning, residual files after app uninstallation, installation package cleaning, large file cleaning, and privacy trace cleaning.
本发明的实施例还公开了21、一种对设备进行安全检测的装置,包括:The embodiment of the present invention also discloses 21. A device for safety detection of equipment, comprising:
本发明的实施例还公开了C21、一种对设备进行安全检测的装置,包括:The embodiment of the present invention also discloses C21, a device for safety detection of equipment, including:
安全检测请求接收模块,适于在移动设备连接至计算设备时,在所述移动设备侧接收所述计算设备侧发出的对移动设备的安全检测请求,所述安全检测请求包括指定检测对象;The security detection request receiving module is adapted to receive, on the mobile device side, a security detection request for the mobile device sent by the computing device side when the mobile device is connected to the computing device, and the security detection request includes a designated detection object;
安全检测结果信息发送模块,适于在所述移动设备侧获取与所述指定检测对象对应的安全检测结果信息,并将所述安全检测结果信息发送至计算设备侧;The safety detection result information sending module is adapted to obtain the safety detection result information corresponding to the specified detection object on the mobile device side, and send the safety detection result information to the computing device side;
执行指令接收模块,适于在所述移动设备侧接收计算设备侧发送的执行指令,所述执行指令为计算设备依据所述安全检测结果信息生成;The execution command receiving module is adapted to receive the execution command sent by the computing device side at the mobile device side, the execution command is generated by the computing device according to the security detection result information;
执行指令执行模块,适于在所述移动设备侧执行所述执行指令。The execution instruction execution module is adapted to execute the execution instruction on the side of the mobile device.
C22、如C21所述的装置,还包括:C22. The device as described in C21, further comprising:
安装包接收模块,适于在所述移动设备侧接收所述计算设备侧发出的对移动设备的安全检测请求的之前,所述移动设备侧接收所述计算设备侧发送的第三方应用安装包,所述第三方应用安装包为所述计算设备侧在检测到所述移动设备侧没有安装第三方应用时,从服务器中下载得到;The installation package receiving module is adapted to receive the third-party application installation package sent by the computing device side before the mobile device side receives the security detection request for the mobile device sent by the computing device side, The third-party application installation package is downloaded from the server when the computing device side detects that no third-party application is installed on the mobile device side;
安装包安装模块,适于所述移动设备侧依据所述第三方应用安装包安装第三方应用。The installation package installation module is adapted to install a third-party application on the mobile device side according to the third-party application installation package.
C23、如C21或C22所述的装置,还包括:C23. The device as described in C21 or C22, further comprising:
通道建立模块,适于在所述移动设备侧接收所述计算设备侧发出的对移动设备的安全检测请求之前,建立所述移动设备与所述计算设备的 SOCKET连接通道,所述移动设备通过所述SOCKET连接通道接收安全检测请求、以及发送安全检测结果信息、以及接收执行指令。The channel establishment module is adapted to establish a SOCKET connection channel between the mobile device and the computing device before the mobile device side receives the security detection request for the mobile device sent by the computing device side, and the mobile device passes through the The SOCKET connection channel receives security testing requests, sends security testing result information, and receives execution instructions.
C24、如C22所述的装置,所述安全检测请求接收模块还适于:C24. The device as described in C22, the safety detection request receiving module is also suitable for:
在所述移动设备侧采用所述第三方应用接收所述计算设备侧发出的对移动设备的安全检测请求;Using the third-party application on the mobile device side to receive a security detection request for the mobile device sent by the computing device side;
所述安全检测结果信息发送模块还适于:The described safety detection result information sending module is also suitable for:
在所述移动设备侧采用所述第三方应用依据所述安全检测请求执行对指定检测对象的安全检测操作,获得安全检测结果信息;Using the third-party application on the mobile device side to perform a security testing operation on a designated testing object according to the security testing request, and obtain security testing result information;
由所述第三方应用将所述安全检测结果信息返回至所述计算设备侧;returning the security detection result information to the computing device side by the third-party application;
所述执行指令接收模块还适于:The execution instruction receiving module is also suitable for:
在所述移动设备侧采用所述第三方应用接收计算设备侧发送的执行指令;Using the third-party application on the mobile device side to receive the execution instruction sent by the computing device side;
所述执行指令执行模块还适于:The execution instruction execution module is also suitable for:
在所述移动设备侧采用所述第三方应用执行所述执行指令。The execution instruction is executed by using the third-party application on the mobile device side.
C25、如C22所述的装置,所述安全检测请求接收模块还适于:C25. The device as described in C22, the safety detection request receiving module is also suitable for:
在所述移动设备侧采用所述第一客户端程序接收所述计算设备侧发出的对移动设备的安全检测请求;Using the first client program on the mobile device side to receive a security detection request for the mobile device sent by the computing device side;
所述安全检测结果信息发送模块还适于:The described safety detection result information sending module is also suitable for:
在所述移动设备侧采用所述第一客户端程序将所述安全检测请求发送至所述第三方应用,由所述第三方医用依据所述安全检测请求执行对指定检测对象的安全检测操作,获得安全检测结果信息并返回第一客户端程序中;On the mobile device side, the first client program is used to send the safety detection request to the third-party application, and the third-party medical device performs a safety detection operation on a designated detection object according to the safety detection request, Obtain the security detection result information and return it to the first client program;
所述第一客户端程序将所述安全检测结果信息返回至所述计算设备侧;The first client program returns the security detection result information to the computing device side;
所述执行指令接收模块还适于:The execution instruction receiving module is also suitable for:
在所述移动设备侧采用所述第一客户端程序接收计算设备侧发送的执行指令;Using the first client program on the mobile device side to receive an execution instruction sent by the computing device side;
所述执行指令执行模块还适于:The execution instruction execution module is also suitable for:
在所述移动设备侧采用所述第一客户端程序将所述执行指令发送至第三方应用,由所述第三方应用执行所述执行指令。The first client program is used on the mobile device side to send the execution instruction to a third-party application, and the third-party application executes the execution instruction.
C26、如C25所述的装置,所述第一客户端程序将所述安全检测请求发送至所述第三方应用,具体为:C26. The device described in C25, wherein the first client program sends the security detection request to the third-party application, specifically:
所述第一客户端程序依据所述指定检测对象调用所述第三方应用的服务的接口,将所述安全检测请求发送至所述第三方应用。The first client program calls the service interface of the third-party application according to the specified detection object, and sends the security detection request to the third-party application.
C27、如C21所述的装置,所述指定检测对象包括针对移动设备的如下服务的一项或多项:移动设备挂马漏洞检测、检测是否开启云查杀、检测是否存在危险软件、检测是否更新过病毒库、检测安全服务是否开启、检测移动设备是否有山寨应用、检测移动设备上是否有恶意广告应用、主动防御功能开启检测。C27. The device as described in C21, the specified detection object includes one or more of the following services for mobile devices: mobile device hanging horse vulnerability detection, detection of whether cloud scanning and killing is enabled, detection of dangerous software, detection of whether The virus database has been updated, whether the security service is enabled, whether the mobile device has counterfeit applications, whether there are malicious advertising applications on the mobile device, and whether the active defense function has been enabled.
C28、如C21所述的装置,所述指定检测对象包括针对移动设备的如下服务的一项或多项:内存优化检测、检测是否存在后台软件、自动启动的软件检测、垃圾数据清理检测、清理缓存检测、清理应用卸载后存在的残留文件检测、安装包清理检测、大文件整理、隐私痕迹清理检测。C28. The device as described in C21, the specified detection object includes one or more of the following services for mobile devices: memory optimization detection, detection of background software, automatic startup software detection, garbage data cleaning detection, cleaning Cache detection, cleaning residual file detection after app uninstallation, installation package cleaning detection, large file organization, privacy trace cleaning detection.
C29、如C27或C28所述的装置,所述安全检测结果信息包括安全检测进度信息,相应地,所述执行指令包括停止指令、暂停指令、继续执行指令。C29. The device described in C27 or C28, wherein the safety detection result information includes safety detection progress information, and correspondingly, the execution instruction includes a stop instruction, a pause instruction, and a continue execution instruction.
C30、如C27所述的装置,所述安全检测结果信息包括安全检测结果,相应地,所述执行指令包括以下的一项或多项:移动设备挂马漏洞修复、开启云查杀、危险软件修复、病毒库更新、开启安全服务、山寨应用修复、恶意广告应用修复、开启主动防御功能。C30, the device as described in C27, the safety detection result information includes the safety detection result, and correspondingly, the execution instruction includes one or more of the following: mobile device hanging horse vulnerability repair, enabling cloud scanning and killing, dangerous software Repair, update the virus database, enable security services, repair counterfeit applications, repair malicious advertising applications, and enable active defense functions.
C31、如C28所述的装置,所述安全检测结果信息包括安全检测结果,相应地,所述执行指令包括以下的一项或多项:内存优化、后台软件关闭、关闭自动启动的软件、垃圾数据清理、清理缓存、清理应用卸载后存在的残留文件、安装包清理、大文件整理、隐私痕迹清理。C31. The device as described in C28, the safety detection result information includes the safety detection result, and correspondingly, the execution instruction includes one or more of the following: memory optimization, background software closing, closing automatically started software, garbage Data cleaning, cache cleaning, residual files after app uninstallation, installation package cleaning, large file cleaning, and privacy trace cleaning.
本发明的实施例还公开了D32、一种对设备进行安全检测的装置,包括:The embodiment of the present invention also discloses D32, a device for safety detection of equipment, including:
安全检测请求发送模块,适于在计算设备侧安全检测到有移动设备接入时,在计算设备侧向所述移动设备侧发出对移动设备的安全检测请求,所述安全检测请求包括指定检测对象;The security detection request sending module is adapted to send a security detection request to the mobile device from the computing device side to the mobile device side when the computing device side safely detects that there is a mobile device access, and the security detection request includes a specified detection object ;
安全检测结果信息接收模块,适于在所述计算设备侧接收所述移动设备侧返回的针对所述安全检测请求的安全检测结果信息,所述安全检测结果信息由所述移动设备侧依据所述指定检测对象获得;The safety inspection result information receiving module is adapted to receive, on the computing device side, the safety inspection result information for the safety inspection request returned by the mobile device, and the safety inspection result information is sent by the mobile device according to the Obtained by specifying the detection object;
执行指令发送模块,适于在计算设备侧依据所述安全检测结果信息生成对应的执行指令并发送至所述移动设备侧,由所述移动设备侧执行所述执行指令。The execution instruction sending module is adapted to generate a corresponding execution instruction according to the security detection result information on the computing device side and send it to the mobile device side, and the mobile device side executes the execution instruction.
D33、如D32所述的装置,还包括:D33. The device as described in D32, further comprising:
安装包信息获取模块,适于在所述计算设备侧向所述移动设备侧发出对移动设备的安全检测请求之前,在计算设备侧读取所述移动设备侧中所有已安装应用的安装包信息,所述安装包信息包括安装包标识;The installation package information acquisition module is adapted to read the installation package information of all installed applications on the mobile device side before the computing device side sends a security detection request to the mobile device side to the mobile device side , the installation package information includes an installation package identifier;
查找模块,适于在计算设备侧判断所述安装包标识中不存在第三方应用安装包标识时,从服务器中获取所述第三方应用安装包的下载地址;The search module is adapted to obtain the download address of the third-party application installation package from the server when the computing device side judges that there is no third-party application installation package identification in the installation package identification;
安装包发送模块,适于在计算设备侧依据所述第三方应用安装包的下载地址下载所述第三方应用安装包并发送至移动设备侧。The installation package sending module is adapted to download the third-party application installation package on the computing device side according to the download address of the third-party application installation package and send it to the mobile device side.
D34、如D32或D33所述的装置,还包括:D34. The device as described in D32 or D33, further comprising:
连接通道建立模块,适于在所述计算设备侧向所述移动设备侧发出对移动设备的安全检测请求之前,建立所述移动设备与所述计算设备的 SOCKET连接通道,所述计算设备通过所述连接通道发送安全检测请求、以及接收安全检测结果信息、以及发送执行指令。A connection channel establishment module, adapted to establish a SOCKET connection channel between the mobile device and the computing device before the computing device side sends a security detection request to the mobile device side, and the computing device passes the The above connection channel sends a security detection request, receives security detection result information, and sends an execution instruction.
D35、如D32所述的装置,所述安全检测结果信息具有类型标识的信息,所述执行指令发送模块还适于:D35. The device as described in D32, the safety detection result information has type identification information, and the execution instruction sending module is also suitable for:
计算设备侧在预设映射表中查找所述类型标识对应的执行建议信息,所述预设映射表中存储有计算设备与移动设备预先约定的类型标识与执行建议信息的映射关系;The computing device side looks up the execution suggestion information corresponding to the type identifier in a preset mapping table, and the preset mapping table stores a mapping relationship between the type identifier and the execution suggestion information pre-agreed between the computing device and the mobile device;
在计算设备侧展示所述安全检测结果信息以及对应的执行建议信息;Displaying the security detection result information and corresponding execution suggestion information on the computing device side;
在计算设备侧接收用户对所述一个或多个执行建议信息的选定指令;receiving, at the computing device side, user selected instructions for the one or more implementation suggestion messages;
依据所述选定指令生成一个或多个执行建议信息对应的执行指令并发送至移动设备侧。One or more execution instructions corresponding to the execution suggestion information are generated according to the selected instruction and sent to the mobile device side.
D36、如D32所述的装置,所述指定检测对象包括针对移动设备的如下服务的一项或多项:移动设备挂马漏洞检测、检测是否开启云查杀、检测是否存在危险软件、检测是否更新过病毒库、检测安全服务是否开启、检测移动设备是否有山寨应用、检测移动设备上是否有恶意广告应用、主动防御功能开启检测。D36. The device as described in D32, the specified detection object includes one or more of the following services for mobile devices: mobile device hanging horse vulnerability detection, detection of whether cloud scanning and killing is enabled, detection of dangerous software, detection of whether The virus database has been updated, whether the security service is enabled, whether the mobile device has counterfeit applications, whether there are malicious advertising applications on the mobile device, and whether the active defense function has been enabled.
D37、如D32所述的装置,所述指定检测对象包括针对移动设备的如下服务的一项或多项:内存优化检测、检测是否存在后台软件、自动启动的软件检测、垃圾数据清理检测、清理缓存检测、清理应用卸载后存在的残留文件检测、安装包清理检测、大文件整理、隐私痕迹清理检测。D37. The device as described in D32, the specified detection object includes one or more of the following services for mobile devices: memory optimization detection, detection of background software, automatic startup software detection, junk data cleaning detection, cleaning Cache detection, cleaning residual file detection after app uninstallation, installation package cleaning detection, large file organization, privacy trace cleaning detection.
D38、如D36或D37所述的装置,所述安全检测结果信息包括安全检测进度信息,相应地,所述执行指令包括停止指令、暂停指令、继续执行指令。D38. The device as described in D36 or D37, wherein the safety inspection result information includes safety inspection progress information, and correspondingly, the execution instruction includes a stop instruction, a pause instruction, and a continue execution instruction.
D39、如D36所述的装置,所述安全检测结果信息包括安全检测结果,相应地,所述执行指令包括以下的一项或多项:移动设备挂马漏洞修复、开启云查杀、危险软件修复、病毒库更新、开启安全服务、山寨应用修复、恶意广告应用修复、开启主动防御功能。D39. The device as described in D36, the safety detection result information includes the safety detection result, and correspondingly, the execution instruction includes one or more of the following: mobile device hanging horse vulnerability repair, enabling cloud scanning and killing, dangerous software Repair, update the virus database, enable security services, repair counterfeit applications, repair malicious advertising applications, and enable active defense functions.
D40、如D37所述的装置,所述安全检测结果信息包括安全检测结果,相应地,所述执行指令包括以下的一项或多项:内存优化、后台软件关闭、关闭自动启动的软件、垃圾数据清理、清理缓存、清理应用卸载后存在的残留文件、安装包清理、大文件整理、隐私痕迹清理。D40. The device as described in D37, the safety detection result information includes the safety detection result, and correspondingly, the execution instruction includes one or more of the following: memory optimization, background software closing, closing automatically started software, garbage Data cleaning, cache cleaning, residual files after app uninstallation, installation package cleaning, large file cleaning, and privacy trace cleaning.
Claims (34)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310632733.2A CN103632096B (en) | 2013-11-29 | 2013-11-29 | A kind of method and apparatus that safety detection is carried out to equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310632733.2A CN103632096B (en) | 2013-11-29 | 2013-11-29 | A kind of method and apparatus that safety detection is carried out to equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103632096A CN103632096A (en) | 2014-03-12 |
CN103632096B true CN103632096B (en) | 2018-01-16 |
Family
ID=50213132
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310632733.2A Expired - Fee Related CN103632096B (en) | 2013-11-29 | 2013-11-29 | A kind of method and apparatus that safety detection is carried out to equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103632096B (en) |
Families Citing this family (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103944802B (en) * | 2014-04-17 | 2017-07-04 | 新华三技术有限公司 | Control mobile device uses the method and device of exchange mailbox |
CN104050417B (en) * | 2014-07-04 | 2018-03-27 | 北京奇虎科技有限公司 | A kind of method and device detected in mobile terminal to application state |
CN104199682A (en) * | 2014-08-04 | 2014-12-10 | 联想(北京)有限公司 | Information processing method and electronic equipment |
CN104360884A (en) * | 2014-11-18 | 2015-02-18 | 久邦计算机技术(广州)有限公司 | Plug-in resource packet loading method based on Android system |
CN104484484B (en) * | 2015-01-08 | 2018-05-01 | 北京奇虎科技有限公司 | Clear up the method and device of cache file |
CN104809394B (en) * | 2015-04-08 | 2017-04-05 | 北京奇虎科技有限公司 | The method of checking and killing virus, device and terminal |
CN105224397A (en) * | 2015-10-30 | 2016-01-06 | 中国民生银行股份有限公司 | Intelligence POS management method and device |
CN105589723A (en) * | 2015-12-22 | 2016-05-18 | 广州三星通信技术研究有限公司 | Method for installing application in electronic terminal, and electronic terminal |
CN105678161A (en) * | 2015-12-23 | 2016-06-15 | 北京奇虎科技有限公司 | Installation monitoring method and apparatus of applications |
CN107086978B (en) * | 2016-02-15 | 2019-12-10 | 中国移动通信集团福建有限公司 | Method and device for identifying Trojan horse virus |
CN106027575A (en) * | 2016-08-01 | 2016-10-12 | 湖南润安危物联科技发展有限公司 | Client and security check device and method |
CN107102885A (en) * | 2017-04-14 | 2017-08-29 | 北京洋浦伟业科技发展有限公司 | The method and device of Android simulator is detected using ADB modes |
CN107301346A (en) * | 2017-05-23 | 2017-10-27 | 成都联宇云安科技有限公司 | One kind realizes Android device APP fast and safely detection methods using white list mechanism |
CN108093416B (en) * | 2017-11-30 | 2021-09-21 | 厦门市美亚柏科信息股份有限公司 | Mobile APP push data acquisition method and terminal |
CN110287087B (en) * | 2018-03-19 | 2023-06-13 | 百度在线网络技术(北京)有限公司 | Method and device for detecting application |
CN109861979B (en) * | 2018-12-28 | 2021-08-10 | 努比亚技术有限公司 | Program processing method, electronic device, and computer-readable storage medium |
CN110058871A (en) * | 2019-04-23 | 2019-07-26 | 湖南快乐阳光互动娱乐传媒有限公司 | Method and system for detecting illegal decompilation of program and updating formal version |
CN110727945B (en) * | 2019-09-20 | 2021-10-22 | 上海连尚网络科技有限公司 | Virus scanning method, device and computer readable medium |
CN111666153B (en) * | 2020-05-25 | 2024-07-05 | 深圳Tcl新技术有限公司 | Cache task management method, terminal device and storage medium |
CN114024697A (en) * | 2020-07-16 | 2022-02-08 | 青岛海尔工业智能研究院有限公司 | Security control method, device, system, electronic device, and storage medium |
CN112269993A (en) * | 2020-11-02 | 2021-01-26 | 商丘经济贸易学校 | Method for protecting computer system safety |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1862508A (en) * | 2005-05-13 | 2006-11-15 | 中兴通讯股份有限公司 | Automatic testing system of person digital aid cell phone function and method thereof |
CN102255676A (en) * | 2010-05-19 | 2011-11-23 | 广东新支点技术服务有限公司 | Automatic end-user oriented testing method for mobile phone |
CN102708048A (en) * | 2012-04-21 | 2012-10-03 | 北京迈凯互动网络科技有限公司 | Method and system for testing mobile application |
CN102752457A (en) * | 2012-07-19 | 2012-10-24 | 腾讯科技(深圳)有限公司 | Method and system for installing applications |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI322350B (en) * | 2006-12-15 | 2010-03-21 | Inst Information Industry | Test device, method, application program, and computer readable medium for deriving a qualified test case plan from a test case database |
-
2013
- 2013-11-29 CN CN201310632733.2A patent/CN103632096B/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1862508A (en) * | 2005-05-13 | 2006-11-15 | 中兴通讯股份有限公司 | Automatic testing system of person digital aid cell phone function and method thereof |
CN102255676A (en) * | 2010-05-19 | 2011-11-23 | 广东新支点技术服务有限公司 | Automatic end-user oriented testing method for mobile phone |
CN102708048A (en) * | 2012-04-21 | 2012-10-03 | 北京迈凯互动网络科技有限公司 | Method and system for testing mobile application |
CN102752457A (en) * | 2012-07-19 | 2012-10-24 | 腾讯科技(深圳)有限公司 | Method and system for installing applications |
Non-Patent Citations (1)
Title |
---|
Android平台远程终端控制系统的研究与设计;黄兴;《中国优秀硕士学位论文全文数据库 信息科技辑》;20131115(第11期);I136-891 * |
Also Published As
Publication number | Publication date |
---|---|
CN103632096A (en) | 2014-03-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103632096B (en) | A kind of method and apparatus that safety detection is carried out to equipment | |
US11336458B2 (en) | Evaluating authenticity of applications based on assessing user device context for increased security | |
US11620383B2 (en) | Dynamic analysis techniques for applications | |
US11210390B1 (en) | Multi-version application support and registration within a single operating system environment | |
US11604878B2 (en) | Dynamic analysis techniques for applications | |
CN103279706B (en) | Intercept the method and apparatus installing Android application program in the terminal | |
US10198574B1 (en) | System and method for analysis of a memory dump associated with a potentially malicious content suspect | |
Rastogi et al. | Are these Ads Safe: Detecting Hidden Attacks through the Mobile App-Web Interfaces. | |
Xing et al. | Upgrading your android, elevating my malware: Privilege escalation through mobile os updating | |
US9596257B2 (en) | Detection and prevention of installation of malicious mobile applications | |
CN104517054B (en) | Method, device, client and server for detecting malicious APK | |
CN102882875B (en) | Active defense method and device | |
US8966632B1 (en) | In-the-cloud sandbox for inspecting mobile applications for malicious content | |
CN104318160B (en) | The method and apparatus of killing rogue program | |
CN104462968B (en) | Scanning method, device and system for malicious applications | |
CN104462971B (en) | The method and apparatus that malicious application is recognized according to application program stated features | |
CN104317599A (en) | Method and device for detecting whether installation package is packaged repeatedly or not | |
CN103793649A (en) | Method and device for cloud-based safety scanning of files | |
CN105095758B (en) | Screen locking applied program processing method, device and mobile terminal | |
CN103559447A (en) | Detection method, detection device and detection system based on virus sample characteristics | |
CN104239798B (en) | Mobile terminal, server end in mobile office system and its virus method and system | |
CN102857519B (en) | Active defensive system | |
CN104484598A (en) | Method and device for protecting safety of intelligent terminal | |
CN105791250A (en) | App detection method and device | |
CN105095754A (en) | Method, device and mobile terminal for processing virus applications |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20180116 Termination date: 20211129 |
|
CF01 | Termination of patent right due to non-payment of annual fee |