CN101339596A - Method and device for protecting computer software system - Google Patents

Method and device for protecting computer software system Download PDF

Info

Publication number
CN101339596A
CN101339596A CNA2008101467059A CN200810146705A CN101339596A CN 101339596 A CN101339596 A CN 101339596A CN A2008101467059 A CNA2008101467059 A CN A2008101467059A CN 200810146705 A CN200810146705 A CN 200810146705A CN 101339596 A CN101339596 A CN 101339596A
Authority
CN
China
Prior art keywords
key operation
risk
program
value
threshold value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2008101467059A
Other languages
Chinese (zh)
Inventor
王宇
陈旭东
任翔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CNA2008101467059A priority Critical patent/CN101339596A/en
Publication of CN101339596A publication Critical patent/CN101339596A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The embodiment of the invention discloses a method for protecting a computer software system and a device thereof. The method comprises: endowing risk threshold values to each key operation of the computer software system in advance; evaluating the risk value that a procedure which triggers any key operation is a vicious procedure, and when the risk value reaches the risk threshold value of the key operation, the user is asked whether the key operation is allowed; if the entering triggering of the users allowing the key operation is received, the key operation is allowed to be implemented; otherwise, the implementing of the key operation is forbidden. The device comprises a risk threshold storage module, a risk evaluation module and a user prompting module. The application of the method or the device of the embodiment of the invention can reduce the interferences to the users caused by the protecting of the computer software system.

Description

A kind of method and apparatus that computer software is protected
Technical field
The present invention relates to the computer security technique field, relate in particular to a kind of method and apparatus that computer software is protected.
Background technology
In order to prevent rogue program invasion computer software, need protect computer software.Wherein, rogue program is meant, destroys function or the framework or the data of computer software, the program that causes described software systems normally to move; Relative with rogue program, normal procedure can not destroy function or the framework or the data of computer software.
At present, there is a kind of key operation whether to be triggered the method that described system is protected according to computer software.Wherein, the key operation of system is meant, rogue program needs the operation of execution usually when the invasion computer software, these operations usually are the operations to the sensitive position of described system, for example, to the modification of computer software registry boot item, to the modification of specific file or specific process in the described system etc., sensitive position wherein is meant the function of described system or the bigger software module of framework influence, for example described registration table, specific file and specific process.
Whether be triggered the method that described system is protected to describe in detail to existing this key operation below according to computer software.
Fig. 1 is that whether the key operation according to computer software is triggered the method flow diagram that described system is protected in the prior art, and as shown in Figure 1, this method comprises:
Step 101, whether the key operation of monitoring computer software systems is triggered, if, execution in step 102, otherwise continue monitoring.
Step 102, the invoke user attention program.
Step 103, user prompt program inquire whether the user allows the key operation that is triggered, if, execution in step 104, otherwise execution in step 105.
Step 104 is carried out described key operation, process ends.
Step 105 forbids carrying out described key operation, process ends.
Fig. 2 is the synoptic diagram that adopts method shown in Figure 1 that computer software is protected.
As shown in Figure 2, be mounted with program hook (Hook point) in the key operation module of computer software, when the key operation in this key operation module is triggered, the Hook point can be before key operation be carried out, the invoke user attention program comes pop-up window inquiry user whether to allow this key operation, if receiving the user, the user prompt program allow the affirmation of this key operation to trigger, then return the message that allows to carry out described key operation to the Hook point, otherwise, return the message of forbidding carrying out described key operation to the Hook point.If the Hook point has been received the message that allows to carry out described key operation, then key operation module is carried out corresponding key operation, if the Hook point has been received the message of forbidding carrying out described key operation, then key operation module forbids carrying out corresponding key operation, and returns from this Hook point.
As seen from the above technical solution; whether the key operation according to computer software at present is triggered in the method that described system is protected; as long as key operation is triggered; then the Hook point that is embedded in of this key operation place module will the invoke user attention program; whether the prompting user allows to carry out described key operation; and in actual applications; described key operation might not all be triggered by rogue program; often triggered by normal procedure, as long as this key operation method of promptly pointing out the user that is triggered is bigger to the interference that the user brings.
Summary of the invention
In view of this, the purpose of the embodiment of the invention is to provide a kind of method and apparatus that computer software is protected, to reduce that computer software is protected the interference that brings to the user.
For achieving the above object, the technical scheme of the embodiment of the invention specifically is achieved in that
A kind of method that computer software is protected, this method comprises:
Give risk threshold value for each key operation of computer software in advance;
The program that assessment triggers arbitrary key operation is the value-at-risk of rogue program, and when this value-at-risk reached the risk threshold value of described key operation, whether the inquiry user allowed this key operation;
Allow the affirmation of described key operation to trigger if receive the user, then allow to carry out described key operation, otherwise, forbid carrying out described key operation.
A kind of device that computer software is protected, this device comprises risk threshold value memory module, risk evaluation module and user prompt module;
Described risk threshold value memory module is used to store the risk threshold value of giving for each operation of computer software in advance;
Described risk evaluation module, the program that assessment triggers described key operation is the value-at-risk of rogue program, obtain the risk threshold value of described key operation from described risk threshold value memory module, more described value-at-risk and described risk threshold value, when this value-at-risk reaches the risk threshold value of described key operation, send the prompting indication to described user prompt module, after receiving the permission indication that user prompt module sends, allow to carry out described key operation, receive that user prompt module sends forbid indication after, forbid carrying out described key operation;
Described user prompt module, be used to receive prompting indication from described risk evaluation module, whether the inquiry user allows the corresponding key operation of described prompting indication, when receiving that the user allows the affirmation of described key operation to trigger, send the permission indication to described risk evaluation module, when receiving that the user forbids that the affirmation of described key operation triggers, forbid indication to described risk evaluation module transmission.
As seen, in embodiments of the present invention, give risk threshold value for each key operation of computer software in advance, the program that assessment triggers described key operation is the value-at-risk of rogue program, and when this value-at-risk reached the risk threshold value of described key operation, whether the inquiry user allowed this key operation, allow the affirmation of described key operation to trigger if receive the user, then allow to carry out described key operation, otherwise, forbid carrying out described key operation.Because before the key operation whether the inquiry user allows to be triggered; it is the value-at-risk of rogue program that assessment earlier triggers the program of described key operation; only when this value-at-risk reaches the risk threshold value of giving for described key operation in advance; inquire just whether the user allows this key operation; therefore; with in the prior art as long as key operation is triggered and inquires that promptly the user compares, reduced computer software is protected the interference that brings to the user.
Description of drawings
Fig. 1 is that whether the key operation according to computer software is triggered the method flow diagram that described system is protected in the prior art;
Fig. 2 is the synoptic diagram that adopts method shown in Figure 1 that computer software is protected;
Fig. 3 is the process flow diagram of the method that computer software is protected that provides of the embodiment of the invention;
Fig. 4 is the synoptic diagram that adopts method shown in Figure 3 that computer software is protected;
Fig. 5 is first structural drawing of the device that computer software is protected that provides of the embodiment of the invention;
Fig. 6 is second structural drawing of the device that computer software is protected that provides of the embodiment of the invention.
Embodiment
In the embodiment of the invention, give risk threshold value for each key operation of computer software in advance, the program that assessment triggers described key operation is the value-at-risk of rogue program, when this value-at-risk reaches the risk threshold value of described key operation, whether the inquiry user allows this key operation, allows the affirmation of described key operation to trigger if receive the user, then allows to carry out described key operation, otherwise, forbid carrying out described key operation.
For making purpose of the present invention, technical scheme and advantage clearer, below with reference to the accompanying drawing embodiment that develops simultaneously, the present invention is described in more detail.
Fig. 3 is the process flow diagram of the method that computer software is protected that provides of the embodiment of the invention, and as shown in Figure 3, this method comprises:
Step 301 is given risk threshold value for each key operation of computer software in advance.
In this step, can give different risk threshold values for the different key operation of computer software, for example, for a lower risk threshold value is given in the operation of revising registration table, for specific process is given higher risk threshold value, wherein, risk threshold value is low more, shows that the program that triggers this key operation is that the probability of rogue program is big more.Also can give identical risk threshold value for described different key operation.
Risk threshold value in this step can be that computer software is given, i.e. given described risk threshold value when designing a calculating machine software systems; Described risk threshold value also can be by artificial setting.
Step 302, whether the key operation of monitoring computer software systems is triggered, if, execution in step 303, otherwise, execution in step 302 continued.
In this step, can in the module at the key operation place of computer software, the Hook point be set,, then need to trigger earlier the Hook point, therefore,, represent that then this key operation is triggered if the Hook point has been triggered if carry out described key operation.
Step 303, the program that assessment triggers described key operation is the value-at-risk of rogue program.
In this step, can judge whether the program that triggers described key operation has the feature that described rogue program is different from normal procedure, if, then should trigger the value-at-risk of the program of described key operation according to described feature evaluation, if not, the value-at-risk that then shows the program that this triggers described key operation is 0, i.e. the program of the described key operation of this triggering can not be a rogue program.
Particularly, each feature that can be in advance be different from normal procedure for the rogue program that can trigger described key operation is given the risk weights, when the program that triggers described key operation has the feature of described rogue program, risk weights according to described feature are assessed the value-at-risk that this triggers the program of described key operation, for example, the number that has the feature of described rogue program when the program that triggers described key operation is (to comprise two) more than two, the value-at-risk of the program that obtains triggering described key operation of the risk weights of described feature can being added up.The logic that also can adopt other is obtained triggering the value-at-risk of the program of described key operation by the risk weights of described feature, for example, when the program that triggers described key operation possesses certain two or more specific described feature simultaneously, after the risk weights of described certain two or more specific described feature are added up, again accumulation result be multiply by extra weights, adopt this logic be because, when the program that triggers described key operation possesses certain two or more specific described feature simultaneously, this program is that the probability of rogue program is bigger, therefore need multiply by extra weights again.
The act instantiation describes the appraisal procedure of value-at-risk below.
The feature that rogue program has usually has the shell of adding, does not beat signature, does not have version information, the company that do not produce, file attribute be for hiding, and gives weights for these features in advance, specifically sees Table one:
Feature Add shell Do not beat signature No version information No product company File attribute is for hiding
The risk weights a1 a2 a3 a4 a5
Table one
The risk threshold value of supposing a certain key operation is b, has the shell of adding if trigger the program of this key operation, file attribute is for hiding these two features, when the logic that adds up when the risk weights that adopt described feature obtains the value-at-risk of this program, value-at-risk=the a1+a5 of this program then, if when adopting the program that triggers key operation to possess two or more special characteristics simultaneously, when the logic that again accumulation result be multiply by extra weights after the risk weights of described special characteristic are added up obtains the value-at-risk of this program, add shell and file attribute for hiding if comprise in the described special characteristic, the value-at-risk of this program=(a1+a5) * A then, wherein, A is extra weights, and the value of A is greater than 1.
Step 304 judges whether described value-at-risk reaches the risk threshold value of described key operation, if, execution in step 305, otherwise return step 302.
Be example still, if a1+a5 〉=b represents that then the value-at-risk of this program has reached the risk threshold value of described key operation with the instantiation in the step 303.
Step 305, whether the inquiry user allows this key operation, if, execution in step 306, otherwise, execution in step 307.
In this step, the value-at-risk that triggers the program of described key operation can be shown or export to the user,, and then make the affirmation that whether allows this key operation and trigger so that the user understands the hazard level of described program.
Step 306 allows to carry out described key operation, process ends.
Step 307 forbids carrying out described key operation, process ends.
Fig. 4 is the synoptic diagram that adopts method shown in Figure 3 that computer software is protected.
As shown in Figure 4, be mounted with the Hook point in the key operation module of computer software, when the key operation in this key operation module is triggered, the Hook point can be before key operation be carried out, call risk assessment procedures and assess the value-at-risk of the program that triggers described key operation, when this value-at-risk reaches in advance the risk threshold value of setting for described key operation, the invoke user attention program comes pop-up window inquiry user whether to allow this key operation, if described value-at-risk does not reach described risk threshold value, then never call described user prompt program.Wherein, when the feature that is different from normal procedure according to rogue program is assessed the value-at-risk of the program that triggers described key operation, those skilled in the art learn assess described value-at-risk according to described feature after, whether possesses described feature as long as judge the program that triggers key operation, the risk weights of the feature that this program is had according to certain logic carry out computing then, can obtain the value-at-risk of this program, and the determining program common practise that whether to have a certain described feature be those skilled in the art how.
After described user prompt program is called, if receiving the user, described user prompt program allow the affirmation of this key operation to trigger, then return the message that allows to carry out described key operation to the Hook point, otherwise, the message of forbidding carrying out described key operation returned to the Hook point.If the Hook point has been received the message that allows to carry out described key operation, then key operation module is carried out corresponding key operation, if the Hook point has been received the message of forbidding carrying out described key operation, then key operation module forbids carrying out corresponding key operation, and returns from this Hook point.
Fig. 5 is first structural drawing of the device that computer software is protected that provides of the embodiment of the invention, and as shown in Figure 5, this device comprises risk threshold value memory module 501, risk evaluation module 502 and user prompt module 503.
Risk threshold value memory module 501 is used to store the risk threshold value of giving for each operation of computer software in advance.
Risk evaluation module 502, the program that assessment triggers described key operation is the value-at-risk of rogue program, obtain the risk threshold value of described key operation from risk threshold value memory module 501, more described value-at-risk and described risk threshold value, when this value-at-risk reaches the risk threshold value of described key operation, send the prompting indication to user prompt module 503, after receiving the permission indication that user prompt module 503 sends, allow to carry out described key operation, receive that user prompt module 503 sends forbid indication after, forbid carrying out described key operation.
User prompt module 503, be used to receive prompting indication from risk evaluation module 502, whether the inquiry user allows the corresponding key operation of described prompting indication, when receiving that the user allows the affirmation of described key operation to trigger, send the permission indication to risk evaluation module 502, when receiving that the user forbids that the affirmation of described key operation triggers, forbid indication to risk evaluation module 502 transmissions.
Fig. 6 is second structural drawing of the device that computer software is protected that provides of the embodiment of the invention.
As shown in Figure 6, this device comprises risk threshold value memory module 601, risk evaluation module 602 and user prompt module 603, and risk threshold value memory module 601 is wherein distinguished corresponding identical with the risk threshold value memory module 501 among Fig. 5 with user prompt module 503 with user prompt module 603.
Risk evaluation module 602 comprises key operation monitoring modular 6021, risk judge module 6022 and key operation enable module 6023.
Whether key operation monitoring modular 6021 is used to monitor key operation and is triggered, and when described key operation is triggered, sends the judgement indication to risk judge module 6022.
Risk judge module 6022, the program that is used for triggering described key operation according to described judgement indication assessment is the value-at-risk of rogue program, obtain the risk threshold value of described key operation from risk threshold value memory module 601, more described value-at-risk and described risk threshold value, when this value-at-risk reaches the risk threshold value of described key operation, send the prompting indication to user prompt module 603.
Key operation enable module 6023, be used to receive the permission indication that user prompt module 603 sends after, allow to carry out described key operation, receive that user prompt module 603 sends forbid indication after, forbid carrying out described key operation.
Risk judge module 6022, the rogue program that can trigger described key operation be can also be used to store and the feature of normal procedure and the corresponding relation of risk weights are different from, according to described corresponding relation with trigger the described feature that the program of described key operation has, the program that assessment triggers described key operation is the value-at-risk of rogue program, obtain the risk threshold value of described key operation from risk threshold value memory module 601, more described value-at-risk and described risk threshold value, when this value-at-risk reaches the risk threshold value of described key operation, send the prompting indication to user prompt module 603.
As seen from the above technical solution; because after key operation is triggered; before the key operation whether the inquiry user allows to be triggered; it is the value-at-risk of rogue program that assessment earlier triggers the program of described key operation; done once suspicious judgement earlier by the device assisting users that computer software is protected; only when this value-at-risk reaches the risk threshold value of giving for described key operation in advance; inquire just whether the user allows this key operation; with in the prior art as long as key operation is triggered and inquires that promptly the user compares, reduced computer software is protected the interference that brings to the user.
The above is preferred embodiment of the present invention only, is not to be used to limit protection scope of the present invention, all any modifications of being made within the spirit and principles in the present invention, is equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (12)

1, a kind of method that computer software is protected is characterized in that, this method comprises:
Give risk threshold value for each key operation of computer software in advance;
The program that assessment triggers arbitrary key operation is the value-at-risk of rogue program, and when this value-at-risk reached the risk threshold value of described key operation, whether the inquiry user allowed this key operation;
Allow the affirmation of described key operation to trigger if receive the user, then allow to carry out described key operation, otherwise, forbid carrying out described key operation.
2, the method for claim 1 is characterized in that, the program of the described key operation of assessment triggering is that the value-at-risk of rogue program comprises:
Each feature that is different from normal procedure for the rogue program that can trigger described key operation is given the risk weights in advance;
Judge whether the program that triggers described key operation has described feature, if then assess the value-at-risk that this triggers the program of described key operation according to the risk weights of described feature.
3, method as claimed in claim 2 is characterized in that, assesses this value-at-risk that triggers the program of described key operation according to the risk weights of described feature and comprises:
If triggering the number that the program of described key operation has described feature is more than two, the add up value-at-risk of the program that obtains triggering described key operation of risk weights that then will this plural feature.
4, method as claimed in claim 2 is characterized in that, assesses this value-at-risk that triggers the program of described key operation according to the risk weights of described feature and comprises:
Have two or more specific described features if trigger the program of described key operation, then the risk weights with this two or more specific described feature add up, accumulation result be multiply by extra weights, obtain triggering the value-at-risk of the program of described key operation.
5, method as claimed in claim 2 is characterized in that, the feature that the rogue program that can trigger described key operation is different from normal procedure comprises:
Add shell, do not beat signature, do not have version information, the company that do not produce, file attribute be for hiding.
6, the method for claim 1 is characterized in that, describedly gives risk threshold value for each key operation of computer software in advance and comprises:
Give different risk threshold values for the different key operation of computer software in advance.
7, the method for claim 1 is characterized in that, describedly gives risk threshold value for each key operation of computer software in advance and comprises:
By the risk threshold value of given each key operation of computer software, perhaps by the described risk threshold value of artificial setting.
8, the method for claim 1 is characterized in that, the program that assessment triggers described key operation is before the value-at-risk of rogue program, and this method further comprises:
Whether monitor described key operation is triggered.
9, the method for claim 1 is characterized in that, whether described inquiry user allows this key operation to comprise:
The inquiry user when whether allowing this key operation, show or export described value-at-risk.
10, a kind of device that computer software is protected is characterized in that, this device comprises risk threshold value memory module, risk evaluation module and user prompt module;
Described risk threshold value memory module is used to store the risk threshold value of giving for each operation of computer software in advance;
Described risk evaluation module, the program that assessment triggers described key operation is the value-at-risk of rogue program, obtain the risk threshold value of described key operation from described risk threshold value memory module, more described value-at-risk and described risk threshold value, when this value-at-risk reaches the risk threshold value of described key operation, send the prompting indication to described user prompt module, after receiving the permission indication that user prompt module sends, allow to carry out described key operation, receive that user prompt module sends forbid indication after, forbid carrying out described key operation;
Described user prompt module, be used to receive prompting indication from described risk evaluation module, whether the inquiry user allows the corresponding key operation of described prompting indication, when receiving that the user allows the affirmation of described key operation to trigger, send the permission indication to described risk evaluation module, when receiving that the user forbids that the affirmation of described key operation triggers, forbid indication to described risk evaluation module transmission.
11, device as claimed in claim 10 is characterized in that, described risk evaluation module comprises key operation monitoring modular, risk judge module and key operation enable module;
Whether described key operation monitoring modular is used to monitor described key operation and is triggered, and when key operation is triggered, sends the judgement indication to described risk judge module;
Described risk judge module, the program that is used for triggering described key operation according to described judgement indication assessment is the value-at-risk of rogue program, obtain the risk threshold value of described key operation from described risk threshold value memory module, more described value-at-risk and described risk threshold value, when this value-at-risk reaches the risk threshold value of described key operation, send the prompting indication to described user prompt module;
Described key operation enable module, be used to receive the permission indication that user prompt module sends after, allow to carry out described key operation, receive that user prompt module sends forbid indication after, forbid carrying out described key operation.
12, device as claimed in claim 11 is characterized in that,
Described risk judge module, be used to store the rogue program that can trigger described key operation and be different from the feature of normal procedure and the corresponding relation of risk weights, according to described corresponding relation with trigger the described feature that the program of described key operation has, the program that assessment triggers described key operation is the value-at-risk of rogue program, obtain the risk threshold value of described key operation from described risk threshold value memory module, more described value-at-risk and described risk threshold value, when this value-at-risk reaches the risk threshold value of described key operation, send the prompting indication to described user prompt module.
CNA2008101467059A 2008-08-26 2008-08-26 Method and device for protecting computer software system Pending CN101339596A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2008101467059A CN101339596A (en) 2008-08-26 2008-08-26 Method and device for protecting computer software system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2008101467059A CN101339596A (en) 2008-08-26 2008-08-26 Method and device for protecting computer software system

Publications (1)

Publication Number Publication Date
CN101339596A true CN101339596A (en) 2009-01-07

Family

ID=40213662

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2008101467059A Pending CN101339596A (en) 2008-08-26 2008-08-26 Method and device for protecting computer software system

Country Status (1)

Country Link
CN (1) CN101339596A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101984450A (en) * 2010-12-15 2011-03-09 北京安天电子设备有限公司 Malicious code detection method and system
CN102576326A (en) * 2009-10-08 2012-07-11 日本电气株式会社 Operational surveillance device, operational surveillance method and program storage medium
CN103177214A (en) * 2011-12-23 2013-06-26 宇龙计算机通信科技(深圳)有限公司 Detection method, system and communication terminal of malicious software
CN103208039A (en) * 2012-01-13 2013-07-17 株式会社日立制作所 Method and device for evaluating software project risks
CN104217155A (en) * 2013-05-30 2014-12-17 宁夏新航信息科技有限公司 Method and device for protecting computer software
CN105046114A (en) * 2015-07-14 2015-11-11 上海斐讯数据通信技术有限公司 Method and system for preventing android application program from being hidden and intelligent terminal
CN105404806A (en) * 2015-12-03 2016-03-16 烟台南山学院 Computer software protection method and apparatus
CN105718811A (en) * 2016-01-22 2016-06-29 中国科学院软件研究所 User misoperation prevention system for network information system
CN106790211A (en) * 2017-01-06 2017-05-31 浙江中都信息技术有限公司 A kind of Mathematical Statistical System and method for predicting malware infection

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102576326B (en) * 2009-10-08 2015-08-19 日本电气株式会社 Operation monitoring equipment, operation monitoring method and program recorded medium
CN102576326A (en) * 2009-10-08 2012-07-11 日本电气株式会社 Operational surveillance device, operational surveillance method and program storage medium
CN101984450B (en) * 2010-12-15 2012-10-24 北京安天电子设备有限公司 Malicious code detection method and system
CN101984450A (en) * 2010-12-15 2011-03-09 北京安天电子设备有限公司 Malicious code detection method and system
CN103177214A (en) * 2011-12-23 2013-06-26 宇龙计算机通信科技(深圳)有限公司 Detection method, system and communication terminal of malicious software
CN103177214B (en) * 2011-12-23 2016-02-10 宇龙计算机通信科技(深圳)有限公司 The detection method of Malware, system and communication terminal
CN103208039A (en) * 2012-01-13 2013-07-17 株式会社日立制作所 Method and device for evaluating software project risks
CN104217155A (en) * 2013-05-30 2014-12-17 宁夏新航信息科技有限公司 Method and device for protecting computer software
CN105046114A (en) * 2015-07-14 2015-11-11 上海斐讯数据通信技术有限公司 Method and system for preventing android application program from being hidden and intelligent terminal
CN105046114B (en) * 2015-07-14 2018-07-24 上海斐讯数据通信技术有限公司 Prevent method, system and the intelligent terminal that android application programs are hidden
CN105404806A (en) * 2015-12-03 2016-03-16 烟台南山学院 Computer software protection method and apparatus
CN105404806B (en) * 2015-12-03 2018-07-24 烟台南山学院 A kind of method and apparatus that computer software is protected
CN105718811A (en) * 2016-01-22 2016-06-29 中国科学院软件研究所 User misoperation prevention system for network information system
CN106790211A (en) * 2017-01-06 2017-05-31 浙江中都信息技术有限公司 A kind of Mathematical Statistical System and method for predicting malware infection
CN106790211B (en) * 2017-01-06 2018-06-01 浙江中都信息技术有限公司 A kind of Mathematical Statistical System and method for predicting malware infection

Similar Documents

Publication Publication Date Title
CN101339596A (en) Method and device for protecting computer software system
CN101414997B (en) Method and apparatus for preventing malevolence program from accessing network
CN103605924B (en) A kind of method and device preventing rogue program attacking network from paying the page
CN101084504B (en) Integrated circuit with improved device security
CN107623687B (en) Anti-theft brushing method, operation detection method and device and electronic equipment
CN104348809A (en) Network security monitoring method and system
US20080035725A1 (en) Method to use cell phone location to authenticate or enable/disable authorization of credit cards
CN107508831B (en) Bus-based intrusion detection method
US20180359274A1 (en) Systems and methods for providing a notification of a cyber attack in a security system
CN103888282A (en) Network intrusion alarm method and system based on nuclear power plant
CN107368760A (en) A kind of electronic equipment condition processing method and device
CN107038391A (en) Method and apparatus for protecting data integrity by embedded system
EP3172692A1 (en) Remedial action for release of threat data
US20090328238A1 (en) Disabling encrypted data
Hamad et al. Red-Zone: Towards an Intrusion Response Framework for Intra-vehicle System.
CN111259382A (en) Malicious behavior identification method, device and system and storage medium
CN103595731A (en) System and method for protecting account security
CN106203119B (en) Hide processing method, device and the electronic equipment of cursor
CN111488576B (en) Method and system for protecting tampering of home page, electronic equipment and storage medium
CN105939321A (en) DNS (Domain Name System) attack detection method and device
US11790091B2 (en) Monitoring information-security coverage to identify an exploitable weakness in the information-securing coverage
US10623444B2 (en) Apparatus and method for analysis of binary targets to generate security policy
CN110784475A (en) Security defense method and device
CN104917737A (en) User account protection method and device
CN104331406A (en) Database capacity control method and database capacity control device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Open date: 20090107