CN102831358B - A kind of method and device preventing webpage tamper - Google Patents

A kind of method and device preventing webpage tamper Download PDF

Info

Publication number
CN102831358B
CN102831358B CN201210357004.6A CN201210357004A CN102831358B CN 102831358 B CN102831358 B CN 102831358B CN 201210357004 A CN201210357004 A CN 201210357004A CN 102831358 B CN102831358 B CN 102831358B
Authority
CN
China
Prior art keywords
browser
function
homepage
detecting module
process transfer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210357004.6A
Other languages
Chinese (zh)
Other versions
CN102831358A (en
Inventor
肖锐
肖鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qizhi Business Consulting Co ltd
Beijing Qihoo Technology Co Ltd
360 Digital Security Technology Group Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201210357004.6A priority Critical patent/CN102831358B/en
Publication of CN102831358A publication Critical patent/CN102831358A/en
Application granted granted Critical
Publication of CN102831358B publication Critical patent/CN102831358B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a kind of method and apparatus preventing webpage tamper, relate to field of computer technology, solve in prior art the method security locking browser homepage low, unreliable, the problem be easily tampered.Described method comprises: the process transfer of the detecting module detecting browser preset, and described process transfer comprises: browser calls the system function of Query Browser First page information; When detecting described process transfer, tackle this process transfer, and will to pre-set and the browser home address being stored in detecting module feeds back to the process transfer of described browser by described system function, for connecting and/or show the homepage preset.

Description

A kind of method and device preventing webpage tamper
Technical field
The present invention relates to field of computer technology, particularly relate to a kind of method and the device that prevent webpage tamper.
Background technology
Along with the development of internet, applications, the homepage of web browser has become the hotly contested spot of Malware, virus and each macroreticular fail-safe software manufacturer.Malware, virus are by distorting browser homepage, and the Webpage can browsed by browser after browser starts or the operation that returns to the homepage detected navigates to the page of virus or Malware deviser embedding, has a strong impact on the use of user.And each macroreticular fail-safe software manufacturer is experienced to provide better safety to user; the browser homepage of protection user is not maliciously tampered; competitively be proposed the function of locking browser homepage; make user can set the homepage of browser; the network security software provides a kind of method locking user browser homepage; be the homepage that user sets for locking the homepage of browser, to improve Consumer's Experience.But the method for existing locking browser homepage is easily closed Malware by virus and is cracked, and security is not high enough, preventing virus and Malware can not distort browser homepage completely, unreliable.Therefore, a kind of method of webpage tamper that prevents providing security higher becomes a problem in the urgent need to address.
Summary of the invention
Fundamental purpose of the present invention is to provide a kind of method and the device that prevent webpage tamper, with solve prior art exist preventing virus and Malware can not distort browser homepage completely, security is low, insecure problem, wherein: the method preventing webpage tamper of the embodiment of the present invention, comprising:
The process transfer of the detecting module detecting browser preset, described process transfer comprises: browser calls the system function of Query Browser home address;
When detecting described process transfer, tackle this process transfer, and will to pre-set and the browser home address being stored in detecting module feeds back to the process transfer of described browser by described system function, for connecting and/or show the homepage preset.
The device preventing webpage tamper of the embodiment of the present invention, comprising:
Detecting module, for detecting the process transfer of browser, described process transfer comprises: browser calls the system function of Query Browser home address;
Locking module, for when detecting described process transfer, tackle this process transfer, and will to pre-set and the browser home address being stored in detecting module feeds back to the process of described browser by described system function, for connecting and/or show the homepage preset.
Wherein, described default detecting module pre-sets the process transfer of at least one intercept point interception browser.According to technical scheme of the present invention, by pre-setting the system function of the process transfer Query Browser home address of at least one intercept point interception browser, and will to pre-set and the browser home address being stored in detecting module feeds back to the browser process calling this system function, for connecting and/or show the homepage preset, safe and reliablely can prevent virus or Malware distorting browser homepage, effectively improve Consumer's Experience.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme of the embodiment of the present invention, below the accompanying drawing used required in describing embodiment is briefly described, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is the schematic flow sheet of the method preventing webpage tamper according to an embodiment of the invention;
Fig. 2 is the structural representation of the device preventing webpage tamper according to an embodiment of the invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
In order to be that method of the present invention is more convenient for understanding, first the application briefly introduces the process that virus and Malware distort browser homepage.Browser in the present invention comprises: the IE(InternetExplorer of windows) browser, 360 secure browsers, red fox browser etc.The application is for the IE(InternetExplorer of windows) browser is introduced.
The configuration (as: IE home address, level of security, cache file deposit path etc.) of IE is stored in the registration table of Windows.In program development process, virus, Malware, the in addition network security software easily realize by the registration table revising Windows the homepage revising IE.The registration table application program interface function (such as: RegSetValue) of usual use Windows specifies the information such as item and value of the major key of registration table, sub-key, amendment.When " homepage " button of client terminal start-up IE or click IE toolbar being detected, the API of process (as iexplore.exe) the meeting calling system of browser goes to inquire about the key assignments that in registration table, browser homepage is corresponding, then connect the Website page that the key-value pair that obtains is answered, and show this page.The Website page now jumped to may be the page after virus or Malware are distorted.
In order to reach the object of locking IE homepage, stop virus or Malware distorting IE homepage, enable IE start or " homepage " button of corresponding click IE toolbar time connect and show the Website page pre-set, the method for the application adopts the realization of flow process as shown in Figure 1 to prevent from distorting webpage.
Step 101, the process transfer of the detecting module preset detecting browser, described process transfer comprises the system function that browser calls Query Browser home address.
The detecting module preset in the present embodiment comprises function library and this module runs the rear data file set up.Comprise the program code preventing webpage tamper in described function library, be stored in the data file of this module foundation after the browser home address encryption pre-set.When browser starts, first start detecting module.
After the detecting module preset starts, the process transfer of detecting real-time browser.
Step 102, when detecting described process transfer, tackles this process transfer, and will pre-set and the browser home address being stored in detecting module feeds back to described process transfer by described system function, for connecting and/or show the homepage preset.The process transfer of browser, after obtaining the Query Result of home address, can be connected to the website that this home address is corresponding, and shows this Website page, thus reaches the browser homepage of display setting, prevents malicious code from distorting the object of web page address.
Described default detecting module arranges Hook Function by the process transfer inquiry registration table at browser with the position of the function obtaining browser homepage key assignments, realizes the interception of the process transfer query function to browser.When the process transfer system function of browser, if the Hook Function of this function detected, then first call Hook Function, Hook Function is further calling system function again.Hook Function inside adds interception code, and the browser home address that system function can be returned is revised as the browser home address being stored in detecting module pre-set.Detecting module can arrange Hook Function in the position of the multiple system function of the process transfer of browser, to reach safer, stable interception result.
A kind of concrete technical scheme locking the method for IE homepage of the application is described with an IE specific embodiment below.
When IE starts, first want initialization com object, play up interface.Concrete function call process is as example below:
Call the main window message processing function of IE;
IEWinMain;
Call window main thread message processing function when IE starts;
BrowserThreadProc;
Call IE and play up interface main thread message processing function,
IEFrameWndProc;
CShellBrowser2::OnCreate function, creates and plays up interface.
Then, IE inquires about registration table, obtaining the station address of IE homepage, for being connected to this website, and showing corresponding Website page.Specifically call example as follows:
CShellBrowser2::ReplaceCmdLine, obtains related command line parameter when IE starts;
GetStdLocation, obtains start-up parameter further;
URLSubRegQueryW, the registration table homepage started for inquiring about IE is correlated with key assignments;
SHRegGetUSValueW, the registration table homepage started for inquiring about IE is correlated with key assignments;
RegQueryValueExA, the registration table homepage started for inquiring about IE is correlated with key assignments;
RegQueryValueExW, the registration table homepage started for inquiring about IE is correlated with key assignments;
After executing aforesaid operations, obtain the key assignments of the homepage of IE in the HIVE structure of process internal memory from registration table of the inquiry registration table of IE, i.e. home address, the home address herein obtained is used for connect, and shows corresponding Website page.
But, the homepage key assignments in HIVE structure may be have modified due to virus or Malware, therefore, what obtain may be the home address be tampered, if the home address obtained is used for connect herein, and showing corresponding Website page, the homepage of browser display will be the Website page that virus or Malware are arranged, and the use sense having had a strong impact on user is subject to.
The position of the functions such as CShellBrowser2::ReplaceCmdLine arranges intercept point, tackle this to call, and the IE home address pre-set is fed back to the process calling this system function, as Query Result, website corresponding to this home address is connected to for browser, and show this Website page, thus reach and prevent Malware from distorting webpage, the object of locking IE homepage.The position of RegQueryValueExW function arranges the hidden hook of IATHook(), realize interception function call, and default IE First page information is returned to the process of the browser calling this system function.RegQueryValueExW function place arranges IATHook, comparatively other function calls more bottom, not easily by malicious virus or other software perceives, stability and reliability higher.Detecting module is herein Safemon.dll.The browser home address pre-set is stored in detecting module after encryption, can effectively preventing malicious virus or the cracking and distorting of software, and reliability is higher.The Hook Function of RegQueryValueExW.
But if IE is under the management of other network security softwares or management software, then other network security softwares or management software may revise the IE homepage that detecting module returns when calling upper system function.Webpage is distorted in order to prevent Malware, effective locking IE homepage, detecting module is tackled the system function calling process of iexplore.exe further, in the position of upper strata function call, intercept point is set, as arranged intercept point in the position of calling URLSubRegQueryW function, interception iexplore.exe calls URLSubRegQueryW function.URLSubRegQueryW function setup InlineHook (inline hook), when URLSubRegQueryW function is called, default IE home address is returned to the process calling this system function, as Query Result by detecting module.
The all operations relevant with homepage of IE are all through URLSubRegQueryW function call, and this calls than other network management softwares closer to upper strata, therefore can obtain good interception result.The Hook Function of URLSubRegQueryW function.
Equally, after IE starts, when receiving the instruction of click " homepage " button, the process (as iexplore.exe) of IE also will be inquired about registration table and be obtained IE home address.Concrete querying flow is:
IEWinMain;
InternalCallWinProc function, creates IE inner window calling routine;
CInternetToolbar::SizableWndProc function, initialization IE toolbar related linear program;
CIEFrameAuto::GoHome function, the instruction of " homepage " button is clicked in response;
Then, calling system function, inquiry registration table, obtain the station address of IE homepage, for being connected to this website, and show corresponding Website page, concrete invoked procedure is:
SDHGetPageLocation, to be correlated with key assignments for registration table homepage when clicking " homepage " button;
URLSubRegQueryW, to be correlated with key assignments for registration table homepage when inquiring about click " homepage " button;
SHRegGetUSValueW function, to be correlated with key assignments for registration table homepage when inquiring about click " homepage " button;
RegQueryValueExA, to be correlated with key assignments for registration table homepage when inquiring about click " homepage " button;
RegQueryValueExW function, to be correlated with key assignments for registration table homepage when inquiring about click " homepage " button.
The hidden hook of RegQueryValueExW function setup IATHook(), realize interception function call, and default IE homepage is returned to this system function call.But if IE is under the management of other network security softwares or management software, then other network security softwares or management software may revise the IE homepage that detecting module returns when calling upper system function.In order to effectively lock IE homepage, detecting module is tackled the system function invoked procedure of iexplore.exe further, intercept point is set on upper strata, as at URLSubRegQueryW function setup intercept point, tackles iexplore.exe and call URLSubRegQueryW function.URLSubRegQueryW function setup InlineHook (inline hook), when URLSubRegQueryW function is called, default IE First page information is returned to this system function and calls by detecting module.
Just describe the implementation process of the method for locking IE homepage above for IE software version, based on same principle, for the IE software design patterns intercept point of different editions.RegQueryValueExW arranges the hidden hook of IATHook(), realize interception function call; RegQueryValueExW arranges the hidden hook of IATHook(), realize interception function call.When browser starts, first detecting module reads the version information of IE, according to different browser versions, arranges intercept point in the position of corresponding process transfer system function.
The position of CShellBrowser2::ReplaceCmdLine function arranges intercept point, the process inquiry IE homepage of deeper interception inquiry IE homepage, for locking IE homepage when IE starts, effectively can avoid virus and Malware distorting IE homepage, improving Consumer's Experience.
Detecting module arranges multiple intercept point, and the operation of browser process being called to the system function of inquiry IE First page information is tackled, and effectively can lock the homepage of IE, security is higher.
Corresponding, present invention also provides a kind of device preventing webpage tamper, as shown in Figure 2, comprising: detecting module 201 and locking module 202, wherein:
Detecting module 201, for detecting the process transfer of browser, described process transfer comprises: browser calls the system function of Query Browser home address;
Locking module 202, for when detecting described process transfer, tackle this process transfer, and will to pre-set and the browser home address being stored in detecting module feeds back to the process of described browser by described system function, for connecting and/or show the homepage preset.The process transfer of browser, after obtaining the Query Result of home address, can be connected to the website that this home address is corresponding, and shows this Website page, thus reaches the browser homepage of display setting, prevents malicious code from distorting the object of web page address.
Wherein, described detecting module pre-sets at least one intercept point, calls the process transfer of inquiry home address for tackling browser.The present invention pre-sets intercept point at the process transfer inquiry registration table of browser with the position of the function obtaining browser homepage key assignments, tackle this process transfer, and the browser home address pre-set is fed back to the process transfer calling this system function, as Query Result, for being connected to website corresponding to this home address for browser, and show this Website page, thus reach the browser homepage of display setting, prevent malicious code from distorting the object of web page address.
One or more in CShellBrowser2::ReplaceCmdLine.
The set-up mode of at least one intercept point described is Hook Function.When the process transfer of browser is provided with the system function of hook, Hook Function runs, and just the browser home address pre-set can be turned back to the process transfer of described browser, for display or connection, thus realizes locking main browser page.
URLSubRegQueryW function setup InlineHook.IATHook is set not easily by malicious virus or other software perceives, stability and reliability higher; On upper strata, function call place arranges intercept point, can tackle virus and Malware distorting IE homepage; Simultaneously at upper system function and the first floor system function setup intercept point of inquiry IE First page information, can the operation of comprehensive interception IE process inquiry IE home address, the more safe and reliable homepage preventing Malware from distorting browser.Described detecting module can read the version information of browser, according to different browser versions, arranges intercept point in the position of corresponding call function.
The Hook Function of RegQueryValueExW function.The Hook Function of URLSubRegQueryW function.
Each embodiment in this instructions generally adopts the mode of going forward one by one to describe, and what each embodiment stressed is the difference with other embodiments, between each embodiment identical similar part mutually see.
The application can describe in the general context of computer executable instructions, such as program module or unit.Usually, program module or unit can comprise the routine, program, object, assembly, data structure etc. that perform particular task or realize particular abstract data type.In general, program module or unit can be realized by software, hardware or both combinations.Also can put into practice the application in a distributed computing environment, in these distributed computing environment, be executed the task by the remote processing devices be connected by communication network.In a distributed computing environment, program module or unit can be arranged in the local and remote computer-readable storage medium comprising memory device.
Finally, also it should be noted that, in this article, the such as relational terms of first and second grades and so on is only used for an entity or operation to separate with another entity or operational zone, and not necessarily requires or imply the relation that there is any this reality between these entities or operation or sequentially.And, term " comprises ", " comprising " or its any other variant are intended to contain comprising of nonexcludability, thus make to comprise the process of a series of key element, method, commodity or equipment and not only comprise those key elements, but also comprise other key elements clearly do not listed, or also comprise by the intrinsic key element of this process, method, commodity or equipment.When not more restrictions, the key element limited by statement " comprising ... ", and be not precluded within process, method, commodity or the equipment comprising described key element and also there is other identical element.
Apply specific case herein to set forth the principle of the application and embodiment, the explanation of above embodiment is just for helping method and the main thought thereof of understanding the application; Meanwhile, for one of ordinary skill in the art, according to the thought of the application, all will change in specific embodiments and applications, in sum, this description should not be construed as the restriction to the application.

Claims (6)

1. prevent a method for webpage tamper, comprising:
The process transfer of the detecting module detecting browser preset, described process transfer comprises: browser calls the system function of Query Browser home address;
When detecting described process transfer, tackle this process transfer, and will to pre-set and the browser home address being stored in detecting module feeds back to described process transfer by described system function, for connecting and/or show the homepage preset;
Wherein, described default detecting module pre-sets at least one intercept point, for tackling the system function of browser inquiry home address;
Call inquiry registration table pre-set intercept point with the position of the function obtaining browser homepage key assignments; The set-up mode of described intercept point is Hook Function; The inside of described Hook Function adds interception code, and the browser home address returned by system function is revised as the browser home address being stored in detecting module pre-set.
One or more in CShellBrowser2::ReplaceCmdLine, wherein,
URLSubRegQueryW is for inquiring about registration table homepage key assignments;
The command line parameter that CShellBrowser2::ReplaceCmdLine starts for obtaining browser;
Described detecting module at least comprises described inquiry registration table to obtain the Hook Function of the function of browser homepage key assignments.
3. the method according to any one of claim 1-2, described detecting module, according to different browser versions, arranges intercept point in the position of corresponding call function.
4. prevent a device for webpage tamper, comprising:
Detecting module, for detecting the process transfer of browser, described process transfer comprises: browser calls the system function of Query Browser home address;
Locking module, for when detecting described process transfer, tackle this process transfer, and will to pre-set and the browser home address being stored in detecting module feeds back to the process transfer of described browser by described system function, for connecting and/or show the homepage preset;
Described detecting module pre-sets at least one intercept point, for tackling the system function of browser inquiry home address;
Call inquiry registration table pre-set intercept point with the position of the function obtaining browser homepage key assignments; The set-up mode of described intercept point is Hook Function; The inside of described Hook Function adds interception code, and the browser home address returned by system function is revised as the browser home address being stored in detecting module pre-set.
One or more in CShellBrowser2::ReplaceCmdLine, wherein,
URLSubRegQueryW is for inquiring about registration table homepage key assignments;
The command line parameter that CShellBrowser2::ReplaceCmdLine starts for obtaining browser;
Described detecting module at least comprises described inquiry registration table to obtain the Hook Function of the function of browser homepage key assignments.
6. the device according to claim 4 or 5, described detecting module, according to different browser versions, arranges intercept point in the position of corresponding call function.
CN201210357004.6A 2012-09-21 2012-09-21 A kind of method and device preventing webpage tamper Active CN102831358B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210357004.6A CN102831358B (en) 2012-09-21 2012-09-21 A kind of method and device preventing webpage tamper

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210357004.6A CN102831358B (en) 2012-09-21 2012-09-21 A kind of method and device preventing webpage tamper

Publications (2)

Publication Number Publication Date
CN102831358A CN102831358A (en) 2012-12-19
CN102831358B true CN102831358B (en) 2016-03-30

Family

ID=47334491

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210357004.6A Active CN102831358B (en) 2012-09-21 2012-09-21 A kind of method and device preventing webpage tamper

Country Status (1)

Country Link
CN (1) CN102831358B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103942490B (en) * 2013-01-17 2017-04-19 珠海市君天电子科技有限公司 Method and device for preventing webpage content from being tampered
CN103246734B (en) * 2013-05-13 2016-08-10 深圳市奇兔软件技术有限公司 A kind of browser homepage locking method
CN104700031B (en) * 2013-12-06 2019-12-13 腾讯科技(深圳)有限公司 Method, device and system for preventing remote code from being executed in application operation
CN105721387A (en) * 2014-12-01 2016-06-29 北京蓝光引力网络股份有限公司 Method for preventing network hijack
CN104536731B (en) * 2014-12-05 2017-12-19 北京奇虎科技有限公司 Carry out the methods, devices and systems of application program setting
CN105224653B (en) * 2015-09-30 2019-07-05 北京奇虎科技有限公司 Processing method and processing equipment when a kind of browser is held as a hostage
CN105574190B (en) * 2015-12-24 2019-03-26 珠海豹趣科技有限公司 A kind of Web access method and device
CN106203092B (en) * 2016-06-30 2019-12-10 珠海豹趣科技有限公司 Method and device for intercepting shutdown of malicious program and electronic equipment
CN106375441A (en) * 2016-08-31 2017-02-01 北京深思数盾科技股份有限公司 Function extension method based on WEB browser and terminal device
CN111488576B (en) * 2020-04-23 2020-12-25 成都安易迅科技有限公司 Method and system for protecting tampering of home page, electronic equipment and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101673303A (en) * 2009-10-20 2010-03-17 华康科技(新加坡)有限公司 Generation system of personalized home page
CN102663289A (en) * 2012-03-22 2012-09-12 奇智软件(北京)有限公司 Method and device for intercepting rogue program of modifying page elements

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2408474A1 (en) * 2002-10-17 2004-04-17 Ibm Canada Limited-Ibm Canada Limitee Apparatus and method for enabling efficient multi-protocol database transaction processing

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101673303A (en) * 2009-10-20 2010-03-17 华康科技(新加坡)有限公司 Generation system of personalized home page
CN102663289A (en) * 2012-03-22 2012-09-12 奇智软件(北京)有限公司 Method and device for intercepting rogue program of modifying page elements

Also Published As

Publication number Publication date
CN102831358A (en) 2012-12-19

Similar Documents

Publication Publication Date Title
CN102831358B (en) A kind of method and device preventing webpage tamper
US20170318052A1 (en) Intercepting and supervising calls to transformed operations and objects
EP2447878B1 (en) Web based remote malware detection
CN111695156A (en) Service platform access method, device, equipment and storage medium
US20160006760A1 (en) Detecting and preventing phishing attacks
US9218487B2 (en) Remote DOM access
US9727354B2 (en) System and methods for loading an application and its modules in a client device
KR101542335B1 (en) Encoding labels in values to capture information flows
CN105631355A (en) Data processing method and device
US20130346839A1 (en) Private tunnel network portal
Bhavani Cross-site scripting attacks on android webview
TW201723897A (en) Method, device, and system for displaying information associated with a web page
CN103970760B (en) A kind of web-page requests processing method and processing device
CN103780450B (en) The detection method and system of browser access network address
US9769159B2 (en) Cookie optimization
CN105631334A (en) Application security detecting method and system
CN111614624A (en) Risk detection method, device, system and storage medium
US20210250375A1 (en) Network attack defense method, apparatus, device, system and storage medium
CN108156121A (en) The alarm method and device that the monitoring method and device of flow abduction, flow are kidnapped
CN103823873A (en) Reading/writing method, device and system of browser setting item
CN103023869B (en) Malicious attack prevention method and browser
US8381269B2 (en) System architecture and method for secure web browsing using public computers
CN103561076A (en) Webpage trojan-linking real-time protection method and system based on cloud
US8484465B1 (en) Heterogeneous virtual machines sharing a security model
KR20150049457A (en) Method and apparatus for managing authentication information

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee after: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Patentee after: Beijing Qizhi Business Consulting Co.,Ltd.

Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Patentee before: Qizhi software (Beijing) Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220330

Address after: 100016 1773, 15 / F, 17 / F, building 3, No.10, Jiuxianqiao Road, Chaoyang District, Beijing

Patentee after: Sanliu0 Digital Security Technology Group Co.,Ltd.

Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Patentee before: Beijing Qizhi Business Consulting Co.,Ltd.