CN107045609A - Method, storage medium and the mobile terminal of detecting system security - Google Patents

Method, storage medium and the mobile terminal of detecting system security Download PDF

Info

Publication number
CN107045609A
CN107045609A CN201710294082.9A CN201710294082A CN107045609A CN 107045609 A CN107045609 A CN 107045609A CN 201710294082 A CN201710294082 A CN 201710294082A CN 107045609 A CN107045609 A CN 107045609A
Authority
CN
China
Prior art keywords
risk
app
user
excessive
case
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710294082.9A
Other languages
Chinese (zh)
Inventor
朱洁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201710294082.9A priority Critical patent/CN107045609A/en
Publication of CN107045609A publication Critical patent/CN107045609A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/568Computer malware detection or handling, e.g. anti-virus arrangements eliminating virus, restoring damaged files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software

Abstract

The invention discloses a kind of method, storage medium and the mobile terminal of detecting system security, this method includes:Detect whether that the safety detection for receiving application software APP is instructed;In the case where receiving safety detection instruction, risk supervision is carried out to all APP in system and/or all installation kits;The APP and/or installation kit that detect risk are sorted out according to default danger classes, and are presented on screen.The present invention carries out risk supervision to all APP in system and/or all installation kits, the APP and/or installation kit that detect risk are sorted out according to default danger classes again, the detected main body of the process includes all APP and/or all installation kits, that detects is more comprehensive, and after sensing APP and/or installation kit with same default danger classes have been carried out sorting out display, it can allow what user became apparent to check, can also quickly be handled according to sorting out, better user experience.

Description

Method, storage medium and the mobile terminal of detecting system security
Technical field
The present invention relates to communication field, more particularly to a kind of method of detecting system security, storage medium and movement are eventually End.
Background technology
Antivirus software, also referred to as anti-viral software or antivirus software, are to be used to eliminate computer virus, Trojan Horse and malice One class software of the computer threats such as software.
Antivirus software is generally integrated the function, some antivirus softwares such as monitoring identification, virus scan and removing and automatic upgrading It is that computer system of defense (includes antivirus software, fire wall, Trojan Horse and other evils also with functions such as data recoveries Anticipate the killing program of software, intrusion prevention system etc.) important component.
Antivirus software is generally integrated monitoring identification, virus scan and removing, the automatically work(such as upgrading virus base, Initiative Defense Can, some antivirus softwares, also with functions such as data recoveries, are that computer system of defense (includes antivirus software, fire wall, Te Luo Killing program and intrusion prevention system of her wooden horse and other Malwares etc.) important component.
Antivirus software is that a kind of program code that can have harm known to all to computer to virus, wooden horse etc. is carried out The program means of removing." antivirus software " by the name domestic older generation's anti-viral software manufacturer, later due to and the world Anti-virus industry, which integrates with, to be referred to as " anti-viral software ", " protection capacity of safety protection software " or " fail-safe software "." the internet of integrated fire proof wall Safety suit ", " global function is set with safely " etc. are used for the class software for eliminating computer virus, Trojan Horse and Malware, Belong to antivirus software category.Antivirus software is generally integrated the function such as monitoring identification, virus scan and removing and automatic upgrading, has Anti-viral software also with data recovery, take precautions against hacker attacks, the function such as control of network flow quantity.
With the popularization of intelligent terminal, including virus various safety issues in intelligent terminal increasingly by Concern, existing intelligent terminal safety detecting method is all antivirus software, and existing antivirus product is examined just for application Survey, it is necessary to which user sees that treatment advice just can determine how processing, complex operation, user's body one by one after virus is detected Test relatively low.
The content of the invention
It is a primary object of the present invention to propose a kind of method, storage medium and the mobile terminal of detecting system security, Aim to solve the problem that the following problem of prior art:Existing intelligent terminal safety detecting method is all antivirus software, and existing is killed Malicious product just for application detected, after virus is detected, it is necessary to user see one by one treatment advice just can determine that as Where is managed, and complex operation, Consumer's Experience is relatively low.
To achieve the above object, the method for a kind of detecting system security that the present invention is provided, including:Detect whether to receive Safety detection to application software APP is instructed;In the case where receiving the safety detection instruction, to the institute in system There are APP and/or all installation kits to carry out risk supervision;The APP and/or installation kit of risk will be detected according to default danger classes Sorted out, and be presented on screen.
Optionally, before detecting whether that the safety detection for receiving application software APP is instructed, in addition to:For each wind Dangerous item sets details, and the details include:Risk classifications, danger classes and suggestion for operation, wherein, described danger etc. Level at least includes:Excessive risk and low-risk.
Optionally, after being presented on screen, in addition to:Judge whether to receive and check that the operation of risk details refers to Order;In the case where receiving the operational order for checking risk details, the detailed of the risk is presented on screen Information.
Optionally, after being presented on screen, in addition to:Judge whether default processing button receives trigger signal; In the case of receiving the trigger signal, present in APP described in default processing rule process and/or the installation kit Risk.
Optionally, judge whether default processing button receives trigger signal, including:Detecting the risk of user's selection is The no risk for containing all excessive risks detected;In the case of the risk not comprising all excessive risks, in screen Prompt message frame is ejected on curtain, is not selected all also with the risk item for pointing out user to there is excessive risk;Containing all high wind In the case of the risk of danger, judge whether the default processing button receives trigger signal.
Optionally, whether the risk item of detection user selection contains the risk of all excessive risks detected, including: Detect whether the risk that there is excessive risk;In the risk that there is excessive risk, whether the risk of detection user's selection wraps The risk of all excessive risks detected is contained.
Optionally, on screen after ejection prompt message frame, in addition to:Judge whether to receive the finger for indicating to continue with Order;In the case where receiving the instruction for indicating to continue with, judge whether the default processing button receives triggering Signal;In the case where not receiving the instruction for indicating to continue with, the risk of user's selection is continued to, to detect Whether the risk item of user's selection contains the risk of all excessive risks detected.
Optionally, according to risk present in APP described in default processing rule process and/or the installation kit, including: Delete the risk script in risk corresponding A PP, the corresponding APP of unloading risk, delete the corresponding installation kit of risk.
In addition, to achieve the above object, the present invention also proposes a kind of storage medium, and be stored with computer program, the meter The step of calculation machine program realizes the above method when being executed by processor.
In addition, to achieve the above object, the present invention also proposes a kind of mobile terminal, at least including memory, processor, institute State the computer program that is stored with memory, realized during computer program of the processor on the memory is performed above-mentioned The step of method.
The present invention is in the case where receiving the safety detection instruction, to all APP and/or all peaces in system Dress bag carries out risk supervision, then the APP and/or installation kit that detect risk are sorted out according to default danger classes, and is in On present screen, the detected main body of the process includes all APP and/or all installation kits, detection more comprehensively, and in inspection APP and/or installation kit with same default danger classes have been carried out sorting out display after survey, can allow what user became apparent from Check, can also quickly be handled according to sorting out, better user experience;Solve the following problem of prior art:It is existing Intelligent terminal safety detecting method be all antivirus software, and existing antivirus product is detected just for application, in detection Go out after virus, it is necessary to which user sees that treatment advice just can determine how processing one by one, complex operation, Consumer's Experience is relatively low.
Brief description of the drawings
Fig. 1 is a kind of optional hardware architecture diagram of mobile terminal of realization each embodiment of the invention;
Fig. 2 is the communications network system Organization Chart of mobile terminal as shown in Figure 1;
Fig. 3 is the flow chart of the method for first embodiment of the invention detecting system security;
Fig. 4 is third embodiment of the invention interface schematic diagram one;
Fig. 5 is third embodiment of the invention interface schematic diagram two;
Fig. 6 is third embodiment of the invention interface schematic diagram three;
Fig. 7 is third embodiment of the invention interface schematic diagram four;
Fig. 8 is third embodiment of the invention interface schematic diagram five;
Fig. 9 is third embodiment of the invention interface schematic diagram six.
The realization, functional characteristics and advantage of the object of the invention will be described further referring to the drawings in conjunction with the embodiments.
Embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
In follow-up description, the suffix using such as " module ", " part " or " unit " for representing element is only Be conducive to the explanation of the present invention, itself there is no a specific meaning.Therefore, " module ", " part " or " unit " can be mixed Ground is used.
Terminal can be implemented in a variety of manners.For example, the terminal described in the present invention can include such as mobile phone, flat board Computer, notebook computer, palm PC, personal digital assistant (Personal Digital Assistant, PDA), portable Media player (Portable Media Player, PMP), guider, wearable device, Intelligent bracelet, pedometer etc. are moved Move the fixed terminals such as terminal, and numeral TV, desktop computer.
It will be illustrated in subsequent descriptions by taking mobile terminal as an example, it will be appreciated by those skilled in the art that except special Outside element for moving purpose, construction according to the embodiment of the present invention can also apply to the terminal of fixed type.
Referring to Fig. 1, its hardware architecture diagram for a kind of mobile terminal of realization each embodiment of the invention, the shifting Dynamic terminal 100 can include:RF (Radio Frequency, radio frequency) unit 101, WiFi module 102, audio output unit 103rd, A/V (audio/video) input block 104, sensor 105, display unit 106, user input unit 107, interface unit 108th, the part such as memory 109, processor 110 and power supply 111.It will be understood by those skilled in the art that shown in Fig. 1 Mobile terminal structure does not constitute the restriction to mobile terminal, and mobile terminal can be included than illustrating more or less parts, Either combine some parts or different parts arrangement.
The all parts of mobile terminal are specifically introduced with reference to Fig. 1:
Radio frequency unit 101 can be used for receiving and sending messages or communication process in, the reception and transmission of signal, specifically, by base station Downlink information receive after, handled to processor 110;In addition, up data are sent into base station.Generally, radio frequency unit 101 Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier, duplexer etc..In addition, penetrating Frequency unit 101 can also be communicated by radio communication with network and other equipment.Above-mentioned radio communication can use any communication Standard or agreement, including but not limited to GSM (Global System of Mobile communication, global system for mobile telecommunications System), GPRS (General Packet Radio Service, general packet radio service), CDMA2000 (Code Division Multiple Access 2000, CDMA 2000), WCDMA (Wideband Code Division Multiple Access, WCDMA), TD-SCDMA (Time Division-Synchronous Code Division Multiple Access, TD SDMA), FDD-LTE (Frequency Division Duplexing-Long Term Evolution, FDD Long Term Evolution) and TDD-LTE (Time Division Duplexing-Long Term Evolution, time division duplex Long Term Evolution) etc..
WiFi belongs to short range wireless transmission technology, and mobile terminal can help user's transmitting-receiving electricity by WiFi module 102 Sub- mail, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and accessed.Although Fig. 1 shows Go out WiFi module 102, but it is understood that, it is simultaneously not belonging to must be configured into for mobile terminal, completely can be according to need To be omitted in the essential scope for do not change invention.
Audio output unit 103 can be in call signal reception pattern, call mode, record mould in mobile terminal 1 00 When under the isotypes such as formula, speech recognition mode, broadcast reception mode, it is that radio frequency unit 101 or WiFi module 102 are received or The voice data stored in memory 109 is converted into audio signal and is output as sound.Moreover, audio output unit 103 The audio output related to the specific function that mobile terminal 1 00 is performed can also be provided (for example, call signal receives sound, disappeared Breath receives sound etc.).Audio output unit 103 can include loudspeaker, buzzer etc..
A/V input blocks 104 are used to receive audio or video signal.A/V input blocks 104 can include graphics processor (Graphics Processing Unit, GPU) 1041 and microphone 1042,1041 pairs of graphics processor is in video acquisition mode Or the view data progress of the static images or video obtained in image capture mode by image capture apparatus (such as camera) Reason.Picture frame after processing may be displayed on display unit 106.Picture frame after being handled through graphics processor 1041 can be deposited Storage is transmitted in memory 109 (or other storage mediums) or via radio frequency unit 101 or WiFi module 102.Mike Wind 1042 can connect in telephone calling model, logging mode, speech recognition mode etc. operational mode via microphone 1042 Quiet down sound (voice data), and can be voice data by such acoustic processing.Audio (voice) data after processing can To be converted to the form output that mobile communication base station can be sent to via radio frequency unit 101 in the case of telephone calling model. Microphone 1042 can implement various types of noises and eliminate (or suppression) algorithm to eliminate (or suppression) in reception and send sound The noise produced during frequency signal or interference.
Mobile terminal 1 00 also includes at least one sensor 105, such as optical sensor, motion sensor and other biographies Sensor.Specifically, optical sensor includes ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to environment The light and shade of light adjusts the brightness of display panel 1061, and proximity transducer can close when mobile terminal 1 00 is moved in one's ear Display panel 1061 and/or backlight.As one kind of motion sensor, accelerometer sensor can detect in all directions (general For three axles) size of acceleration, size and the direction of gravity are can detect that when static, the application available for identification mobile phone posture (such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) etc.; The fingerprint sensor that can also configure as mobile phone, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, The other sensors such as hygrometer, thermometer, infrared ray sensor, will not be repeated here.
Display unit 106 is used for the information for showing the information inputted by user or being supplied to user.Display unit 106 can be wrapped Display panel 1061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used Forms such as (Organic Light-Emitting Diode, OLED) configures display panel 1061.
User input unit 107 can be used for the numeral or character information for receiving input, and produce the use with mobile terminal The key signals input that family is set and function control is relevant.Specifically, user input unit 107 may include contact panel 1071 with And other input equipments 1072.Contact panel 1071, also referred to as touch-screen, collect touch operation of the user on or near it (such as user is using any suitable objects such as finger, stylus or annex on contact panel 1071 or in contact panel 1071 Neighbouring operation), and corresponding attachment means are driven according to formula set in advance.Contact panel 1071 may include touch detection Two parts of device and touch controller.Wherein, touch detecting apparatus detects the touch orientation of user, and detects touch operation band The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it It is converted into contact coordinate, then gives processor 110, and the order sent of reception processing device 110 and can be performed.In addition, can To realize contact panel 1071 using polytypes such as resistance-type, condenser type, infrared ray and surface acoustic waves.Except contact panel 1071, user input unit 107 can also include other input equipments 1072.Specifically, other input equipments 1072 can be wrapped Include but be not limited to physical keyboard, in function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc. One or more, do not limit herein specifically.
Further, contact panel 1071 can cover display panel 1061, detect thereon when contact panel 1071 or After neighbouring touch operation, processor 110 is sent to determine the type of touch event, with preprocessor 110 according to touch thing The type of part provides corresponding visual output on display panel 1061.Although in Fig. 1, contact panel 1071 and display panel 1061 be input and the output function that mobile terminal is realized as two independent parts, but in certain embodiments, can By contact panel 1071 and the input that is integrated and realizing mobile terminal of display panel 1061 and output function, not do specifically herein Limit.
Interface unit 108 is connected the interface that can pass through as at least one external device (ED) with mobile terminal 1 00.For example, External device (ED) can include wired or wireless head-band earphone port, external power source (or battery charger) port, wired or nothing Line FPDP, memory card port, the port for connecting the device with identification module, audio input/output (I/O) end Mouth, video i/o port, ear port etc..Interface unit 108 can be used for receiving the input from external device (ED) (for example, number It is believed that breath, electric power etc.) and the input received is transferred to one or more elements in mobile terminal 1 00 or can be with For transmitting data between mobile terminal 1 00 and external device (ED).
Memory 109 can be used for storage software program and various data.Memory 109 can mainly include storing program area And storage data field, wherein, application program (the such as sound that storing program area can be needed for storage program area, at least one function Sound playing function, image player function etc.) etc.;Storage data field can be stored uses created data (such as according to mobile phone Voice data, phone directory etc.) etc..In addition, memory 109 can include high-speed random access memory, it can also include non-easy The property lost memory, for example, at least one disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of mobile terminal, utilizes each of various interfaces and the whole mobile terminal of connection Individual part, by operation or performs and is stored in software program and/or module in memory 109, and calls and be stored in storage Data in device 109, perform the various functions and processing data of mobile terminal, so as to carry out integral monitoring to mobile terminal.Place Reason device 110 may include one or more processing units;It is preferred that, processor 110 can integrated application processor and modulatedemodulate mediate Device is managed, wherein, application processor mainly handles operating system, user interface and application program etc., and modem processor is main Handle radio communication.It is understood that above-mentioned modem processor can not also be integrated into processor 110.
Mobile terminal 1 00 can also include the power supply 111 (such as battery) powered to all parts, it is preferred that power supply 111 Can be logically contiguous by power-supply management system and processor 110, so as to realize management charging by power-supply management system, put The function such as electricity and power managed.
Although Fig. 1 is not shown, mobile terminal 1 00 can also will not be repeated here including bluetooth module etc..
For the ease of understanding the embodiment of the present invention, the communications network system that the mobile terminal of the present invention is based on is entered below Row description.
Referring to Fig. 2, Fig. 2 is a kind of communications network system Organization Chart provided in an embodiment of the present invention, the communication network system Unite as the LTE system of universal mobile communications technology, UE (User Equipment, use of the LTE system including communicating connection successively Family equipment) 201, E-UTRAN (Evolved UMTS Terrestrial Radio Access Network, evolved UMTS lands Ground wireless access network) 202, EPC (Evolved Packet Core, evolved packet-based core networks) 203 and operator IP operation 204。
Specifically, UE201 can be above-mentioned terminal 100, and here is omitted.
E-UTRAN202 includes eNodeB2021 and other eNodeB2022 etc..Wherein, eNodeB2021 can be by returning Journey (backhaul) (such as X2 interface) is connected with other eNodeB2022, and eNodeB2021 is connected to EPC203, ENodeB2021 can provide UE201 to EPC203 access.
EPC203 can include MME (Mobility Management Entity, mobility management entity) 2031, HSS (Home Subscriber Server, home subscriber server) 2032, other MME2033, SGW (Serving Gate Way, Gateway) 2034, PGW (PDN Gate Way, grouped data network gateway) 2035 and PCRF (Policy and Charging Rules Function, policy and rate functional entity) 2036 etc..Wherein, MME2031 be processing UE201 and There is provided carrying and connection management for the control node of signaling between EPC203.HSS2032 is all to manage for providing some registers Such as function of attaching position register (not shown) etc, and some are preserved about the use such as service features, data rate The special information in family.All customer data can be transmitted by SGW2034, and PGW2035 can provide UE 201 IP Address is distributed and other functions, and PCRF2036 is strategy and the charging control strategic decision-making of business data flow and IP bearing resources Point, it selects and provided available strategy and charging control decision-making with charge execution function unit (not shown) for strategy.
IP operation 204 can include internet, Intranet, IMS (IP Multimedia Subsystem, IP multimedia System) or other IP operations etc..
Although above-mentioned be described by taking LTE system as an example, those skilled in the art it is to be understood that the present invention not only Suitable for LTE system, be readily applicable to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA with And following new network system etc., do not limit herein.
Based on above-mentioned mobile terminal hardware configuration and communications network system, each embodiment of the inventive method is proposed.
First embodiment of the invention provide a kind of method of detecting system security, the flow of this method as shown in figure 3, Including step S302 to S306:
S302, detects whether to receive APP safety detection instruction.
The present embodiment can be presented when realizing in an APP form.When presenting, the APP can set one virtually Button, safety detection instruction is received using the virtual key.
Can also be each risk in advance before detecting whether to receive application software APP safety detection instruction Item sets details, and details can include risk classifications, danger classes and suggestion for operation etc., wherein, danger classes is extremely Include less:Excessive risk and low-risk.
For example, being virus base (not singly referring to virus, also including bad software of all kinds of plug-in units or Consumer's Experience etc.) first In risk title corresponding risk classifications are set, such as when risk classifications being set to entitled Trojan virus, so that it may To determine that it is wooden horse type;Then, it is that Trojan sets danger classes to be senior;Finally, it is that Trojan sets suggestion for operation, Due to the virus that Trojan is wooden horse type, therefore, suggestion for operation typically unloads corresponding application or installation kit immediately.
For another example the virus to entitled G-Ware sets corresponding risk classifications to be rogue software, it is G-Ware then It is senior to set danger classes;Finally, it is that G-Ware sets suggestion for operation, due to the virus that G-Ware is rogue software type, Therefore, suggestion for operation typically unloads corresponding application or installation kit immediately.
For another example the virus to entitled G-Ware sets corresponding risk classifications to be rogue software, it is G-Ware then It is senior to set danger classes;Finally, it is that G-Ware sets suggestion for operation, due to the virus that G-Ware is rogue software type, Therefore, suggestion for operation typically unloads corresponding application or installation kit immediately.
For another example the virus to entitled Tool sets corresponding risk classifications to be hack tool type, it is Tool then It is rudimentary to set danger classes;Finally, it is that Tool sets suggestion for operation, due to the virus that Tool is hack tool type, it is not Belong at once with regard to content to be processed, therefore, suggestion for operation is normally present risk, suggestion and used with caution.
S304, in the case where receiving safety detection instruction, to all APP and/or all installation kits in system Carry out risk supervision.
In the case where virtual key detection have received safety detection instruction, to all APP in system and/or All installation kits carry out risk supervision, and the risk supervision can set detection project according to demand, if for example, when user is current Between it is more nervous, then can be quick detection, when user time takes it easy, it is possible to detected totally.Carrying out quickly During detection, it can be detected just for installation kit or APP, and not all be detected;Examined totally During survey, it is possible to be all to be detected installation kit and APP.User can use different detection modes to carry out safety detection, Better user experience.
S306, the APP and/or installation kit that detect risk is sorted out according to default danger classes, and be presented on screen On curtain.
When detecting the APP and/or installation kit with risk, it is possible to by APP and/or installation kit according to default danger Grade is sorted out, for example, danger classes higher various types of risks are all referred to together, danger classes is relatively low Various types of risks be also all referred to together, be according to default danger when user sees testing result so Grade sorted out after result, further each and every one check which is than relatively hazardous project without user.
In the provisioning process, preferential to set two kinds of risk class, i.e. excessive risk and low-risk, so, user was using Cheng Zhong, directly can just be handled excessive risk, and consider to ignore low-risk.Certainly, also may be used in the provisioning process To set three risk class or four risk class, still, set excessive risk class that user can be made to use process In cannot be distinguished by emphasis and non-emphasis, produce bad Consumer's Experience, therefore, the present embodiment suggestion sets two kinds of risk class, To obtain more preferable Consumer's Experience.
After being presented on screen, it can also further determine whether to receive and check that the operation of risk details refers to Order.Reception for the operational order or received by pre-setting a button.
In the case where receiving the operational order for checking risk details, the detailed letter of risk is presented on screen Breath.For example, when detecting the risk of a low-risk, user can click on the risk, enter the detailed of the risk Checked in thin information, so as to the more comprehensive understanding risk of user.
In the case where detecting risk, it is necessary to handle the risk of excessive risk, accordingly it is also possible to be to set one one Key clears up button, in the case where the button receives trigger signal, cleans out the risk of excessive risk, for example, deleting risk Risk script, the corresponding APP of unloading risk, the corresponding installation kit of deletion risk item in item corresponding A PP.
The embodiment of the present invention is in the case where receiving safety detection instruction, to all APP in system and/or all Installation kit carries out risk supervision, then the APP and/or installation kit that detect risk are sorted out according to default danger classes, and Be presented on screen, the detected main body of the process includes all APP and/or all installation kits, detection more comprehensively, and APP and/or installation kit with same default danger classes have been carried out sorting out display after detection, user can have been allowed to become apparent from Check, can also according to sort out quickly be handled, better user experience;Solve the following problem of prior art:It is existing Some intelligent terminal safety detecting methods are all antivirus softwares, and existing antivirus product is just for using being detected, in inspection Measure after virus, it is necessary to which user sees that treatment advice just can determine how processing one by one, complex operation, Consumer's Experience is relatively low.
Second embodiment of the invention provides a kind of method of detecting system security, and the flow of this method includes:
S1, is that each risk that may be present sets details, details include:Risk classifications, danger classes And suggestion for operation, wherein, danger classes at least includes:Excessive risk and low-risk.
For example, being virus base (not singly referring to virus, also including bad software of all kinds of plug-in units or Consumer's Experience etc.) first In risk title corresponding risk classifications are set, such as when risk classifications being set to entitled Trojan virus, so that it may To determine that it is wooden horse type;Then, it is that Trojan sets danger classes to be senior;Finally, it is that Trojan sets suggestion for operation, Due to the virus that Trojan is wooden horse type, therefore, suggestion for operation typically unloads corresponding application or installation kit immediately.
For another example the virus to entitled G-Ware sets corresponding risk classifications to be rogue software, it is G-Ware then It is senior to set danger classes;Finally, it is that G-Ware sets suggestion for operation, due to the virus that G-Ware is rogue software type, Therefore, suggestion for operation typically unloads corresponding application or installation kit immediately.
For another example the virus to entitled G-Ware sets corresponding risk classifications to be rogue software, it is G-Ware then It is senior to set danger classes;Finally, it is that G-Ware sets suggestion for operation, due to the virus that G-Ware is rogue software type, Therefore, suggestion for operation typically unloads corresponding application or installation kit immediately.
For another example the virus to entitled Tool sets corresponding risk classifications to be hack tool type, it is Tool then It is rudimentary to set danger classes;Finally, it is that Tool sets suggestion for operation, due to the virus that Tool is hack tool type, it is not Belong at once with regard to content to be processed, therefore, suggestion for operation is normally present risk, suggestion and used with caution.
S2, detects whether to receive APP safety detection instruction.
The present embodiment can be presented when realizing in an APP form.When presenting, the APP can set one virtually Button, safety detection instruction is received using the virtual key.
All APP and/or all installation kits in system, in the case where receiving safety detection instruction, are entered by S3 Row risk supervision.
In the case where virtual key detection have received safety detection instruction, to all APP in system and/or All installation kits carry out risk supervision, and the risk supervision can set detection project according to demand, if for example, when user is current Between it is more nervous, then can be quick detection, when user time takes it easy, it is possible to detected totally.Carrying out quickly During detection, it can be detected just for installation kit or APP, and not all be detected;Examined totally During survey, it is possible to be all to be detected installation kit and APP.User can use different detection modes to carry out safety detection, Better user experience.
S4, the APP and/or installation kit that detect risk is sorted out according to default danger classes, and be presented on screen On.
When detecting the APP and/or installation kit with risk, it is possible to by APP and/or installation kit according to default danger Grade is sorted out, for example, danger classes higher various types of risks are all referred to together, danger classes is relatively low Various types of risks be also all referred to together, be according to default danger when user sees testing result so Grade sorted out after result, further each and every one check which is than relatively hazardous project without user.
In the provisioning process, preferential to set two kinds of risk class, i.e. excessive risk and low-risk, so, user was using Cheng Zhong, directly can just be handled excessive risk, and consider to ignore low-risk.Certainly, also may be used in the provisioning process To set three risk class or four risk class, still, set excessive risk class that user can be made to use process In cannot be distinguished by emphasis and non-emphasis, produce bad Consumer's Experience, therefore, the present embodiment suggestion sets two kinds of risk class, To obtain more preferable Consumer's Experience.
S5, judges whether to receive the operational order for checking risk details., can also for the reception of the operational order Received by pre-setting a button.
In the case where receiving the operational order for checking risk details, the detailed letter of risk is presented on screen Breath.For example, when detecting the risk of a low-risk, user can click on the risk, enter the detailed of the risk Checked in thin information, so as to the more comprehensive understanding risk of user.
S6, judges whether default processing button receives trigger signal.
In the case where receiving trigger signal, according to wind present in default processing rule process APP and/or installation kit Dangerous item.
Wherein, judge to include when whether default processing button receives trigger signal:Detecting the risk of user's selection is The no risk for containing all excessive risks detected;In the case of the risk not comprising all excessive risks, in screen Prompt message frame is ejected on curtain, is not selected all also with the risk item for pointing out user to there is excessive risk;Containing all high wind In the case of the risk of danger, judge whether default processing button receives trigger signal.
When whether the risk item for detecting user's selection contains the risk of all excessive risks detected, first detection is The no risk that there is excessive risk;In the risk that there is excessive risk, whether the risk of detection user's selection contains inspection The risk for all excessive risks measured.
During realization, ejected on screen after prompt message frame, can also determine whether that receiving instruction continues The instruction of processing;In the case where receiving the instruction for indicating to continue with, judge whether default processing button receives triggering Signal;In the case where not receiving the instruction for indicating to continue with, the risk of user's selection is continued to, to detect user Whether the risk item of selection contains the risk of all excessive risks detected.
During realization, it can be wrapped according to risk present in default processing rule process APP and/or installation kit Include:Delete the risk item script in risk corresponding A PP, the corresponding APP of unloading risk, delete the corresponding installation of risk Bag.
The embodiment of the present invention is in the case where receiving safety detection instruction, to all APP in system and/or all Installation kit carries out risk supervision, then the APP and/or installation kit that detect risk are sorted out according to default danger classes, and Be presented on screen, the detected main body of the process includes all APP and/or all installation kits, detection more comprehensively, and APP and/or installation kit with same default danger classes have been carried out sorting out display after detection, user can have been allowed to become apparent from Check, can also according to sort out quickly be handled, better user experience;Solve the following problem of prior art:It is existing Some intelligent terminal safety detecting methods are all antivirus softwares, and existing antivirus product is just for using being detected, in inspection Measure after virus, it is necessary to which user sees that treatment advice just can determine how processing one by one, complex operation, Consumer's Experience is relatively low.
Through the above description of the embodiments, those skilled in the art can be understood that according to above-mentioned implementation The method of example can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but a lot In the case of the former be more preferably embodiment.Understood based on such, technical scheme is substantially in other words to existing The part that technology contributes can be embodied in the form of software product, and the computer software product is stored in a storage In medium (such as ROM/RAM, magnetic disc, CD), including some instructions are to cause a station terminal equipment (can be mobile phone, calculate Machine, server, or network equipment etc.) method that performs each of the invention embodiment.
Third embodiment of the invention additionally provides a kind of storage medium, and the storage medium can be deposited in the form of a memory , and set in the terminal.Alternatively, in the present embodiment, above-mentioned storage medium, which can be configured to storage, is used to hold The program code of row following steps:
S11, detects whether to receive application software APP safety detection instruction;
All APP and/or all installation kits in system, in the case where receiving safety detection instruction, are entered by S12 Row risk supervision;
S13, the APP and/or installation kit that detect risk is sorted out according to default danger classes, and be presented on screen On.
The present embodiment can be presented when realizing in an APP form.When presenting, the APP can set one virtually Button, safety detection instruction is received using the virtual key.
Can also be each risk in advance before detecting whether to receive application software APP safety detection instruction Item sets details, and details can include risk classifications, danger classes and suggestion for operation etc., wherein, danger classes is extremely Include less:Excessive risk and low-risk.
For example, being virus base (not singly referring to virus, also including bad software of all kinds of plug-in units or Consumer's Experience etc.) first In risk title corresponding risk classifications are set, such as when risk classifications being set to entitled Trojan virus, so that it may To determine that it is wooden horse type;Then, it is that Trojan sets danger classes to be senior;Finally, it is that Trojan sets suggestion for operation, Due to the virus that Trojan is wooden horse type, therefore, suggestion for operation typically unloads corresponding application or installation kit immediately.
For another example entitled PornWare virus is set corresponding risk classifications be comprising yellow content software, with Afterwards, it is that PornWare sets danger classes to be middle rank;Finally, it is that PornWare sets suggestion for operation, because PornWare is bag The virus of the software type containing yellow content, therefore, suggestion for operation is normally present security risk, it is proposed that use with caution.
For another example the virus to entitled AdWare sets corresponding risk classifications to contain ad plug-in, then, it is AdWare sets danger classes to be rudimentary;Finally, it is that AdWare sets suggestion for operation, because AdWare is to contain ad plug-in class The virus of type, endangers smaller, therefore, suggestion for operation is typically suggestiveness or suggestive, for example, advertisement is included, may influence Usage experience.
For another example the virus to entitled Tool sets corresponding risk classifications to be hack tool type, it is Tool then It is middle rank to set danger classes;Finally, it is that Tool sets suggestion for operation, due to the virus that Tool is hack tool type, it is not Belong at once with regard to content to be processed, therefore, suggestion for operation is normally present risk, suggestion and used with caution.
In the case where virtual key detection have received safety detection instruction, to all APP in system and/or All installation kits carry out risk supervision, and the risk supervision can set detection project according to demand, if for example, when user is current Between it is more nervous, then can be quick detection, when user time takes it easy, it is possible to detected totally.Carrying out quickly During detection, it can be detected just for installation kit or APP, and not all be detected;Examined totally During survey, it is possible to be all to be detected installation kit and APP.User can use different detection modes to carry out safety detection, Better user experience.
When detecting the APP and/or installation kit with risk, it is possible to by APP and/or installation kit according to default danger Grade is sorted out, for example, danger classes higher various types of risks are all referred to together, danger classes is relatively low Various types of risks be also all referred to together, be according to default danger when user sees testing result so Grade sorted out after result, further each and every one check which is than relatively hazardous project without user.
In the provisioning process, preferential to set two kinds of risk class, i.e. excessive risk and low-risk, so, user was using Cheng Zhong, directly can just be handled excessive risk, and consider to ignore low-risk.Certainly, also may be used in the provisioning process To set three risk class or four risk class, still, set excessive risk class that user can be made to use process In cannot be distinguished by emphasis and non-emphasis, produce bad Consumer's Experience, therefore, the present embodiment suggestion sets two kinds of risk class, To obtain more preferable Consumer's Experience.
After being presented on screen, it can also further determine whether to receive and check that the operation of risk details refers to Order.Reception for the operational order or received by pre-setting a button.
In the case where receiving the operational order for checking risk details, the detailed letter of risk is presented on screen Breath.For example, when detecting the risk of a low-risk, user can click on the risk, enter the detailed of the risk Checked in thin information, so as to the more comprehensive understanding risk of user.
In the case where detecting risk, it is necessary to handle the risk of excessive risk, accordingly it is also possible to be to set one one Key clears up button, in the case where the button receives trigger signal, cleans out the risk of excessive risk, for example, deleting risk Risk script, the corresponding APP of unloading risk, the corresponding installation kit of deletion risk item in item corresponding A PP.
After being presented on screen, it can also judge whether default processing button receives trigger signal.Receiving In the case of trigger signal, according to risk present in default processing rule process APP and/or installation kit.
Wherein, judge to include when whether default processing button receives trigger signal:Detecting the risk of user's selection is The no risk for containing all excessive risks detected;In the case of the risk not comprising all excessive risks, in screen Prompt message frame is ejected on curtain, is not selected all also with the risk item for pointing out user to there is excessive risk;Containing all high wind In the case of the risk of danger, judge whether default processing button receives trigger signal.
When whether the risk item for detecting user's selection contains the risk of all excessive risks detected, first detection is The no risk that there is excessive risk;In the risk that there is excessive risk, whether the risk of detection user's selection contains inspection The risk for all excessive risks measured.
During realization, ejected on screen after prompt message frame, can also determine whether that receiving instruction continues The instruction of processing;In the case where receiving the instruction for indicating to continue with, judge whether default processing button receives triggering Signal;In the case where not receiving the instruction for indicating to continue with, the risk of user's selection is continued to, to detect user Whether the risk item of selection contains the risk of all excessive risks detected.
During realization, it can be wrapped according to risk present in default processing rule process APP and/or installation kit Include:Delete the risk item script in risk corresponding A PP, the corresponding APP of unloading risk, delete the corresponding installation of risk Bag.
Said process is described in detail below in conjunction with the accompanying drawings.
As shown in figure 4, in the case that APP receives safety detection instruction, carrying out safety detection, i.e. scanning system Interior all APP and all installation kits.Can be the detection carried out according to the difference of risk classifications during detection, As shown in figure 4, be applied according to risk, the different type such as viral wooden horse, payment risk, system vulnerability, account safety is carried out Scanning, during scanning, user can click on " stopping " at any time to stop scanning.
As shown in figure 5, when overall killing is over, and completes safety detection, each risk can be presented on screen .Interface shown in Fig. 5 is then the situation that risk is not present, if there is risk, and there is excessive risk, then occurs Interface as shown in Figure 6, excessive risk has just been checked when occurring;If there is risk, but in the absence of excessive risk, Interface as shown in Figure 7 so just occurs, in the interface, due in the absence of excessive risk, therefore, boundary not being appeared in The risk being just checked on face, but need user to choose.
When user is clicked inside the details of risk, the interface as shown in Fig. 8 or Fig. 9 will be presented, due to this reality It is to be directed to APP and the two kinds of main body of installation kit to apply example, therefore, may all have risk for application or installation kit, So having different display interfaces.
The situation for high-risk grade is shown in Fig. 8 and Fig. 9, and medium risk grade and low risk level are equally fitted With here is omitted.
Alternatively, in the present embodiment, above-mentioned storage medium can include but is not limited to:USB flash disk, read-only storage (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), mobile hard disk, magnetic disc or CD etc. is various can be with the medium of store program codes.Alternatively, in the present embodiment, processor has been deposited according in storage medium The program code of storage performs the method and step of above-described embodiment record.Alternatively, the specific example in the present embodiment may be referred to Example described in above-described embodiment and optional embodiment, the present embodiment will not be repeated here.Obviously, the technology of this area Personnel should be understood that above-mentioned each module of the invention or each step can be realized with general computing device, and they can be with Concentrate on single computing device, or be distributed on the network that multiple computing devices are constituted, alternatively, they can be used Computing device executable program code is realized, it is thus possible to be stored in storage device by computing device to hold OK, and in some cases, can to perform shown or described step different from order herein, or by they point Each integrated circuit modules is not fabricated to, or the multiple modules or step in them are fabricated to single integrated circuit module Realize.So, the present invention is not restricted to any specific hardware and software combination.
Further, above-mentioned storage medium of the invention is in the presence of with form of memory, and it can also be arranged on mobile terminal In, therefore, the embodiment of the present invention can also provide a kind of mobile terminal, at least including memory, processor, be stored on memory There is a computer program, realized during computer program of the processor on memory is performed above-mentioned the step of state method.
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row His property is included, so that process, method, article or device including a series of key elements not only include those key elements, and And also including other key elements being not expressly set out, or also include for this process, method, article or device institute inherently Key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including this Also there is other identical element in process, method, article or the device of key element.
The embodiments of the present invention are for illustration only, and the quality of embodiment is not represented.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Understood based on such, technical scheme is substantially done to prior art in other words Going out the part of contribution can be embodied in the form of software product, and the computer software product is stored in a storage medium In (such as ROM/RAM, magnetic disc, CD), including some instructions are to cause a station terminal (can be mobile phone, computer, service Device, air conditioner, or network equipment etc.) perform method described in each of the invention embodiment.
Embodiments of the invention are described above in conjunction with accompanying drawing, but the invention is not limited in above-mentioned specific Embodiment, above-mentioned embodiment is only schematical, rather than restricted, one of ordinary skill in the art Under the enlightenment of the present invention, in the case of present inventive concept and scope of the claimed protection is not departed from, it can also make a lot Form, these are belonged within the protection of the present invention.

Claims (10)

1. a kind of method of detecting system security, it is characterised in that including:
Detect whether that the safety detection for receiving application software APP is instructed;
In the case where receiving the safety detection instruction, sector-style is entered to all APP and/or all installation kits in system Danger detection;
The APP and/or installation kit that detect risk are sorted out according to default danger classes, and are presented on screen.
2. the method as described in claim 1, it is characterised in that detect whether to receive application software APP safety detection Before instruction, in addition to:
Details are set for each risk, the details include:Risk classifications, danger classes and suggestion for operation, its In, the danger classes at least includes:Excessive risk and low-risk.
3. the method as described in claim 1, it is characterised in that after being presented on screen, in addition to:
Judge whether to receive the operational order for checking risk details;
In the case where receiving the operational order for checking risk details, the detailed of the risk is presented on screen Information.
4. method as claimed any one in claims 1 to 3, it is characterised in that after being presented on screen, in addition to:
Judge whether default processing button receives trigger signal;
In the case where receiving the trigger signal, according in APP described in default processing rule process and/or the installation kit The risk of presence.
5. method as claimed in claim 4, it is characterised in that judge whether default processing button receives trigger signal, is wrapped Include:
Whether the risk item of detection user's selection contains the risk of all excessive risks detected;
In the case of the risk not comprising all excessive risks, prompt message frame is ejected on screen, to point out user to deposit In risk item also not all selections of excessive risk;
In the case where containing the risk of all excessive risks, judge whether the default processing button receives triggering letter Number.
6. method as claimed in claim 5, it is characterised in that whether the risk of detection user's selection contains what is detected The risk of all excessive risks, including:
Detect whether the risk that there is excessive risk;
In the risk that there is excessive risk, whether the risk item that detection user selects contains all excessive risks detected Risk.
7. method as claimed in claim 5, it is characterised in that on screen after ejection prompt message frame, in addition to:
Judge whether to receive the instruction for indicating to continue with;
In the case where receiving the instruction for indicating to continue with, judge whether the default processing button receives triggering Signal;
In the case where not receiving the instruction for indicating to continue with, the risk of user's selection is continued to, to detect Whether the risk item of user's selection contains the risk of all excessive risks detected.
8. method as claimed in claim 4, it is characterised in that according to APP and/or the peace described in default processing rule process Risk present in dress bag, including:
Delete the risk item script in risk corresponding A PP, the corresponding APP of unloading risk, delete the corresponding installation of risk Bag.
9. a kind of storage medium, be stored with computer program, it is characterised in that real when the computer program is executed by processor Any one of existing claim 1 to 8 the step of method.
10. a kind of mobile terminal, at least including memory, processor, be stored with computer program, its feature on the memory It is, side any one of claim 1 to 8 is realized during computer program of the processor on the memory is performed The step of method.
CN201710294082.9A 2017-04-28 2017-04-28 Method, storage medium and the mobile terminal of detecting system security Pending CN107045609A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710294082.9A CN107045609A (en) 2017-04-28 2017-04-28 Method, storage medium and the mobile terminal of detecting system security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710294082.9A CN107045609A (en) 2017-04-28 2017-04-28 Method, storage medium and the mobile terminal of detecting system security

Publications (1)

Publication Number Publication Date
CN107045609A true CN107045609A (en) 2017-08-15

Family

ID=59546908

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710294082.9A Pending CN107045609A (en) 2017-04-28 2017-04-28 Method, storage medium and the mobile terminal of detecting system security

Country Status (1)

Country Link
CN (1) CN107045609A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107563189A (en) * 2017-08-24 2018-01-09 东软集团股份有限公司 One kind applies detection method and terminal
CN109753807A (en) * 2019-01-09 2019-05-14 国家保密科技测评中心 Safety detection method and device
US10846402B2 (en) 2017-10-09 2020-11-24 Advanced New Technologies Co., Ltd. Security scanning method and apparatus for mini program, and electronic device
CN112685733A (en) * 2020-12-24 2021-04-20 北京小米移动软件有限公司 Security detection method, security detection device, and storage medium

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101513008A (en) * 2006-07-31 2009-08-19 意大利电信股份公司 System for implementing safety of telecommunication terminal
CN102779257A (en) * 2012-06-28 2012-11-14 奇智软件(北京)有限公司 Security detection method and system of Android application program
CN102831338A (en) * 2012-06-28 2012-12-19 北京奇虎科技有限公司 Security detection method and system of Android application program
CN103150510A (en) * 2013-03-18 2013-06-12 珠海市君天电子科技有限公司 Method and device for processing malicious behaviors of software
CN103366121A (en) * 2012-03-26 2013-10-23 腾讯科技(深圳)有限公司 Safety inspection method, device and system
CN103377341A (en) * 2012-04-28 2013-10-30 北京网秦天下科技有限公司 Method and system for security detection
CN103577301A (en) * 2012-07-20 2014-02-12 腾讯科技(深圳)有限公司 Method and terminal for displaying progress information
CN103838731A (en) * 2012-11-21 2014-06-04 腾讯科技(深圳)有限公司 Method and terminal for processing data
CN104050417A (en) * 2014-07-04 2014-09-17 北京奇虎科技有限公司 Method and device for detecting software states at mobile terminal
CN106295321A (en) * 2016-08-12 2017-01-04 中国银联股份有限公司 The Risk Identification Method of a kind of software installation process and device

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101513008A (en) * 2006-07-31 2009-08-19 意大利电信股份公司 System for implementing safety of telecommunication terminal
CN103366121A (en) * 2012-03-26 2013-10-23 腾讯科技(深圳)有限公司 Safety inspection method, device and system
CN103377341A (en) * 2012-04-28 2013-10-30 北京网秦天下科技有限公司 Method and system for security detection
CN102779257A (en) * 2012-06-28 2012-11-14 奇智软件(北京)有限公司 Security detection method and system of Android application program
CN102831338A (en) * 2012-06-28 2012-12-19 北京奇虎科技有限公司 Security detection method and system of Android application program
CN103577301A (en) * 2012-07-20 2014-02-12 腾讯科技(深圳)有限公司 Method and terminal for displaying progress information
CN103838731A (en) * 2012-11-21 2014-06-04 腾讯科技(深圳)有限公司 Method and terminal for processing data
CN103150510A (en) * 2013-03-18 2013-06-12 珠海市君天电子科技有限公司 Method and device for processing malicious behaviors of software
CN104050417A (en) * 2014-07-04 2014-09-17 北京奇虎科技有限公司 Method and device for detecting software states at mobile terminal
CN106295321A (en) * 2016-08-12 2017-01-04 中国银联股份有限公司 The Risk Identification Method of a kind of software installation process and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
跑跑车安卓网: ""360手机卫士symbian版3.8.8"", 《HTTP://WWW.PAOPAOCHE.NET/ANDROID/20359.HTML》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107563189A (en) * 2017-08-24 2018-01-09 东软集团股份有限公司 One kind applies detection method and terminal
US10846402B2 (en) 2017-10-09 2020-11-24 Advanced New Technologies Co., Ltd. Security scanning method and apparatus for mini program, and electronic device
CN109753807A (en) * 2019-01-09 2019-05-14 国家保密科技测评中心 Safety detection method and device
CN112685733A (en) * 2020-12-24 2021-04-20 北京小米移动软件有限公司 Security detection method, security detection device, and storage medium

Similar Documents

Publication Publication Date Title
CN108551411A (en) Collecting method, mobile terminal and computer readable storage medium
CN107729133A (en) A kind of method, terminal and computer-readable recording medium for running application program
CN107895561A (en) Method, terminal and the computer-readable recording medium of a kind of intelligent bright screen and the screen that goes out
CN107315937A (en) A kind of method for secret protection, mobile terminal and computer-readable recording medium
CN107045609A (en) Method, storage medium and the mobile terminal of detecting system security
CN107395850A (en) A kind of social communication information guard method, device and computer-readable recording medium
CN107678634A (en) The method to set up and terminal of game mode, computer-readable recording medium
CN107577394A (en) A kind of message treatment method, equipment and computer-readable storage medium
CN107506646A (en) Detection method, device and the computer-readable recording medium of malicious application
CN107517321A (en) Terminal pattern switching method, mobile terminal and computer-readable recording medium
CN109687974A (en) APK verification method, device, mobile terminal and readable storage medium storing program for executing
CN108075899A (en) A kind of auth method, mobile terminal and computer readable storage medium
CN107341067A (en) A kind of keys deactivation processing method, equipment and computer-readable recording medium
CN109901980A (en) Serial ports log grabs circuit, method, terminal and computer readable storage medium
CN107276991A (en) Load method, equipment and the computer-readable recording medium of Web page
CN107506039A (en) Mobile terminal, data transmission method and computer-readable storage medium
CN107172605A (en) A kind of Emmergency call method, mobile terminal and computer-readable recording medium
CN107622213A (en) A kind of data access method, terminal and computer-readable recording medium
CN108540458A (en) A kind of method of client checks, equipment, server and storage medium
CN107347117A (en) A kind of message management method, mobile terminal and computer-readable recording medium
CN107562586A (en) A kind of internal-memory detection method, equipment and computer-readable storage medium
CN107368241A (en) A kind of information processing method, equipment and computer-readable recording medium
CN107450796A (en) A kind of image processing method, mobile terminal and computer-readable recording medium
CN108510264A (en) Method of payment, mobile terminal and readable storage medium storing program for executing
CN107194217A (en) User data access control method, equipment and computer-readable recording medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170815