CN103632096B - A kind of method and apparatus that safety detection is carried out to equipment - Google Patents
A kind of method and apparatus that safety detection is carried out to equipment Download PDFInfo
- Publication number
- CN103632096B CN103632096B CN201310632733.2A CN201310632733A CN103632096B CN 103632096 B CN103632096 B CN 103632096B CN 201310632733 A CN201310632733 A CN 201310632733A CN 103632096 B CN103632096 B CN 103632096B
- Authority
- CN
- China
- Prior art keywords
- mobile device
- safety detection
- device side
- computing device
- detection
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/85—Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Telephonic Communication Services (AREA)
- Alarm Systems (AREA)
Abstract
The invention discloses a kind of method and apparatus that safety detection is carried out to equipment, wherein methods described includes:When mobile device is connected to computing device, asked in the safety detection to mobile device that the mobile device side joint receipts computing device side is sent, the safety detection request includes specifying detection object;Safety detection result information corresponding with the specified detection object is obtained in the mobile device side, and the safety detection result information is sent to computing device side;The execute instruction of computing device side transmission is received in the mobile device side joint, the execute instruction is that computing device generates according to the safety detection result information;The execute instruction is performed in the mobile device side.The present invention can cause user that the safety detection to mobile device can be achieved in computing device side, so as to improve the security of mobile device.
Description
Technical field
The present invention relates to equipment safety detection technique field, and in particular to a kind of method that safety detection is carried out to equipment,
A kind of and device that safety detection is carried out to equipment.
Background technology
With the raising of the level of informatization and the continuous release of various applicability technologies, the intelligence such as computer or mobile phone is eventually
End has been widely used in study, amusement, work etc., and more and more important angle is play in daily life
Color.However, the extensive use of intelligent terminal also intelligent terminal is proposed in garbage data cleaning, security protection etc. it is higher
It is required that.
For the demand, many third party's safety applications manufacturers have developed for intelligent terminal safety applications, described
Safety applications can check UP in intelligent terminal side to intelligent terminal, and carry out a series of repair according to physical examination result and grasp
Make, to ensure the performance of intelligent terminal and security.For mobile device, although being mounted with advance on some mobile devices
Some antivirus softwares, but often user easy virus infection, is especially accessing not when mobile phone bodyguard is installed thereon
When application market downloads some applications, it is easy to it is tied either download to be provided with malicious application, plug-in unit or
It is the software of advertisement applications etc, often leads to user in the case of imperceptible, is escaped by mobile device flow, quilt
Steal privacy or be that malice such as is deducted fees at the loss, it is therefore necessary to the safety of the mobile device of user is carried out from each channel
Protection.
The content of the invention
In view of the above problems, it is proposed that the present invention so as to provide one kind overcome above mentioned problem or at least in part solve on
State a kind of method that safety detection is carried out to equipment of problem and a kind of corresponding device that safety detection is carried out to equipment.
According to one aspect of the present invention, there is provided a kind of method that safety detection is carried out to equipment, including:
When mobile device is connected to computing device, in pair that the mobile device side joint receipts computing device side is sent
The safety detection request of mobile device, the safety detection request include specifying detection object;
Safety detection result information corresponding with the specified detection object is obtained in the mobile device side, and described in general
Safety detection result information is sent to computing device side;
Receive the execute instruction that computing device side sends in the mobile device side joint, the execute instruction be computing device according to
Generated according to the safety detection result information;
The execute instruction is performed in the mobile device side.
Alternatively, the safety detection to mobile device sent in the mobile device side joint receipts computing device side please
Before the step of asking, in addition to:
The mobile device side joint receives the third-party application installation kit that the computing device side is sent, the third-party application
Installation kit be the computing device side when detecting that the mobile device side is fitted without third-party application, from server under
Load obtains;
Third-party application is installed according to the third-party application installation kit in the mobile device side.
Alternatively, the safety detection to mobile device sent in the mobile device side joint receipts computing device side please
Before the step of asking, in addition to:
The SOCKET interface channels of the mobile device and the computing device are established, the mobile device passes through described
SOCKET interface channels receive safety detection request and send safety detection result information and receive execute instruction.
Alternatively, the safety to mobile device sent in the mobile device side joint receipts computing device side is examined
Surveying the step of asking is:
The mobile device side using the third-party application receive that the computing device side sends to mobile device
Safety detection request;
It is described that safety detection result information corresponding with the specified detection object, and general are obtained in the mobile device side
The safety detection result information, which was sent to the step of computing device side, to be included:
Ask to perform to specifying detection according to the safety detection using the third-party application in the mobile device side
The safety detection operation of object, obtains safety detection result information;
The safety detection result information is back to the computing device side by the third-party application;
It is described to be in the step of execute instruction of mobile device side joint receipts computing device side transmission:
The execute instruction of computing device side transmission is received using the third-party application in the mobile device side;
It is described to be the step of the mobile device side performs the execute instruction:
The execute instruction is performed using the third-party application in the mobile device side.
Alternatively, the mobile device side is provided with the first client-side program, described to receive institute in the mobile device side joint
Stating the step of safety detection to mobile device that computing device side is sent is asked is:
The mobile device side using first client-side program receive that the computing device side sends to movement
The safety detection request of equipment;
It is described that safety detection result information corresponding with the specified detection object, and general are obtained in the mobile device side
The safety detection result information, which was sent to the step of computing device side, to be included:
Safety detection request is sent to described the using first client-side program in the mobile device side
Tripartite applies, and asks execution to grasp the safety detection for specifying detection object according to the safety detection by the third party is medical
Make, obtain safety detection result information and return in the first client-side program;
The safety detection result information is back to the computing device side by first client-side program;
It is described to be in the step of execute instruction of mobile device side joint receipts computing device side transmission:
The execute instruction of computing device side transmission is received using first client-side program in the mobile device side;
It is described to be the step of the mobile device side performs the execute instruction:
The execute instruction is sent to third-party application using first client-side program in the mobile device side,
The execute instruction is performed by the third-party application.
Alternatively, the step of first client-side program sends safety detection request to the third-party application
Including:
First client-side program calls the interface of the service of the third-party application according to the specified detection object,
Safety detection request is sent to the third-party application.
Alternatively, the specified detection object includes being directed to the one or more of the following service of mobile device:Movement is set
Standby extension horse Hole Detection, detect whether to open cloud killing, detect whether dangerous software, detect whether updated virus base,
Whether detection security service opens, detects whether mobile device has mountain vallage application, detects on mobile device whether have malice advertisement
Using, Initiative Defense function open detection.
Alternatively, the specified detection object includes being directed to the one or more of the following service of mobile device:Internal memory is excellent
Change detection, detect whether to exist daemon software, the software detection of automatic start, garbage data cleaning detection, the detection of cleaning caching,
Existing Stub File detection, installation kit cleaning detection, big file consolidation, the cleaning detection of privacy vestige after cleaning application unloading.
Alternatively, the safety detection result information includes safety detection progress msg, correspondingly, the execute instruction bag
Include halt instruction, pause instruction, continue executing with instruction.
Alternatively, the safety detection result information includes safety detection result, correspondingly, the execute instruction include with
Under it is one or more:The reparation of mobile device extension horse leak, open cloud killing, dangerous software reparation, virus base renewal, unlatching peace
Full service, mountain vallage application reparation, the reparation of malice advertisement applications, unlatching Initiative Defense function.
Alternatively, the safety detection result information includes safety detection result, correspondingly, the execute instruction include with
Under it is one or more:Internal memory optimization, daemon software closing, the software for closing automatic start, garbage data cleaning, cleaning are slow
Deposit, clear up using existing Stub File, installation kit cleaning, big file consolidation, the cleaning of privacy vestige after unloading.
According to another aspect of the present invention, there is provided a kind of method that safety detection is carried out to equipment, including:
When computing device side safety detection is to when having mobile device access, in computing device, laterally the mobile device side is sent out
Go out the safety detection request to mobile device, the safety detection request includes specifying detection object;
The safety inspection for safety detection request of the mobile device side return is received in the computing device side joint
Object information is surveyed, the safety detection result information is obtained by the mobile device side according to the specified detection object;
According to execute instruction corresponding to safety detection result information generation and sent in computing device side to the shifting
Dynamic equipment side, the execute instruction is performed by the mobile device side.
Alternatively, in the computing device, laterally the mobile device side sends what the safety detection of mobile device was asked
Before step, in addition to:
All installation package informatins for having installed application in the mobile device side, the installation kit are read in computing device side
Information identifies including installation kit;
When judging third-party application installation kit mark is not present in the installation kit mark in computing device side, from server
The middle download address for obtaining the third-party application installation kit;
In computing device side the third-party application installation is downloaded according to the download address of the third-party application installation kit
Wrap and send to mobile device side.
Alternatively, in the computing device, laterally the mobile device side sends what the safety detection of mobile device was asked
Before step, in addition to:
The SOCKET interface channels of the mobile device and the computing device are established, the computing device passes through the company
Road is connected to send safety detection request and receive safety detection result information and send execute instruction.
Alternatively, the safety detection result information has the information of type identification, described in computing device side foundation institute
Stating execute instruction corresponding to the generation of safety detection result information and sending to the step of mobile device side includes:
Computing device side is searched in default mapping table and advisory information is performed corresponding to the type identification, and described preset is reflected
Computing device and the type identification that mobile device is made an appointment and the mapping relations for performing advisory information are stored with firing table;
The safety detection result information and corresponding execution advisory information are shown in computing device side;
Selected instruction of the user to one or more of execution advisory informations is received in computing device side joint;
According to execute instruction corresponding to the selected one or more execution advisory informations of instruction generation and send to movement
Equipment side.
Alternatively, the specified detection object includes being directed to the one or more of the following service of mobile device:Movement is set
Standby extension horse Hole Detection, detect whether to open cloud killing, detect whether dangerous software, detect whether updated virus base,
Whether detection security service opens, detects whether mobile device has mountain vallage application, detects on mobile device whether have malice advertisement
Using, Initiative Defense function open detection.
Alternatively, the specified detection object includes being directed to the one or more of the following service of mobile device:Internal memory is excellent
Change detection, detect whether to exist daemon software, the software detection of automatic start, garbage data cleaning detection, the detection of cleaning caching,
Existing Stub File detection, installation kit cleaning detection, big file consolidation, the cleaning detection of privacy vestige after cleaning application unloading.
Alternatively, the safety detection result information includes safety detection progress msg, correspondingly, the execute instruction bag
Include halt instruction, pause instruction, continue executing with instruction.
Alternatively, the safety detection result information includes safety detection result, correspondingly, the execute instruction include with
Under it is one or more:The reparation of mobile device extension horse leak, open cloud killing, dangerous software reparation, virus base renewal, unlatching peace
Full service, mountain vallage application reparation, the reparation of malice advertisement applications, unlatching Initiative Defense function.
Alternatively, the safety detection result information includes safety detection result, correspondingly, the execute instruction include with
Under it is one or more:Internal memory optimization, daemon software closing, the software for closing automatic start, garbage data cleaning, cleaning are slow
Deposit, clear up using existing Stub File, installation kit cleaning, big file consolidation, the cleaning of privacy vestige after unloading.
According to another aspect of the present invention, there is provided a kind of device that safety detection is carried out to equipment, including:
Safety detection request receiving module, suitable for when mobile device is connected to computing device, in the mobile device side
Receive the safety detection to mobile device that the computing device side is sent to ask, the safety detection request includes specifying detection
Object;
Safety detection result information sending module, suitable for being obtained and the specified detection object pair in the mobile device side
The safety detection result information answered, and the safety detection result information is sent to computing device side;
Execute instruction receiving module, suitable for receiving the execute instruction of computing device side transmission, institute in the mobile device side joint
Execute instruction is stated to generate according to the safety detection result information for computing device;
Execute instruction execution module, suitable for performing the execute instruction in the mobile device side.
Alternatively, described device also includes:
Installation kit receiving module, suitable for being sent in the mobile device side joint receipts computing device side to mobile device
Safety detection request before, the mobile device side joint receives the third-party application installation kit that the computing device side is sent,
The third-party application installation kit is that the computing device side is detecting that the mobile device side is fitted without third-party application
When, download and obtain from server;
Installation kit installs module, should according to third-party application installation kit installation third party suitable for the mobile device side
With.
Alternatively, described device also includes:
Path setup module, suitable for the mobile device side joint receive that the computing device side sends to mobile device
Before safety detection request, the SOCKET interface channels of the mobile device and the computing device, the mobile device are established
Safety detection request is received by the SOCKET interface channels and sends safety detection result information and receives and is performed
Instruction.
Alternatively, the safety detection request receiving module is further adapted for:
The mobile device side using the third-party application receive that the computing device side sends to mobile device
Safety detection request;
The safety detection result information sending module is further adapted for:
Ask to perform to specifying detection according to the safety detection using the third-party application in the mobile device side
The safety detection operation of object, obtains safety detection result information;
The safety detection result information is back to the computing device side by the third-party application;
The execute instruction receiving module is further adapted for:
The execute instruction of computing device side transmission is received using the third-party application in the mobile device side;
The execute instruction execution module is further adapted for:
The execute instruction is performed using the third-party application in the mobile device side.
Alternatively, the safety detection request receiving module is further adapted for:
The mobile device side using first client-side program receive that the computing device side sends to movement
The safety detection request of equipment;
The safety detection result information sending module is further adapted for:
Safety detection request is sent to described the using first client-side program in the mobile device side
Tripartite applies, and asks execution to grasp the safety detection for specifying detection object according to the safety detection by the third party is medical
Make, obtain safety detection result information and return in the first client-side program;
The safety detection result information is back to the computing device side by first client-side program;
The execute instruction receiving module is further adapted for:
The execute instruction of computing device side transmission is received using first client-side program in the mobile device side;
The execute instruction execution module is further adapted for:
The execute instruction is sent to third-party application using first client-side program in the mobile device side,
The execute instruction is performed by the third-party application.
Alternatively, first client-side program sends safety detection request to the third-party application, specifically
For:
First client-side program calls the interface of the service of the third-party application according to the specified detection object,
Safety detection request is sent to the third-party application.
Alternatively, the specified detection object includes being directed to the one or more of the following service of mobile device:Movement is set
Standby extension horse Hole Detection, detect whether to open cloud killing, detect whether dangerous software, detect whether updated virus base,
Whether detection security service opens, detects whether mobile device has mountain vallage application, detects on mobile device whether have malice advertisement
Using, Initiative Defense function open detection.
Alternatively, the specified detection object includes being directed to the one or more of the following service of mobile device:Internal memory is excellent
Change detection, detect whether to exist daemon software, the software detection of automatic start, garbage data cleaning detection, the detection of cleaning caching,
Existing Stub File detection, installation kit cleaning detection, big file consolidation, the cleaning detection of privacy vestige after cleaning application unloading.
Alternatively, the safety detection result information includes safety detection progress msg, correspondingly, the execute instruction bag
Include halt instruction, pause instruction, continue executing with instruction.
Alternatively, the safety detection result information includes safety detection result, correspondingly, the execute instruction include with
Under it is one or more:The reparation of mobile device extension horse leak, open cloud killing, dangerous software reparation, virus base renewal, unlatching peace
Full service, mountain vallage application reparation, the reparation of malice advertisement applications, unlatching Initiative Defense function.
Alternatively, the safety detection result information includes safety detection result, correspondingly, the execute instruction include with
Under it is one or more:Internal memory optimization, daemon software closing, the software for closing automatic start, garbage data cleaning, cleaning are slow
Deposit, clear up using existing Stub File, installation kit cleaning, big file consolidation, the cleaning of privacy vestige after unloading.
According to another aspect of the present invention, there is provided a kind of device that safety detection is carried out to equipment, including:
Safety detection request sending module, suitable for, to when having mobile device access, being counted in computing device side safety detection
Calculating equipment, laterally the mobile device side sends the request of the safety detection of mobile device, the safety detection request is included specifying
Detection object;
Safety detection result information receiving module, suitable for receiving what the mobile device side returned in the computing device side joint
For the safety detection request safety detection result information, the safety detection result information by the mobile device side according to
Obtained according to the specified detection object;
Execute instruction sending module, suitable for being held in computing device side according to corresponding to safety detection result information generation
Row is instructed and sent to the mobile device side, and the execute instruction is performed by the mobile device side.
Alternatively, described device also includes:
Installation kit data obtaining module, suitable for laterally the mobile device side is sent to mobile device in the computing device
Safety detection request before, all installation kits letters for having installed application in the mobile device side are read in computing device side
Breath, the installation kit information identify including installation kit;
Searching modul, suitable for judging third-party application installation kit mark is not present in the installation kit mark in computing device side
During knowledge, the download address of the third-party application installation kit is obtained from server;
Installation kit sending module, suitable for being downloaded in computing device side according to the download address of the third-party application installation kit
The third-party application installation kit is simultaneously sent to mobile device side.
Alternatively, described device also includes:
Interface channel establishes module, suitable in the computing device, laterally the mobile device side is sent to mobile device
Before safety detection request, the SOCKET interface channels of the mobile device and the computing device, the computing device are established
Safety detection request is sent by the interface channel and receives safety detection result information and sends execute instruction.
Alternatively, the safety detection result information has the information of type identification, and the execute instruction sending module is also
It is suitable to:
Computing device side is searched in default mapping table and advisory information is performed corresponding to the type identification, and described preset is reflected
Computing device and the type identification that mobile device is made an appointment and the mapping relations for performing advisory information are stored with firing table;
The safety detection result information and corresponding execution advisory information are shown in computing device side;
Selected instruction of the user to one or more of execution advisory informations is received in computing device side joint;
According to execute instruction corresponding to the selected one or more execution advisory informations of instruction generation and send to movement
Equipment side.
Alternatively, the specified detection object includes being directed to the one or more of the following service of mobile device:Movement is set
Standby extension horse Hole Detection, detect whether to open cloud killing, detect whether dangerous software, detect whether updated virus base,
Whether detection security service opens, detects whether mobile device has mountain vallage application, detects on mobile device whether have malice advertisement
Using, Initiative Defense function open detection.
Alternatively, the specified detection object includes being directed to the one or more of the following service of mobile device:Internal memory is excellent
Change detection, detect whether to exist daemon software, the software detection of automatic start, garbage data cleaning detection, the detection of cleaning caching,
Existing Stub File detection, installation kit cleaning detection, big file consolidation, the cleaning detection of privacy vestige after cleaning application unloading.
Alternatively, the safety detection result information includes safety detection progress msg, correspondingly, the execute instruction bag
Include halt instruction, pause instruction, continue executing with instruction.
Alternatively, the safety detection result information includes safety detection result, correspondingly, the execute instruction include with
Under it is one or more:The reparation of mobile device extension horse leak, open cloud killing, dangerous software reparation, virus base renewal, unlatching peace
Full service, mountain vallage application reparation, the reparation of malice advertisement applications, unlatching Initiative Defense function.
Alternatively, the safety detection result information includes safety detection result, correspondingly, the execute instruction include with
Under it is one or more:Internal memory optimization, daemon software closing, the software for closing automatic start, garbage data cleaning, cleaning are slow
Deposit, clear up using existing Stub File, installation kit cleaning, big file consolidation, the cleaning of privacy vestige after unloading.
Compared with background technology, the present invention has the advantages that:
In the present invention, when mobile device is connected to computing device, be can be achieved in computing device side to mobile device
Specified detection object safety detection, and computing device receive mobile device return safety detection result when can to
Computing device lateral movement equipment sends execute instruction and promotes mobile device to perform related operation for safety detection result, makes
It is that the safety detection to mobile device can be achieved that user, which is obtained, in computing device side, so as to improve the security of mobile device.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention,
And can be practiced according to the content of specification, and in order to allow above and other objects of the present invention, feature and advantage can
Become apparent, below especially exemplified by the embodiment of the present invention.
Brief description of the drawings
By reading the detailed description of hereafter preferred embodiment, it is various other the advantages of and benefit it is common for this area
Technical staff will be clear understanding.Accompanying drawing is only used for showing the purpose of preferred embodiment, and is not considered as to the present invention
Limitation.And in whole accompanying drawing, identical part is denoted by the same reference numerals.In the accompanying drawings:
Fig. 1 shows a kind of step flow chart of embodiment of the method one that safety detection is carried out to equipment of the present invention;
Fig. 2 shows a kind of step flow chart of embodiment of the method two that safety detection is carried out to equipment of the present invention;
Fig. 3 shows a kind of step flow chart of embodiment of the method three that safety detection is carried out to equipment of the present invention;
Fig. 4 shows a kind of step flow chart of embodiment of the method four that safety detection is carried out to equipment of the present invention;
Fig. 5 shows a kind of structured flowchart of device embodiment one that safety detection is carried out to equipment of the present invention;
Fig. 6 shows a kind of structured flowchart of device embodiment two that safety detection is carried out to equipment of the present invention.
Embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although the disclosure is shown in accompanying drawing
Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here
Limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure
Completely it is communicated to those skilled in the art.
Reference picture 1, show a kind of step flow of embodiment of the method one that safety detection is carried out to equipment of the present invention
Figure, the embodiment of the present invention are illustrated from mobile device side, may include steps of:
Step 101, when mobile device is connected to computing device, the computing device side is received in the mobile device side joint
The safety detection to mobile device sent is asked, and the safety detection request includes specifying detection object;
In one preferred embodiment of the invention, the specified detection object includes the following service for mobile device
It is one or more:Mobile device extension horse Hole Detection, detect whether to open cloud killing, detect whether dangerous software, inspection
Survey whether updated virus base, detection security service open, detects whether mobile device has mountain vallage application, detection is mobile sets
Whether there are malice advertisement applications, Initiative Defense function open detection, internal memory optimization to detect, detect whether in the presence of soft from the background for upper
Existing residual after part, the software detection of automatic start, garbage data cleaning detection, the detection of cleaning caching, cleaning application unloading
File detection, installation kit cleaning detection, big file consolidation, the cleaning detection of privacy vestige.
Step 102, safety detection result information corresponding with the specified detection object is obtained in the mobile device side,
And the safety detection result information is sent to computing device side;
Step 103, the execute instruction of computing device side transmission is received in the mobile device side joint, the execute instruction is meter
Equipment is calculated to generate according to the safety detection result information;
In one preferred embodiment of the invention, the safety detection result information can include safety detection progress letter
Breath, accordingly, the execute instruction can include halt instruction, pause instruction, continue executing with instruction.
In another preferred embodiment of the invention, the safety detection result information includes safety detection result, phase
Ying Di, the execute instruction can include following one or more:The reparation of mobile device extension horse leak, open cloud killing, danger
Dangerous software reparation, virus base renewal, open security service, mountain vallage application reparation, the reparation of malice advertisement applications, unlatching Initiative Defense
Function, internal memory optimization, daemon software closing, the software for closing automatic start, garbage data cleaning, cleaning caching, cleaning are applied
Existing Stub File, installation kit cleaning, big file consolidation, the cleaning of privacy vestige after unloading.
Step 104, the execute instruction is performed in the mobile device side.
In one preferred embodiment of the invention, before the step 101, can also include:
The mobile device side joint receives the third-party application installation kit that the computing device side is sent, the third-party application
Installation kit be the computing device side when detecting that the mobile device side is fitted without third-party application, from server under
Load obtains;
Third-party application is installed according to the third-party application installation kit in the mobile device side.
In one preferred embodiment of the invention, before the step 101, can also include:
The SOCKET interface channels of the mobile device and the computing device are established, the mobile device passes through described
SOCKET interface channels receive safety detection request and send safety detection result information and receive execute instruction.
In one preferred embodiment of the invention, the step 101 is specifically as follows:
The mobile device side using the third-party application receive that the computing device side sends to mobile device
Safety detection request;
The step 102 can include following sub-step:
Ask to perform to specifying detection according to the safety detection using the third-party application in the mobile device side
The safety detection operation of object, obtains safety detection result information;
The safety detection result information is back to the computing device side by the third-party application;
The step 103 is specifically as follows:
The execute instruction of computing device side transmission is received using the third-party application in the mobile device side;
The step 104 is specifically as follows:
The execute instruction is performed using the third-party application in the mobile device side.
Specifically, the mobile device side can receive that computing device side send by the third-party application to moving
The safety detection request of dynamic equipment, the third-party application ask to perform the peace to specifying detection object according to the safety detection
Full inspection surveys operation, obtains safety detection result information and returns to the computing device side.
In another preferred embodiment of the invention, the mobile device side is provided with the first client-side program, described
Step 101 can be:
The mobile device side using first client-side program receive that the computing device side sends to movement
The safety detection request of equipment;
The step 102 can include following sub-step:
Safety detection request is sent to described the using first client-side program in the mobile device side
Tripartite applies, and asks to perform according to the safety detection by the third-party application and the safety detection for specifying detection object is grasped
Make, obtain safety detection result information and return in the first client-side program;
The safety detection result information is back to the computing device side by first client-side program;
The step 103 can be:
The execute instruction of computing device side transmission is received using first client-side program in the mobile device side;
The step 104 can be:
The execute instruction is sent to third-party application using first client-side program in the mobile device side,
The execute instruction is performed by the third-party application.
Specifically, the mobile device can receive pair that computing device side is sent by first client-side program
The safety detection request of mobile device, first client-side program sends safety detection request should to the third party
With, receive the safety detection result information that the third-party application returns and return to computing device side, wherein, the safety detection
Object information is asked to perform and the safety detection for specifying detection object is operated by the third-party application according to the safety detection
Obtain.
In one preferred embodiment of the invention, first client-side program sends safety detection request extremely
The step of third-party application, can include:
First client-side program calls the interface of the service of the third-party application according to the specified detection object,
Safety detection request is sent to the third-party application.
In embodiments of the present invention, when mobile device is connected to computing device, can be achieved in computing device side to moving
The safety detection of the specified detection object of dynamic equipment, and when computing device is received in the safety detection result that mobile device returns
To sending execute instruction in computing device lateral movement equipment mobile device can be promoted to perform correlation for safety detection result
Operation so that user is that can be achieved to the safety detection of mobile device, so as to improve the peace of mobile device in computing device side
Quan Xing.
Reference picture 2, show a kind of step flow of embodiment of the method two that safety detection is carried out to equipment of the present invention
Figure, the embodiment of the present invention illustrate from computing device side, and the embodiment of the present invention may include steps of:
Step 201, when computing device side safety detection is to when having mobile device access, in the computing device laterally movement
Equipment side sends the safety detection request to mobile device, and the safety detection request includes specifying detection object;
In one preferred embodiment of the invention, the specified detection object can be included for the as follows of mobile device
What is serviced is one or more:Mobile device extension horse Hole Detection, detect whether to open cloud killing, detect whether it is dangerous soft
Part, detect whether updated virus base, detection security service are opened, detect whether mobile device has mountain vallage application, detection
Whether there are malice advertisement applications, Initiative Defense function open detection, internal memory optimization to detect, detect whether after existing on mobile device
It is existing after platform software, the software detection of automatic start, garbage data cleaning detection, the detection of cleaning caching, cleaning application unloading
Stub File detection, installation kit cleaning detection, big file consolidation, the cleaning detection of privacy vestige.
Step 202, being asked for the safety detection for the mobile device side return is received in the computing device side joint
Safety detection result information, the safety detection result information obtains by the mobile device side according to the specified detection object
;
Step 203, according to execute instruction corresponding to safety detection result information generation and sent in computing device side
To the mobile device side, the execute instruction is performed by the mobile device side.
In one preferred embodiment of the invention, the safety detection result information can include safety detection progress letter
Breath, correspondingly, the execute instruction can include halt instruction, pause instruction, continue executing with instruction.
In one preferred embodiment of the invention, the safety detection result information can include safety detection result,
Correspondingly, it is described can be included with execute instruction it is following one or more:The reparation of mobile device extension horse leak, open cloud killing,
Dangerous software reparation, virus base renewal, unlatching security service, mountain vallage application reparation, the reparation of malice advertisement applications, unlatching are actively anti-
Imperial function, internal memory optimization, daemon software closing, the software for closing automatic start, garbage data cleaning, cleaning caching, cleaning are answered
Cleared up with existing Stub File, installation kit cleaning, big file consolidation, privacy vestige after unloading.
In one preferred embodiment of the invention, before the step 201, can also include:
All installation package informatins for having installed application in the mobile device side, the installation kit are read in computing device side
Information identifies including installation kit;
When judging third-party application installation kit mark is not present in the installation kit mark in computing device side, from server
The middle download address for obtaining the third-party application installation kit;
In computing device side the third-party application installation is downloaded according to the download address of the third-party application installation kit
Wrap and send to mobile device side.
In one preferred embodiment of the invention, before the step 201, can also include:
The SOCKET interface channels of the mobile device and the computing device are established, the computing device passes through the company
Road is connected to send safety detection request and receive safety detection result information and send execute instruction.
In one preferred embodiment of the invention, the safety detection result information has the information of type identification, institute
Following sub-step can be included by stating step 203:
Sub-step S11, computing device side are searched in default mapping table and perform advisory information corresponding to the type identification,
It is stored with what computing device was made an appointment with mobile device in the default mapping table, type identification is with performing advisory information
Mapping relations;
Sub-step S12, the safety detection result information and corresponding execution advisory information are shown in computing device side;
Sub-step S13, selected instruction of the user to one or more of execution advisory informations is received in computing device side joint;
Sub-step S14, according to execute instruction corresponding to the selected one or more execution advisory informations of instruction generation simultaneously
Send to mobile device side.
Reference picture 3, show a kind of step flow of embodiment of the method three that safety detection is carried out to equipment of the present invention
Figure, wherein, the computing device is that one kind can be run according to program, and the automatic, smart electronicses of high speed processing mass data are set
It is standby, such as desktop computer, notebook computer.The mobile device is a kind of computing device that can be used on the move, such as hand
Machine.The present embodiment is by taking the mobile device for being provided with Android operation system as an example, and certainly, the present invention is not limited to be provided with Android system
The mobile device of system, principle of the invention are equally applicable to be provided with the mobile device of other operating systems.
In embodiments of the present invention, mobile device side is provided with the first client-side program, and computing device side is provided with second
Client-side program, the mobile device pass through first client-side program and second client with the computing device
Program is communicated, and when first client-side program does not start, the second client-side program can be by the first client
End program sends enabled instruction to start first client-side program, and then opens communication process between the two.
Methods described may include steps of:
Step 301, when mobile device is connected to computing device, whether the second client-side program detects the mobile device
Third-party application is installed, if it is not, step 302 is then performed, if so, then performing step 304;
In the specific implementation, the second client-side program of computing device side is detecting that mobile device is successfully connected to calculate
During equipment, all installation package informatins for having installed application in mobile device side can be read, wherein the installation kit information carries
There is installation kit mark.Second client-side program searches whether the installation that third-party application be present in all installation kit marks
Bag mark, if in the presence of illustrating that mobile device side is provided with third-party application, otherwise, then illustrate that mobile device side is fitted without
There is third-party application.
Further, the installation package informatin can also carry the version number of each application, be found if computing device is searched
The mobile device is provided with third-party application, but the version number of the third-party application is less than the 3rd of the storage of computing device side
Fang Yingyong latest edition number, then computing device equally judge that the mobile device side is fitted without third-party application.
Step 302, the second client-side program is downloaded the third-party application installation kit and sent to mobile device side;
In the specific implementation, mobile device can pass through data wire or wireless(Such as Wi-Fi communication technology WIFI)Deng
Form is connected to computing device, when mobile device accesses computing device by data wire, if the second client-side program detects
The mobile device has been fitted without third-party application, then searches the installation kit mark of the third-party application in the server,
The download address of the third-party application installation kit is obtained when the installation kit for finding the third-party application identifies, under described
Third-party application installation kit is downloaded in set address and the third-party application installation kit is sent to mobile device by data wire
Side.
Further, when the mobile device is the Android device for being provided with Android system, second client
Program can pass through ADB(Android Debug Bridge, exactly play a part of debugging bridge)Third-party application is pacified in driving
Dress bag is sent to mobile device side, wherein, ADB is a client-server end program, and wherein client is computing device,
Server end is Android device, and ADB drives the client driver for the communication for being exactly computing device and Android device, ADB
An instrument in androidsdk, with this instrument can directly operational administrative Android simulator or real Android set
Standby (such as mobile phone).Its major function has:The shell (order line) of operational outfit;The port mapping of management simulation device or equipment;
Upload/download file between computing device and Android device;Local Android installation kit apk is attached to simulator or Android device
Deng.
When mobile device is wirelessly established with computing device to be connected, if the second client-side program detect it is described
Mobile device has been fitted without third-party application, then searches the installation kit mark of the third-party application in the server, looking for
To the third-party application installation kit mark when obtain the download address of the third-party application installation kit, download ground from described
Third-party application installation kit is downloaded in location and the third-party application installation kit is sent to mobile device side by radio channel.
In practice, the second client-side program directly can also send described the download address of the third-party application installation kit extremely
Mobile device side, installation is downloaded by mobile device side.
Specifically, mobile device wirelessly establishes the process of connection, Ke Yiwei with computing device:
When computing device will be connected with mobile device, computing device can send connection request to server first.Wherein,
The connection request includes the terminal data of the mobile device of device identification and request connection.
The device identification is used to identify a computing device, e.g., the IP address of computing device, NIC address and MID values
Deng.Wherein, MID(Mobile Internet Device, mobile internet device)Value is calculated by the numbering of hardware
Unique characteristic value.
The terminal data is the related data of mobile device, as the title of mobile device, the world of mobile device are mobile
Device identity(International Mobile Equipment Identity, IMEI), the model of mobile device etc., this
Outside, if mobile device is mobile phone, corresponding terminal data can also include the phone number of the mobile phone.Wherein, the IMEI
Can be with one mobile device of unique mark.
Then server can correspondingly receive the connection request, and the calculating can be obtained from the connection request and is set
Standby device identification, so that it is determined that the computing device to be connected, and obtain the mobile device of the computing device request connection
Terminal data.
And the mobile device that server record communicated with(Or computing device)Terminal data(Or device data), because
This can search the mobile device according to the terminal data, that is, detect the terminal data and any stored in server
Whether the terminal data of mobile device matches, if matching, illustrates that the mobile device can be found, then build the equipment
Mark and the mapping relations of the terminal data, to establish the incidence relation of the mobile device and the computing device;If no
Matching, then illustrate not finding the mobile device, i.e., described mobile device temporarily fails and server communication.
Step 303, third-party application is installed in mobile device side according to the third-party application installation kit, continues executing with step
304;
Specifically, pacify after mobile device receives the third-party application installation kit according to the third-party application
Dress bag installation third-party application;In another case, when mobile device receive be third-party application installation kit download
During location, then the download address according to the third-party application installation kit downloads the third-party application installation kit and carries out third party
The installation of application, after third-party application completes installation, mobile device returns to installation message to calculating by long connection and set
It is standby, to notify the installation of third-party application described in computing device.
In embodiments of the present invention, it can detect whether mobile device side is provided with third-party application in computing device side,
When detecting that mobile device side is fitted without third-party application, computing device is then downloaded third-party application installation kit and sent automatically
Installed to mobile device, in this process, mobile device can also smoothly install in the case where that need not network
Tripartite applies, and saves the resource of mobile device, enriches the channel that security protection is carried out to mobile device, improves mobile device
Security;And user, which need not carry out any operation, to install third-party application in mobile device side(Or other should
With), it is convenient and swift, improve Consumer's Experience.
Applied to the embodiment of the present invention, the third-party application can be that safety detection class is served by, and such as 360 mobile phones are defended
Scholar, Kingsoft bodyguard etc., the embodiment of the present invention need not be any limitation as to the particular type of third-party application.
Step 304, the SOCKET interface channels of the mobile device and the computing device are established;
Specifically, the SOCKET for establishing the mobile device and the computing device(Socket)Interface channel
Process, actually using the mobile device as server, the client-server of client is used as using the computing device
SOCKET connection procedures, the process can be divided into server monitoring, client request, connection three steps of confirmation, wherein, service
Device, which is monitored, refers to server side socket and the specific client socket of delocalization, but in etc. state to be connected, it is real
When monitor network state;Client request refers to the socket proposition connection request by client, and the target to be connected is service
The socket at device end.Therefore, the socket of client must describe the socket of its server to be connected first, it is indicated that service
The address of device end socket and port numbers, then just propose connection request to server side socket;Connection confirmation refers to when clothes
Business device end socket listens to the connection request for receiving client socket in other words, and it please with regard to customer in response end socket
Ask, establish a new thread, client is issued in the description of server side socket, once client confirms this description,
Connection(Or interface channel)Just establish, now can be with one between the first client-side program of progress and the second client-side program
Series of data transfers.
In the specific implementation, server establishes the socket for monitoring connection, then called by calling socket functions
Bind functions, socket is associated with address information.Listen functions are called to realize the monitoring to the port, when there is company
When connecing request, by calling accept functions to establish the connection with client, finally, read functions are called to carry out reading client hair
The message brought, naturally it is also possible to realize identical function using recv functions.
Step 305, second client-side program by the SOCKET interface channels to first client-side program
The safety detection request to mobile device is sent, the safety detection request includes specifying detection object;
To ensure the detection request of mobile device safety, one kind as the present embodiment is preferably shown for the safety detection request
Example, the safety detection request can include specifying detection object, and the specified detection object is to be pacified for mobile device
The project that full inspection is surveyed, can be including the one or more of the following service for mobile device:Mobile device extension horse Hole Detection,
Detect whether to open cloud killing, detect whether dangerous software, detect whether updated virus base, whether detect security service
Open, whether detection mobile device has mountain vallage application, whether has malice advertisement applications, Initiative Defense function on detection mobile device
Open detection, etc..
As another preferred exemplary of the present embodiment, the safety detection request can include specifying detection object, institute
It is to optimize project with garbage-cleaning for mobile device to state specified detection object, can include for mobile device as
Lower service it is one or more:Internal memory optimization detection, detect whether daemon software, the software detection of automatic start, rubbish be present
Data scrubbing detects, cleaning caching detects, clears up to clear up using existing Stub File detection, installation kit after unloading and detects, greatly
File consolidation, the cleaning detection of privacy vestige, etc..
Step 306, first client-side program sends safety detection request to third-party application;
In practice, the third-party application can establish a variety of services in the installation process of mobile device side
(service), the first client-side program is after safety detection request is received, according to the specified detection object positioning third party
Using corresponding service, if for example, the specified detection object is junk data safety detection, its corresponding third-party application
Service for cleaning service.First client-side program is by calling the interface serviced corresponding to the third-party application will be described
Safety detection request is sent into third-party application.
Step 307, the third-party application operates to safety detection corresponding to the specified detection object execution, is pacified
Full inspection surveys object information;
Specifically, the specified detection object in the safety detection request includes the information of type identification, the type
The information of mark specifies the information of the detection type of detection object, different classes for the instruction of third-party application and server commitment
The different operation of message identification of type mark, the detection object is known that by the information third-party application of the type identification
Detected for which kind of, so as to perform corresponding operation, obtain safety detection result information.For example,
The information of the type identification of physical examination is CMD_SYSTEM_EXAM_SCAN;
The information of the type identification of garbage-cleaning is CMD_CLEAR_GARBAGE_SCAN;
The information of the type identification of antivirus is CMD_SECURITY_SCAN.
As a kind of preferred exemplary of the embodiment of the present invention, if the detection object is active defense function open detection,
Its specific detected rule can be:Third-party application detects mobile device and possesses Initiative Defense function first, if so, then detecting
Whether the Initiative Defense function opens;If it is not, then third party device detects whether first client-side program is opened actively
Defense function.
As another example of the present embodiment, if whether the specified detection object has mountain vallage should for detection mobile device
With its specific detected rule can be:Third-party application scans the APP of mobile device(Application, application)List,
The developer's signature or MD5 values of each application in the list of application are obtained, and by the application in the list of application with answering
Contrasted with the application in white list, if certain is applied in application white list, then developer's signature or MD5 by the application
The developer's signature or MD5 values of value application corresponding with white list are compared, if the developer's signature or MD5 of the application
The developer's signature or MD5 values of value application corresponding with white list are inconsistent, then judge that the application belongs to mountain vallage application;If
Certain application application white list in, then Scan for Viruses storehouse or(Enter killing of racking)If this is applied in virus base, report disease
Poison or wooden horse.
As another example of the present embodiment, if the specified detection object whether there is danger for detection mobile device
Whether software has malice advertisement applications, and its specific detected rule can be:Third-party application scans the APP of mobile device
(Application, application)List, the application in list of application is matched with the black and white lists in server.Wherein, in vain
List is the list of record security process, and blacklist is the list for recording dangerous process.The type of process is in white list
Bai Jincheng, the type of process is black process in blacklist, and all unknown processes outside white and black list belong to
Grey process.When the process of application is white process(The process that such as 360 mobile phone assistant, 91 mobile phone assistants or pea pods call)When,
Confirm that the related application of the process is believable application(Or safety applications), it is allowed to the operation of the process;When application process is black
During process(Such as malice promotes the process of APK application call), it is insincere to confirm the related application program of the process
Application program, after the type of the process is judged, intercept the operation of the process immediately(Such as by disconnecting the process and 5037
The connection of port intercepts the process), forbid the related application program of the process to carry out any operation to mobile device(Such as enumerate
The Android device connected in system), and successful information will be intercepted and sent to the first client-side program, by the first client-side program
Return to computing device side.
In addition, this example by the behavior of client collection procedure and can also be associated with performance of program, so as in database
Middle logging program feature and its corresponding program behavior, can according to the program behavior and the incidence relation of performance of program being collected into
To carry out analytic induction to sample in database, so as to help to belong to blacklist to software or program or white list is sentenced
It is disconnected.Due to have recorded behavior record corresponding to performance of program and this feature in database, therefore known white list can be combined
Unknown program is analyzed.For example, if unknown program feature is identical with the known procedure feature in existing white list, incite somebody to action
The unknown program feature and its program behavior are all included in white list.If unknown program behavior and the known journey in existing white list
Sequence behavior is identical or approximate, then the unknown program behavior and its performance of program is all included in into white list.
For example, by taking antivirus as an example, third-party application(Such as mobile phone bodyguard)Virus results are obtained in the following manner:
(1)Android installation kits are scanned, and the characteristic information specified is extracted from the Android installation kits;
The characteristic information extracted in this example can include:
1)Android installation kit bag names:packageName
2)Android installation kits version number:versionCode
3)The MD5 of the digital signature of Android installation kits:signature[0]
4)Android components receiver
5)Instruction in classes.dex
6)Character string in ELF files
7)The MD5 of each file under the catalogues such as assets, res, lib
8)Android components service, activity
(2)Searched in preset safety identification storehouse with the single feature information specified or its combine the feature to match note
Record;Wherein, level of security corresponding to feature record and feature record is included in the safety identification storehouse, is wrapped in every feature record
The combination of information containing single feature or characteristic information;
(3)Level of security corresponding to the feature found record is included in the safety detection of the Android installation kits
As a result middle display.
This example includes safety, dangerous, careful and four level of securitys of wooden horse.Wherein, the definition of various level of securitys
It is as follows:
Safety:The application is a normal application, without the behavior of any threat user mobile phone safety;
It is dangerous:There is security risk in the application, it is possible to the application inherently Malware;It is also possible to the application originally
Being the normal software of regular company issue, but because security breaches be present, cause the privacy of user, mobile phone safe by prestige
The side of body;
With caution:The application is a normal application, but be there are problems that, such as user's imprudence can be allowed to be detained
Take, or there is disagreeableness advertisement to be complained;After this kind of application is found, can prompt user with caution using and inform this
Using possible behavior, but decide whether remove the application in its sole discretion by user;
Wooden horse:The application is virus, wooden horse or other Malwares, here for being referred to generally simply as wooden horse, but not
Represent the application only wooden horse.
So when setting safety identification storehouse, can be by safety, danger, the Android with caution and under four ranks of wooden horse
Installation kit is all used as sample Android installation kits, so as to which the feature obtained by the single feature in sample or combinations of features records
The information such as behavior and the description of a kind of level of security and correlation can be correspond to respectively.
For example, the feature record in safety identification storehouse has four, first feature records and Article 4 feature record difference
Corresponding level of security is wooden horse rank, and level of security corresponding to Article 2 feature record and Article 3 feature record difference is equal
For level of security.
Certainly, a feature record can also be set in safety identification storehouse, list the Android installation kits of certain wooden horse
Version number and its MD5 values of digital signature, although the combinations of features that uses of this feature record recorded with Article 2 feature it is identical,
The combination of version number and digital signature MD5 values is all employ, but level of security corresponding to this feature record is then " wooden horse ".
So level of security is not corresponding with a certain specific feature or combinations of features, but with specific feature
Or the value of combinations of features is corresponding.Therefore, for identical feature or combinations of features, specific value is different, corresponding safety
Rank is also different.
Moreover, above-mentioned safe, dangerous, careful and four ranks of wooden horse definition is illustrative only, answered according to actual
With, naturally it is also possible to there are other level of securitys to classify and define, the protection domain of this example is not limited to this.
So, it is described searched in preset safety identification storehouse with the single feature information specified or its combine what is matched
Feature is recorded, and level of security corresponding to the feature found record is included in the safety detection of the Android installation kits
As a result the step of, it can be understood as:
Feature record is searched in safety identifies storehouse, if the specified single feature extracted records phase with first feature
Matching, then can be determined that current Android installation kits is wooden horse rank;If the specific characteristic extracted be combined after with
Article 2 feature records or Article 3 feature record matches, then can be determined that current Android installation kits is safe level
Not;If the specific characteristic extracted matches after being combined with Article 4 feature record, can be determined that current
Android installation kits are also wooden horse rank.
So for some Android installation kit safety detection result can be include it is safe, dangerous, careful or wooden
The information of four expression level of securitys of horse, can also include the behavior related to level of security in addition in the safety detection result
At least one of description, software description, timestamp etc. prompt message, the prompt message of such as corresponding " careful " rank can be " may
Cause to deduct fees, if the application is deleted in selection ".
More specifically, the safety detection result can include level of security, behavior description information, software description information and
Timestamp information.Wherein:
Level of security:32 integer representations can be used, safety, dangerous, careful or four level of securitys of wooden horse can be represented, often
Individual level of security is as defined above.
Behavior description information:32 can also be used(0~31)Integer representation, the software of each level of security can be represented
Behavior description.Wherein it is possible to choose an expression flag bit, flag bit is the 0 no malicious act of expression, if malice row
Can then to define:1st represents " stealthily downloading on backstage ", and the 2nd represents " sending short message privately ", and the 3rd representative " includes
Advertisement ", etc..That is, each can individually represent a kind of behavior description of software.
For example, the Android application programs for being detected as " wooden horse rank ", if malicious act=3, translate into two and enter
System is exactly 11, and the 1st=1, the 2nd=1, the malicious act of expression is:There is backstage stealthily to download and send short message privately simultaneously
Behavior.
For another example the Android application programs for being detected as " careful rank ", if behavior description=4, translate into two
System is exactly 100, and the 1st=0, the 2nd=0, the 2nd=1, the behavior of expression is:Include advertisement.Because this advertisement is probably
What user allowed, it is also possible to what user did not allowed, so user can be prompted to use with caution, whether clear decided in its sole discretion by user
Remove.
Software description information:Character string is typically expressed as, is the explanation to Android application programs, such as publisher, issue
The information such as time.
Timestamp information:Show the characteristic information of Android application programs(Such as normal characteristics, Trojan characteristics)What is
When be put in storage.
It should be noted that above-mentioned Initiative Defense function open detection, detection mobile device whether have mountain vallage apply and
Detection mobile device is with the presence or absence of dangerous software or whether to have the detected rules of malice advertisement applications be only showing for the present embodiment
Whether example, those skilled in the art can reach detection mobile device with the presence or absence of dangerous software using other or have malice advertisement should
It is possible with or with the presence or absence of the method for purpose of mountain vallage application, in addition, the detection of detection object is specified for other, this
Art personnel can be detected using the existing any technology that can be achieved the goal, and the present invention need not be limited this
System.
Step 308, the safety detection result information is returned to the first client-side program by third-party application, by described first
The safety detection result information is forwarded to the second client-side program by client-side program by the SOCKET interface channels;
Specifically, after the third-party application performs corresponding safety detection operation, safety detection result information is obtained
And the first client-side program is returned, in practice, the third-party application can be by calling first client-side program to exist
The safety detection result information is returned to the first client-side program by the call back function first registered.Further, third-party application
, can be to the safety detection result information labeling type when the safety detection result information is returned into the first client-side program
Mark, the type identification are third-party application and the second client-side program or are used for mark peace with what mobile device was made an appointment
Full inspection surveys the mark of object information type.
Step 309, second client-side program performs suggestion according to corresponding to the safety detection result information acquisition
Information;
Applied to the embodiment of the present invention, after the second client-side program receives safety detection result information, the peace is parsed
Full inspection surveys type identification corresponding to object information acquisition, and subsequent second client-side program searches the type in default mapping table
Mark, obtain execution advisory information corresponding with the type mark.Wherein, it is stored with each type mark in the default mapping table
Know and corresponding one or more mapping relations for performing advisory information.
In one preferred embodiment of the invention, the safety detection result information can include safety detection progress letter
Breath.Service corresponding to third-party application can enter safety detection during to specifying detection object to carry out safety detection
Spend information and return to the first client-side program, by the first client-side program by the SOCKET interface channels by safety detection progress
Information returns to the second client-side program.After second client-side program receives the safety detection progress, parsing safety detection is entered
Type identification and safety detection progress corresponding to spending acquisition of information, search the type identification from default mapping table, obtain
It is corresponding with the safety detection progress to perform advisory information, wherein, it is right for the type identification institute of the safety detection progress
The execution advisory information answered can have stopping performs suggestion, suspend perform suggestion, continue executing with suggestion etc..
In another preferred embodiment of the invention, the safety detection result information can include safety detection knot
Fruit, the safety detection result be for specifying detection object safety detection after obtained final result, the second client
After program receives the safety detection result, type identification corresponding to parsing safety detection result acquisition, from default mapping table
It is middle to search the type identification, execution advisory information corresponding with the safety detection result is obtained, wherein, for the safety
Detecting the execution advisory information corresponding to the type identification of structure can have mobile device extension horse leak reparation suggestion, unlatching cloud to look into
Kill suggestion, dangerous software reparation suggestion, virus base more new suggested, unlatching security service suggestion, mountain vallage application reparation suggestion, malice
Advertisement applications reparation suggestion, internal memory optimization suggestion, daemon software close software advisor, the rubbish number for suggesting, closing automatic start
Suggest according to cleaning, cleaning caches suggestion, existing Stub File suggestion, installation kit clear up suggestion, big text after cleaning application unloading
Part arranges suggestion, the cleaning of privacy vestige is suggested.Etc..
Step 310, second client-side program shows the safety detection result information and corresponding performs suggestion
Information;
Second client-side program, can be by the safety detection result information and its is right after obtaining and performing advisory information
The execution advisory information answered shows user in computing device side.The display form can be to be opened up in the form of pop-up
Show, or be directly shown in the current window of the second client-side program, the content of displaying is except safety detection result information
And performed corresponding to it outside advisory information, the mark of mobile device, file path, file size etc. can also be included, this
Inventive embodiments need not be any limitation as to the form of displaying.
Step 311, second client-side program is receiving user for one or more choosings for performing advisory information
After fixed instruction, according to selected instruction generation execute instruction corresponding with one or more of execution advisory informations and send
To the first client-side program, the execute instruction is sent into the 3rd application by the first client-side program;
Specifically, user can be sent to safety detection by way of selected one or more execution advisory informations
As a result processing wish, generated when user is selected one or more performs advisory information and one or more of perform suggestion
The selected instruction of information, after the second client-side program receives the selected instruction, execute instruction passes through described corresponding to generation
SOCKET interface channels are sent to the first client-side program, are sent by the first client-side program into third-party application.
For example, described stop execute instruction corresponding to execution suggestion to stop execute instruction, the pause execution suggestion pair
The execute instruction answered is pause execute instruction, described continues executing with execute instruction corresponding to suggestion to continue executing with instruction;It is described
Mobile device extension horse leak reparation suggestion, open cloud killing suggestion, dangerous software reparation suggestion, virus base more new suggested, unlatching
Suggestion, malice advertisement applications reparation suggestion, Initiative Defense function unlatching suggestion, internal memory are repaired in security service suggestion, mountain vallage application
Optimizing Suggestions, daemon software closing suggestion, the software advisor for closing automatic start, garbage data cleaning suggestion, cleaning caching are built
Existing Stub File suggestion, installation kit cleaning suggestion, big file consolidation suggestion, privacy vestige are clear after view, cleaning application unloading
Reason instructs difference to be the reparation of mobile device extension horse leak, open cloud killing, dangerous software reparation, virus base corresponding to suggesting
Renewal, open security service, mountain vallage application reparations, the reparation of malice advertisement applications, unlatching Initiative Defense function, internal memory optimization, after
The closing of platform software, the software for closing automatic start, garbage data cleaning, cleaning caching, cleaning are using existing residual after unloading
File, installation kit cleaning, big file consolidation, the cleaning of privacy vestige.
Step 312, third-party application performs the execute instruction.
Specifically, the execute instruction carries command identification, and different command identifications instruction third-party application performs
Different operations, i.e., after third-party application receives execute instruction, perform corresponding repair according to the command identification and operate.
For example, if the execute instruction that third-party application receives is unlatching Initiative Defense function, if possessing on mobile device
Initiative Defense function, then the Initiative Defense function on mobile device is opened, otherwise, open the active of first client-side program
Defense function.Specifically, after Initiative Defense function is opened, can utilize application program title or information with it is pre-defined
Information in database is compared to judge the identity of the application program, and then takes corresponding processing, wherein,
The pre-defined database can include application program white list, blacklist and characteristic.The white list can be with
The title of application program comprising known trust(UID including program(Unique identifier)With the bag name of program), it is described
Blacklist can include the title of known malicious application(UID including program(Unique identifier)With the bag of program
Name), the characteristic can include known malice feature(Such as characteristic of advertisement)Data.
When the title using application program is to judge the identity of the application program:In the application program
When title is included in the white list in the pre-defined database, performed according to the address of the service of application call
The calling, and return to active service result to the application program;Or it is included in advance in the title of the application program
When in the blacklist in the database of definition, pre-defined service result is returned to the application program;Or answered described
When being not included in the title of program in the white and black list in pre-defined database, the application program is shown
The information of title and information and the calling, and according to passing through selection of the operating system for the calling on the mobile apparatus
To perform processing.
That is, when the title of application program is included in white list, the application program answering for trust is judged
With program, it is allowed to which it so as to perform calling according to the address of the service, and is returned for the calling of service to the application program
Active service result;When the title of application program is included in blacklist, judge that the application software for malicious application, is refused
It, directly to the false service result of its return, makes it think that calling has succeeded for the calling of service absolutely;And work as and apply journey
When the title of sequence had both been not included in white list or had been not included in blacklist, then the title and information of the application program are shown
With the information of the calling, and according to performing place by selection of the operating system for the calling on the mobile apparatus
Reason.Specifically, in the case where have selected the permission application program to the calling of the service, according to the ground of the service
Location performs the calling, and returns to active service result to the application program;Or do not allow described to apply journey have selected
In the case of the calling serviced described in ordered pair, pre-defined service result is returned to the application program.
And when the information using application program for the identity of the application program to judge:Journey is applied described
When the packet of sequence is containing characteristic in the pre-defined database, pre-defined clothes are returned to the application program
Business result;Or the application program information do not include the pre-defined database in characteristic when, display
The title and information of the application program and the information of the calling, and according on the mobile apparatus by operating system for
The selection of the calling performs processing.
And for example, the execute instruction received when third-party application is repaired for mountain vallage application and instructed, then third-party application is from clothes
Official's application installation package corresponding to mountain vallage application is matched in business device, and official's application installation package of matching is pushed to user,
Prompt the user whether selection installation(Whiten);When execute instruction is that garbage data cleaning instructs, then third-party application is cleared up
The junk data that mobile device side safety detection obtains;If the execute instruction is closing daemon software or the software of automatic start
When, then third-party application closes the daemon software or the software of automatic start.
It should be noted that carrying out safety detection to mobile device on the computing device in the embodiment of the present invention, refer to
Safety detection is carried out to the mobile device of access on computing device, specific detection operation and execution operation are safety in movement
What the security classes detection application in equipment was carried out, with to the safety detection of u disks and being differed in computing device side.
The embodiment of the present invention can intercept malicious application and steal by carrying out safety detection to mobile device on the computing device
Peep the privacy information of mobile device user(Including associated person information, message registration, short message, multimedia message, various accounts and password etc.)
Behavior, prevent malicious application dial phone of deducting fees, send deduct fees short message, access expend network traffics website, prevent malice
Using installation wooden horse and Virus, the GPS or network positions of malicious application record user are prevented, malicious application ejection is intercepted and disturbs
Advertising message etc. is disturbed, can be intercepted for calling of any malicious application for service, so as to improve mobile device
Security.
In addition, the embodiment of the present invention can also detected by carrying out safety detection to mobile device on the computing device
During to the software for having daemon software or automatic start, the daemon software or the software of automatic start can be closed, so as to save
The network traffics of mobile device;The property of mobile device can be improved by carrying out internal memory optimization, garbage-cleaning etc. to mobile device
Energy.
Reference picture 4, show a kind of step flow of embodiment of the method four that safety detection is carried out to equipment of the present invention
Figure, the present embodiment is by taking the mobile device for being provided with Android operation system as an example, and certainly, the present invention is not limited to be provided with Android system
The mobile device of system, principle of the invention are equally applicable to be provided with the mobile device of other operating systems.
In embodiments of the present invention, if be embedded with the service of the first client-side program in service in third-party application,
Then it can directly be communicated by third-party application with the second client-side program of computing device, methods described can be included such as
Lower step:
Step 401, when mobile device is connected to computing device, whether the second client-side program detects the mobile device
Third-party application is installed, if it is not, step 402 is then performed, if so, then performing step 404;
Step 402, the second client-side program is downloaded the third-party application installation kit and sent to mobile device side;
Step 403, third-party application is installed in mobile device side according to the third-party application installation kit, continues executing with step
404;
Applied to the embodiment of the present invention, the third-party application can be that safe safety detection class is served by, such as 360 hands
Machine bodyguard, Kingsoft bodyguard etc., the embodiment of the present invention need not be any limitation as to the particular type of third-party application.
Step 404, the SOCKET interface channels of the mobile device and the computing device are established;
Step 405, the second client-side program SOCKET interface channels send to the third-party application and movement are set
Standby safety detection request, the safety detection request include specifying detection object;
As a kind of preferred exemplary of the present embodiment, the safety detection request can include specifying detection object, described
It is that the project of safety detection is carried out for mobile device to specify detection object, can be including the following service for mobile device
It is one or more:Mobile device extension horse Hole Detection, detect whether to open cloud killing, detect whether dangerous software, detection
Whether updated virus base, detection security service whether open, detect mobile device whether have mountain vallage application, detect mobile device
On whether have malice advertisement applications, Initiative Defense function open detection, internal memory optimization detection, detect whether to exist daemon software,
The software detection of automatic start, garbage data cleaning detection, cleaning caching detect, clear up existing Stub File after application unloading
Detection, installation kit cleaning detection, big file consolidation, the cleaning detection of privacy vestige, etc..
Step 406, the third-party application operates to safety detection corresponding to the specified detection object execution, is pacified
Full inspection surveys object information;
Step 407, the safety detection result information is returned to the second client-side program by third-party application;
Step 408, second client-side program performs suggestion according to corresponding to the safety detection result information acquisition
Information;
Step 409, second client-side program shows the safety detection result information and corresponding performs suggestion
Information;
Step 410, second client-side program is receiving user for one or more choosings for performing advisory information
After fixed instruction, according to selected instruction generation execute instruction corresponding with one or more of execution advisory informations and send
Into the 3rd application;
In one preferred embodiment of the invention, the safety detection result information can include safety detection progress letter
Breath, accordingly, the execute instruction can include halt instruction, pause instruction, continue executing with instruction.
In another preferred embodiment of the invention, the safety detection result information includes safety detection result, phase
Ying Di, the execute instruction can include following one or more:The reparation of mobile device extension horse leak, open cloud killing, danger
Dangerous software reparation, virus base renewal, open security service, mountain vallage application reparation, the reparation of malice advertisement applications, unlatching Initiative Defense
Function, internal memory optimization, daemon software closing, the software for closing automatic start, garbage data cleaning, cleaning caching, cleaning are applied
Existing Stub File, installation kit cleaning, big file consolidation, the cleaning of privacy vestige after unloading.
Step 411, third-party application performs the execute instruction.
For Fig. 4 embodiment of the method, because it is substantially similar to above-mentioned Fig. 3 embodiments of the method, so description
Fairly simple, the relevent part can refer to the partial explaination of embodiments of method.
For embodiment of the method, in order to be briefly described, therefore it is all expressed as to a series of combination of actions, but this area
Technical staff should know that the present invention is not limited by described sequence of movement, because according to the present invention, some steps can
To carry out using other orders or simultaneously.Secondly, those skilled in the art should also know, implementation described in this description
Example belongs to preferred embodiment, necessary to involved action and the module not necessarily present invention.
Reference picture 5, a kind of structured flowchart of device embodiment one that safety detection is carried out to equipment of the present invention is shown,
Described device can include following module:
Safety detection request receiving module 501, suitable for when mobile device is connected to computing device, in the mobile device
Side joint is received the safety detection to mobile device that the computing device side is sent and asked, and the safety detection request includes specifying inspection
Survey object;
Safety detection result information sending module 502, suitable for being obtained in the mobile device side and the specified detection pair
Sent as corresponding safety detection result information, and by the safety detection result information to computing device side;
Execute instruction receiving module 503, suitable for receiving the execute instruction of computing device side transmission in the mobile device side joint,
The execute instruction is that computing device generates according to the safety detection result information;
Execute instruction execution module 504, suitable for performing the execute instruction in the mobile device side.
In one preferred embodiment of the invention, described device can also include:
Installation kit receiving module, suitable for being sent in the mobile device side joint receipts computing device side to mobile device
Safety detection request before, the mobile device side joint receives the third-party application installation kit that the computing device side is sent,
The third-party application installation kit is that the computing device side is detecting that the mobile device side is fitted without third-party application
When, download and obtain from server;
Installation kit installs module, should according to third-party application installation kit installation third party suitable for the mobile device side
With.
In one preferred embodiment of the invention, described device can also include:
Path setup module, suitable for the mobile device side joint receive that the computing device side sends to mobile device
Before safety detection request, the SOCKET interface channels of the mobile device and the computing device, the mobile device are established
Safety detection request is received by the SOCKET interface channels and sends safety detection result information and receives and is performed
Instruction.
In one preferred embodiment of the invention, the safety detection request receiving module 501 is further adapted for:
The mobile device side using the third-party application receive that the computing device side sends to mobile device
Safety detection request;
The safety detection result information sending module 502 is further adapted for:
Ask to perform to specifying detection according to the safety detection using the third-party application in the mobile device side
The safety detection operation of object, obtains safety detection result information;
The safety detection result information is back to the computing device side by the third-party application;
The execute instruction receiving module 503 is further adapted for:
The execute instruction of computing device side transmission is received using the third-party application in the mobile device side;
The execute instruction execution module 504 is further adapted for:
The execute instruction is performed using the third-party application in the mobile device side.
In another preferred embodiment of the invention, the mobile device side is provided with the first client-side program, described
Safety detection request receiving module 501 is further adapted for:
The mobile device side using first client-side program receive that the computing device side sends to movement
The safety detection request of equipment;
The safety detection result information sending module 502 is further adapted for:
Safety detection request is sent to described the using first client-side program in the mobile device side
Tripartite applies, and asks to perform according to the safety detection by the third-party application and the safety detection for specifying detection object is grasped
Make, obtain safety detection result information and return in the first client-side program;
The safety detection result information is back to the computing device side by first client-side program;
The execute instruction receiving module 503 is further adapted for:
The execute instruction of computing device side transmission is received using first client-side program in the mobile device side;
The execute instruction execution module 504 is further adapted for:
The execute instruction is sent to third-party application using first client-side program in the mobile device side,
The execute instruction is performed by the third-party application.
In one preferred embodiment of the invention, first client-side program sends safety detection request extremely
The third-party application, it is specially:
First client-side program calls the interface of the service of the third-party application according to the specified detection object,
Safety detection request is sent to the third-party application.
As a kind of preferred exemplary of the embodiment of the present invention, the specified detection object can be included for mobile device
What is serviced as follows is one or more:Mobile device extension horse Hole Detection, detect whether to open cloud killing, detect whether it is dangerous
Software, detect whether updated virus base, detection security service are opened, detect whether mobile device has mountain vallage application, inspection
Whether survey on mobile device has malice advertisement applications, Initiative Defense function open detection, internal memory optimization to detect, detect whether exist
Exist after daemon software, the software detection of automatic start, garbage data cleaning detection, the detection of cleaning caching, cleaning application unloading
Stub File detection, installation kit cleaning detection, big file consolidation, privacy vestige cleaning detect.
As a kind of preferred exemplary of the embodiment of the present invention, the safety detection result information is believed including safety detection progress
Breath, correspondingly, the execute instruction include halt instruction, pause instruction, continue executing with instruction.
As another preferred exemplary of the embodiment of the present invention, the safety detection result information includes safety detection knot
Fruit, correspondingly, the execute instruction include following one or more:The reparation of mobile device extension horse leak, open cloud killing, danger
Dangerous software reparation, virus base renewal, open security service, mountain vallage application reparation, the reparation of malice advertisement applications, unlatching Initiative Defense
Function, internal memory optimization, daemon software closing, the software for closing automatic start, garbage data cleaning, cleaning caching, cleaning are applied
Existing Stub File, installation kit cleaning, big file consolidation, the cleaning of privacy vestige after unloading.
For Fig. 5 device embodiment, because it is substantially similar to above method embodiment, so the comparison of description
Simply, the relevent part can refer to the partial explaination of embodiments of method.
Reference picture 6, a kind of structured flowchart of device embodiment two that safety detection is carried out to equipment of the present invention is shown,
Described device can include following module:
Safety detection request sending module 601, suitable in computing device side safety detection to when having mobile device access,
Laterally the mobile device side sends and includes finger to the request of the safety detection of mobile device, the safety detection request computing device
Determine detection object;
Safety detection result information receiving module 602, returned suitable for receiving the mobile device side in the computing device side joint
The safety detection result information for safety detection request returned, the safety detection result information is by the mobile device
Side obtains according to the specified detection object;
Execute instruction sending module 603, corresponded to suitable for being generated in computing device side according to the safety detection result information
Execute instruction and send to the mobile device side, the execute instruction is performed by the mobile device side.
In one preferred embodiment of the invention, described device can also include:
Installation kit data obtaining module, suitable for laterally the mobile device side is sent to mobile device in the computing device
Safety detection request before, all installation kits letters for having installed application in the mobile device side are read in computing device side
Breath, the installation kit information identify including installation kit;
Searching modul, suitable for judging third-party application installation kit mark is not present in the installation kit mark in computing device side
During knowledge, the download address of the third-party application installation kit is obtained from server;
Installation kit sending module, suitable for being downloaded in computing device side according to the download address of the third-party application installation kit
The third-party application installation kit is simultaneously sent to mobile device side.
In one preferred embodiment of the invention, described device can also include:
Interface channel establishes module, suitable in the computing device, laterally the mobile device side is sent to mobile device
Before safety detection request, the SOCKET interface channels of the mobile device and the computing device, the computing device are established
Safety detection request is sent by the interface channel and receives safety detection result information and sends execute instruction.
In one preferred embodiment of the invention, the safety detection result information has the information of type identification, institute
Execute instruction sending module 603 is stated to be further adapted for:
Computing device side is searched in default mapping table and advisory information is performed corresponding to the type identification, and described preset is reflected
Computing device and the type identification that mobile device is made an appointment and the mapping relations for performing advisory information are stored with firing table;
The safety detection result information and corresponding execution advisory information are shown in computing device side;
Selected instruction of the user to one or more of execution advisory informations is received in computing device side joint;
According to execute instruction corresponding to the selected one or more execution advisory informations of instruction generation and send to movement
Equipment side.
As a kind of preferred exemplary of the embodiment of the present invention, the specified detection object can be included for mobile device
What is serviced as follows is one or more:Mobile device extension horse Hole Detection, detect whether to open cloud killing, detect whether it is dangerous
Software, detect whether updated virus base, detection security service are opened, detect whether mobile device has mountain vallage application, inspection
Whether survey on mobile device has malice advertisement applications, Initiative Defense function open detection, internal memory optimization to detect, detect whether exist
Exist after daemon software, the software detection of automatic start, garbage data cleaning detection, the detection of cleaning caching, cleaning application unloading
Stub File detection, installation kit cleaning detection, big file consolidation, privacy vestige cleaning detect.
In one preferred embodiment of the invention, the safety detection result information can include safety detection progress letter
Breath, correspondingly, the execute instruction include halt instruction, pause instruction, continue executing with instruction.
In another preferred embodiment of the invention, the safety detection result information includes safety detection result, phase
Ying Di, the execute instruction include following one or more:The reparation of mobile device extension horse leak, open cloud killing, be dangerous soft
Part reparation, virus base renewal, open security service, mountain vallage application reparation, the reparation of malice advertisement applications, unlatching Initiative Defense work(
Energy, internal memory optimization, daemon software closed, close the software of automatic start, garbage data cleaning, cleaning caching, cleaning application are unloaded
Existing Stub File, installation kit cleaning, big file consolidation, the cleaning of privacy vestige after load.For Fig. 6 device embodiment and
Speech, because it is substantially similar to above method embodiment, so description is fairly simple, related part is referring to embodiment of the method
Part illustrates.
Provided herein algorithm and display not with the intrinsic phase of any particular computing device, virtual system or miscellaneous equipment
Close.Various general-purpose systems can also be used together with teaching based on this.As described above, this kind of system is constructed to want
The structure asked is obvious.In addition, the present invention is not also directed to any certain programmed language.It should be understood that it can utilize each
Kind programming language realizes the content of invention described herein, and the description done above to language-specific is to disclose this
The preferred forms of invention.
In the specification that this place provides, numerous specific details are set forth.It is to be appreciated, however, that the implementation of the present invention
Example can be put into practice in the case of these no details.In some instances, known method, structure is not been shown in detail
And technology, so as not to obscure the understanding of this description.
Similarly, it will be appreciated that in order to simplify the disclosure and help to understand one or more of each inventive aspect,
Above in the description to the exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes
In example, figure or descriptions thereof.However, the method for the disclosure should be construed to reflect following intention:I.e. required guarantor
The application claims of shield features more more than the feature being expressly recited in each claim.It is more precisely, such as following
Claims reflect as, inventive aspect is all features less than single embodiment disclosed above.Therefore,
Thus the claims for following embodiment are expressly incorporated in the embodiment, wherein each claim is in itself
Separate embodiments all as the present invention.
Those skilled in the art, which are appreciated that, to be carried out adaptively to the module in the equipment in embodiment
Change and they are arranged in one or more equipment different from the embodiment.Can be the module or list in embodiment
Member or component be combined into a module or unit or component, and can be divided into addition multiple submodule or subelement or
Sub-component.In addition at least some in such feature and/or process or unit exclude each other, it can use any
Combination is to this specification(Including adjoint claim, summary and accompanying drawing)Disclosed in all features and so disclosed appoint
Where all processes or unit of method or equipment are combined.Unless expressly stated otherwise, this specification(Including adjoint power
Profit requirement, summary and accompanying drawing)Disclosed in each feature can be by providing identical, equivalent or similar purpose alternative features come generation
Replace.
In addition, it will be appreciated by those of skill in the art that although some embodiments described herein include other embodiments
In included some features rather than further feature, but the combination of the feature of different embodiments means in of the invention
Within the scope of and form different embodiments.For example, in the following claims, embodiment claimed is appointed
One of meaning mode can use in any combination.
The all parts embodiment of the present invention can be realized with hardware, or to be run on one or more processor
Software module realize, or realized with combinations thereof.It will be understood by those of skill in the art that it can use in practice
Microprocessor or digital signal processor(DSP)It is according to embodiments of the present invention to equipment progress security detection equipment to realize
In some or all parts some or all functions.The present invention is also implemented as described herein for performing
Some or all equipment or program of device of method(For example, computing device program and computing device program product).
Such program for realizing the present invention can be stored on computing device computer-readable recording medium, or can have one or more letter
Number form.Such signal can be downloaded from internet website and obtained, and either be provided or with any on carrier signal
Other forms provide.
It should be noted that the present invention will be described rather than limits the invention for above-described embodiment, and ability
Field technique personnel can design alternative embodiment without departing from the scope of the appended claims.In the claims,
Any reference symbol between bracket should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not
Element or step listed in the claims.Word "a" or "an" before element does not exclude the presence of multiple such
Element.The present invention can be by means of including the hardware of some different elements and being come by means of properly programmed computing device real
It is existing.In if the unit claim of equipment for drying is listed, several in these devices can be by same hardware branch
To embody.The use of word first, second, and third does not indicate that any order.These words can be explained and run after fame
Claim.
Embodiment of the invention discloses that A1, a kind of method that safety detection is carried out to equipment, including:
When mobile device is connected to computing device, in pair that the mobile device side joint receipts computing device side is sent
The safety detection request of mobile device, the safety detection request include specifying detection object;
Safety detection result information corresponding with the specified detection object is obtained in the mobile device side, and described in general
Safety detection result information is sent to computing device side;
Receive the execute instruction that computing device side sends in the mobile device side joint, the execute instruction be computing device according to
Generated according to the safety detection result information;
The execute instruction is performed in the mobile device side.
A2, the method as described in A1, the mobile device side joint receive that the computing device side sends to mobile device
Safety detection request the step of before, in addition to:
The mobile device side joint receives the third-party application installation kit that the computing device side is sent, the third-party application
Installation kit be the computing device side when detecting that the mobile device side is fitted without third-party application, from server under
Load obtains;
Third-party application is installed according to the third-party application installation kit in the mobile device side.
A3, the method as described in A1 or A2, the mobile device side joint receive that the computing device side sends to movement
Before the step of safety detection request of equipment, in addition to:
The SOCKET interface channels of the mobile device and the computing device are established, the mobile device passes through described
SOCKET interface channels receive safety detection request and send safety detection result information and receive execute instruction.
A4, the method as described in A2, it is described the mobile device side joint receive that the computing device side sends to movement
Equipment safety detection request the step of be:
The mobile device side using the third-party application receive that the computing device side sends to mobile device
Safety detection request;
It is described that safety detection result information corresponding with the specified detection object, and general are obtained in the mobile device side
The safety detection result information, which was sent to the step of computing device side, to be included:
Ask to perform to specifying detection according to the safety detection using the third-party application in the mobile device side
The safety detection operation of object, obtains safety detection result information;
The safety detection result information is back to the computing device side by the third-party application;
It is described to be in the step of execute instruction of mobile device side joint receipts computing device side transmission:
The execute instruction of computing device side transmission is received using the third-party application in the mobile device side;
It is described to be the step of the mobile device side performs the execute instruction:
The execute instruction is performed using the third-party application in the mobile device side.
A5, the method as described in A2, the mobile device side is provided with the first client-side program, described to be set in the movement
Standby side joint receives the step of safety detection to mobile device that the computing device side is sent is asked and is:
The mobile device side using first client-side program receive that the computing device side sends to movement
The safety detection request of equipment;
It is described that safety detection result information corresponding with the specified detection object, and general are obtained in the mobile device side
The safety detection result information, which was sent to the step of computing device side, to be included:
Safety detection request is sent to described the using first client-side program in the mobile device side
Tripartite applies, and asks execution to grasp the safety detection for specifying detection object according to the safety detection by the third party is medical
Make, obtain safety detection result information and return in the first client-side program;
The safety detection result information is back to the computing device side by first client-side program;
It is described to be in the step of execute instruction of mobile device side joint receipts computing device side transmission:
The execute instruction of computing device side transmission is received using first client-side program in the mobile device side;
It is described to be the step of the mobile device side performs the execute instruction:
The execute instruction is sent to third-party application using first client-side program in the mobile device side,
The execute instruction is performed by the third-party application.
A6, the method as described in A5, first client-side program send safety detection request to the described 3rd
The step of Fang Yingyong, includes:
First client-side program calls the interface of the service of the third-party application according to the specified detection object,
Safety detection request is sent to the third-party application.
A7, the method as described in A1, the specified detection object include for one of following service of mobile device or
It is multinomial:Mobile device extension horse Hole Detection, detect whether to open cloud killing, detect whether dangerous software, detect whether more
It is new cross virus base, whether detection security service opens, detect mobile device whether have mountain vallage application, detect on mobile device whether
There are malice advertisement applications, Initiative Defense function open detection.
A8, the method as described in A1, the specified detection object include for one of following service of mobile device or
It is multinomial:Internal memory optimization detection, detect whether that daemon software, the software detection of automatic start, garbage data cleaning be present detects, be clear
Existing Stub File detection, installation kit cleaning detection, big file consolidation, privacy trace after the detection of reason caching, cleaning application unloading
Mark cleaning detection.
A9, the method as described in A7 or A8, the safety detection result information include safety detection progress msg, accordingly
Ground, the execute instruction include halt instruction, pause instruction, continue executing with instruction.
A10, the method as described in A7, the safety detection result information includes safety detection result, correspondingly, described to hold
Row instruction includes following one or more:The reparation of mobile device extension horse leak, open cloud killing, dangerous software reparation, virus
Storehouse renewal, open security service, mountain vallage application reparation, the reparation of malice advertisement applications, unlatching Initiative Defense function.
A11, the method as described in A8, the safety detection result information includes safety detection result, correspondingly, described to hold
Row instruction includes following one or more:Software, the junk data of automatic start are closed, closed to internal memory optimization, daemon software
Existing Stub File, installation kit cleaning, big file consolidation, privacy vestige are clear after cleaning, cleaning caching, cleaning application unloading
Reason.
Embodiments of the invention also disclose B12, a kind of method that safety detection is carried out to equipment, including:
When computing device side safety detection is to when having mobile device access, in computing device, laterally the mobile device side is sent out
Go out the safety detection request to mobile device, the safety detection request includes specifying detection object;
The safety inspection for safety detection request of the mobile device side return is received in the computing device side joint
Object information is surveyed, the safety detection result information is obtained by the mobile device side according to the specified detection object;
According to execute instruction corresponding to safety detection result information generation and sent in computing device side to the shifting
Dynamic equipment side, the execute instruction is performed by the mobile device side.
B13, the method as described in B12, in the computing device, laterally the mobile device side is sent to mobile device
Before the step of safety detection is asked, in addition to:
All installation package informatins for having installed application in the mobile device side, the installation kit are read in computing device side
Information identifies including installation kit;
When judging third-party application installation kit mark is not present in the installation kit mark in computing device side, from server
The middle download address for obtaining the third-party application installation kit;
In computing device side the third-party application installation is downloaded according to the download address of the third-party application installation kit
Wrap and send to mobile device side.
B14, the method as described in B12 or 13, the computing device laterally the mobile device side send to movement set
Before the step of standby safety detection is asked, in addition to:
The SOCKET interface channels of the mobile device and the computing device are established, the computing device passes through the company
Road is connected to send safety detection request and receive safety detection result information and send execute instruction.
B15, the method as described in B12, the safety detection result information has the information of type identification, described to calculate
Equipment side according to the safety detection result information generate corresponding to execute instruction and send to the mobile device side the step of
Including:
Computing device side is searched in default mapping table and advisory information is performed corresponding to the type identification, and described preset is reflected
Computing device and the type identification that mobile device is made an appointment and the mapping relations for performing advisory information are stored with firing table;
The safety detection result information and corresponding execution advisory information are shown in computing device side;
Selected instruction of the user to one or more of execution advisory informations is received in computing device side joint;
According to execute instruction corresponding to the selected one or more execution advisory informations of instruction generation and send to movement
Equipment side.
B16, the method as described in B12, the specified detection object include one of the following service for mobile device
It is or multinomial:Mobile device extension horse Hole Detection, detect whether to open cloud killing, detect whether dangerous software, detect whether
Updated virus base, detection security service whether open, detect mobile device whether have mountain vallage application, detect mobile device on be
It is no to have malice advertisement applications, Initiative Defense function open detection.
B17, the method as described in B12, the specified detection object include one of the following service for mobile device
It is or multinomial:Internal memory optimization detection, detect whether to exist daemon software, the software detection of automatic start, garbage data cleaning detection,
Existing Stub File detection, installation kit cleaning detection, big file consolidation, privacy after the detection of cleaning caching, cleaning application unloading
Vestige cleaning detection.
B18, the method as described in B16 or B17, the safety detection result information include safety detection progress msg, phase
Ying Di, the execute instruction include halt instruction, pause instruction, continue executing with instruction.
B19, the method as described in B16, the safety detection result information includes safety detection result, correspondingly, described
Execute instruction includes following one or more:The reparation of mobile device extension horse leak, open cloud killing, dangerous software reparation, disease
Malicious storehouse renewal, open security service, mountain vallage application reparation, the reparation of malice advertisement applications, unlatching Initiative Defense function.
B20, the method as described in B17, the safety detection result information includes safety detection result, correspondingly, described
Execute instruction includes following one or more:Software, the rubbish number of automatic start are closed, closed to internal memory optimization, daemon software
It is clear according to existing Stub File, installation kit cleaning, big file consolidation, privacy vestige after cleaning, cleaning caching, cleaning application unloading
Reason.
Embodiments of the invention also disclose a kind of 21, device that safety detection is carried out to equipment, including:
Embodiments of the invention also disclose C21, a kind of device that safety detection is carried out to equipment, including:
Safety detection request receiving module, suitable for when mobile device is connected to computing device, in the mobile device side
Receive the safety detection to mobile device that the computing device side is sent to ask, the safety detection request includes specifying detection
Object;
Safety detection result information sending module, suitable for being obtained and the specified detection object pair in the mobile device side
The safety detection result information answered, and the safety detection result information is sent to computing device side;
Execute instruction receiving module, suitable for receiving the execute instruction of computing device side transmission, institute in the mobile device side joint
Execute instruction is stated to generate according to the safety detection result information for computing device;
Execute instruction execution module, suitable for performing the execute instruction in the mobile device side.
C22, the device as described in C21, in addition to:
Installation kit receiving module, suitable for being sent in the mobile device side joint receipts computing device side to mobile device
Safety detection request before, the mobile device side joint receives the third-party application installation kit that the computing device side is sent,
The third-party application installation kit is that the computing device side is detecting that the mobile device side is fitted without third-party application
When, download and obtain from server;
Installation kit installs module, should according to third-party application installation kit installation third party suitable for the mobile device side
With.
C23, the device as described in C21 or C22, in addition to:
Path setup module, suitable for the mobile device side joint receive that the computing device side sends to mobile device
Before safety detection request, the SOCKET interface channels of the mobile device and the computing device, the mobile device are established
Safety detection request is received by the SOCKET interface channels and sends safety detection result information and receives and is performed
Instruction.
C24, the device as described in C22, the safety detection request receiving module are further adapted for:
The mobile device side using the third-party application receive that the computing device side sends to mobile device
Safety detection request;
The safety detection result information sending module is further adapted for:
Ask to perform to specifying detection according to the safety detection using the third-party application in the mobile device side
The safety detection operation of object, obtains safety detection result information;
The safety detection result information is back to the computing device side by the third-party application;
The execute instruction receiving module is further adapted for:
The execute instruction of computing device side transmission is received using the third-party application in the mobile device side;
The execute instruction execution module is further adapted for:
The execute instruction is performed using the third-party application in the mobile device side.
C25, the device as described in C22, the safety detection request receiving module are further adapted for:
The mobile device side using first client-side program receive that the computing device side sends to movement
The safety detection request of equipment;
The safety detection result information sending module is further adapted for:
Safety detection request is sent to described the using first client-side program in the mobile device side
Tripartite applies, and asks execution to grasp the safety detection for specifying detection object according to the safety detection by the third party is medical
Make, obtain safety detection result information and return in the first client-side program;
The safety detection result information is back to the computing device side by first client-side program;
The execute instruction receiving module is further adapted for:
The execute instruction of computing device side transmission is received using first client-side program in the mobile device side;
The execute instruction execution module is further adapted for:
The execute instruction is sent to third-party application using first client-side program in the mobile device side,
The execute instruction is performed by the third-party application.
C26, the device as described in C25, first client-side program send safety detection request to described the
Tripartite applies, and is specially:
First client-side program calls the interface of the service of the third-party application according to the specified detection object,
Safety detection request is sent to the third-party application.
C27, the device as described in C21, the specified detection object include one of the following service for mobile device
It is or multinomial:Mobile device extension horse Hole Detection, detect whether to open cloud killing, detect whether dangerous software, detect whether
Updated virus base, detection security service whether open, detect mobile device whether have mountain vallage application, detect mobile device on be
It is no to have malice advertisement applications, Initiative Defense function open detection.
C28, the device as described in C21, the specified detection object include one of the following service for mobile device
It is or multinomial:Internal memory optimization detection, detect whether to exist daemon software, the software detection of automatic start, garbage data cleaning detection,
Existing Stub File detection, installation kit cleaning detection, big file consolidation, privacy after the detection of cleaning caching, cleaning application unloading
Vestige cleaning detection.
C29, the device as described in C27 or C28, the safety detection result information include safety detection progress msg, phase
Ying Di, the execute instruction include halt instruction, pause instruction, continue executing with instruction.
C30, the device as described in C27, the safety detection result information includes safety detection result, correspondingly, described
Execute instruction includes following one or more:The reparation of mobile device extension horse leak, open cloud killing, dangerous software reparation, disease
Malicious storehouse renewal, open security service, mountain vallage application reparation, the reparation of malice advertisement applications, unlatching Initiative Defense function.
C31, the device as described in C28, the safety detection result information includes safety detection result, correspondingly, described
Execute instruction includes following one or more:Software, the rubbish number of automatic start are closed, closed to internal memory optimization, daemon software
It is clear according to existing Stub File, installation kit cleaning, big file consolidation, privacy vestige after cleaning, cleaning caching, cleaning application unloading
Reason.
Embodiments of the invention also disclose D32, a kind of device that safety detection is carried out to equipment, including:
Safety detection request sending module, suitable for, to when having mobile device access, being counted in computing device side safety detection
Calculating equipment, laterally the mobile device side sends the request of the safety detection of mobile device, the safety detection request is included specifying
Detection object;
Safety detection result information receiving module, suitable for receiving what the mobile device side returned in the computing device side joint
For the safety detection request safety detection result information, the safety detection result information by the mobile device side according to
Obtained according to the specified detection object;
Execute instruction sending module, suitable for being held in computing device side according to corresponding to safety detection result information generation
Row is instructed and sent to the mobile device side, and the execute instruction is performed by the mobile device side.
D33, the device as described in D32, in addition to:
Installation kit data obtaining module, suitable for laterally the mobile device side is sent to mobile device in the computing device
Safety detection request before, all installation kits letters for having installed application in the mobile device side are read in computing device side
Breath, the installation kit information identify including installation kit;
Searching modul, suitable for judging third-party application installation kit mark is not present in the installation kit mark in computing device side
During knowledge, the download address of the third-party application installation kit is obtained from server;
Installation kit sending module, suitable for being downloaded in computing device side according to the download address of the third-party application installation kit
The third-party application installation kit is simultaneously sent to mobile device side.
D34, the device as described in D32 or D33, in addition to:
Interface channel establishes module, suitable in the computing device, laterally the mobile device side is sent to mobile device
Before safety detection request, the SOCKET interface channels of the mobile device and the computing device, the computing device are established
Safety detection request is sent by the interface channel and receives safety detection result information and sends execute instruction.
D35, the device as described in D32, the safety detection result information have the information of type identification, and the execution refers to
Sending module is made to be further adapted for:
Computing device side is searched in default mapping table and advisory information is performed corresponding to the type identification, and described preset is reflected
Computing device and the type identification that mobile device is made an appointment and the mapping relations for performing advisory information are stored with firing table;
The safety detection result information and corresponding execution advisory information are shown in computing device side;
Selected instruction of the user to one or more of execution advisory informations is received in computing device side joint;
According to execute instruction corresponding to the selected one or more execution advisory informations of instruction generation and send to movement
Equipment side.
D36, the device as described in D32, the specified detection object include one of the following service for mobile device
It is or multinomial:Mobile device extension horse Hole Detection, detect whether to open cloud killing, detect whether dangerous software, detect whether
Updated virus base, detection security service whether open, detect mobile device whether have mountain vallage application, detect mobile device on be
It is no to have malice advertisement applications, Initiative Defense function open detection.
D37, the device as described in D32, the specified detection object include one of the following service for mobile device
It is or multinomial:Internal memory optimization detection, detect whether to exist daemon software, the software detection of automatic start, garbage data cleaning detection,
Existing Stub File detection, installation kit cleaning detection, big file consolidation, privacy after the detection of cleaning caching, cleaning application unloading
Vestige cleaning detection.
D38, the device as described in D36 or D37, the safety detection result information include safety detection progress msg, phase
Ying Di, the execute instruction include halt instruction, pause instruction, continue executing with instruction.
D39, the device as described in D36, the safety detection result information includes safety detection result, correspondingly, described
Execute instruction includes following one or more:The reparation of mobile device extension horse leak, open cloud killing, dangerous software reparation, disease
Malicious storehouse renewal, open security service, mountain vallage application reparation, the reparation of malice advertisement applications, unlatching Initiative Defense function.
D40, the device as described in D37, the safety detection result information includes safety detection result, correspondingly, described
Execute instruction includes following one or more:Software, the rubbish number of automatic start are closed, closed to internal memory optimization, daemon software
It is clear according to existing Stub File, installation kit cleaning, big file consolidation, privacy vestige after cleaning, cleaning caching, cleaning application unloading
Reason.
Claims (34)
1. a kind of method that safety detection is carried out to equipment, including:
Mobile device side joint receives the third-party application installation kit that computing device side is sent, and the third-party application installation kit is described
Download and obtain from server when detecting that the mobile device side is fitted without third-party application in computing device side;It is described
Mobile device side is provided with the first client-side program;
Third-party application is installed according to the third-party application installation kit in the mobile device side;
When mobile device is connected to computing device, in the mobile device side using described in first client-side program reception
The safety detection to mobile device that computing device side is sent is asked, and the safety detection request includes specifying detection object;
Safety detection request is sent to the third party using first client-side program in the mobile device side
Using, by the third-party application according to the safety detection ask perform to specify detection object safety detection operate, obtain
Obtain safety detection result information and return in the first client-side program;
The safety detection result information is back to the computing device side by first client-side program;
The execute instruction of computing device side transmission is received in the mobile device side joint, the execute instruction is computing device according to institute
State the generation of safety detection result information;
The execute instruction is performed in the mobile device side;
Wherein, it is described to be the step of the mobile device side performs the execute instruction:
The execute instruction is sent to third-party application using first client-side program in the mobile device side, by institute
State third-party application and perform the execute instruction.
2. the method as described in claim 1, it is characterised in that receive the computing device side in the mobile device side joint and send
The step of request the safety detection of mobile device before, in addition to:
The SOCKET interface channels of the mobile device and the computing device are established, the mobile device passes through the SOCKET
Interface channel receives safety detection request and sends safety detection result information and receive execute instruction.
3. the method as described in claim 1, it is characterised in that described to receive the transmission of computing device side in the mobile device side joint
Execute instruction the step of be:
The execute instruction of computing device side transmission is received using first client-side program in the mobile device side.
4. method as claimed in claim 3, it is characterised in that the safety detection is asked to send out by first client-side program
The step of delivering to the third-party application includes:
First client-side program calls the interface of the service of the third-party application according to the specified detection object, by institute
Safety detection request is stated to send to the third-party application.
5. the method as described in claim 1, it is characterised in that the specified detection object is included for the as follows of mobile device
What is serviced is one or more:Mobile device extension horse Hole Detection, detect whether to open cloud killing, detect whether it is dangerous soft
Part, detect whether updated virus base, detection security service are opened, detect whether mobile device has mountain vallage application, detection
Whether malice advertisement applications, Initiative Defense function open detection are had on mobile device.
6. the method as described in claim 1, it is characterised in that the specified detection object is included for the as follows of mobile device
What is serviced is one or more:Internal memory optimization detection, detect whether daemon software, the software detection of automatic start, rubbish number be present
According to existing Stub File detection, installation kit cleaning detection, big text after cleaning detection, the detection of cleaning caching, cleaning application unloading
Part arranges, the cleaning detection of privacy vestige.
7. the method as described in claim 5 or 6, it is characterised in that the safety detection result information is entered including safety detection
Information is spent, correspondingly, the execute instruction includes halt instruction, pause instruction, continues executing with instruction.
8. method as claimed in claim 5, it is characterised in that the safety detection result information includes safety detection result,
Correspondingly, the execute instruction includes following one or more:The reparation of mobile device extension horse leak, open cloud killing, danger
Software reparation, virus base renewal, open security service, mountain vallage application reparation, the reparation of malice advertisement applications, unlatching Initiative Defense work(
Energy.
9. method as claimed in claim 6, it is characterised in that the safety detection result information includes safety detection result,
Correspondingly, the execute instruction includes following one or more:Internal memory optimization, daemon software are closed, close automatic start
Existing Stub File, installation kit cleaning, big file are whole after software, garbage data cleaning, cleaning caching, cleaning application unloading
Reason, the cleaning of privacy vestige.
10. a kind of method that safety detection is carried out to equipment, including:
All installation package informatins for having installed application in mobile device side are read in computing device side, the installation kit information includes
Installation kit identifies;
When judging third-party application installation kit mark is not present in the installation kit mark in computing device side, obtained from server
Take the download address of the third-party application installation kit;
In computing device side the third-party application installation kit is downloaded according to the download address of the third-party application installation kit simultaneously
Send to mobile device side;
When computing device side safety detection is to when having mobile device access, in computing device, laterally the mobile device side is sent pair
The safety detection request of mobile device, the safety detection request include specifying detection object;
The safety detection knot for safety detection request of the mobile device side return is received in the computing device side joint
Fruit information, the safety detection result information are obtained by the mobile device side according to the specified detection object;In the shifting
Dynamic equipment side is sent safety detection request to the third-party application using the first client-side program, by the third party
The safety detection for specifying detection object is operated using asking to perform according to the safety detection, obtains safety detection result information
And return in the first client-side program;The safety detection result information is back to the calculating by first client-side program
Equipment side;
Set in computing device side according to execute instruction corresponding to safety detection result information generation and sending to the movement
Standby side, the execute instruction is performed by the mobile device side;
Wherein, the mobile device side is provided with the first client-side program;
It is described by the mobile device side perform the execute instruction the step of be:
The execute instruction is sent to third-party application using first client-side program in the mobile device side, by institute
State third-party application and perform the execute instruction.
11. method as claimed in claim 10, it is characterised in that laterally the mobile device side is sent in the computing device
Before the step of asking the safety detection of mobile device, in addition to:
The SOCKET interface channels of the mobile device and the computing device are established, the computing device is logical by the connection
Road sends safety detection request and receives safety detection result information and send execute instruction.
12. method as claimed in claim 10, it is characterised in that the safety detection result information has the letter of type identification
Breath, it is described according to execute instruction corresponding to safety detection result information generation and to be sent in computing device side to the movement
The step of equipment side, includes:
Computing device side is searched in default mapping table and advisory information is performed corresponding to the type identification, the default mapping table
In be stored with the mapping relations of type identification that computing device and mobile device are made an appointment with performing advisory information;
The safety detection result information and corresponding execution advisory information are shown in computing device side;
Selected instruction of the user to one or more of execution advisory informations is received in computing device side joint;
According to execute instruction corresponding to the selected one or more execution advisory informations of instruction generation and send to mobile device
Side.
13. method as claimed in claim 10, it is characterised in that the specified detection object include for mobile device as
Lower service it is one or more:Mobile device extension horse Hole Detection, detect whether to open cloud killing, detect whether it is dangerous soft
Part, detect whether updated virus base, detection security service are opened, detect whether mobile device has mountain vallage application, detection
Whether malice advertisement applications, Initiative Defense function open detection are had on mobile device.
14. method as claimed in claim 10, it is characterised in that the specified detection object include for mobile device as
Lower service it is one or more:Internal memory optimization detection, detect whether daemon software, the software detection of automatic start, rubbish be present
Data scrubbing detects, cleaning caching detects, clears up to clear up using existing Stub File detection, installation kit after unloading and detects, greatly
File consolidation, the cleaning detection of privacy vestige.
15. the method as described in claim 13 or 14, it is characterised in that the safety detection result information includes safety detection
Progress msg, correspondingly, the execute instruction include halt instruction, pause instruction, continue executing with instruction.
16. method as claimed in claim 13, it is characterised in that the safety detection result information includes safety detection knot
Fruit, correspondingly, the execute instruction include following one or more:The reparation of mobile device extension horse leak, open cloud killing, danger
Dangerous software reparation, virus base renewal, open security service, mountain vallage application reparation, the reparation of malice advertisement applications, unlatching Initiative Defense
Function.
17. method as claimed in claim 14, it is characterised in that the safety detection result information includes safety detection knot
Fruit, correspondingly, the execute instruction include following one or more:Internal memory optimization, daemon software are closed, close automatic start
Software, garbage data cleaning, cleaning caching, cleaning application unloading after existing Stub File, installation kit cleaning, big file it is whole
Reason, the cleaning of privacy vestige.
18. a kind of device that safety detection is carried out to equipment, including:
Safety detection request receiving module, suitable for when mobile device is connected to computing device, being used in the mobile device side
First client-side program receives the safety detection to mobile device that the computing device side is sent and asked, and the safety detection please
Ask including specifying detection object;It is further adapted for receiving the computing device side using the first client-side program in the mobile device side
The safety detection to mobile device sent is asked;
Safety detection result information sending module, suitable for using first client-side program by described in the mobile device side
Safety detection request is sent to third-party application, asks to perform to specifying inspection according to the safety detection by the third-party application
The safety detection operation of object is surveyed, safety detection result information is obtained and returns in the first client-side program;First client
The safety detection result information is back to the computing device side by end program;
Execute instruction receiving module, it is described to hold suitable for receiving the execute instruction of computing device side transmission in the mobile device side joint
Row instruction generates for computing device according to the safety detection result information;
Execute instruction execution module, suitable for performing the execute instruction in the mobile device side;
Installation kit receiving module, suitable for the peace to mobile device sent in the mobile device side joint receipts computing device side
Full inspection is surveyed before request, and the mobile device side joint receives the third-party application installation kit that the computing device side is sent, and described the
Tripartite's application installation package be the computing device side when detecting that the mobile device side is fitted without third-party application, from clothes
Download and obtain in business device;
Installation kit installs module, and third-party application is installed according to the third-party application installation kit suitable for the mobile device side;
The execute instruction execution module is further adapted for:
The execute instruction is sent to third-party application using first client-side program in the mobile device side, by institute
State third-party application and perform the execute instruction.
19. device as claimed in claim 18, it is characterised in that also include:
Path setup module, suitable for the safety to mobile device sent in the mobile device side joint receipts computing device side
Before detection request, the SOCKET interface channels of the mobile device and the computing device are established, the mobile device passes through
The SOCKET interface channels receive safety detection request and send safety detection result information and receive execute instruction.
20. device as claimed in claim 18, it is characterised in that
The execute instruction receiving module is further adapted for:
The execute instruction of computing device side transmission is received using first client-side program in the mobile device side.
21. device as claimed in claim 20, it is characterised in that first client-side program asks the safety detection
Send to the third-party application, be specially:
First client-side program calls the interface of the service of the third-party application according to the specified detection object, by institute
Safety detection request is stated to send to the third-party application.
22. device as claimed in claim 18, it is characterised in that the specified detection object include for mobile device as
Lower service it is one or more:Mobile device extension horse Hole Detection, detect whether to open cloud killing, detect whether it is dangerous soft
Part, detect whether updated virus base, detection security service are opened, detect whether mobile device has mountain vallage application, detection
Whether malice advertisement applications, Initiative Defense function open detection are had on mobile device.
23. device as claimed in claim 18, it is characterised in that the specified detection object include for mobile device as
Lower service it is one or more:Internal memory optimization detection, detect whether daemon software, the software detection of automatic start, rubbish be present
Data scrubbing detects, cleaning caching detects, clears up to clear up using existing Stub File detection, installation kit after unloading and detects, greatly
File consolidation, the cleaning detection of privacy vestige.
24. the device as described in claim 22 or 23, it is characterised in that the safety detection result information includes safety detection
Progress msg, correspondingly, the execute instruction include halt instruction, pause instruction, continue executing with instruction.
25. device as claimed in claim 22, it is characterised in that the safety detection result information includes safety detection knot
Fruit, correspondingly, the execute instruction include following one or more:The reparation of mobile device extension horse leak, open cloud killing, danger
Dangerous software reparation, virus base renewal, open security service, mountain vallage application reparation, the reparation of malice advertisement applications, unlatching Initiative Defense
Function.
26. device as claimed in claim 23, it is characterised in that the safety detection result information includes safety detection knot
Fruit, correspondingly, the execute instruction include following one or more:Internal memory optimization, daemon software are closed, close automatic start
Software, garbage data cleaning, cleaning caching, cleaning application unloading after existing Stub File, installation kit cleaning, big file it is whole
Reason, the cleaning of privacy vestige.
27. a kind of device that safety detection is carried out to equipment, including:
Safety detection request sending module, suitable for, to when having mobile device access, being set in computing device side safety detection in calculating
The standby lateral mobile device side sends the safety detection request to mobile device, and the safety detection request includes specifying detection
Object;
Safety detection result information receiving module, suitable for receiving being directed to for the mobile device side return in the computing device side joint
The safety detection result information of the safety detection request, the safety detection result information is by the mobile device side according to institute
Specified detection object is stated to obtain;Safety detection request is sent extremely using the first client-side program in the mobile device side
Third-party application, ask to perform according to the safety detection by the third-party application and the safety detection for specifying detection object is grasped
Make, obtain safety detection result information and return in the first client-side program;First client-side program examines the safety
Survey object information and be back to the computing device side;
Execute instruction sending module, refer to suitable for generating corresponding perform according to the safety detection result information in computing device side
Make and send to the mobile device side, the execute instruction is performed by the mobile device side;
Installation kit data obtaining module, suitable for laterally the mobile device side sends peace to mobile device in the computing device
Full inspection is surveyed before request, and all installation package informatins for having installed application in the mobile device side, institute are read in computing device side
Installation kit information is stated to identify including installation kit;
Searching modul, suitable for judging that third-party application installation kit, which is not present, in the installation kit mark identifies in computing device side
When, the download address of the third-party application installation kit is obtained from server;
Installation kit sending module, suitable for computing device side according to the third-party application installation kit download address download described in
Third-party application installation kit is simultaneously sent to mobile device side;
Wherein, the mobile device side is provided with the first client-side program;
The mobile device side includes execute instruction execution module, suitable for using first client in the mobile device side
Program sends the execute instruction to third-party application, and the execute instruction is performed by the third-party application.
28. device as claimed in claim 27, it is characterised in that also include:
Interface channel establishes module, suitable in the computing device, laterally the mobile device side sends safety to mobile device
Before detection request, the SOCKET interface channels of the mobile device and the computing device are established, the computing device passes through
The interface channel sends safety detection request and receives safety detection result information and send execute instruction.
29. device as claimed in claim 27, it is characterised in that the safety detection result information has the letter of type identification
Breath, the execute instruction sending module are further adapted for:
Computing device side is searched in default mapping table and advisory information is performed corresponding to the type identification, the default mapping table
In be stored with the mapping relations of type identification that computing device and mobile device are made an appointment with performing advisory information;
The safety detection result information and corresponding execution advisory information are shown in computing device side;
Selected instruction of the user to one or more of execution advisory informations is received in computing device side joint;
According to execute instruction corresponding to the selected one or more execution advisory informations of instruction generation and send to mobile device
Side.
30. device as claimed in claim 27, it is characterised in that the specified detection object include for mobile device as
Lower service it is one or more:Mobile device extension horse Hole Detection, detect whether to open cloud killing, detect whether it is dangerous soft
Part, detect whether updated virus base, detection security service are opened, detect whether mobile device has mountain vallage application, detection
Whether malice advertisement applications, Initiative Defense function open detection are had on mobile device.
31. device as claimed in claim 27, it is characterised in that the specified detection object include for mobile device as
Lower service it is one or more:Internal memory optimization detection, detect whether daemon software, the software detection of automatic start, rubbish be present
Data scrubbing detects, cleaning caching detects, clears up to clear up using existing Stub File detection, installation kit after unloading and detects, greatly
File consolidation, the cleaning detection of privacy vestige.
32. the device as described in claim 30 or 31, it is characterised in that the safety detection result information includes safety detection
Progress msg, correspondingly, the execute instruction include halt instruction, pause instruction, continue executing with instruction.
33. device as claimed in claim 30, it is characterised in that the safety detection result information includes safety detection knot
Fruit, correspondingly, the execute instruction include following one or more:The reparation of mobile device extension horse leak, open cloud killing, danger
Dangerous software reparation, virus base renewal, open security service, mountain vallage application reparation, the reparation of malice advertisement applications, unlatching Initiative Defense
Function.
34. device as claimed in claim 31, it is characterised in that the safety detection result information includes safety detection knot
Fruit, correspondingly, the execute instruction include following one or more:Internal memory optimization, daemon software are closed, close automatic start
Software, garbage data cleaning, cleaning caching, cleaning application unloading after existing Stub File, installation kit cleaning, big file it is whole
Reason, the cleaning of privacy vestige.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310632733.2A CN103632096B (en) | 2013-11-29 | 2013-11-29 | A kind of method and apparatus that safety detection is carried out to equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310632733.2A CN103632096B (en) | 2013-11-29 | 2013-11-29 | A kind of method and apparatus that safety detection is carried out to equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103632096A CN103632096A (en) | 2014-03-12 |
CN103632096B true CN103632096B (en) | 2018-01-16 |
Family
ID=50213132
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310632733.2A Expired - Fee Related CN103632096B (en) | 2013-11-29 | 2013-11-29 | A kind of method and apparatus that safety detection is carried out to equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103632096B (en) |
Families Citing this family (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103944802B (en) * | 2014-04-17 | 2017-07-04 | 新华三技术有限公司 | Control mobile device uses the method and device of exchange mailbox |
CN104050417B (en) * | 2014-07-04 | 2018-03-27 | 北京奇虎科技有限公司 | A kind of method and device detected in mobile terminal to application state |
CN104199682A (en) * | 2014-08-04 | 2014-12-10 | 联想(北京)有限公司 | Information processing method and electronic equipment |
CN104360884A (en) * | 2014-11-18 | 2015-02-18 | 久邦计算机技术(广州)有限公司 | Plug-in resource packet loading method based on Android system |
CN104484484B (en) * | 2015-01-08 | 2018-05-01 | 北京奇虎科技有限公司 | Clear up the method and device of cache file |
CN104809394B (en) * | 2015-04-08 | 2017-04-05 | 北京奇虎科技有限公司 | The method of checking and killing virus, device and terminal |
CN105224397A (en) * | 2015-10-30 | 2016-01-06 | 中国民生银行股份有限公司 | Intelligence POS management method and device |
CN105589723A (en) * | 2015-12-22 | 2016-05-18 | 广州三星通信技术研究有限公司 | Method for installing application in electronic terminal, and electronic terminal |
CN105678161A (en) * | 2015-12-23 | 2016-06-15 | 北京奇虎科技有限公司 | Installation monitoring method and apparatus of applications |
CN107086978B (en) * | 2016-02-15 | 2019-12-10 | 中国移动通信集团福建有限公司 | Method and device for identifying Trojan horse virus |
CN106027575A (en) * | 2016-08-01 | 2016-10-12 | 湖南润安危物联科技发展有限公司 | Client and security check device and method |
CN107102885A (en) * | 2017-04-14 | 2017-08-29 | 北京洋浦伟业科技发展有限公司 | The method and device of Android simulator is detected using ADB modes |
CN107301346A (en) * | 2017-05-23 | 2017-10-27 | 成都联宇云安科技有限公司 | One kind realizes Android device APP fast and safely detection methods using white list mechanism |
CN108093416B (en) * | 2017-11-30 | 2021-09-21 | 厦门市美亚柏科信息股份有限公司 | Mobile APP push data acquisition method and terminal |
CN110287087B (en) * | 2018-03-19 | 2023-06-13 | 百度在线网络技术(北京)有限公司 | Method and device for detecting application |
CN109861979B (en) * | 2018-12-28 | 2021-08-10 | 努比亚技术有限公司 | Program processing method, electronic device, and computer-readable storage medium |
CN110058871A (en) * | 2019-04-23 | 2019-07-26 | 湖南快乐阳光互动娱乐传媒有限公司 | It detects the illegal decompiling of program and updates the method and system of official release |
CN110727945B (en) * | 2019-09-20 | 2021-10-22 | 上海连尚网络科技有限公司 | Virus scanning method, device and computer readable medium |
CN114024697A (en) * | 2020-07-16 | 2022-02-08 | 青岛海尔工业智能研究院有限公司 | Security control method, device, system, electronic device, and storage medium |
CN112269993A (en) * | 2020-11-02 | 2021-01-26 | 商丘经济贸易学校 | Method for protecting computer system safety |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1862508A (en) * | 2005-05-13 | 2006-11-15 | 中兴通讯股份有限公司 | Automatic testing system of person digital aid cell phone function and method thereof |
CN102255676A (en) * | 2010-05-19 | 2011-11-23 | 广东新支点技术服务有限公司 | Automatic end-user oriented testing method for mobile phone |
CN102708048A (en) * | 2012-04-21 | 2012-10-03 | 北京迈凯互动网络科技有限公司 | Method and system for testing mobile application |
CN102752457A (en) * | 2012-07-19 | 2012-10-24 | 腾讯科技(深圳)有限公司 | Method and system for installing applications |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI322350B (en) * | 2006-12-15 | 2010-03-21 | Inst Information Industry | Test device, method, application program, and computer readable medium for deriving a qualified test case plan from a test case database |
-
2013
- 2013-11-29 CN CN201310632733.2A patent/CN103632096B/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1862508A (en) * | 2005-05-13 | 2006-11-15 | 中兴通讯股份有限公司 | Automatic testing system of person digital aid cell phone function and method thereof |
CN102255676A (en) * | 2010-05-19 | 2011-11-23 | 广东新支点技术服务有限公司 | Automatic end-user oriented testing method for mobile phone |
CN102708048A (en) * | 2012-04-21 | 2012-10-03 | 北京迈凯互动网络科技有限公司 | Method and system for testing mobile application |
CN102752457A (en) * | 2012-07-19 | 2012-10-24 | 腾讯科技(深圳)有限公司 | Method and system for installing applications |
Non-Patent Citations (1)
Title |
---|
Android平台远程终端控制系统的研究与设计;黄兴;《中国优秀硕士学位论文全文数据库 信息科技辑》;20131115(第11期);I136-891 * |
Also Published As
Publication number | Publication date |
---|---|
CN103632096A (en) | 2014-03-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103632096B (en) | A kind of method and apparatus that safety detection is carried out to equipment | |
US11336458B2 (en) | Evaluating authenticity of applications based on assessing user device context for increased security | |
Rastogi et al. | Are these Ads Safe: Detecting Hidden Attacks through the Mobile App-Web Interfaces. | |
CN103761472B (en) | Application program accessing method and device based on intelligent terminal | |
CN104517054B (en) | Method, device, client and server for detecting malicious APK | |
Grace et al. | Unsafe exposure analysis of mobile in-app advertisements | |
US9336389B1 (en) | Rapid malware inspection of mobile applications | |
Feng et al. | Mobidroid: A performance-sensitive malware detection system on mobile platform | |
Hu et al. | Migdroid: Detecting app-repackaging android malware via method invocation graph | |
US20170068810A1 (en) | Method and apparatus for installing an application program based on an intelligent terminal device | |
CN104268476B (en) | A kind of method for running application program | |
CN104484599A (en) | Behavior processing method and device based on application program | |
CN105554137B (en) | A kind of standby system and method | |
CN105844155B (en) | Macro-virus searching and killing method and system | |
US9747449B2 (en) | Method and device for preventing application in an operating system from being uninstalled | |
CN104268475B (en) | A kind of system for running application program | |
CN103793649A (en) | Method and device for cloud-based safety scanning of files | |
WO2018121266A1 (en) | Method and device for obtaining application and terminal device | |
Wang et al. | Understanding malicious cross-library data harvesting on android | |
CN104239798B (en) | Mobile terminal, server end in mobile office system and its virus method and system | |
CN106682513A (en) | Detection method for target sample file and device | |
CN105095758B (en) | Screen locking applied program processing method, device and mobile terminal | |
CN103713945B (en) | The recognition methods of game and device | |
CN109558732A (en) | A kind of method for preventing application file to be tampered and server | |
CN110110521A (en) | It is a kind of based on iOS application safety detection method, apparatus and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20180116 Termination date: 20211129 |