[go: up one dir, main page]

CN107766723A - Suppress method, apparatus, equipment and the readable storage medium storing program for executing of malicious application installation - Google Patents

Suppress method, apparatus, equipment and the readable storage medium storing program for executing of malicious application installation Download PDF

Info

Publication number
CN107766723A
CN107766723A CN201711172944.7A CN201711172944A CN107766723A CN 107766723 A CN107766723 A CN 107766723A CN 201711172944 A CN201711172944 A CN 201711172944A CN 107766723 A CN107766723 A CN 107766723A
Authority
CN
China
Prior art keywords
malicious application
terminal
installation
application
cloud storehouse
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201711172944.7A
Other languages
Chinese (zh)
Inventor
周燕红
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201711172944.7A priority Critical patent/CN107766723A/en
Publication of CN107766723A publication Critical patent/CN107766723A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the present invention is by judging whether terminal cloud storehouse is stored with the information of the malicious application to be installed, if so, then refusal installation;If it is not, then judge whether the malicious application to be installed is potential malicious application, if so, then refusal installation;If it is not, then allow to install.The present invention establishes the cloud storehouse for the information for being stored with malicious application, and downloads the cloud storehouse to the terminal, while real-time update cloud storehouse.And when the information for not having to store malicious application in cloud storehouse, potential malicious application when then needing to further determine whether, and, it is necessary to all applications being currently running of shield terminal when installing the application, monitor whether it has the anticipatory behavior of malicious application, can just decide whether to terminate installation.The present invention can realize the effect for suppressing malicious application installation, provide the user a good terminal operating environment.

Description

Suppress method, apparatus, equipment and the readable storage medium storing program for executing of malicious application installation
Technical field
The present embodiments relate to field of terminal technology, more particularly to a kind of method, apparatus for suppressing malicious application installation, Equipment and readable storage medium storing program for executing.
Background technology
With the fast development of intelligent terminal, the security of terminal applies installation is increasingly taken seriously.Such as intelligent hand The a series of terminal payment functions such as machine has converged Alipay, wechat is paid, Jingdone district is paid, and when user's imprudence is mounted with to dislike Meaning application, serious meeting cause malicious application to destroy payment environment, cause the property loss of user.And now it is various should Downloaded with user is attract, how to avoid the installation of malicious application is primarily to solve the problems, such as.
Suppress the installation of malicious application at present, be typically employed in one database of terminal downloads, such as Tengxun's application treasured, user The selection application from database is needed to download, although ensure that safety, the application of database purchase is limited, it is impossible to meets user To the demand of application, and need to download different databases.For example, user wants to download an application but not applied in Tengxun In treasured, in 360 applications are precious, at this moment just need to download two applications it is precious could meet demands, and when the application that user downloads is mended In Tengxun, application is precious, does not also need solve the problems, such as that the application that user downloads is not malicious application then when during 360 applications are precious.
The content of the invention
The present invention provides a kind of method for suppressing malicious application installation, to realize user security installing terminal application, for eventually Make the running environment of a safety in end.
In a first aspect, the embodiments of the invention provide a kind of method for suppressing malicious application installation, including:
Judge whether terminal cloud storehouse is stored with the information of the malicious application to be installed, if so, then refusal installation;
If it is not, then judge whether the malicious application to be installed is potential malicious application, if so, then refusal installation; If it is not, then allow to install.
Further, it is described to judge whether terminal cloud storehouse is stored with the information of the malicious application to be installed, if so, then refusing Also include before installation:
Establish the cloud storehouse for the information for being stored with malicious application;
The cloud storehouse is downloaded to the terminal;
Cloud storehouse described in real-time update.
Further, it is described to judge whether the malicious application to be installed is potential malicious application, including:
All applications being currently running of shield terminal;
The malicious application to be installed;
Monitor the behavior of the malicious application to be installed;
Determine whether the behavior is corresponding with the anticipatory behavior of the malicious application.
Further, after whether the determination behavior is corresponding with the anticipatory behavior of the malicious application, also wrap Include:
Intercept the specified communication between the malicious application and terminal.
The anticipatory behavior of the malicious application, including:
Attempt collection terminal information;
Attempt to tamper with the terminal applies;
Frequent pop-up malice advertisement and illegal link.
Second aspect, the embodiment of the present invention additionally provide a kind of device for suppressing malicious application installation, including:
Cloud storehouse signal judgement module, for judging whether terminal cloud storehouse is stored with the information of the malicious application to be installed, if It is, then refusal installation;
Potential malicious application judge module, if not storing the information of the malicious application to be installed for terminal cloud storehouse When, then judge whether the malicious application to be installed is potential malicious application, if so, then refusal installation;If it is not, then allow Installation.
Further, before the terminal cloud storehouse judge module, in addition to:
Yun Ku establishes module, for establishing the cloud storehouse for the information for being stored with malicious application;
Download module, for downloading the cloud storehouse to the terminal;
Update module, for cloud storehouse described in real-time update.
Further, the potential malicious application judge module, including:
Submodule is shielded, for all applications being currently running of shield terminal;
Submodule is installed, for the malicious application to be installed;
Submodule is monitored, for monitoring the behavior of the malicious application to be installed;
Determination sub-module, for determining whether the behavior is corresponding with the anticipatory behavior of the malicious application.
Further, after the determination sub-module, in addition to:
Blocking module, for intercepting specified communication of the malicious application between terminal;
Further, the anticipatory behavior of the malicious application, including:
Attempt collection terminal information;
Attempt to tamper with the terminal applies;
Frequent pop-up malice advertisement and illegal link.
The third aspect, the embodiment of the present invention additionally provide a kind of computer equipment, including memory, processor and are stored in Realize that the present invention such as appoints on memory and the computer program that can run on a processor, during the computing device described program The method of suppression malicious application installation described in embodiment of anticipating.
Fourth aspect, the embodiment of the present invention additionally provide a kind of computer-readable recording medium, are stored thereon with computer Program, the method that the suppression malicious application installation as described in any embodiment of the present invention is realized when the program is executed by processor.
The embodiment of the present invention is by judging whether terminal cloud storehouse is stored with the information of the malicious application to be installed, if so, then Refusal installation;If it is not, then judge whether the malicious application to be installed is potential malicious application, if so, then refusal installation; If it is not, then allow to install.The present invention establishes the cloud storehouse for the information for being stored with malicious application, and downloads the cloud storehouse to the end End, while real-time update cloud storehouse.And when the information for not having to store malicious application in cloud storehouse, then when needing to further determine whether Potential malicious application, and, it is necessary to which all applications being currently running of shield terminal, monitor whether it has malice when installing the application The anticipatory behavior of application, it can just decide whether to terminate installation.The present invention can realize suppress malicious application installation effect, for Family provides a good terminal operating environment.
Brief description of the drawings
Fig. 1 is a kind of flow chart of the method for suppression malicious application installation that the embodiment of the present invention one provides;
Fig. 2 is a kind of flow chart of the method for suppression malicious application installation that the embodiment of the present invention two provides;
Fig. 3 is a kind of structural representation of the device for suppression malicious application installation that the embodiment of the present invention three provides;
Fig. 4 is a kind of structural representation for equipment that the embodiment of the present invention four provides.
Embodiment
The present invention is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched The specific embodiment stated is used only for explaining the present invention, rather than limitation of the invention.It also should be noted that in order to just Part related to the present invention rather than full content are illustrate only in description, accompanying drawing.
It should be mentioned that some exemplary embodiments are described as before exemplary embodiment is discussed in greater detail The processing described as flow chart or method.Although operations (or step) are described as the processing of order by flow chart, Many of which operation can be implemented concurrently, concomitantly or simultaneously.In addition, the order of operations can be pacified again Row.The processing can be terminated when its operations are completed, it is also possible to the additional step being not included in accompanying drawing.Institute State processing and can correspond to method, function, code, subroutine, subprogram etc..
Embodiment one
Fig. 1 be the embodiment of the present invention one provide a kind of suppression malicious application installation method flow chart, the present embodiment It is applicable to suppress malicious application the situation of installation, this method can be performed by device that suppression malicious application is installed, should Device can be realized by the mode of software and/or hardware, and can typically be integrated in computer equipment.As shown in figure 1, this implementation The method of example specifically comprises the following steps:
Step 110, judge whether terminal cloud storehouse is stored with the information of the malicious application to be installed, if so, then refusal installation;
Wherein, malicious application is that user is not desired to install and is forced the application of installation, when user triggers the correlation of malicious application Link and cause using installation, as user wants to download a software, point opens the download link of the software, and when installation It was found that the binding installation for the application for being not desired to installation in the link be present, or user's point is opened a link and is mounted with automatically Situation for the malicious application that the link includes etc..Yun Ku is a kind of virtual database, can store substantial amounts of information, has peace The characteristics of full stabilization, mass memory.The information of the malicious application to be installed is stored using cloud storehouse, is intended to when existing in cloud storehouse During the information of the malicious application of installation, then refusal installation, so as to avoid the installation of malicious application.
It is understood that the application that user is not desired to install still safety can also be stored in cloud storehouse, herein, malice is answered With being interpreted as artificially being not desired to the situation that installation is but forced binding installation and/or malicious application is installed automatically.The evil stored in Yun Ku Meaning application, when user wants installation, the application can be found in Yun Kuzhong and installed.
Step 120, if it is not, then judging whether the malicious application to be installed is potential malicious application, if so, then refusing Installation absolutely;If it is not, then allow to install.
Wherein, when the information of the malicious application to be installed is not present in cloud storehouse, then need to determine whether that the malice should With whether being potential malicious application.Generally, potential malicious application only can be just judged it in the process of running, and And potential malicious application may impact or steal in the process of running end message to other application.Therefore, if should Malicious application is potential malicious application, then refusal installation, i.e., terminates installation immediately during malicious application is run, no Then, then continue to install.
The embodiment of the present invention is by judging whether terminal cloud storehouse is stored with the information of the malicious application to be installed, if so, then Refusal installation;If it is not, then judge whether the malicious application to be installed is potential malicious application, if so, then refusal installation; If it is not, then allow to install.The present invention establishes the cloud storehouse for the information for being stored with malicious application, and downloads the cloud storehouse to the end End, while real-time update cloud storehouse.And when the information for not having to store malicious application in cloud storehouse, then when needing to further determine whether Potential malicious application, and, it is necessary to which all applications being currently running of shield terminal, monitor whether it has malice when installing the application The anticipatory behavior of application, it can just decide whether to terminate installation.The present invention can realize suppress malicious application installation effect, for Family provides a good terminal operating environment.
It is described to judge whether the malicious application to be installed is that potential malice on the basis of above-mentioned technical proposal With, including:
All applications being currently running of shield terminal;
The malicious application to be installed;
Monitor the behavior of the malicious application to be installed;
Determine whether the behavior is corresponding with the anticipatory behavior of the malicious application.
Wherein, potential application such as steals end message, distorts end in the process of running there may be the operation behavior of malice End application etc., therefore, it is necessary to mask all applications being currently running of terminal before the malicious application to be installed, bag The application in running background is included, establishes screen layer, by intercepting the communication between malicious application and terminal applies, terminal is owned Using shielding, the invasion of malicious application to be installed is avoided.
The behavior of the malicious application to be installed is monitored, is to monitor the behavior of malicious application in the process of running, judges its row Whether to have the anticipatory behavior of malicious application, the anticipatory behavior of malicious application includes:Attempt collection terminal information;Attempt to tamper with institute State terminal applies;Frequent pop-up malice advertisement and illegal link.
After whether the determination behavior is corresponding with the anticipatory behavior of the malicious application, in addition to:
Intercept the specified communication between the malicious application and terminal.
Embodiment two
Fig. 2 be the embodiment of the present invention two provide a kind of suppression malicious application installation method flow chart, the present embodiment It is optimized based on above-described embodiment, as shown in Fig. 2 the method for the present embodiment specifically comprises the following steps:
Step 210, foundation are stored with the cloud storehouse of the information of malicious application.
Yun Ku's prevents the important method that malicious application is installed when establishing, the cloud library storage relevant information of malicious application, In order to reduce the internal memory in cloud storehouse, the information can be illegal link or title, the application installation package of malicious application of malicious application Title and application link etc..In order to avoid the maloperation in user of malicious application information, such as open careless when and dislike Meaning application by the malicious application information in cloud storehouse, it is necessary to carry out storage setting, for example, it is black to establish malicious application in cloud storehouse List file, the information of malicious application is stored in the blacklist file, only when user need this reappraise or Blacklist file can be just put out when the malicious application is installed, malicious application therein is selected.Setting to cloud storehouse More like the process that virus is identified similar to antivirus software.Yun Ku not only has the invalid informations such as the virus in identification malicious application concurrently Function, with more storage user be forced binding installation application message function.
Step 220, the cloud storehouse is downloaded to the terminal.
Yun Ku is needed to be installed to terminal, and when malicious application will be installed to terminal, itself and Yun Kuzhong information are carried out Matching, if the match is successful, it is malicious application to illustrate the application.
Cloud storehouse described in step 230, real-time update.
Wherein, the renewal of malicious application is frequent, and therefore, Yun Ku also wants real-time update.
Step 240, judge whether terminal cloud storehouse is stored with the information of the malicious application to be installed, if so, then refusal installation;
Step 250, if it is not, then judging whether the malicious application to be installed is potential malicious application, if so, then refusing Installation absolutely;If it is not, then allow to install.
The embodiment of the present invention is by judging whether terminal cloud storehouse is stored with the information of the malicious application to be installed, if so, then Refusal installation;If it is not, then judge whether the malicious application to be installed is potential malicious application, if so, then refusal installation; If it is not, then allow to install.The present invention establishes the cloud storehouse for the information for being stored with malicious application, and downloads the cloud storehouse to the end End, while real-time update cloud storehouse.And when the information for not having to store malicious application in cloud storehouse, then when needing to further determine whether Potential malicious application, and, it is necessary to which all applications being currently running of shield terminal, monitor whether it has malice when installing the application The anticipatory behavior of application, it can just decide whether to terminate installation.The present invention can realize suppress malicious application installation effect, for Family provides a good terminal operating environment.
Embodiment three
Fig. 3 be the embodiment of the present invention three provide a kind of suppression malicious application installation device structural representation, such as Fig. 3 Shown, the device includes cloud storehouse signal judgement module 310 and potential malicious application judge module 320, wherein:
Cloud storehouse signal judgement module 310, for judging whether terminal cloud storehouse is stored with the information of the malicious application to be installed, If so, then refusal installation;
Potential malicious application judge module 320, if not storing the letter of the malicious application to be installed for terminal cloud storehouse During breath, then judge whether the malicious application to be installed is potential malicious application, if so, then refusal installation;If it is not, then permit Perhaps install.
The embodiment of the present invention is by judging whether terminal cloud storehouse is stored with the information of the malicious application to be installed, if so, then Refusal installation;If it is not, then judge whether the malicious application to be installed is potential malicious application, if so, then refusal installation; If it is not, then allow to install.The present invention establishes the cloud storehouse for the information for being stored with malicious application, and downloads the cloud storehouse to the end End, while real-time update cloud storehouse.And when the information for not having to store malicious application in cloud storehouse, then when needing to further determine whether Potential malicious application, and, it is necessary to which all applications being currently running of shield terminal, monitor whether it has malice when installing the application The anticipatory behavior of application, it can just decide whether to terminate installation.The present invention can realize suppress malicious application installation effect, for Family provides a good terminal operating environment.
Before the terminal cloud storehouse judge module, in addition to:
Yun Ku establishes module, for establishing the cloud storehouse for the information for being stored with malicious application;
Download module, for downloading the cloud storehouse to the terminal;
Update module, for cloud storehouse described in real-time update.
The potential malicious application judge module, including:
Submodule is shielded, for all applications being currently running of shield terminal;
Submodule is installed, for the malicious application to be installed;
Submodule is monitored, for monitoring the behavior of the malicious application to be installed;
Determination sub-module, for determining whether the behavior is corresponding with the anticipatory behavior of the malicious application;
After the determination sub-module, in addition to:
Blocking module, for intercepting specified communication of the malicious application between terminal;
The anticipatory behavior of the malicious application, including:
Attempt collection terminal information;
Attempt to tamper with the terminal applies;
Frequent pop-up malice advertisement and illegal link.
The device for the suppression malicious application installation that the embodiment of the present invention is provided can perform any embodiment of the present invention and be carried The method of the suppression malicious application installation of confession, possesses the corresponding functional module of execution method and beneficial effect.
Example IV
Fig. 4 is a kind of structural representation for equipment that the embodiment of the present invention four provides, as shown in figure 4, the equipment includes place Manage device 40, memory 41, input unit 42 and output device 43;The quantity of processor 40 can be one or more in equipment, In Fig. 4 by taking a processor 40 as an example;Processor 40, memory 41, input unit 42 and output device 43 in equipment can be with Connected by bus or other modes, in Fig. 4 exemplified by being connected by bus.
Memory 41 is used as a kind of computer-readable recording medium, and journey is can perform available for storage software program, computer Sequence and module, as in the embodiment of the present invention suppression malicious application install method corresponding to programmed instruction/module (for example, Cloud storehouse signal judgement module 310 and potential malicious application judge module 320).Processor 40 is stored in memory 41 by operation In software program, instruction and module, so as to perform the various function application of equipment and data processing, that is, realize above-mentioned Suppress the method for malicious application installation.
Memory 41 can mainly include storing program area and storage data field, wherein, storing program area can store operation system Application program needed for system, at least one function;Storage data field can store uses created data etc. according to terminal.This Outside, memory 41 can include high-speed random access memory, can also include nonvolatile memory, for example, at least a magnetic Disk storage device, flush memory device or other non-volatile solid state memory parts.In some instances, memory 41 can be further Including network connection to equipment can be passed through relative to the remotely located memory of processor 40, these remote memories.It is above-mentioned The example of network includes but is not limited to internet, intranet, LAN, mobile radio communication and combinations thereof.
Input unit 42 can be used for the numeral or character information for receiving input, and produce set with the user of equipment and The relevant key signals input of function control.Output device 43 may include the display devices such as display screen.
Embodiment five
The embodiment of the present invention five also provides a kind of storage medium for including computer executable instructions, and the computer can be held Row instruction by computer processor when being performed for performing a kind of associative operation for the method for suppressing malicious application installation.
By the description above with respect to embodiment, it is apparent to those skilled in the art that, the present invention It can be realized by software and required common hardware, naturally it is also possible to realized by hardware, but the former is more in many cases Good embodiment.Based on such understanding, what technical scheme substantially contributed to prior art in other words Part can be embodied in the form of software product, and the computer software product can be stored in computer-readable recording medium In, floppy disk, read-only storage (Read-Only Memory, ROM), random access memory (Random such as computer Access Memory, RAM), flash memory (FLASH), hard disk or CD etc., including some instructions are causing a computer to set Standby (can be personal computer, server, or network equipment etc.) performs the method described in each embodiment of the present invention.
It is worth noting that, in the embodiment of above-mentioned suppression malicious application installation, included unit and module are only Divided according to function logic, but be not limited to above-mentioned division, as long as corresponding function can be realized;Separately Outside, the specific name of each functional unit is also only to facilitate mutually distinguish, the protection domain being not intended to limit the invention.
Pay attention to, above are only presently preferred embodiments of the present invention and institute's application technology principle.It will be appreciated by those skilled in the art that The invention is not restricted to specific embodiment described here, can carry out for a person skilled in the art various obvious changes, Readjust and substitute without departing from protection scope of the present invention.Therefore, although being carried out by above example to the present invention It is described in further detail, but the present invention is not limited only to above example, without departing from the inventive concept, also Other more equivalent embodiments can be included, and the scope of the present invention is determined by scope of the appended claims.

Claims (10)

  1. A kind of 1. method for suppressing malicious application installation, it is characterised in that including:
    Judge whether terminal cloud storehouse is stored with the information of the malicious application to be installed, if so, then refusal installation;
    If it is not, then judge whether the malicious application to be installed is potential malicious application, if so, then refusal installation;If it is not, Then allow to install.
  2. 2. according to the method for claim 1, it is characterised in that described to judge whether terminal cloud storehouse is stored with the evil to be installed The information of meaning application, if so, then also including before refusal installation:
    Establish the cloud storehouse for the information for being stored with malicious application;
    The cloud storehouse is downloaded to the terminal;
    Cloud storehouse described in real-time update.
  3. 3. according to the method for claim 1, it is characterised in that described to judge whether the malicious application to be installed is latent Malicious application, including:
    All applications being currently running of shield terminal;
    The malicious application to be installed;
    Monitor the behavior of the malicious application to be installed;
    Determine whether the behavior is corresponding with the anticipatory behavior of the malicious application.
  4. 4. according to the method for claim 3, it is characterised in that it is described determine the behavior whether with the malicious application After anticipatory behavior is corresponding, in addition to:
    Intercept the specified communication between the malicious application and terminal.
  5. 5. according to the method for claim 3, it is characterised in that the anticipatory behavior of the malicious application, including:
    Attempt collection terminal information;
    Attempt to tamper with the terminal applies;
    Frequent pop-up malice advertisement and illegal link.
  6. A kind of 6. device for suppressing malicious application installation, it is characterised in that including:
    Cloud storehouse signal judgement module, for judging whether terminal cloud storehouse is stored with the information of the malicious application to be installed, if so, then Refusal installation;
    Potential malicious application judge module, if do not store the information of the malicious application to be installed for terminal cloud storehouse, Judge whether the malicious application to be installed is potential malicious application, if so, then refusal installation;If it is not, then allow to install.
  7. 7. device according to claim 6, it is characterised in that before the terminal cloud storehouse judge module, in addition to:
    Yun Ku establishes module, for establishing the cloud storehouse for the information for being stored with malicious application;
    Download module, for downloading the cloud storehouse to the terminal;
    Update module, for cloud storehouse described in real-time update.
  8. 8. device according to claim 6, it is characterised in that the potential malicious application judge module, including:
    Submodule is shielded, for all applications being currently running of shield terminal;
    Submodule is installed, for the malicious application to be installed;
    Submodule is monitored, for monitoring the behavior of the malicious application to be installed;
    Determination sub-module, for determining whether the behavior is corresponding with the anticipatory behavior of the malicious application;
    After the determination sub-module, in addition to:
    Blocking module, for intercepting specified communication of the malicious application between terminal;
    The anticipatory behavior of the malicious application, including:
    Attempt collection terminal information;
    Attempt to tamper with the terminal applies;
    Frequent pop-up malice advertisement and illegal link.
  9. 9. a kind of computer equipment, including memory, processor and storage are on a memory and the meter that can run on a processor Calculation machine program, it is characterised in that the suppression as described in any in claim 1-5 is realized during the computing device described program The method of malicious application installation.
  10. 10. a kind of computer-readable recording medium, is stored thereon with computer program, it is characterised in that the program is by processor The method that the suppression malicious application installation as described in any in claim 1-5 is realized during execution.
CN201711172944.7A 2017-11-22 2017-11-22 Suppress method, apparatus, equipment and the readable storage medium storing program for executing of malicious application installation Withdrawn CN107766723A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711172944.7A CN107766723A (en) 2017-11-22 2017-11-22 Suppress method, apparatus, equipment and the readable storage medium storing program for executing of malicious application installation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711172944.7A CN107766723A (en) 2017-11-22 2017-11-22 Suppress method, apparatus, equipment and the readable storage medium storing program for executing of malicious application installation

Publications (1)

Publication Number Publication Date
CN107766723A true CN107766723A (en) 2018-03-06

Family

ID=61280170

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711172944.7A Withdrawn CN107766723A (en) 2017-11-22 2017-11-22 Suppress method, apparatus, equipment and the readable storage medium storing program for executing of malicious application installation

Country Status (1)

Country Link
CN (1) CN107766723A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110008687A (en) * 2019-02-19 2019-07-12 阿里巴巴集团控股有限公司 The processing method and processing device of risk application
CN110351720A (en) * 2019-07-23 2019-10-18 深圳传音控股股份有限公司 Using installation based reminding method, device, mobile terminal and readable storage medium storing program for executing

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103679016A (en) * 2012-09-04 2014-03-26 珠海市君天电子科技有限公司 Method and system for processing malicious programs of mobile phone
CN103679029A (en) * 2013-12-11 2014-03-26 北京奇虎科技有限公司 Method and device for repairing cheap-copy application programs
US20170068815A1 (en) * 2014-07-14 2017-03-09 Palo Alto Networks, Inc. Detection of malware using an instrumented virtual machine environment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103679016A (en) * 2012-09-04 2014-03-26 珠海市君天电子科技有限公司 Method and system for processing malicious programs of mobile phone
CN103679029A (en) * 2013-12-11 2014-03-26 北京奇虎科技有限公司 Method and device for repairing cheap-copy application programs
US20170068815A1 (en) * 2014-07-14 2017-03-09 Palo Alto Networks, Inc. Detection of malware using an instrumented virtual machine environment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
郝瑞: "《基于虚拟可信平台的软件可信性研究》", 31 May 2017, 武汉大学出版社 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110008687A (en) * 2019-02-19 2019-07-12 阿里巴巴集团控股有限公司 The processing method and processing device of risk application
CN110008687B (en) * 2019-02-19 2023-05-05 创新先进技术有限公司 Risk application processing method and apparatus
CN110351720A (en) * 2019-07-23 2019-10-18 深圳传音控股股份有限公司 Using installation based reminding method, device, mobile terminal and readable storage medium storing program for executing

Similar Documents

Publication Publication Date Title
US8458673B2 (en) Computer-implemented method and system for binding digital rights management executable code to a software application
RU2566329C2 (en) Method of protecting computer system from malware
US9158919B2 (en) Threat level assessment of applications
JP6326497B2 (en) Dynamic application security verification
US20170076099A1 (en) An access method and apparatus for an application program based on an intelligent terminal device
KR101074624B1 (en) Method and system for protecting abusinng based browser
US10402563B2 (en) Automated classification of exploits based on runtime environmental features
US20230185921A1 (en) Prioritizing vulnerabilities
US20100037317A1 (en) Mehtod and system for security monitoring of the interface between a browser and an external browser module
US20090106818A1 (en) Selectively authorizing software functionality after installation of the software
CN106845223B (en) Method and apparatus for detecting malicious code
Yang et al. {Iframes/Popups} Are Dangerous in Mobile {WebView}: Studying and Mitigating Differential Context Vulnerabilities
Strackx et al. Protected software module architectures
Dong et al. AdSentry: comprehensive and flexible confinement of JavaScript-based advertisements
US20180218150A1 (en) Apparatus and methods for transitioning between a secure area and a less-secure area
CN111177727A (en) Vulnerability detection method and device
CN107766723A (en) Suppress method, apparatus, equipment and the readable storage medium storing program for executing of malicious application installation
US20040250086A1 (en) Method and system for protecting against software misuse and malicious code
US11507673B1 (en) Adaptive cyber-attack emulation
CN108427884B (en) Warning method and device for webpage ore mining script
CN113282363A (en) Method and device for optimizing hybrid APP
US8516447B2 (en) Computer-implemented method and system for binding digital rights management executable code to a software application
Johns et al. Tamper-resistant likejacking protection
US20080115133A1 (en) Apparatus and method for managing execution of active x control
CN111222122A (en) Application authority management method and device and embedded equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20180306