CN107766723A - Suppress method, apparatus, equipment and the readable storage medium storing program for executing of malicious application installation - Google Patents
Suppress method, apparatus, equipment and the readable storage medium storing program for executing of malicious application installation Download PDFInfo
- Publication number
- CN107766723A CN107766723A CN201711172944.7A CN201711172944A CN107766723A CN 107766723 A CN107766723 A CN 107766723A CN 201711172944 A CN201711172944 A CN 201711172944A CN 107766723 A CN107766723 A CN 107766723A
- Authority
- CN
- China
- Prior art keywords
- malicious application
- terminal
- installation
- application
- cloud storehouse
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/033—Test or assess software
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The embodiment of the present invention is by judging whether terminal cloud storehouse is stored with the information of the malicious application to be installed, if so, then refusal installation;If it is not, then judge whether the malicious application to be installed is potential malicious application, if so, then refusal installation;If it is not, then allow to install.The present invention establishes the cloud storehouse for the information for being stored with malicious application, and downloads the cloud storehouse to the terminal, while real-time update cloud storehouse.And when the information for not having to store malicious application in cloud storehouse, potential malicious application when then needing to further determine whether, and, it is necessary to all applications being currently running of shield terminal when installing the application, monitor whether it has the anticipatory behavior of malicious application, can just decide whether to terminate installation.The present invention can realize the effect for suppressing malicious application installation, provide the user a good terminal operating environment.
Description
Technical field
The present embodiments relate to field of terminal technology, more particularly to a kind of method, apparatus for suppressing malicious application installation,
Equipment and readable storage medium storing program for executing.
Background technology
With the fast development of intelligent terminal, the security of terminal applies installation is increasingly taken seriously.Such as intelligent hand
The a series of terminal payment functions such as machine has converged Alipay, wechat is paid, Jingdone district is paid, and when user's imprudence is mounted with to dislike
Meaning application, serious meeting cause malicious application to destroy payment environment, cause the property loss of user.And now it is various should
Downloaded with user is attract, how to avoid the installation of malicious application is primarily to solve the problems, such as.
Suppress the installation of malicious application at present, be typically employed in one database of terminal downloads, such as Tengxun's application treasured, user
The selection application from database is needed to download, although ensure that safety, the application of database purchase is limited, it is impossible to meets user
To the demand of application, and need to download different databases.For example, user wants to download an application but not applied in Tengxun
In treasured, in 360 applications are precious, at this moment just need to download two applications it is precious could meet demands, and when the application that user downloads is mended
In Tengxun, application is precious, does not also need solve the problems, such as that the application that user downloads is not malicious application then when during 360 applications are precious.
The content of the invention
The present invention provides a kind of method for suppressing malicious application installation, to realize user security installing terminal application, for eventually
Make the running environment of a safety in end.
In a first aspect, the embodiments of the invention provide a kind of method for suppressing malicious application installation, including:
Judge whether terminal cloud storehouse is stored with the information of the malicious application to be installed, if so, then refusal installation;
If it is not, then judge whether the malicious application to be installed is potential malicious application, if so, then refusal installation;
If it is not, then allow to install.
Further, it is described to judge whether terminal cloud storehouse is stored with the information of the malicious application to be installed, if so, then refusing
Also include before installation:
Establish the cloud storehouse for the information for being stored with malicious application;
The cloud storehouse is downloaded to the terminal;
Cloud storehouse described in real-time update.
Further, it is described to judge whether the malicious application to be installed is potential malicious application, including:
All applications being currently running of shield terminal;
The malicious application to be installed;
Monitor the behavior of the malicious application to be installed;
Determine whether the behavior is corresponding with the anticipatory behavior of the malicious application.
Further, after whether the determination behavior is corresponding with the anticipatory behavior of the malicious application, also wrap
Include:
Intercept the specified communication between the malicious application and terminal.
The anticipatory behavior of the malicious application, including:
Attempt collection terminal information;
Attempt to tamper with the terminal applies;
Frequent pop-up malice advertisement and illegal link.
Second aspect, the embodiment of the present invention additionally provide a kind of device for suppressing malicious application installation, including:
Cloud storehouse signal judgement module, for judging whether terminal cloud storehouse is stored with the information of the malicious application to be installed, if
It is, then refusal installation;
Potential malicious application judge module, if not storing the information of the malicious application to be installed for terminal cloud storehouse
When, then judge whether the malicious application to be installed is potential malicious application, if so, then refusal installation;If it is not, then allow
Installation.
Further, before the terminal cloud storehouse judge module, in addition to:
Yun Ku establishes module, for establishing the cloud storehouse for the information for being stored with malicious application;
Download module, for downloading the cloud storehouse to the terminal;
Update module, for cloud storehouse described in real-time update.
Further, the potential malicious application judge module, including:
Submodule is shielded, for all applications being currently running of shield terminal;
Submodule is installed, for the malicious application to be installed;
Submodule is monitored, for monitoring the behavior of the malicious application to be installed;
Determination sub-module, for determining whether the behavior is corresponding with the anticipatory behavior of the malicious application.
Further, after the determination sub-module, in addition to:
Blocking module, for intercepting specified communication of the malicious application between terminal;
Further, the anticipatory behavior of the malicious application, including:
Attempt collection terminal information;
Attempt to tamper with the terminal applies;
Frequent pop-up malice advertisement and illegal link.
The third aspect, the embodiment of the present invention additionally provide a kind of computer equipment, including memory, processor and are stored in
Realize that the present invention such as appoints on memory and the computer program that can run on a processor, during the computing device described program
The method of suppression malicious application installation described in embodiment of anticipating.
Fourth aspect, the embodiment of the present invention additionally provide a kind of computer-readable recording medium, are stored thereon with computer
Program, the method that the suppression malicious application installation as described in any embodiment of the present invention is realized when the program is executed by processor.
The embodiment of the present invention is by judging whether terminal cloud storehouse is stored with the information of the malicious application to be installed, if so, then
Refusal installation;If it is not, then judge whether the malicious application to be installed is potential malicious application, if so, then refusal installation;
If it is not, then allow to install.The present invention establishes the cloud storehouse for the information for being stored with malicious application, and downloads the cloud storehouse to the end
End, while real-time update cloud storehouse.And when the information for not having to store malicious application in cloud storehouse, then when needing to further determine whether
Potential malicious application, and, it is necessary to which all applications being currently running of shield terminal, monitor whether it has malice when installing the application
The anticipatory behavior of application, it can just decide whether to terminate installation.The present invention can realize suppress malicious application installation effect, for
Family provides a good terminal operating environment.
Brief description of the drawings
Fig. 1 is a kind of flow chart of the method for suppression malicious application installation that the embodiment of the present invention one provides;
Fig. 2 is a kind of flow chart of the method for suppression malicious application installation that the embodiment of the present invention two provides;
Fig. 3 is a kind of structural representation of the device for suppression malicious application installation that the embodiment of the present invention three provides;
Fig. 4 is a kind of structural representation for equipment that the embodiment of the present invention four provides.
Embodiment
The present invention is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched
The specific embodiment stated is used only for explaining the present invention, rather than limitation of the invention.It also should be noted that in order to just
Part related to the present invention rather than full content are illustrate only in description, accompanying drawing.
It should be mentioned that some exemplary embodiments are described as before exemplary embodiment is discussed in greater detail
The processing described as flow chart or method.Although operations (or step) are described as the processing of order by flow chart,
Many of which operation can be implemented concurrently, concomitantly or simultaneously.In addition, the order of operations can be pacified again
Row.The processing can be terminated when its operations are completed, it is also possible to the additional step being not included in accompanying drawing.Institute
State processing and can correspond to method, function, code, subroutine, subprogram etc..
Embodiment one
Fig. 1 be the embodiment of the present invention one provide a kind of suppression malicious application installation method flow chart, the present embodiment
It is applicable to suppress malicious application the situation of installation, this method can be performed by device that suppression malicious application is installed, should
Device can be realized by the mode of software and/or hardware, and can typically be integrated in computer equipment.As shown in figure 1, this implementation
The method of example specifically comprises the following steps:
Step 110, judge whether terminal cloud storehouse is stored with the information of the malicious application to be installed, if so, then refusal installation;
Wherein, malicious application is that user is not desired to install and is forced the application of installation, when user triggers the correlation of malicious application
Link and cause using installation, as user wants to download a software, point opens the download link of the software, and when installation
It was found that the binding installation for the application for being not desired to installation in the link be present, or user's point is opened a link and is mounted with automatically
Situation for the malicious application that the link includes etc..Yun Ku is a kind of virtual database, can store substantial amounts of information, has peace
The characteristics of full stabilization, mass memory.The information of the malicious application to be installed is stored using cloud storehouse, is intended to when existing in cloud storehouse
During the information of the malicious application of installation, then refusal installation, so as to avoid the installation of malicious application.
It is understood that the application that user is not desired to install still safety can also be stored in cloud storehouse, herein, malice is answered
With being interpreted as artificially being not desired to the situation that installation is but forced binding installation and/or malicious application is installed automatically.The evil stored in Yun Ku
Meaning application, when user wants installation, the application can be found in Yun Kuzhong and installed.
Step 120, if it is not, then judging whether the malicious application to be installed is potential malicious application, if so, then refusing
Installation absolutely;If it is not, then allow to install.
Wherein, when the information of the malicious application to be installed is not present in cloud storehouse, then need to determine whether that the malice should
With whether being potential malicious application.Generally, potential malicious application only can be just judged it in the process of running, and
And potential malicious application may impact or steal in the process of running end message to other application.Therefore, if should
Malicious application is potential malicious application, then refusal installation, i.e., terminates installation immediately during malicious application is run, no
Then, then continue to install.
The embodiment of the present invention is by judging whether terminal cloud storehouse is stored with the information of the malicious application to be installed, if so, then
Refusal installation;If it is not, then judge whether the malicious application to be installed is potential malicious application, if so, then refusal installation;
If it is not, then allow to install.The present invention establishes the cloud storehouse for the information for being stored with malicious application, and downloads the cloud storehouse to the end
End, while real-time update cloud storehouse.And when the information for not having to store malicious application in cloud storehouse, then when needing to further determine whether
Potential malicious application, and, it is necessary to which all applications being currently running of shield terminal, monitor whether it has malice when installing the application
The anticipatory behavior of application, it can just decide whether to terminate installation.The present invention can realize suppress malicious application installation effect, for
Family provides a good terminal operating environment.
It is described to judge whether the malicious application to be installed is that potential malice on the basis of above-mentioned technical proposal
With, including:
All applications being currently running of shield terminal;
The malicious application to be installed;
Monitor the behavior of the malicious application to be installed;
Determine whether the behavior is corresponding with the anticipatory behavior of the malicious application.
Wherein, potential application such as steals end message, distorts end in the process of running there may be the operation behavior of malice
End application etc., therefore, it is necessary to mask all applications being currently running of terminal before the malicious application to be installed, bag
The application in running background is included, establishes screen layer, by intercepting the communication between malicious application and terminal applies, terminal is owned
Using shielding, the invasion of malicious application to be installed is avoided.
The behavior of the malicious application to be installed is monitored, is to monitor the behavior of malicious application in the process of running, judges its row
Whether to have the anticipatory behavior of malicious application, the anticipatory behavior of malicious application includes:Attempt collection terminal information;Attempt to tamper with institute
State terminal applies;Frequent pop-up malice advertisement and illegal link.
After whether the determination behavior is corresponding with the anticipatory behavior of the malicious application, in addition to:
Intercept the specified communication between the malicious application and terminal.
Embodiment two
Fig. 2 be the embodiment of the present invention two provide a kind of suppression malicious application installation method flow chart, the present embodiment
It is optimized based on above-described embodiment, as shown in Fig. 2 the method for the present embodiment specifically comprises the following steps:
Step 210, foundation are stored with the cloud storehouse of the information of malicious application.
Yun Ku's prevents the important method that malicious application is installed when establishing, the cloud library storage relevant information of malicious application,
In order to reduce the internal memory in cloud storehouse, the information can be illegal link or title, the application installation package of malicious application of malicious application
Title and application link etc..In order to avoid the maloperation in user of malicious application information, such as open careless when and dislike
Meaning application by the malicious application information in cloud storehouse, it is necessary to carry out storage setting, for example, it is black to establish malicious application in cloud storehouse
List file, the information of malicious application is stored in the blacklist file, only when user need this reappraise or
Blacklist file can be just put out when the malicious application is installed, malicious application therein is selected.Setting to cloud storehouse
More like the process that virus is identified similar to antivirus software.Yun Ku not only has the invalid informations such as the virus in identification malicious application concurrently
Function, with more storage user be forced binding installation application message function.
Step 220, the cloud storehouse is downloaded to the terminal.
Yun Ku is needed to be installed to terminal, and when malicious application will be installed to terminal, itself and Yun Kuzhong information are carried out
Matching, if the match is successful, it is malicious application to illustrate the application.
Cloud storehouse described in step 230, real-time update.
Wherein, the renewal of malicious application is frequent, and therefore, Yun Ku also wants real-time update.
Step 240, judge whether terminal cloud storehouse is stored with the information of the malicious application to be installed, if so, then refusal installation;
Step 250, if it is not, then judging whether the malicious application to be installed is potential malicious application, if so, then refusing
Installation absolutely;If it is not, then allow to install.
The embodiment of the present invention is by judging whether terminal cloud storehouse is stored with the information of the malicious application to be installed, if so, then
Refusal installation;If it is not, then judge whether the malicious application to be installed is potential malicious application, if so, then refusal installation;
If it is not, then allow to install.The present invention establishes the cloud storehouse for the information for being stored with malicious application, and downloads the cloud storehouse to the end
End, while real-time update cloud storehouse.And when the information for not having to store malicious application in cloud storehouse, then when needing to further determine whether
Potential malicious application, and, it is necessary to which all applications being currently running of shield terminal, monitor whether it has malice when installing the application
The anticipatory behavior of application, it can just decide whether to terminate installation.The present invention can realize suppress malicious application installation effect, for
Family provides a good terminal operating environment.
Embodiment three
Fig. 3 be the embodiment of the present invention three provide a kind of suppression malicious application installation device structural representation, such as Fig. 3
Shown, the device includes cloud storehouse signal judgement module 310 and potential malicious application judge module 320, wherein:
Cloud storehouse signal judgement module 310, for judging whether terminal cloud storehouse is stored with the information of the malicious application to be installed,
If so, then refusal installation;
Potential malicious application judge module 320, if not storing the letter of the malicious application to be installed for terminal cloud storehouse
During breath, then judge whether the malicious application to be installed is potential malicious application, if so, then refusal installation;If it is not, then permit
Perhaps install.
The embodiment of the present invention is by judging whether terminal cloud storehouse is stored with the information of the malicious application to be installed, if so, then
Refusal installation;If it is not, then judge whether the malicious application to be installed is potential malicious application, if so, then refusal installation;
If it is not, then allow to install.The present invention establishes the cloud storehouse for the information for being stored with malicious application, and downloads the cloud storehouse to the end
End, while real-time update cloud storehouse.And when the information for not having to store malicious application in cloud storehouse, then when needing to further determine whether
Potential malicious application, and, it is necessary to which all applications being currently running of shield terminal, monitor whether it has malice when installing the application
The anticipatory behavior of application, it can just decide whether to terminate installation.The present invention can realize suppress malicious application installation effect, for
Family provides a good terminal operating environment.
Before the terminal cloud storehouse judge module, in addition to:
Yun Ku establishes module, for establishing the cloud storehouse for the information for being stored with malicious application;
Download module, for downloading the cloud storehouse to the terminal;
Update module, for cloud storehouse described in real-time update.
The potential malicious application judge module, including:
Submodule is shielded, for all applications being currently running of shield terminal;
Submodule is installed, for the malicious application to be installed;
Submodule is monitored, for monitoring the behavior of the malicious application to be installed;
Determination sub-module, for determining whether the behavior is corresponding with the anticipatory behavior of the malicious application;
After the determination sub-module, in addition to:
Blocking module, for intercepting specified communication of the malicious application between terminal;
The anticipatory behavior of the malicious application, including:
Attempt collection terminal information;
Attempt to tamper with the terminal applies;
Frequent pop-up malice advertisement and illegal link.
The device for the suppression malicious application installation that the embodiment of the present invention is provided can perform any embodiment of the present invention and be carried
The method of the suppression malicious application installation of confession, possesses the corresponding functional module of execution method and beneficial effect.
Example IV
Fig. 4 is a kind of structural representation for equipment that the embodiment of the present invention four provides, as shown in figure 4, the equipment includes place
Manage device 40, memory 41, input unit 42 and output device 43;The quantity of processor 40 can be one or more in equipment,
In Fig. 4 by taking a processor 40 as an example;Processor 40, memory 41, input unit 42 and output device 43 in equipment can be with
Connected by bus or other modes, in Fig. 4 exemplified by being connected by bus.
Memory 41 is used as a kind of computer-readable recording medium, and journey is can perform available for storage software program, computer
Sequence and module, as in the embodiment of the present invention suppression malicious application install method corresponding to programmed instruction/module (for example,
Cloud storehouse signal judgement module 310 and potential malicious application judge module 320).Processor 40 is stored in memory 41 by operation
In software program, instruction and module, so as to perform the various function application of equipment and data processing, that is, realize above-mentioned
Suppress the method for malicious application installation.
Memory 41 can mainly include storing program area and storage data field, wherein, storing program area can store operation system
Application program needed for system, at least one function;Storage data field can store uses created data etc. according to terminal.This
Outside, memory 41 can include high-speed random access memory, can also include nonvolatile memory, for example, at least a magnetic
Disk storage device, flush memory device or other non-volatile solid state memory parts.In some instances, memory 41 can be further
Including network connection to equipment can be passed through relative to the remotely located memory of processor 40, these remote memories.It is above-mentioned
The example of network includes but is not limited to internet, intranet, LAN, mobile radio communication and combinations thereof.
Input unit 42 can be used for the numeral or character information for receiving input, and produce set with the user of equipment and
The relevant key signals input of function control.Output device 43 may include the display devices such as display screen.
Embodiment five
The embodiment of the present invention five also provides a kind of storage medium for including computer executable instructions, and the computer can be held
Row instruction by computer processor when being performed for performing a kind of associative operation for the method for suppressing malicious application installation.
By the description above with respect to embodiment, it is apparent to those skilled in the art that, the present invention
It can be realized by software and required common hardware, naturally it is also possible to realized by hardware, but the former is more in many cases
Good embodiment.Based on such understanding, what technical scheme substantially contributed to prior art in other words
Part can be embodied in the form of software product, and the computer software product can be stored in computer-readable recording medium
In, floppy disk, read-only storage (Read-Only Memory, ROM), random access memory (Random such as computer
Access Memory, RAM), flash memory (FLASH), hard disk or CD etc., including some instructions are causing a computer to set
Standby (can be personal computer, server, or network equipment etc.) performs the method described in each embodiment of the present invention.
It is worth noting that, in the embodiment of above-mentioned suppression malicious application installation, included unit and module are only
Divided according to function logic, but be not limited to above-mentioned division, as long as corresponding function can be realized;Separately
Outside, the specific name of each functional unit is also only to facilitate mutually distinguish, the protection domain being not intended to limit the invention.
Pay attention to, above are only presently preferred embodiments of the present invention and institute's application technology principle.It will be appreciated by those skilled in the art that
The invention is not restricted to specific embodiment described here, can carry out for a person skilled in the art various obvious changes,
Readjust and substitute without departing from protection scope of the present invention.Therefore, although being carried out by above example to the present invention
It is described in further detail, but the present invention is not limited only to above example, without departing from the inventive concept, also
Other more equivalent embodiments can be included, and the scope of the present invention is determined by scope of the appended claims.
Claims (10)
- A kind of 1. method for suppressing malicious application installation, it is characterised in that including:Judge whether terminal cloud storehouse is stored with the information of the malicious application to be installed, if so, then refusal installation;If it is not, then judge whether the malicious application to be installed is potential malicious application, if so, then refusal installation;If it is not, Then allow to install.
- 2. according to the method for claim 1, it is characterised in that described to judge whether terminal cloud storehouse is stored with the evil to be installed The information of meaning application, if so, then also including before refusal installation:Establish the cloud storehouse for the information for being stored with malicious application;The cloud storehouse is downloaded to the terminal;Cloud storehouse described in real-time update.
- 3. according to the method for claim 1, it is characterised in that described to judge whether the malicious application to be installed is latent Malicious application, including:All applications being currently running of shield terminal;The malicious application to be installed;Monitor the behavior of the malicious application to be installed;Determine whether the behavior is corresponding with the anticipatory behavior of the malicious application.
- 4. according to the method for claim 3, it is characterised in that it is described determine the behavior whether with the malicious application After anticipatory behavior is corresponding, in addition to:Intercept the specified communication between the malicious application and terminal.
- 5. according to the method for claim 3, it is characterised in that the anticipatory behavior of the malicious application, including:Attempt collection terminal information;Attempt to tamper with the terminal applies;Frequent pop-up malice advertisement and illegal link.
- A kind of 6. device for suppressing malicious application installation, it is characterised in that including:Cloud storehouse signal judgement module, for judging whether terminal cloud storehouse is stored with the information of the malicious application to be installed, if so, then Refusal installation;Potential malicious application judge module, if do not store the information of the malicious application to be installed for terminal cloud storehouse, Judge whether the malicious application to be installed is potential malicious application, if so, then refusal installation;If it is not, then allow to install.
- 7. device according to claim 6, it is characterised in that before the terminal cloud storehouse judge module, in addition to:Yun Ku establishes module, for establishing the cloud storehouse for the information for being stored with malicious application;Download module, for downloading the cloud storehouse to the terminal;Update module, for cloud storehouse described in real-time update.
- 8. device according to claim 6, it is characterised in that the potential malicious application judge module, including:Submodule is shielded, for all applications being currently running of shield terminal;Submodule is installed, for the malicious application to be installed;Submodule is monitored, for monitoring the behavior of the malicious application to be installed;Determination sub-module, for determining whether the behavior is corresponding with the anticipatory behavior of the malicious application;After the determination sub-module, in addition to:Blocking module, for intercepting specified communication of the malicious application between terminal;The anticipatory behavior of the malicious application, including:Attempt collection terminal information;Attempt to tamper with the terminal applies;Frequent pop-up malice advertisement and illegal link.
- 9. a kind of computer equipment, including memory, processor and storage are on a memory and the meter that can run on a processor Calculation machine program, it is characterised in that the suppression as described in any in claim 1-5 is realized during the computing device described program The method of malicious application installation.
- 10. a kind of computer-readable recording medium, is stored thereon with computer program, it is characterised in that the program is by processor The method that the suppression malicious application installation as described in any in claim 1-5 is realized during execution.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201711172944.7A CN107766723A (en) | 2017-11-22 | 2017-11-22 | Suppress method, apparatus, equipment and the readable storage medium storing program for executing of malicious application installation |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201711172944.7A CN107766723A (en) | 2017-11-22 | 2017-11-22 | Suppress method, apparatus, equipment and the readable storage medium storing program for executing of malicious application installation |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN107766723A true CN107766723A (en) | 2018-03-06 |
Family
ID=61280170
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201711172944.7A Withdrawn CN107766723A (en) | 2017-11-22 | 2017-11-22 | Suppress method, apparatus, equipment and the readable storage medium storing program for executing of malicious application installation |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN107766723A (en) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN110008687A (en) * | 2019-02-19 | 2019-07-12 | 阿里巴巴集团控股有限公司 | The processing method and processing device of risk application |
| CN110351720A (en) * | 2019-07-23 | 2019-10-18 | 深圳传音控股股份有限公司 | Using installation based reminding method, device, mobile terminal and readable storage medium storing program for executing |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN103679016A (en) * | 2012-09-04 | 2014-03-26 | 珠海市君天电子科技有限公司 | Method and system for processing malicious programs of mobile phone |
| CN103679029A (en) * | 2013-12-11 | 2014-03-26 | 北京奇虎科技有限公司 | Method and device for repairing cheap-copy application programs |
| US20170068815A1 (en) * | 2014-07-14 | 2017-03-09 | Palo Alto Networks, Inc. | Detection of malware using an instrumented virtual machine environment |
-
2017
- 2017-11-22 CN CN201711172944.7A patent/CN107766723A/en not_active Withdrawn
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN103679016A (en) * | 2012-09-04 | 2014-03-26 | 珠海市君天电子科技有限公司 | Method and system for processing malicious programs of mobile phone |
| CN103679029A (en) * | 2013-12-11 | 2014-03-26 | 北京奇虎科技有限公司 | Method and device for repairing cheap-copy application programs |
| US20170068815A1 (en) * | 2014-07-14 | 2017-03-09 | Palo Alto Networks, Inc. | Detection of malware using an instrumented virtual machine environment |
Non-Patent Citations (1)
| Title |
|---|
| 郝瑞: "《基于虚拟可信平台的软件可信性研究》", 31 May 2017, 武汉大学出版社 * |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN110008687A (en) * | 2019-02-19 | 2019-07-12 | 阿里巴巴集团控股有限公司 | The processing method and processing device of risk application |
| CN110008687B (en) * | 2019-02-19 | 2023-05-05 | 创新先进技术有限公司 | Risk application processing method and apparatus |
| CN110351720A (en) * | 2019-07-23 | 2019-10-18 | 深圳传音控股股份有限公司 | Using installation based reminding method, device, mobile terminal and readable storage medium storing program for executing |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US8458673B2 (en) | Computer-implemented method and system for binding digital rights management executable code to a software application | |
| RU2566329C2 (en) | Method of protecting computer system from malware | |
| US9158919B2 (en) | Threat level assessment of applications | |
| JP6326497B2 (en) | Dynamic application security verification | |
| US20170076099A1 (en) | An access method and apparatus for an application program based on an intelligent terminal device | |
| KR101074624B1 (en) | Method and system for protecting abusinng based browser | |
| US10402563B2 (en) | Automated classification of exploits based on runtime environmental features | |
| US20230185921A1 (en) | Prioritizing vulnerabilities | |
| US20100037317A1 (en) | Mehtod and system for security monitoring of the interface between a browser and an external browser module | |
| US20090106818A1 (en) | Selectively authorizing software functionality after installation of the software | |
| CN106845223B (en) | Method and apparatus for detecting malicious code | |
| Yang et al. | {Iframes/Popups} Are Dangerous in Mobile {WebView}: Studying and Mitigating Differential Context Vulnerabilities | |
| Strackx et al. | Protected software module architectures | |
| Dong et al. | AdSentry: comprehensive and flexible confinement of JavaScript-based advertisements | |
| US20180218150A1 (en) | Apparatus and methods for transitioning between a secure area and a less-secure area | |
| CN111177727A (en) | Vulnerability detection method and device | |
| CN107766723A (en) | Suppress method, apparatus, equipment and the readable storage medium storing program for executing of malicious application installation | |
| US20040250086A1 (en) | Method and system for protecting against software misuse and malicious code | |
| US11507673B1 (en) | Adaptive cyber-attack emulation | |
| CN108427884B (en) | Warning method and device for webpage ore mining script | |
| CN113282363A (en) | Method and device for optimizing hybrid APP | |
| US8516447B2 (en) | Computer-implemented method and system for binding digital rights management executable code to a software application | |
| Johns et al. | Tamper-resistant likejacking protection | |
| US20080115133A1 (en) | Apparatus and method for managing execution of active x control | |
| CN111222122A (en) | Application authority management method and device and embedded equipment |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| WW01 | Invention patent application withdrawn after publication | ||
| WW01 | Invention patent application withdrawn after publication |
Application publication date: 20180306 |