CN103632096B - A kind of method and apparatus that safety detection is carried out to equipment - Google Patents

A kind of method and apparatus that safety detection is carried out to equipment Download PDF

Info

Publication number
CN103632096B
CN103632096B CN201310632733.2A CN201310632733A CN103632096B CN 103632096 B CN103632096 B CN 103632096B CN 201310632733 A CN201310632733 A CN 201310632733A CN 103632096 B CN103632096 B CN 103632096B
Authority
CN
China
Prior art keywords
mobile device
safety detection
device side
computing device
detection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201310632733.2A
Other languages
Chinese (zh)
Other versions
CN103632096A (en
Inventor
张龙
孟凡磊
邱凯
田野
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201310632733.2A priority Critical patent/CN103632096B/en
Publication of CN103632096A publication Critical patent/CN103632096A/en
Application granted granted Critical
Publication of CN103632096B publication Critical patent/CN103632096B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/85Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephonic Communication Services (AREA)
  • Alarm Systems (AREA)

Abstract

The invention discloses a kind of method and apparatus that safety detection is carried out to equipment, wherein methods described includes:When mobile device is connected to computing device, asked in the safety detection to mobile device that the mobile device side joint receipts computing device side is sent, the safety detection request includes specifying detection object;Safety detection result information corresponding with the specified detection object is obtained in the mobile device side, and the safety detection result information is sent to computing device side;The execute instruction of computing device side transmission is received in the mobile device side joint, the execute instruction is that computing device generates according to the safety detection result information;The execute instruction is performed in the mobile device side.The present invention can cause user that the safety detection to mobile device can be achieved in computing device side, so as to improve the security of mobile device.

Description

A kind of method and apparatus that safety detection is carried out to equipment
Technical field
The present invention relates to equipment safety detection technique field, and in particular to a kind of method that safety detection is carried out to equipment, A kind of and device that safety detection is carried out to equipment.
Background technology
With the raising of the level of informatization and the continuous release of various applicability technologies, the intelligence such as computer or mobile phone is eventually End has been widely used in study, amusement, work etc., and more and more important angle is play in daily life Color.However, the extensive use of intelligent terminal also intelligent terminal is proposed in garbage data cleaning, security protection etc. it is higher It is required that.
For the demand, many third party's safety applications manufacturers have developed for intelligent terminal safety applications, described Safety applications can check UP in intelligent terminal side to intelligent terminal, and carry out a series of repair according to physical examination result and grasp Make, to ensure the performance of intelligent terminal and security.For mobile device, although being mounted with advance on some mobile devices Some antivirus softwares, but often user easy virus infection, is especially accessing not when mobile phone bodyguard is installed thereon When application market downloads some applications, it is easy to it is tied either download to be provided with malicious application, plug-in unit or It is the software of advertisement applications etc, often leads to user in the case of imperceptible, is escaped by mobile device flow, quilt Steal privacy or be that malice such as is deducted fees at the loss, it is therefore necessary to the safety of the mobile device of user is carried out from each channel Protection.
The content of the invention
In view of the above problems, it is proposed that the present invention so as to provide one kind overcome above mentioned problem or at least in part solve on State a kind of method that safety detection is carried out to equipment of problem and a kind of corresponding device that safety detection is carried out to equipment.
According to one aspect of the present invention, there is provided a kind of method that safety detection is carried out to equipment, including:
When mobile device is connected to computing device, in pair that the mobile device side joint receipts computing device side is sent The safety detection request of mobile device, the safety detection request include specifying detection object;
Safety detection result information corresponding with the specified detection object is obtained in the mobile device side, and described in general Safety detection result information is sent to computing device side;
Receive the execute instruction that computing device side sends in the mobile device side joint, the execute instruction be computing device according to Generated according to the safety detection result information;
The execute instruction is performed in the mobile device side.
Alternatively, the safety detection to mobile device sent in the mobile device side joint receipts computing device side please Before the step of asking, in addition to:
The mobile device side joint receives the third-party application installation kit that the computing device side is sent, the third-party application Installation kit be the computing device side when detecting that the mobile device side is fitted without third-party application, from server under Load obtains;
Third-party application is installed according to the third-party application installation kit in the mobile device side.
Alternatively, the safety detection to mobile device sent in the mobile device side joint receipts computing device side please Before the step of asking, in addition to:
The SOCKET interface channels of the mobile device and the computing device are established, the mobile device passes through described SOCKET interface channels receive safety detection request and send safety detection result information and receive execute instruction.
Alternatively, the safety to mobile device sent in the mobile device side joint receipts computing device side is examined Surveying the step of asking is:
The mobile device side using the third-party application receive that the computing device side sends to mobile device Safety detection request;
It is described that safety detection result information corresponding with the specified detection object, and general are obtained in the mobile device side The safety detection result information, which was sent to the step of computing device side, to be included:
Ask to perform to specifying detection according to the safety detection using the third-party application in the mobile device side The safety detection operation of object, obtains safety detection result information;
The safety detection result information is back to the computing device side by the third-party application;
It is described to be in the step of execute instruction of mobile device side joint receipts computing device side transmission:
The execute instruction of computing device side transmission is received using the third-party application in the mobile device side;
It is described to be the step of the mobile device side performs the execute instruction:
The execute instruction is performed using the third-party application in the mobile device side.
Alternatively, the mobile device side is provided with the first client-side program, described to receive institute in the mobile device side joint Stating the step of safety detection to mobile device that computing device side is sent is asked is:
The mobile device side using first client-side program receive that the computing device side sends to movement The safety detection request of equipment;
It is described that safety detection result information corresponding with the specified detection object, and general are obtained in the mobile device side The safety detection result information, which was sent to the step of computing device side, to be included:
Safety detection request is sent to described the using first client-side program in the mobile device side Tripartite applies, and asks execution to grasp the safety detection for specifying detection object according to the safety detection by the third party is medical Make, obtain safety detection result information and return in the first client-side program;
The safety detection result information is back to the computing device side by first client-side program;
It is described to be in the step of execute instruction of mobile device side joint receipts computing device side transmission:
The execute instruction of computing device side transmission is received using first client-side program in the mobile device side;
It is described to be the step of the mobile device side performs the execute instruction:
The execute instruction is sent to third-party application using first client-side program in the mobile device side, The execute instruction is performed by the third-party application.
Alternatively, the step of first client-side program sends safety detection request to the third-party application Including:
First client-side program calls the interface of the service of the third-party application according to the specified detection object, Safety detection request is sent to the third-party application.
Alternatively, the specified detection object includes being directed to the one or more of the following service of mobile device:Movement is set Standby extension horse Hole Detection, detect whether to open cloud killing, detect whether dangerous software, detect whether updated virus base, Whether detection security service opens, detects whether mobile device has mountain vallage application, detects on mobile device whether have malice advertisement Using, Initiative Defense function open detection.
Alternatively, the specified detection object includes being directed to the one or more of the following service of mobile device:Internal memory is excellent Change detection, detect whether to exist daemon software, the software detection of automatic start, garbage data cleaning detection, the detection of cleaning caching, Existing Stub File detection, installation kit cleaning detection, big file consolidation, the cleaning detection of privacy vestige after cleaning application unloading.
Alternatively, the safety detection result information includes safety detection progress msg, correspondingly, the execute instruction bag Include halt instruction, pause instruction, continue executing with instruction.
Alternatively, the safety detection result information includes safety detection result, correspondingly, the execute instruction include with Under it is one or more:The reparation of mobile device extension horse leak, open cloud killing, dangerous software reparation, virus base renewal, unlatching peace Full service, mountain vallage application reparation, the reparation of malice advertisement applications, unlatching Initiative Defense function.
Alternatively, the safety detection result information includes safety detection result, correspondingly, the execute instruction include with Under it is one or more:Internal memory optimization, daemon software closing, the software for closing automatic start, garbage data cleaning, cleaning are slow Deposit, clear up using existing Stub File, installation kit cleaning, big file consolidation, the cleaning of privacy vestige after unloading.
According to another aspect of the present invention, there is provided a kind of method that safety detection is carried out to equipment, including:
When computing device side safety detection is to when having mobile device access, in computing device, laterally the mobile device side is sent out Go out the safety detection request to mobile device, the safety detection request includes specifying detection object;
The safety inspection for safety detection request of the mobile device side return is received in the computing device side joint Object information is surveyed, the safety detection result information is obtained by the mobile device side according to the specified detection object;
According to execute instruction corresponding to safety detection result information generation and sent in computing device side to the shifting Dynamic equipment side, the execute instruction is performed by the mobile device side.
Alternatively, in the computing device, laterally the mobile device side sends what the safety detection of mobile device was asked Before step, in addition to:
All installation package informatins for having installed application in the mobile device side, the installation kit are read in computing device side Information identifies including installation kit;
When judging third-party application installation kit mark is not present in the installation kit mark in computing device side, from server The middle download address for obtaining the third-party application installation kit;
In computing device side the third-party application installation is downloaded according to the download address of the third-party application installation kit Wrap and send to mobile device side.
Alternatively, in the computing device, laterally the mobile device side sends what the safety detection of mobile device was asked Before step, in addition to:
The SOCKET interface channels of the mobile device and the computing device are established, the computing device passes through the company Road is connected to send safety detection request and receive safety detection result information and send execute instruction.
Alternatively, the safety detection result information has the information of type identification, described in computing device side foundation institute Stating execute instruction corresponding to the generation of safety detection result information and sending to the step of mobile device side includes:
Computing device side is searched in default mapping table and advisory information is performed corresponding to the type identification, and described preset is reflected Computing device and the type identification that mobile device is made an appointment and the mapping relations for performing advisory information are stored with firing table;
The safety detection result information and corresponding execution advisory information are shown in computing device side;
Selected instruction of the user to one or more of execution advisory informations is received in computing device side joint;
According to execute instruction corresponding to the selected one or more execution advisory informations of instruction generation and send to movement Equipment side.
Alternatively, the specified detection object includes being directed to the one or more of the following service of mobile device:Movement is set Standby extension horse Hole Detection, detect whether to open cloud killing, detect whether dangerous software, detect whether updated virus base, Whether detection security service opens, detects whether mobile device has mountain vallage application, detects on mobile device whether have malice advertisement Using, Initiative Defense function open detection.
Alternatively, the specified detection object includes being directed to the one or more of the following service of mobile device:Internal memory is excellent Change detection, detect whether to exist daemon software, the software detection of automatic start, garbage data cleaning detection, the detection of cleaning caching, Existing Stub File detection, installation kit cleaning detection, big file consolidation, the cleaning detection of privacy vestige after cleaning application unloading.
Alternatively, the safety detection result information includes safety detection progress msg, correspondingly, the execute instruction bag Include halt instruction, pause instruction, continue executing with instruction.
Alternatively, the safety detection result information includes safety detection result, correspondingly, the execute instruction include with Under it is one or more:The reparation of mobile device extension horse leak, open cloud killing, dangerous software reparation, virus base renewal, unlatching peace Full service, mountain vallage application reparation, the reparation of malice advertisement applications, unlatching Initiative Defense function.
Alternatively, the safety detection result information includes safety detection result, correspondingly, the execute instruction include with Under it is one or more:Internal memory optimization, daemon software closing, the software for closing automatic start, garbage data cleaning, cleaning are slow Deposit, clear up using existing Stub File, installation kit cleaning, big file consolidation, the cleaning of privacy vestige after unloading.
According to another aspect of the present invention, there is provided a kind of device that safety detection is carried out to equipment, including:
Safety detection request receiving module, suitable for when mobile device is connected to computing device, in the mobile device side Receive the safety detection to mobile device that the computing device side is sent to ask, the safety detection request includes specifying detection Object;
Safety detection result information sending module, suitable for being obtained and the specified detection object pair in the mobile device side The safety detection result information answered, and the safety detection result information is sent to computing device side;
Execute instruction receiving module, suitable for receiving the execute instruction of computing device side transmission, institute in the mobile device side joint Execute instruction is stated to generate according to the safety detection result information for computing device;
Execute instruction execution module, suitable for performing the execute instruction in the mobile device side.
Alternatively, described device also includes:
Installation kit receiving module, suitable for being sent in the mobile device side joint receipts computing device side to mobile device Safety detection request before, the mobile device side joint receives the third-party application installation kit that the computing device side is sent, The third-party application installation kit is that the computing device side is detecting that the mobile device side is fitted without third-party application When, download and obtain from server;
Installation kit installs module, should according to third-party application installation kit installation third party suitable for the mobile device side With.
Alternatively, described device also includes:
Path setup module, suitable for the mobile device side joint receive that the computing device side sends to mobile device Before safety detection request, the SOCKET interface channels of the mobile device and the computing device, the mobile device are established Safety detection request is received by the SOCKET interface channels and sends safety detection result information and receives and is performed Instruction.
Alternatively, the safety detection request receiving module is further adapted for:
The mobile device side using the third-party application receive that the computing device side sends to mobile device Safety detection request;
The safety detection result information sending module is further adapted for:
Ask to perform to specifying detection according to the safety detection using the third-party application in the mobile device side The safety detection operation of object, obtains safety detection result information;
The safety detection result information is back to the computing device side by the third-party application;
The execute instruction receiving module is further adapted for:
The execute instruction of computing device side transmission is received using the third-party application in the mobile device side;
The execute instruction execution module is further adapted for:
The execute instruction is performed using the third-party application in the mobile device side.
Alternatively, the safety detection request receiving module is further adapted for:
The mobile device side using first client-side program receive that the computing device side sends to movement The safety detection request of equipment;
The safety detection result information sending module is further adapted for:
Safety detection request is sent to described the using first client-side program in the mobile device side Tripartite applies, and asks execution to grasp the safety detection for specifying detection object according to the safety detection by the third party is medical Make, obtain safety detection result information and return in the first client-side program;
The safety detection result information is back to the computing device side by first client-side program;
The execute instruction receiving module is further adapted for:
The execute instruction of computing device side transmission is received using first client-side program in the mobile device side;
The execute instruction execution module is further adapted for:
The execute instruction is sent to third-party application using first client-side program in the mobile device side, The execute instruction is performed by the third-party application.
Alternatively, first client-side program sends safety detection request to the third-party application, specifically For:
First client-side program calls the interface of the service of the third-party application according to the specified detection object, Safety detection request is sent to the third-party application.
Alternatively, the specified detection object includes being directed to the one or more of the following service of mobile device:Movement is set Standby extension horse Hole Detection, detect whether to open cloud killing, detect whether dangerous software, detect whether updated virus base, Whether detection security service opens, detects whether mobile device has mountain vallage application, detects on mobile device whether have malice advertisement Using, Initiative Defense function open detection.
Alternatively, the specified detection object includes being directed to the one or more of the following service of mobile device:Internal memory is excellent Change detection, detect whether to exist daemon software, the software detection of automatic start, garbage data cleaning detection, the detection of cleaning caching, Existing Stub File detection, installation kit cleaning detection, big file consolidation, the cleaning detection of privacy vestige after cleaning application unloading.
Alternatively, the safety detection result information includes safety detection progress msg, correspondingly, the execute instruction bag Include halt instruction, pause instruction, continue executing with instruction.
Alternatively, the safety detection result information includes safety detection result, correspondingly, the execute instruction include with Under it is one or more:The reparation of mobile device extension horse leak, open cloud killing, dangerous software reparation, virus base renewal, unlatching peace Full service, mountain vallage application reparation, the reparation of malice advertisement applications, unlatching Initiative Defense function.
Alternatively, the safety detection result information includes safety detection result, correspondingly, the execute instruction include with Under it is one or more:Internal memory optimization, daemon software closing, the software for closing automatic start, garbage data cleaning, cleaning are slow Deposit, clear up using existing Stub File, installation kit cleaning, big file consolidation, the cleaning of privacy vestige after unloading.
According to another aspect of the present invention, there is provided a kind of device that safety detection is carried out to equipment, including:
Safety detection request sending module, suitable for, to when having mobile device access, being counted in computing device side safety detection Calculating equipment, laterally the mobile device side sends the request of the safety detection of mobile device, the safety detection request is included specifying Detection object;
Safety detection result information receiving module, suitable for receiving what the mobile device side returned in the computing device side joint For the safety detection request safety detection result information, the safety detection result information by the mobile device side according to Obtained according to the specified detection object;
Execute instruction sending module, suitable for being held in computing device side according to corresponding to safety detection result information generation Row is instructed and sent to the mobile device side, and the execute instruction is performed by the mobile device side.
Alternatively, described device also includes:
Installation kit data obtaining module, suitable for laterally the mobile device side is sent to mobile device in the computing device Safety detection request before, all installation kits letters for having installed application in the mobile device side are read in computing device side Breath, the installation kit information identify including installation kit;
Searching modul, suitable for judging third-party application installation kit mark is not present in the installation kit mark in computing device side During knowledge, the download address of the third-party application installation kit is obtained from server;
Installation kit sending module, suitable for being downloaded in computing device side according to the download address of the third-party application installation kit The third-party application installation kit is simultaneously sent to mobile device side.
Alternatively, described device also includes:
Interface channel establishes module, suitable in the computing device, laterally the mobile device side is sent to mobile device Before safety detection request, the SOCKET interface channels of the mobile device and the computing device, the computing device are established Safety detection request is sent by the interface channel and receives safety detection result information and sends execute instruction.
Alternatively, the safety detection result information has the information of type identification, and the execute instruction sending module is also It is suitable to:
Computing device side is searched in default mapping table and advisory information is performed corresponding to the type identification, and described preset is reflected Computing device and the type identification that mobile device is made an appointment and the mapping relations for performing advisory information are stored with firing table;
The safety detection result information and corresponding execution advisory information are shown in computing device side;
Selected instruction of the user to one or more of execution advisory informations is received in computing device side joint;
According to execute instruction corresponding to the selected one or more execution advisory informations of instruction generation and send to movement Equipment side.
Alternatively, the specified detection object includes being directed to the one or more of the following service of mobile device:Movement is set Standby extension horse Hole Detection, detect whether to open cloud killing, detect whether dangerous software, detect whether updated virus base, Whether detection security service opens, detects whether mobile device has mountain vallage application, detects on mobile device whether have malice advertisement Using, Initiative Defense function open detection.
Alternatively, the specified detection object includes being directed to the one or more of the following service of mobile device:Internal memory is excellent Change detection, detect whether to exist daemon software, the software detection of automatic start, garbage data cleaning detection, the detection of cleaning caching, Existing Stub File detection, installation kit cleaning detection, big file consolidation, the cleaning detection of privacy vestige after cleaning application unloading.
Alternatively, the safety detection result information includes safety detection progress msg, correspondingly, the execute instruction bag Include halt instruction, pause instruction, continue executing with instruction.
Alternatively, the safety detection result information includes safety detection result, correspondingly, the execute instruction include with Under it is one or more:The reparation of mobile device extension horse leak, open cloud killing, dangerous software reparation, virus base renewal, unlatching peace Full service, mountain vallage application reparation, the reparation of malice advertisement applications, unlatching Initiative Defense function.
Alternatively, the safety detection result information includes safety detection result, correspondingly, the execute instruction include with Under it is one or more:Internal memory optimization, daemon software closing, the software for closing automatic start, garbage data cleaning, cleaning are slow Deposit, clear up using existing Stub File, installation kit cleaning, big file consolidation, the cleaning of privacy vestige after unloading.
Compared with background technology, the present invention has the advantages that:
In the present invention, when mobile device is connected to computing device, be can be achieved in computing device side to mobile device Specified detection object safety detection, and computing device receive mobile device return safety detection result when can to Computing device lateral movement equipment sends execute instruction and promotes mobile device to perform related operation for safety detection result, makes It is that the safety detection to mobile device can be achieved that user, which is obtained, in computing device side, so as to improve the security of mobile device.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention, And can be practiced according to the content of specification, and in order to allow above and other objects of the present invention, feature and advantage can Become apparent, below especially exemplified by the embodiment of the present invention.
Brief description of the drawings
By reading the detailed description of hereafter preferred embodiment, it is various other the advantages of and benefit it is common for this area Technical staff will be clear understanding.Accompanying drawing is only used for showing the purpose of preferred embodiment, and is not considered as to the present invention Limitation.And in whole accompanying drawing, identical part is denoted by the same reference numerals.In the accompanying drawings:
Fig. 1 shows a kind of step flow chart of embodiment of the method one that safety detection is carried out to equipment of the present invention;
Fig. 2 shows a kind of step flow chart of embodiment of the method two that safety detection is carried out to equipment of the present invention;
Fig. 3 shows a kind of step flow chart of embodiment of the method three that safety detection is carried out to equipment of the present invention;
Fig. 4 shows a kind of step flow chart of embodiment of the method four that safety detection is carried out to equipment of the present invention;
Fig. 5 shows a kind of structured flowchart of device embodiment one that safety detection is carried out to equipment of the present invention;
Fig. 6 shows a kind of structured flowchart of device embodiment two that safety detection is carried out to equipment of the present invention.
Embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although the disclosure is shown in accompanying drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here Limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure Completely it is communicated to those skilled in the art.
Reference picture 1, show a kind of step flow of embodiment of the method one that safety detection is carried out to equipment of the present invention Figure, the embodiment of the present invention are illustrated from mobile device side, may include steps of:
Step 101, when mobile device is connected to computing device, the computing device side is received in the mobile device side joint The safety detection to mobile device sent is asked, and the safety detection request includes specifying detection object;
In one preferred embodiment of the invention, the specified detection object includes the following service for mobile device It is one or more:Mobile device extension horse Hole Detection, detect whether to open cloud killing, detect whether dangerous software, inspection Survey whether updated virus base, detection security service open, detects whether mobile device has mountain vallage application, detection is mobile sets Whether there are malice advertisement applications, Initiative Defense function open detection, internal memory optimization to detect, detect whether in the presence of soft from the background for upper Existing residual after part, the software detection of automatic start, garbage data cleaning detection, the detection of cleaning caching, cleaning application unloading File detection, installation kit cleaning detection, big file consolidation, the cleaning detection of privacy vestige.
Step 102, safety detection result information corresponding with the specified detection object is obtained in the mobile device side, And the safety detection result information is sent to computing device side;
Step 103, the execute instruction of computing device side transmission is received in the mobile device side joint, the execute instruction is meter Equipment is calculated to generate according to the safety detection result information;
In one preferred embodiment of the invention, the safety detection result information can include safety detection progress letter Breath, accordingly, the execute instruction can include halt instruction, pause instruction, continue executing with instruction.
In another preferred embodiment of the invention, the safety detection result information includes safety detection result, phase Ying Di, the execute instruction can include following one or more:The reparation of mobile device extension horse leak, open cloud killing, danger Dangerous software reparation, virus base renewal, open security service, mountain vallage application reparation, the reparation of malice advertisement applications, unlatching Initiative Defense Function, internal memory optimization, daemon software closing, the software for closing automatic start, garbage data cleaning, cleaning caching, cleaning are applied Existing Stub File, installation kit cleaning, big file consolidation, the cleaning of privacy vestige after unloading.
Step 104, the execute instruction is performed in the mobile device side.
In one preferred embodiment of the invention, before the step 101, can also include:
The mobile device side joint receives the third-party application installation kit that the computing device side is sent, the third-party application Installation kit be the computing device side when detecting that the mobile device side is fitted without third-party application, from server under Load obtains;
Third-party application is installed according to the third-party application installation kit in the mobile device side.
In one preferred embodiment of the invention, before the step 101, can also include:
The SOCKET interface channels of the mobile device and the computing device are established, the mobile device passes through described SOCKET interface channels receive safety detection request and send safety detection result information and receive execute instruction.
In one preferred embodiment of the invention, the step 101 is specifically as follows:
The mobile device side using the third-party application receive that the computing device side sends to mobile device Safety detection request;
The step 102 can include following sub-step:
Ask to perform to specifying detection according to the safety detection using the third-party application in the mobile device side The safety detection operation of object, obtains safety detection result information;
The safety detection result information is back to the computing device side by the third-party application;
The step 103 is specifically as follows:
The execute instruction of computing device side transmission is received using the third-party application in the mobile device side;
The step 104 is specifically as follows:
The execute instruction is performed using the third-party application in the mobile device side.
Specifically, the mobile device side can receive that computing device side send by the third-party application to moving The safety detection request of dynamic equipment, the third-party application ask to perform the peace to specifying detection object according to the safety detection Full inspection surveys operation, obtains safety detection result information and returns to the computing device side.
In another preferred embodiment of the invention, the mobile device side is provided with the first client-side program, described Step 101 can be:
The mobile device side using first client-side program receive that the computing device side sends to movement The safety detection request of equipment;
The step 102 can include following sub-step:
Safety detection request is sent to described the using first client-side program in the mobile device side Tripartite applies, and asks to perform according to the safety detection by the third-party application and the safety detection for specifying detection object is grasped Make, obtain safety detection result information and return in the first client-side program;
The safety detection result information is back to the computing device side by first client-side program;
The step 103 can be:
The execute instruction of computing device side transmission is received using first client-side program in the mobile device side;
The step 104 can be:
The execute instruction is sent to third-party application using first client-side program in the mobile device side, The execute instruction is performed by the third-party application.
Specifically, the mobile device can receive pair that computing device side is sent by first client-side program The safety detection request of mobile device, first client-side program sends safety detection request should to the third party With, receive the safety detection result information that the third-party application returns and return to computing device side, wherein, the safety detection Object information is asked to perform and the safety detection for specifying detection object is operated by the third-party application according to the safety detection Obtain.
In one preferred embodiment of the invention, first client-side program sends safety detection request extremely The step of third-party application, can include:
First client-side program calls the interface of the service of the third-party application according to the specified detection object, Safety detection request is sent to the third-party application.
In embodiments of the present invention, when mobile device is connected to computing device, can be achieved in computing device side to moving The safety detection of the specified detection object of dynamic equipment, and when computing device is received in the safety detection result that mobile device returns To sending execute instruction in computing device lateral movement equipment mobile device can be promoted to perform correlation for safety detection result Operation so that user is that can be achieved to the safety detection of mobile device, so as to improve the peace of mobile device in computing device side Quan Xing.
Reference picture 2, show a kind of step flow of embodiment of the method two that safety detection is carried out to equipment of the present invention Figure, the embodiment of the present invention illustrate from computing device side, and the embodiment of the present invention may include steps of:
Step 201, when computing device side safety detection is to when having mobile device access, in the computing device laterally movement Equipment side sends the safety detection request to mobile device, and the safety detection request includes specifying detection object;
In one preferred embodiment of the invention, the specified detection object can be included for the as follows of mobile device What is serviced is one or more:Mobile device extension horse Hole Detection, detect whether to open cloud killing, detect whether it is dangerous soft Part, detect whether updated virus base, detection security service are opened, detect whether mobile device has mountain vallage application, detection Whether there are malice advertisement applications, Initiative Defense function open detection, internal memory optimization to detect, detect whether after existing on mobile device It is existing after platform software, the software detection of automatic start, garbage data cleaning detection, the detection of cleaning caching, cleaning application unloading Stub File detection, installation kit cleaning detection, big file consolidation, the cleaning detection of privacy vestige.
Step 202, being asked for the safety detection for the mobile device side return is received in the computing device side joint Safety detection result information, the safety detection result information obtains by the mobile device side according to the specified detection object ;
Step 203, according to execute instruction corresponding to safety detection result information generation and sent in computing device side To the mobile device side, the execute instruction is performed by the mobile device side.
In one preferred embodiment of the invention, the safety detection result information can include safety detection progress letter Breath, correspondingly, the execute instruction can include halt instruction, pause instruction, continue executing with instruction.
In one preferred embodiment of the invention, the safety detection result information can include safety detection result, Correspondingly, it is described can be included with execute instruction it is following one or more:The reparation of mobile device extension horse leak, open cloud killing, Dangerous software reparation, virus base renewal, unlatching security service, mountain vallage application reparation, the reparation of malice advertisement applications, unlatching are actively anti- Imperial function, internal memory optimization, daemon software closing, the software for closing automatic start, garbage data cleaning, cleaning caching, cleaning are answered Cleared up with existing Stub File, installation kit cleaning, big file consolidation, privacy vestige after unloading.
In one preferred embodiment of the invention, before the step 201, can also include:
All installation package informatins for having installed application in the mobile device side, the installation kit are read in computing device side Information identifies including installation kit;
When judging third-party application installation kit mark is not present in the installation kit mark in computing device side, from server The middle download address for obtaining the third-party application installation kit;
In computing device side the third-party application installation is downloaded according to the download address of the third-party application installation kit Wrap and send to mobile device side.
In one preferred embodiment of the invention, before the step 201, can also include:
The SOCKET interface channels of the mobile device and the computing device are established, the computing device passes through the company Road is connected to send safety detection request and receive safety detection result information and send execute instruction.
In one preferred embodiment of the invention, the safety detection result information has the information of type identification, institute Following sub-step can be included by stating step 203:
Sub-step S11, computing device side are searched in default mapping table and perform advisory information corresponding to the type identification, It is stored with what computing device was made an appointment with mobile device in the default mapping table, type identification is with performing advisory information Mapping relations;
Sub-step S12, the safety detection result information and corresponding execution advisory information are shown in computing device side;
Sub-step S13, selected instruction of the user to one or more of execution advisory informations is received in computing device side joint;
Sub-step S14, according to execute instruction corresponding to the selected one or more execution advisory informations of instruction generation simultaneously Send to mobile device side.
Reference picture 3, show a kind of step flow of embodiment of the method three that safety detection is carried out to equipment of the present invention Figure, wherein, the computing device is that one kind can be run according to program, and the automatic, smart electronicses of high speed processing mass data are set It is standby, such as desktop computer, notebook computer.The mobile device is a kind of computing device that can be used on the move, such as hand Machine.The present embodiment is by taking the mobile device for being provided with Android operation system as an example, and certainly, the present invention is not limited to be provided with Android system The mobile device of system, principle of the invention are equally applicable to be provided with the mobile device of other operating systems.
In embodiments of the present invention, mobile device side is provided with the first client-side program, and computing device side is provided with second Client-side program, the mobile device pass through first client-side program and second client with the computing device Program is communicated, and when first client-side program does not start, the second client-side program can be by the first client End program sends enabled instruction to start first client-side program, and then opens communication process between the two.
Methods described may include steps of:
Step 301, when mobile device is connected to computing device, whether the second client-side program detects the mobile device Third-party application is installed, if it is not, step 302 is then performed, if so, then performing step 304;
In the specific implementation, the second client-side program of computing device side is detecting that mobile device is successfully connected to calculate During equipment, all installation package informatins for having installed application in mobile device side can be read, wherein the installation kit information carries There is installation kit mark.Second client-side program searches whether the installation that third-party application be present in all installation kit marks Bag mark, if in the presence of illustrating that mobile device side is provided with third-party application, otherwise, then illustrate that mobile device side is fitted without There is third-party application.
Further, the installation package informatin can also carry the version number of each application, be found if computing device is searched The mobile device is provided with third-party application, but the version number of the third-party application is less than the 3rd of the storage of computing device side Fang Yingyong latest edition number, then computing device equally judge that the mobile device side is fitted without third-party application.
Step 302, the second client-side program is downloaded the third-party application installation kit and sent to mobile device side;
In the specific implementation, mobile device can pass through data wire or wireless(Such as Wi-Fi communication technology WIFI)Deng Form is connected to computing device, when mobile device accesses computing device by data wire, if the second client-side program detects The mobile device has been fitted without third-party application, then searches the installation kit mark of the third-party application in the server, The download address of the third-party application installation kit is obtained when the installation kit for finding the third-party application identifies, under described Third-party application installation kit is downloaded in set address and the third-party application installation kit is sent to mobile device by data wire Side.
Further, when the mobile device is the Android device for being provided with Android system, second client Program can pass through ADB(Android Debug Bridge, exactly play a part of debugging bridge)Third-party application is pacified in driving Dress bag is sent to mobile device side, wherein, ADB is a client-server end program, and wherein client is computing device, Server end is Android device, and ADB drives the client driver for the communication for being exactly computing device and Android device, ADB An instrument in androidsdk, with this instrument can directly operational administrative Android simulator or real Android set Standby (such as mobile phone).Its major function has:The shell (order line) of operational outfit;The port mapping of management simulation device or equipment; Upload/download file between computing device and Android device;Local Android installation kit apk is attached to simulator or Android device Deng.
When mobile device is wirelessly established with computing device to be connected, if the second client-side program detect it is described Mobile device has been fitted without third-party application, then searches the installation kit mark of the third-party application in the server, looking for To the third-party application installation kit mark when obtain the download address of the third-party application installation kit, download ground from described Third-party application installation kit is downloaded in location and the third-party application installation kit is sent to mobile device side by radio channel. In practice, the second client-side program directly can also send described the download address of the third-party application installation kit extremely Mobile device side, installation is downloaded by mobile device side.
Specifically, mobile device wirelessly establishes the process of connection, Ke Yiwei with computing device:
When computing device will be connected with mobile device, computing device can send connection request to server first.Wherein, The connection request includes the terminal data of the mobile device of device identification and request connection.
The device identification is used to identify a computing device, e.g., the IP address of computing device, NIC address and MID values Deng.Wherein, MID(Mobile Internet Device, mobile internet device)Value is calculated by the numbering of hardware Unique characteristic value.
The terminal data is the related data of mobile device, as the title of mobile device, the world of mobile device are mobile Device identity(International Mobile Equipment Identity, IMEI), the model of mobile device etc., this Outside, if mobile device is mobile phone, corresponding terminal data can also include the phone number of the mobile phone.Wherein, the IMEI Can be with one mobile device of unique mark.
Then server can correspondingly receive the connection request, and the calculating can be obtained from the connection request and is set Standby device identification, so that it is determined that the computing device to be connected, and obtain the mobile device of the computing device request connection Terminal data.
And the mobile device that server record communicated with(Or computing device)Terminal data(Or device data), because This can search the mobile device according to the terminal data, that is, detect the terminal data and any stored in server Whether the terminal data of mobile device matches, if matching, illustrates that the mobile device can be found, then build the equipment Mark and the mapping relations of the terminal data, to establish the incidence relation of the mobile device and the computing device;If no Matching, then illustrate not finding the mobile device, i.e., described mobile device temporarily fails and server communication.
Step 303, third-party application is installed in mobile device side according to the third-party application installation kit, continues executing with step 304;
Specifically, pacify after mobile device receives the third-party application installation kit according to the third-party application Dress bag installation third-party application;In another case, when mobile device receive be third-party application installation kit download During location, then the download address according to the third-party application installation kit downloads the third-party application installation kit and carries out third party The installation of application, after third-party application completes installation, mobile device returns to installation message to calculating by long connection and set It is standby, to notify the installation of third-party application described in computing device.
In embodiments of the present invention, it can detect whether mobile device side is provided with third-party application in computing device side, When detecting that mobile device side is fitted without third-party application, computing device is then downloaded third-party application installation kit and sent automatically Installed to mobile device, in this process, mobile device can also smoothly install in the case where that need not network Tripartite applies, and saves the resource of mobile device, enriches the channel that security protection is carried out to mobile device, improves mobile device Security;And user, which need not carry out any operation, to install third-party application in mobile device side(Or other should With), it is convenient and swift, improve Consumer's Experience.
Applied to the embodiment of the present invention, the third-party application can be that safety detection class is served by, and such as 360 mobile phones are defended Scholar, Kingsoft bodyguard etc., the embodiment of the present invention need not be any limitation as to the particular type of third-party application.
Step 304, the SOCKET interface channels of the mobile device and the computing device are established;
Specifically, the SOCKET for establishing the mobile device and the computing device(Socket)Interface channel Process, actually using the mobile device as server, the client-server of client is used as using the computing device SOCKET connection procedures, the process can be divided into server monitoring, client request, connection three steps of confirmation, wherein, service Device, which is monitored, refers to server side socket and the specific client socket of delocalization, but in etc. state to be connected, it is real When monitor network state;Client request refers to the socket proposition connection request by client, and the target to be connected is service The socket at device end.Therefore, the socket of client must describe the socket of its server to be connected first, it is indicated that service The address of device end socket and port numbers, then just propose connection request to server side socket;Connection confirmation refers to when clothes Business device end socket listens to the connection request for receiving client socket in other words, and it please with regard to customer in response end socket Ask, establish a new thread, client is issued in the description of server side socket, once client confirms this description, Connection(Or interface channel)Just establish, now can be with one between the first client-side program of progress and the second client-side program Series of data transfers.
In the specific implementation, server establishes the socket for monitoring connection, then called by calling socket functions Bind functions, socket is associated with address information.Listen functions are called to realize the monitoring to the port, when there is company When connecing request, by calling accept functions to establish the connection with client, finally, read functions are called to carry out reading client hair The message brought, naturally it is also possible to realize identical function using recv functions.
Step 305, second client-side program by the SOCKET interface channels to first client-side program The safety detection request to mobile device is sent, the safety detection request includes specifying detection object;
To ensure the detection request of mobile device safety, one kind as the present embodiment is preferably shown for the safety detection request Example, the safety detection request can include specifying detection object, and the specified detection object is to be pacified for mobile device The project that full inspection is surveyed, can be including the one or more of the following service for mobile device:Mobile device extension horse Hole Detection, Detect whether to open cloud killing, detect whether dangerous software, detect whether updated virus base, whether detect security service Open, whether detection mobile device has mountain vallage application, whether has malice advertisement applications, Initiative Defense function on detection mobile device Open detection, etc..
As another preferred exemplary of the present embodiment, the safety detection request can include specifying detection object, institute It is to optimize project with garbage-cleaning for mobile device to state specified detection object, can include for mobile device as Lower service it is one or more:Internal memory optimization detection, detect whether daemon software, the software detection of automatic start, rubbish be present Data scrubbing detects, cleaning caching detects, clears up to clear up using existing Stub File detection, installation kit after unloading and detects, greatly File consolidation, the cleaning detection of privacy vestige, etc..
Step 306, first client-side program sends safety detection request to third-party application;
In practice, the third-party application can establish a variety of services in the installation process of mobile device side (service), the first client-side program is after safety detection request is received, according to the specified detection object positioning third party Using corresponding service, if for example, the specified detection object is junk data safety detection, its corresponding third-party application Service for cleaning service.First client-side program is by calling the interface serviced corresponding to the third-party application will be described Safety detection request is sent into third-party application.
Step 307, the third-party application operates to safety detection corresponding to the specified detection object execution, is pacified Full inspection surveys object information;
Specifically, the specified detection object in the safety detection request includes the information of type identification, the type The information of mark specifies the information of the detection type of detection object, different classes for the instruction of third-party application and server commitment The different operation of message identification of type mark, the detection object is known that by the information third-party application of the type identification Detected for which kind of, so as to perform corresponding operation, obtain safety detection result information.For example,
The information of the type identification of physical examination is CMD_SYSTEM_EXAM_SCAN;
The information of the type identification of garbage-cleaning is CMD_CLEAR_GARBAGE_SCAN;
The information of the type identification of antivirus is CMD_SECURITY_SCAN.
As a kind of preferred exemplary of the embodiment of the present invention, if the detection object is active defense function open detection, Its specific detected rule can be:Third-party application detects mobile device and possesses Initiative Defense function first, if so, then detecting Whether the Initiative Defense function opens;If it is not, then third party device detects whether first client-side program is opened actively Defense function.
As another example of the present embodiment, if whether the specified detection object has mountain vallage should for detection mobile device With its specific detected rule can be:Third-party application scans the APP of mobile device(Application, application)List, The developer's signature or MD5 values of each application in the list of application are obtained, and by the application in the list of application with answering Contrasted with the application in white list, if certain is applied in application white list, then developer's signature or MD5 by the application The developer's signature or MD5 values of value application corresponding with white list are compared, if the developer's signature or MD5 of the application The developer's signature or MD5 values of value application corresponding with white list are inconsistent, then judge that the application belongs to mountain vallage application;If Certain application application white list in, then Scan for Viruses storehouse or(Enter killing of racking)If this is applied in virus base, report disease Poison or wooden horse.
As another example of the present embodiment, if the specified detection object whether there is danger for detection mobile device Whether software has malice advertisement applications, and its specific detected rule can be:Third-party application scans the APP of mobile device (Application, application)List, the application in list of application is matched with the black and white lists in server.Wherein, in vain List is the list of record security process, and blacklist is the list for recording dangerous process.The type of process is in white list Bai Jincheng, the type of process is black process in blacklist, and all unknown processes outside white and black list belong to Grey process.When the process of application is white process(The process that such as 360 mobile phone assistant, 91 mobile phone assistants or pea pods call)When, Confirm that the related application of the process is believable application(Or safety applications), it is allowed to the operation of the process;When application process is black During process(Such as malice promotes the process of APK application call), it is insincere to confirm the related application program of the process Application program, after the type of the process is judged, intercept the operation of the process immediately(Such as by disconnecting the process and 5037 The connection of port intercepts the process), forbid the related application program of the process to carry out any operation to mobile device(Such as enumerate The Android device connected in system), and successful information will be intercepted and sent to the first client-side program, by the first client-side program Return to computing device side.
In addition, this example by the behavior of client collection procedure and can also be associated with performance of program, so as in database Middle logging program feature and its corresponding program behavior, can according to the program behavior and the incidence relation of performance of program being collected into To carry out analytic induction to sample in database, so as to help to belong to blacklist to software or program or white list is sentenced It is disconnected.Due to have recorded behavior record corresponding to performance of program and this feature in database, therefore known white list can be combined Unknown program is analyzed.For example, if unknown program feature is identical with the known procedure feature in existing white list, incite somebody to action The unknown program feature and its program behavior are all included in white list.If unknown program behavior and the known journey in existing white list Sequence behavior is identical or approximate, then the unknown program behavior and its performance of program is all included in into white list.
For example, by taking antivirus as an example, third-party application(Such as mobile phone bodyguard)Virus results are obtained in the following manner:
(1)Android installation kits are scanned, and the characteristic information specified is extracted from the Android installation kits;
The characteristic information extracted in this example can include:
1)Android installation kit bag names:packageName
2)Android installation kits version number:versionCode
3)The MD5 of the digital signature of Android installation kits:signature[0]
4)Android components receiver
5)Instruction in classes.dex
6)Character string in ELF files
7)The MD5 of each file under the catalogues such as assets, res, lib
8)Android components service, activity
(2)Searched in preset safety identification storehouse with the single feature information specified or its combine the feature to match note Record;Wherein, level of security corresponding to feature record and feature record is included in the safety identification storehouse, is wrapped in every feature record The combination of information containing single feature or characteristic information;
(3)Level of security corresponding to the feature found record is included in the safety detection of the Android installation kits As a result middle display.
This example includes safety, dangerous, careful and four level of securitys of wooden horse.Wherein, the definition of various level of securitys It is as follows:
Safety:The application is a normal application, without the behavior of any threat user mobile phone safety;
It is dangerous:There is security risk in the application, it is possible to the application inherently Malware;It is also possible to the application originally Being the normal software of regular company issue, but because security breaches be present, cause the privacy of user, mobile phone safe by prestige The side of body;
With caution:The application is a normal application, but be there are problems that, such as user's imprudence can be allowed to be detained Take, or there is disagreeableness advertisement to be complained;After this kind of application is found, can prompt user with caution using and inform this Using possible behavior, but decide whether remove the application in its sole discretion by user;
Wooden horse:The application is virus, wooden horse or other Malwares, here for being referred to generally simply as wooden horse, but not Represent the application only wooden horse.
So when setting safety identification storehouse, can be by safety, danger, the Android with caution and under four ranks of wooden horse Installation kit is all used as sample Android installation kits, so as to which the feature obtained by the single feature in sample or combinations of features records The information such as behavior and the description of a kind of level of security and correlation can be correspond to respectively.
For example, the feature record in safety identification storehouse has four, first feature records and Article 4 feature record difference Corresponding level of security is wooden horse rank, and level of security corresponding to Article 2 feature record and Article 3 feature record difference is equal For level of security.
Certainly, a feature record can also be set in safety identification storehouse, list the Android installation kits of certain wooden horse Version number and its MD5 values of digital signature, although the combinations of features that uses of this feature record recorded with Article 2 feature it is identical, The combination of version number and digital signature MD5 values is all employ, but level of security corresponding to this feature record is then " wooden horse ".
So level of security is not corresponding with a certain specific feature or combinations of features, but with specific feature Or the value of combinations of features is corresponding.Therefore, for identical feature or combinations of features, specific value is different, corresponding safety Rank is also different.
Moreover, above-mentioned safe, dangerous, careful and four ranks of wooden horse definition is illustrative only, answered according to actual With, naturally it is also possible to there are other level of securitys to classify and define, the protection domain of this example is not limited to this.
So, it is described searched in preset safety identification storehouse with the single feature information specified or its combine what is matched Feature is recorded, and level of security corresponding to the feature found record is included in the safety detection of the Android installation kits As a result the step of, it can be understood as:
Feature record is searched in safety identifies storehouse, if the specified single feature extracted records phase with first feature Matching, then can be determined that current Android installation kits is wooden horse rank;If the specific characteristic extracted be combined after with Article 2 feature records or Article 3 feature record matches, then can be determined that current Android installation kits is safe level Not;If the specific characteristic extracted matches after being combined with Article 4 feature record, can be determined that current Android installation kits are also wooden horse rank.
So for some Android installation kit safety detection result can be include it is safe, dangerous, careful or wooden The information of four expression level of securitys of horse, can also include the behavior related to level of security in addition in the safety detection result At least one of description, software description, timestamp etc. prompt message, the prompt message of such as corresponding " careful " rank can be " may Cause to deduct fees, if the application is deleted in selection ".
More specifically, the safety detection result can include level of security, behavior description information, software description information and Timestamp information.Wherein:
Level of security:32 integer representations can be used, safety, dangerous, careful or four level of securitys of wooden horse can be represented, often Individual level of security is as defined above.
Behavior description information:32 can also be used(0~31)Integer representation, the software of each level of security can be represented Behavior description.Wherein it is possible to choose an expression flag bit, flag bit is the 0 no malicious act of expression, if malice row Can then to define:1st represents " stealthily downloading on backstage ", and the 2nd represents " sending short message privately ", and the 3rd representative " includes Advertisement ", etc..That is, each can individually represent a kind of behavior description of software.
For example, the Android application programs for being detected as " wooden horse rank ", if malicious act=3, translate into two and enter System is exactly 11, and the 1st=1, the 2nd=1, the malicious act of expression is:There is backstage stealthily to download and send short message privately simultaneously Behavior.
For another example the Android application programs for being detected as " careful rank ", if behavior description=4, translate into two System is exactly 100, and the 1st=0, the 2nd=0, the 2nd=1, the behavior of expression is:Include advertisement.Because this advertisement is probably What user allowed, it is also possible to what user did not allowed, so user can be prompted to use with caution, whether clear decided in its sole discretion by user Remove.
Software description information:Character string is typically expressed as, is the explanation to Android application programs, such as publisher, issue The information such as time.
Timestamp information:Show the characteristic information of Android application programs(Such as normal characteristics, Trojan characteristics)What is When be put in storage.
It should be noted that above-mentioned Initiative Defense function open detection, detection mobile device whether have mountain vallage apply and Detection mobile device is with the presence or absence of dangerous software or whether to have the detected rules of malice advertisement applications be only showing for the present embodiment Whether example, those skilled in the art can reach detection mobile device with the presence or absence of dangerous software using other or have malice advertisement should It is possible with or with the presence or absence of the method for purpose of mountain vallage application, in addition, the detection of detection object is specified for other, this Art personnel can be detected using the existing any technology that can be achieved the goal, and the present invention need not be limited this System.
Step 308, the safety detection result information is returned to the first client-side program by third-party application, by described first The safety detection result information is forwarded to the second client-side program by client-side program by the SOCKET interface channels;
Specifically, after the third-party application performs corresponding safety detection operation, safety detection result information is obtained And the first client-side program is returned, in practice, the third-party application can be by calling first client-side program to exist The safety detection result information is returned to the first client-side program by the call back function first registered.Further, third-party application , can be to the safety detection result information labeling type when the safety detection result information is returned into the first client-side program Mark, the type identification are third-party application and the second client-side program or are used for mark peace with what mobile device was made an appointment Full inspection surveys the mark of object information type.
Step 309, second client-side program performs suggestion according to corresponding to the safety detection result information acquisition Information;
Applied to the embodiment of the present invention, after the second client-side program receives safety detection result information, the peace is parsed Full inspection surveys type identification corresponding to object information acquisition, and subsequent second client-side program searches the type in default mapping table Mark, obtain execution advisory information corresponding with the type mark.Wherein, it is stored with each type mark in the default mapping table Know and corresponding one or more mapping relations for performing advisory information.
In one preferred embodiment of the invention, the safety detection result information can include safety detection progress letter Breath.Service corresponding to third-party application can enter safety detection during to specifying detection object to carry out safety detection Spend information and return to the first client-side program, by the first client-side program by the SOCKET interface channels by safety detection progress Information returns to the second client-side program.After second client-side program receives the safety detection progress, parsing safety detection is entered Type identification and safety detection progress corresponding to spending acquisition of information, search the type identification from default mapping table, obtain It is corresponding with the safety detection progress to perform advisory information, wherein, it is right for the type identification institute of the safety detection progress The execution advisory information answered can have stopping performs suggestion, suspend perform suggestion, continue executing with suggestion etc..
In another preferred embodiment of the invention, the safety detection result information can include safety detection knot Fruit, the safety detection result be for specifying detection object safety detection after obtained final result, the second client After program receives the safety detection result, type identification corresponding to parsing safety detection result acquisition, from default mapping table It is middle to search the type identification, execution advisory information corresponding with the safety detection result is obtained, wherein, for the safety Detecting the execution advisory information corresponding to the type identification of structure can have mobile device extension horse leak reparation suggestion, unlatching cloud to look into Kill suggestion, dangerous software reparation suggestion, virus base more new suggested, unlatching security service suggestion, mountain vallage application reparation suggestion, malice Advertisement applications reparation suggestion, internal memory optimization suggestion, daemon software close software advisor, the rubbish number for suggesting, closing automatic start Suggest according to cleaning, cleaning caches suggestion, existing Stub File suggestion, installation kit clear up suggestion, big text after cleaning application unloading Part arranges suggestion, the cleaning of privacy vestige is suggested.Etc..
Step 310, second client-side program shows the safety detection result information and corresponding performs suggestion Information;
Second client-side program, can be by the safety detection result information and its is right after obtaining and performing advisory information The execution advisory information answered shows user in computing device side.The display form can be to be opened up in the form of pop-up Show, or be directly shown in the current window of the second client-side program, the content of displaying is except safety detection result information And performed corresponding to it outside advisory information, the mark of mobile device, file path, file size etc. can also be included, this Inventive embodiments need not be any limitation as to the form of displaying.
Step 311, second client-side program is receiving user for one or more choosings for performing advisory information After fixed instruction, according to selected instruction generation execute instruction corresponding with one or more of execution advisory informations and send To the first client-side program, the execute instruction is sent into the 3rd application by the first client-side program;
Specifically, user can be sent to safety detection by way of selected one or more execution advisory informations As a result processing wish, generated when user is selected one or more performs advisory information and one or more of perform suggestion The selected instruction of information, after the second client-side program receives the selected instruction, execute instruction passes through described corresponding to generation SOCKET interface channels are sent to the first client-side program, are sent by the first client-side program into third-party application.
For example, described stop execute instruction corresponding to execution suggestion to stop execute instruction, the pause execution suggestion pair The execute instruction answered is pause execute instruction, described continues executing with execute instruction corresponding to suggestion to continue executing with instruction;It is described Mobile device extension horse leak reparation suggestion, open cloud killing suggestion, dangerous software reparation suggestion, virus base more new suggested, unlatching Suggestion, malice advertisement applications reparation suggestion, Initiative Defense function unlatching suggestion, internal memory are repaired in security service suggestion, mountain vallage application Optimizing Suggestions, daemon software closing suggestion, the software advisor for closing automatic start, garbage data cleaning suggestion, cleaning caching are built Existing Stub File suggestion, installation kit cleaning suggestion, big file consolidation suggestion, privacy vestige are clear after view, cleaning application unloading Reason instructs difference to be the reparation of mobile device extension horse leak, open cloud killing, dangerous software reparation, virus base corresponding to suggesting Renewal, open security service, mountain vallage application reparations, the reparation of malice advertisement applications, unlatching Initiative Defense function, internal memory optimization, after The closing of platform software, the software for closing automatic start, garbage data cleaning, cleaning caching, cleaning are using existing residual after unloading File, installation kit cleaning, big file consolidation, the cleaning of privacy vestige.
Step 312, third-party application performs the execute instruction.
Specifically, the execute instruction carries command identification, and different command identifications instruction third-party application performs Different operations, i.e., after third-party application receives execute instruction, perform corresponding repair according to the command identification and operate.
For example, if the execute instruction that third-party application receives is unlatching Initiative Defense function, if possessing on mobile device Initiative Defense function, then the Initiative Defense function on mobile device is opened, otherwise, open the active of first client-side program Defense function.Specifically, after Initiative Defense function is opened, can utilize application program title or information with it is pre-defined Information in database is compared to judge the identity of the application program, and then takes corresponding processing, wherein, The pre-defined database can include application program white list, blacklist and characteristic.The white list can be with The title of application program comprising known trust(UID including program(Unique identifier)With the bag name of program), it is described Blacklist can include the title of known malicious application(UID including program(Unique identifier)With the bag of program Name), the characteristic can include known malice feature(Such as characteristic of advertisement)Data.
When the title using application program is to judge the identity of the application program:In the application program When title is included in the white list in the pre-defined database, performed according to the address of the service of application call The calling, and return to active service result to the application program;Or it is included in advance in the title of the application program When in the blacklist in the database of definition, pre-defined service result is returned to the application program;Or answered described When being not included in the title of program in the white and black list in pre-defined database, the application program is shown The information of title and information and the calling, and according to passing through selection of the operating system for the calling on the mobile apparatus To perform processing.
That is, when the title of application program is included in white list, the application program answering for trust is judged With program, it is allowed to which it so as to perform calling according to the address of the service, and is returned for the calling of service to the application program Active service result;When the title of application program is included in blacklist, judge that the application software for malicious application, is refused It, directly to the false service result of its return, makes it think that calling has succeeded for the calling of service absolutely;And work as and apply journey When the title of sequence had both been not included in white list or had been not included in blacklist, then the title and information of the application program are shown With the information of the calling, and according to performing place by selection of the operating system for the calling on the mobile apparatus Reason.Specifically, in the case where have selected the permission application program to the calling of the service, according to the ground of the service Location performs the calling, and returns to active service result to the application program;Or do not allow described to apply journey have selected In the case of the calling serviced described in ordered pair, pre-defined service result is returned to the application program.
And when the information using application program for the identity of the application program to judge:Journey is applied described When the packet of sequence is containing characteristic in the pre-defined database, pre-defined clothes are returned to the application program Business result;Or the application program information do not include the pre-defined database in characteristic when, display The title and information of the application program and the information of the calling, and according on the mobile apparatus by operating system for The selection of the calling performs processing.
And for example, the execute instruction received when third-party application is repaired for mountain vallage application and instructed, then third-party application is from clothes Official's application installation package corresponding to mountain vallage application is matched in business device, and official's application installation package of matching is pushed to user, Prompt the user whether selection installation(Whiten);When execute instruction is that garbage data cleaning instructs, then third-party application is cleared up The junk data that mobile device side safety detection obtains;If the execute instruction is closing daemon software or the software of automatic start When, then third-party application closes the daemon software or the software of automatic start.
It should be noted that carrying out safety detection to mobile device on the computing device in the embodiment of the present invention, refer to Safety detection is carried out to the mobile device of access on computing device, specific detection operation and execution operation are safety in movement What the security classes detection application in equipment was carried out, with to the safety detection of u disks and being differed in computing device side.
The embodiment of the present invention can intercept malicious application and steal by carrying out safety detection to mobile device on the computing device Peep the privacy information of mobile device user(Including associated person information, message registration, short message, multimedia message, various accounts and password etc.) Behavior, prevent malicious application dial phone of deducting fees, send deduct fees short message, access expend network traffics website, prevent malice Using installation wooden horse and Virus, the GPS or network positions of malicious application record user are prevented, malicious application ejection is intercepted and disturbs Advertising message etc. is disturbed, can be intercepted for calling of any malicious application for service, so as to improve mobile device Security.
In addition, the embodiment of the present invention can also detected by carrying out safety detection to mobile device on the computing device During to the software for having daemon software or automatic start, the daemon software or the software of automatic start can be closed, so as to save The network traffics of mobile device;The property of mobile device can be improved by carrying out internal memory optimization, garbage-cleaning etc. to mobile device Energy.
Reference picture 4, show a kind of step flow of embodiment of the method four that safety detection is carried out to equipment of the present invention Figure, the present embodiment is by taking the mobile device for being provided with Android operation system as an example, and certainly, the present invention is not limited to be provided with Android system The mobile device of system, principle of the invention are equally applicable to be provided with the mobile device of other operating systems.
In embodiments of the present invention, if be embedded with the service of the first client-side program in service in third-party application, Then it can directly be communicated by third-party application with the second client-side program of computing device, methods described can be included such as Lower step:
Step 401, when mobile device is connected to computing device, whether the second client-side program detects the mobile device Third-party application is installed, if it is not, step 402 is then performed, if so, then performing step 404;
Step 402, the second client-side program is downloaded the third-party application installation kit and sent to mobile device side;
Step 403, third-party application is installed in mobile device side according to the third-party application installation kit, continues executing with step 404;
Applied to the embodiment of the present invention, the third-party application can be that safe safety detection class is served by, such as 360 hands Machine bodyguard, Kingsoft bodyguard etc., the embodiment of the present invention need not be any limitation as to the particular type of third-party application.
Step 404, the SOCKET interface channels of the mobile device and the computing device are established;
Step 405, the second client-side program SOCKET interface channels send to the third-party application and movement are set Standby safety detection request, the safety detection request include specifying detection object;
As a kind of preferred exemplary of the present embodiment, the safety detection request can include specifying detection object, described It is that the project of safety detection is carried out for mobile device to specify detection object, can be including the following service for mobile device It is one or more:Mobile device extension horse Hole Detection, detect whether to open cloud killing, detect whether dangerous software, detection Whether updated virus base, detection security service whether open, detect mobile device whether have mountain vallage application, detect mobile device On whether have malice advertisement applications, Initiative Defense function open detection, internal memory optimization detection, detect whether to exist daemon software, The software detection of automatic start, garbage data cleaning detection, cleaning caching detect, clear up existing Stub File after application unloading Detection, installation kit cleaning detection, big file consolidation, the cleaning detection of privacy vestige, etc..
Step 406, the third-party application operates to safety detection corresponding to the specified detection object execution, is pacified Full inspection surveys object information;
Step 407, the safety detection result information is returned to the second client-side program by third-party application;
Step 408, second client-side program performs suggestion according to corresponding to the safety detection result information acquisition Information;
Step 409, second client-side program shows the safety detection result information and corresponding performs suggestion Information;
Step 410, second client-side program is receiving user for one or more choosings for performing advisory information After fixed instruction, according to selected instruction generation execute instruction corresponding with one or more of execution advisory informations and send Into the 3rd application;
In one preferred embodiment of the invention, the safety detection result information can include safety detection progress letter Breath, accordingly, the execute instruction can include halt instruction, pause instruction, continue executing with instruction.
In another preferred embodiment of the invention, the safety detection result information includes safety detection result, phase Ying Di, the execute instruction can include following one or more:The reparation of mobile device extension horse leak, open cloud killing, danger Dangerous software reparation, virus base renewal, open security service, mountain vallage application reparation, the reparation of malice advertisement applications, unlatching Initiative Defense Function, internal memory optimization, daemon software closing, the software for closing automatic start, garbage data cleaning, cleaning caching, cleaning are applied Existing Stub File, installation kit cleaning, big file consolidation, the cleaning of privacy vestige after unloading.
Step 411, third-party application performs the execute instruction.
For Fig. 4 embodiment of the method, because it is substantially similar to above-mentioned Fig. 3 embodiments of the method, so description Fairly simple, the relevent part can refer to the partial explaination of embodiments of method.
For embodiment of the method, in order to be briefly described, therefore it is all expressed as to a series of combination of actions, but this area Technical staff should know that the present invention is not limited by described sequence of movement, because according to the present invention, some steps can To carry out using other orders or simultaneously.Secondly, those skilled in the art should also know, implementation described in this description Example belongs to preferred embodiment, necessary to involved action and the module not necessarily present invention.
Reference picture 5, a kind of structured flowchart of device embodiment one that safety detection is carried out to equipment of the present invention is shown, Described device can include following module:
Safety detection request receiving module 501, suitable for when mobile device is connected to computing device, in the mobile device Side joint is received the safety detection to mobile device that the computing device side is sent and asked, and the safety detection request includes specifying inspection Survey object;
Safety detection result information sending module 502, suitable for being obtained in the mobile device side and the specified detection pair Sent as corresponding safety detection result information, and by the safety detection result information to computing device side;
Execute instruction receiving module 503, suitable for receiving the execute instruction of computing device side transmission in the mobile device side joint, The execute instruction is that computing device generates according to the safety detection result information;
Execute instruction execution module 504, suitable for performing the execute instruction in the mobile device side.
In one preferred embodiment of the invention, described device can also include:
Installation kit receiving module, suitable for being sent in the mobile device side joint receipts computing device side to mobile device Safety detection request before, the mobile device side joint receives the third-party application installation kit that the computing device side is sent, The third-party application installation kit is that the computing device side is detecting that the mobile device side is fitted without third-party application When, download and obtain from server;
Installation kit installs module, should according to third-party application installation kit installation third party suitable for the mobile device side With.
In one preferred embodiment of the invention, described device can also include:
Path setup module, suitable for the mobile device side joint receive that the computing device side sends to mobile device Before safety detection request, the SOCKET interface channels of the mobile device and the computing device, the mobile device are established Safety detection request is received by the SOCKET interface channels and sends safety detection result information and receives and is performed Instruction.
In one preferred embodiment of the invention, the safety detection request receiving module 501 is further adapted for:
The mobile device side using the third-party application receive that the computing device side sends to mobile device Safety detection request;
The safety detection result information sending module 502 is further adapted for:
Ask to perform to specifying detection according to the safety detection using the third-party application in the mobile device side The safety detection operation of object, obtains safety detection result information;
The safety detection result information is back to the computing device side by the third-party application;
The execute instruction receiving module 503 is further adapted for:
The execute instruction of computing device side transmission is received using the third-party application in the mobile device side;
The execute instruction execution module 504 is further adapted for:
The execute instruction is performed using the third-party application in the mobile device side.
In another preferred embodiment of the invention, the mobile device side is provided with the first client-side program, described Safety detection request receiving module 501 is further adapted for:
The mobile device side using first client-side program receive that the computing device side sends to movement The safety detection request of equipment;
The safety detection result information sending module 502 is further adapted for:
Safety detection request is sent to described the using first client-side program in the mobile device side Tripartite applies, and asks to perform according to the safety detection by the third-party application and the safety detection for specifying detection object is grasped Make, obtain safety detection result information and return in the first client-side program;
The safety detection result information is back to the computing device side by first client-side program;
The execute instruction receiving module 503 is further adapted for:
The execute instruction of computing device side transmission is received using first client-side program in the mobile device side;
The execute instruction execution module 504 is further adapted for:
The execute instruction is sent to third-party application using first client-side program in the mobile device side, The execute instruction is performed by the third-party application.
In one preferred embodiment of the invention, first client-side program sends safety detection request extremely The third-party application, it is specially:
First client-side program calls the interface of the service of the third-party application according to the specified detection object, Safety detection request is sent to the third-party application.
As a kind of preferred exemplary of the embodiment of the present invention, the specified detection object can be included for mobile device What is serviced as follows is one or more:Mobile device extension horse Hole Detection, detect whether to open cloud killing, detect whether it is dangerous Software, detect whether updated virus base, detection security service are opened, detect whether mobile device has mountain vallage application, inspection Whether survey on mobile device has malice advertisement applications, Initiative Defense function open detection, internal memory optimization to detect, detect whether exist Exist after daemon software, the software detection of automatic start, garbage data cleaning detection, the detection of cleaning caching, cleaning application unloading Stub File detection, installation kit cleaning detection, big file consolidation, privacy vestige cleaning detect.
As a kind of preferred exemplary of the embodiment of the present invention, the safety detection result information is believed including safety detection progress Breath, correspondingly, the execute instruction include halt instruction, pause instruction, continue executing with instruction.
As another preferred exemplary of the embodiment of the present invention, the safety detection result information includes safety detection knot Fruit, correspondingly, the execute instruction include following one or more:The reparation of mobile device extension horse leak, open cloud killing, danger Dangerous software reparation, virus base renewal, open security service, mountain vallage application reparation, the reparation of malice advertisement applications, unlatching Initiative Defense Function, internal memory optimization, daemon software closing, the software for closing automatic start, garbage data cleaning, cleaning caching, cleaning are applied Existing Stub File, installation kit cleaning, big file consolidation, the cleaning of privacy vestige after unloading.
For Fig. 5 device embodiment, because it is substantially similar to above method embodiment, so the comparison of description Simply, the relevent part can refer to the partial explaination of embodiments of method.
Reference picture 6, a kind of structured flowchart of device embodiment two that safety detection is carried out to equipment of the present invention is shown, Described device can include following module:
Safety detection request sending module 601, suitable in computing device side safety detection to when having mobile device access, Laterally the mobile device side sends and includes finger to the request of the safety detection of mobile device, the safety detection request computing device Determine detection object;
Safety detection result information receiving module 602, returned suitable for receiving the mobile device side in the computing device side joint The safety detection result information for safety detection request returned, the safety detection result information is by the mobile device Side obtains according to the specified detection object;
Execute instruction sending module 603, corresponded to suitable for being generated in computing device side according to the safety detection result information Execute instruction and send to the mobile device side, the execute instruction is performed by the mobile device side.
In one preferred embodiment of the invention, described device can also include:
Installation kit data obtaining module, suitable for laterally the mobile device side is sent to mobile device in the computing device Safety detection request before, all installation kits letters for having installed application in the mobile device side are read in computing device side Breath, the installation kit information identify including installation kit;
Searching modul, suitable for judging third-party application installation kit mark is not present in the installation kit mark in computing device side During knowledge, the download address of the third-party application installation kit is obtained from server;
Installation kit sending module, suitable for being downloaded in computing device side according to the download address of the third-party application installation kit The third-party application installation kit is simultaneously sent to mobile device side.
In one preferred embodiment of the invention, described device can also include:
Interface channel establishes module, suitable in the computing device, laterally the mobile device side is sent to mobile device Before safety detection request, the SOCKET interface channels of the mobile device and the computing device, the computing device are established Safety detection request is sent by the interface channel and receives safety detection result information and sends execute instruction.
In one preferred embodiment of the invention, the safety detection result information has the information of type identification, institute Execute instruction sending module 603 is stated to be further adapted for:
Computing device side is searched in default mapping table and advisory information is performed corresponding to the type identification, and described preset is reflected Computing device and the type identification that mobile device is made an appointment and the mapping relations for performing advisory information are stored with firing table;
The safety detection result information and corresponding execution advisory information are shown in computing device side;
Selected instruction of the user to one or more of execution advisory informations is received in computing device side joint;
According to execute instruction corresponding to the selected one or more execution advisory informations of instruction generation and send to movement Equipment side.
As a kind of preferred exemplary of the embodiment of the present invention, the specified detection object can be included for mobile device What is serviced as follows is one or more:Mobile device extension horse Hole Detection, detect whether to open cloud killing, detect whether it is dangerous Software, detect whether updated virus base, detection security service are opened, detect whether mobile device has mountain vallage application, inspection Whether survey on mobile device has malice advertisement applications, Initiative Defense function open detection, internal memory optimization to detect, detect whether exist Exist after daemon software, the software detection of automatic start, garbage data cleaning detection, the detection of cleaning caching, cleaning application unloading Stub File detection, installation kit cleaning detection, big file consolidation, privacy vestige cleaning detect.
In one preferred embodiment of the invention, the safety detection result information can include safety detection progress letter Breath, correspondingly, the execute instruction include halt instruction, pause instruction, continue executing with instruction.
In another preferred embodiment of the invention, the safety detection result information includes safety detection result, phase Ying Di, the execute instruction include following one or more:The reparation of mobile device extension horse leak, open cloud killing, be dangerous soft Part reparation, virus base renewal, open security service, mountain vallage application reparation, the reparation of malice advertisement applications, unlatching Initiative Defense work( Energy, internal memory optimization, daemon software closed, close the software of automatic start, garbage data cleaning, cleaning caching, cleaning application are unloaded Existing Stub File, installation kit cleaning, big file consolidation, the cleaning of privacy vestige after load.For Fig. 6 device embodiment and Speech, because it is substantially similar to above method embodiment, so description is fairly simple, related part is referring to embodiment of the method Part illustrates.
Provided herein algorithm and display not with the intrinsic phase of any particular computing device, virtual system or miscellaneous equipment Close.Various general-purpose systems can also be used together with teaching based on this.As described above, this kind of system is constructed to want The structure asked is obvious.In addition, the present invention is not also directed to any certain programmed language.It should be understood that it can utilize each Kind programming language realizes the content of invention described herein, and the description done above to language-specific is to disclose this The preferred forms of invention.
In the specification that this place provides, numerous specific details are set forth.It is to be appreciated, however, that the implementation of the present invention Example can be put into practice in the case of these no details.In some instances, known method, structure is not been shown in detail And technology, so as not to obscure the understanding of this description.
Similarly, it will be appreciated that in order to simplify the disclosure and help to understand one or more of each inventive aspect, Above in the description to the exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes In example, figure or descriptions thereof.However, the method for the disclosure should be construed to reflect following intention:I.e. required guarantor The application claims of shield features more more than the feature being expressly recited in each claim.It is more precisely, such as following Claims reflect as, inventive aspect is all features less than single embodiment disclosed above.Therefore, Thus the claims for following embodiment are expressly incorporated in the embodiment, wherein each claim is in itself Separate embodiments all as the present invention.
Those skilled in the art, which are appreciated that, to be carried out adaptively to the module in the equipment in embodiment Change and they are arranged in one or more equipment different from the embodiment.Can be the module or list in embodiment Member or component be combined into a module or unit or component, and can be divided into addition multiple submodule or subelement or Sub-component.In addition at least some in such feature and/or process or unit exclude each other, it can use any Combination is to this specification(Including adjoint claim, summary and accompanying drawing)Disclosed in all features and so disclosed appoint Where all processes or unit of method or equipment are combined.Unless expressly stated otherwise, this specification(Including adjoint power Profit requirement, summary and accompanying drawing)Disclosed in each feature can be by providing identical, equivalent or similar purpose alternative features come generation Replace.
In addition, it will be appreciated by those of skill in the art that although some embodiments described herein include other embodiments In included some features rather than further feature, but the combination of the feature of different embodiments means in of the invention Within the scope of and form different embodiments.For example, in the following claims, embodiment claimed is appointed One of meaning mode can use in any combination.
The all parts embodiment of the present invention can be realized with hardware, or to be run on one or more processor Software module realize, or realized with combinations thereof.It will be understood by those of skill in the art that it can use in practice Microprocessor or digital signal processor(DSP)It is according to embodiments of the present invention to equipment progress security detection equipment to realize In some or all parts some or all functions.The present invention is also implemented as described herein for performing Some or all equipment or program of device of method(For example, computing device program and computing device program product). Such program for realizing the present invention can be stored on computing device computer-readable recording medium, or can have one or more letter Number form.Such signal can be downloaded from internet website and obtained, and either be provided or with any on carrier signal Other forms provide.
It should be noted that the present invention will be described rather than limits the invention for above-described embodiment, and ability Field technique personnel can design alternative embodiment without departing from the scope of the appended claims.In the claims, Any reference symbol between bracket should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not Element or step listed in the claims.Word "a" or "an" before element does not exclude the presence of multiple such Element.The present invention can be by means of including the hardware of some different elements and being come by means of properly programmed computing device real It is existing.In if the unit claim of equipment for drying is listed, several in these devices can be by same hardware branch To embody.The use of word first, second, and third does not indicate that any order.These words can be explained and run after fame Claim.
Embodiment of the invention discloses that A1, a kind of method that safety detection is carried out to equipment, including:
When mobile device is connected to computing device, in pair that the mobile device side joint receipts computing device side is sent The safety detection request of mobile device, the safety detection request include specifying detection object;
Safety detection result information corresponding with the specified detection object is obtained in the mobile device side, and described in general Safety detection result information is sent to computing device side;
Receive the execute instruction that computing device side sends in the mobile device side joint, the execute instruction be computing device according to Generated according to the safety detection result information;
The execute instruction is performed in the mobile device side.
A2, the method as described in A1, the mobile device side joint receive that the computing device side sends to mobile device Safety detection request the step of before, in addition to:
The mobile device side joint receives the third-party application installation kit that the computing device side is sent, the third-party application Installation kit be the computing device side when detecting that the mobile device side is fitted without third-party application, from server under Load obtains;
Third-party application is installed according to the third-party application installation kit in the mobile device side.
A3, the method as described in A1 or A2, the mobile device side joint receive that the computing device side sends to movement Before the step of safety detection request of equipment, in addition to:
The SOCKET interface channels of the mobile device and the computing device are established, the mobile device passes through described SOCKET interface channels receive safety detection request and send safety detection result information and receive execute instruction.
A4, the method as described in A2, it is described the mobile device side joint receive that the computing device side sends to movement Equipment safety detection request the step of be:
The mobile device side using the third-party application receive that the computing device side sends to mobile device Safety detection request;
It is described that safety detection result information corresponding with the specified detection object, and general are obtained in the mobile device side The safety detection result information, which was sent to the step of computing device side, to be included:
Ask to perform to specifying detection according to the safety detection using the third-party application in the mobile device side The safety detection operation of object, obtains safety detection result information;
The safety detection result information is back to the computing device side by the third-party application;
It is described to be in the step of execute instruction of mobile device side joint receipts computing device side transmission:
The execute instruction of computing device side transmission is received using the third-party application in the mobile device side;
It is described to be the step of the mobile device side performs the execute instruction:
The execute instruction is performed using the third-party application in the mobile device side.
A5, the method as described in A2, the mobile device side is provided with the first client-side program, described to be set in the movement Standby side joint receives the step of safety detection to mobile device that the computing device side is sent is asked and is:
The mobile device side using first client-side program receive that the computing device side sends to movement The safety detection request of equipment;
It is described that safety detection result information corresponding with the specified detection object, and general are obtained in the mobile device side The safety detection result information, which was sent to the step of computing device side, to be included:
Safety detection request is sent to described the using first client-side program in the mobile device side Tripartite applies, and asks execution to grasp the safety detection for specifying detection object according to the safety detection by the third party is medical Make, obtain safety detection result information and return in the first client-side program;
The safety detection result information is back to the computing device side by first client-side program;
It is described to be in the step of execute instruction of mobile device side joint receipts computing device side transmission:
The execute instruction of computing device side transmission is received using first client-side program in the mobile device side;
It is described to be the step of the mobile device side performs the execute instruction:
The execute instruction is sent to third-party application using first client-side program in the mobile device side, The execute instruction is performed by the third-party application.
A6, the method as described in A5, first client-side program send safety detection request to the described 3rd The step of Fang Yingyong, includes:
First client-side program calls the interface of the service of the third-party application according to the specified detection object, Safety detection request is sent to the third-party application.
A7, the method as described in A1, the specified detection object include for one of following service of mobile device or It is multinomial:Mobile device extension horse Hole Detection, detect whether to open cloud killing, detect whether dangerous software, detect whether more It is new cross virus base, whether detection security service opens, detect mobile device whether have mountain vallage application, detect on mobile device whether There are malice advertisement applications, Initiative Defense function open detection.
A8, the method as described in A1, the specified detection object include for one of following service of mobile device or It is multinomial:Internal memory optimization detection, detect whether that daemon software, the software detection of automatic start, garbage data cleaning be present detects, be clear Existing Stub File detection, installation kit cleaning detection, big file consolidation, privacy trace after the detection of reason caching, cleaning application unloading Mark cleaning detection.
A9, the method as described in A7 or A8, the safety detection result information include safety detection progress msg, accordingly Ground, the execute instruction include halt instruction, pause instruction, continue executing with instruction.
A10, the method as described in A7, the safety detection result information includes safety detection result, correspondingly, described to hold Row instruction includes following one or more:The reparation of mobile device extension horse leak, open cloud killing, dangerous software reparation, virus Storehouse renewal, open security service, mountain vallage application reparation, the reparation of malice advertisement applications, unlatching Initiative Defense function.
A11, the method as described in A8, the safety detection result information includes safety detection result, correspondingly, described to hold Row instruction includes following one or more:Software, the junk data of automatic start are closed, closed to internal memory optimization, daemon software Existing Stub File, installation kit cleaning, big file consolidation, privacy vestige are clear after cleaning, cleaning caching, cleaning application unloading Reason.
Embodiments of the invention also disclose B12, a kind of method that safety detection is carried out to equipment, including:
When computing device side safety detection is to when having mobile device access, in computing device, laterally the mobile device side is sent out Go out the safety detection request to mobile device, the safety detection request includes specifying detection object;
The safety inspection for safety detection request of the mobile device side return is received in the computing device side joint Object information is surveyed, the safety detection result information is obtained by the mobile device side according to the specified detection object;
According to execute instruction corresponding to safety detection result information generation and sent in computing device side to the shifting Dynamic equipment side, the execute instruction is performed by the mobile device side.
B13, the method as described in B12, in the computing device, laterally the mobile device side is sent to mobile device Before the step of safety detection is asked, in addition to:
All installation package informatins for having installed application in the mobile device side, the installation kit are read in computing device side Information identifies including installation kit;
When judging third-party application installation kit mark is not present in the installation kit mark in computing device side, from server The middle download address for obtaining the third-party application installation kit;
In computing device side the third-party application installation is downloaded according to the download address of the third-party application installation kit Wrap and send to mobile device side.
B14, the method as described in B12 or 13, the computing device laterally the mobile device side send to movement set Before the step of standby safety detection is asked, in addition to:
The SOCKET interface channels of the mobile device and the computing device are established, the computing device passes through the company Road is connected to send safety detection request and receive safety detection result information and send execute instruction.
B15, the method as described in B12, the safety detection result information has the information of type identification, described to calculate Equipment side according to the safety detection result information generate corresponding to execute instruction and send to the mobile device side the step of Including:
Computing device side is searched in default mapping table and advisory information is performed corresponding to the type identification, and described preset is reflected Computing device and the type identification that mobile device is made an appointment and the mapping relations for performing advisory information are stored with firing table;
The safety detection result information and corresponding execution advisory information are shown in computing device side;
Selected instruction of the user to one or more of execution advisory informations is received in computing device side joint;
According to execute instruction corresponding to the selected one or more execution advisory informations of instruction generation and send to movement Equipment side.
B16, the method as described in B12, the specified detection object include one of the following service for mobile device It is or multinomial:Mobile device extension horse Hole Detection, detect whether to open cloud killing, detect whether dangerous software, detect whether Updated virus base, detection security service whether open, detect mobile device whether have mountain vallage application, detect mobile device on be It is no to have malice advertisement applications, Initiative Defense function open detection.
B17, the method as described in B12, the specified detection object include one of the following service for mobile device It is or multinomial:Internal memory optimization detection, detect whether to exist daemon software, the software detection of automatic start, garbage data cleaning detection, Existing Stub File detection, installation kit cleaning detection, big file consolidation, privacy after the detection of cleaning caching, cleaning application unloading Vestige cleaning detection.
B18, the method as described in B16 or B17, the safety detection result information include safety detection progress msg, phase Ying Di, the execute instruction include halt instruction, pause instruction, continue executing with instruction.
B19, the method as described in B16, the safety detection result information includes safety detection result, correspondingly, described Execute instruction includes following one or more:The reparation of mobile device extension horse leak, open cloud killing, dangerous software reparation, disease Malicious storehouse renewal, open security service, mountain vallage application reparation, the reparation of malice advertisement applications, unlatching Initiative Defense function.
B20, the method as described in B17, the safety detection result information includes safety detection result, correspondingly, described Execute instruction includes following one or more:Software, the rubbish number of automatic start are closed, closed to internal memory optimization, daemon software It is clear according to existing Stub File, installation kit cleaning, big file consolidation, privacy vestige after cleaning, cleaning caching, cleaning application unloading Reason.
Embodiments of the invention also disclose a kind of 21, device that safety detection is carried out to equipment, including:
Embodiments of the invention also disclose C21, a kind of device that safety detection is carried out to equipment, including:
Safety detection request receiving module, suitable for when mobile device is connected to computing device, in the mobile device side Receive the safety detection to mobile device that the computing device side is sent to ask, the safety detection request includes specifying detection Object;
Safety detection result information sending module, suitable for being obtained and the specified detection object pair in the mobile device side The safety detection result information answered, and the safety detection result information is sent to computing device side;
Execute instruction receiving module, suitable for receiving the execute instruction of computing device side transmission, institute in the mobile device side joint Execute instruction is stated to generate according to the safety detection result information for computing device;
Execute instruction execution module, suitable for performing the execute instruction in the mobile device side.
C22, the device as described in C21, in addition to:
Installation kit receiving module, suitable for being sent in the mobile device side joint receipts computing device side to mobile device Safety detection request before, the mobile device side joint receives the third-party application installation kit that the computing device side is sent, The third-party application installation kit is that the computing device side is detecting that the mobile device side is fitted without third-party application When, download and obtain from server;
Installation kit installs module, should according to third-party application installation kit installation third party suitable for the mobile device side With.
C23, the device as described in C21 or C22, in addition to:
Path setup module, suitable for the mobile device side joint receive that the computing device side sends to mobile device Before safety detection request, the SOCKET interface channels of the mobile device and the computing device, the mobile device are established Safety detection request is received by the SOCKET interface channels and sends safety detection result information and receives and is performed Instruction.
C24, the device as described in C22, the safety detection request receiving module are further adapted for:
The mobile device side using the third-party application receive that the computing device side sends to mobile device Safety detection request;
The safety detection result information sending module is further adapted for:
Ask to perform to specifying detection according to the safety detection using the third-party application in the mobile device side The safety detection operation of object, obtains safety detection result information;
The safety detection result information is back to the computing device side by the third-party application;
The execute instruction receiving module is further adapted for:
The execute instruction of computing device side transmission is received using the third-party application in the mobile device side;
The execute instruction execution module is further adapted for:
The execute instruction is performed using the third-party application in the mobile device side.
C25, the device as described in C22, the safety detection request receiving module are further adapted for:
The mobile device side using first client-side program receive that the computing device side sends to movement The safety detection request of equipment;
The safety detection result information sending module is further adapted for:
Safety detection request is sent to described the using first client-side program in the mobile device side Tripartite applies, and asks execution to grasp the safety detection for specifying detection object according to the safety detection by the third party is medical Make, obtain safety detection result information and return in the first client-side program;
The safety detection result information is back to the computing device side by first client-side program;
The execute instruction receiving module is further adapted for:
The execute instruction of computing device side transmission is received using first client-side program in the mobile device side;
The execute instruction execution module is further adapted for:
The execute instruction is sent to third-party application using first client-side program in the mobile device side, The execute instruction is performed by the third-party application.
C26, the device as described in C25, first client-side program send safety detection request to described the Tripartite applies, and is specially:
First client-side program calls the interface of the service of the third-party application according to the specified detection object, Safety detection request is sent to the third-party application.
C27, the device as described in C21, the specified detection object include one of the following service for mobile device It is or multinomial:Mobile device extension horse Hole Detection, detect whether to open cloud killing, detect whether dangerous software, detect whether Updated virus base, detection security service whether open, detect mobile device whether have mountain vallage application, detect mobile device on be It is no to have malice advertisement applications, Initiative Defense function open detection.
C28, the device as described in C21, the specified detection object include one of the following service for mobile device It is or multinomial:Internal memory optimization detection, detect whether to exist daemon software, the software detection of automatic start, garbage data cleaning detection, Existing Stub File detection, installation kit cleaning detection, big file consolidation, privacy after the detection of cleaning caching, cleaning application unloading Vestige cleaning detection.
C29, the device as described in C27 or C28, the safety detection result information include safety detection progress msg, phase Ying Di, the execute instruction include halt instruction, pause instruction, continue executing with instruction.
C30, the device as described in C27, the safety detection result information includes safety detection result, correspondingly, described Execute instruction includes following one or more:The reparation of mobile device extension horse leak, open cloud killing, dangerous software reparation, disease Malicious storehouse renewal, open security service, mountain vallage application reparation, the reparation of malice advertisement applications, unlatching Initiative Defense function.
C31, the device as described in C28, the safety detection result information includes safety detection result, correspondingly, described Execute instruction includes following one or more:Software, the rubbish number of automatic start are closed, closed to internal memory optimization, daemon software It is clear according to existing Stub File, installation kit cleaning, big file consolidation, privacy vestige after cleaning, cleaning caching, cleaning application unloading Reason.
Embodiments of the invention also disclose D32, a kind of device that safety detection is carried out to equipment, including:
Safety detection request sending module, suitable for, to when having mobile device access, being counted in computing device side safety detection Calculating equipment, laterally the mobile device side sends the request of the safety detection of mobile device, the safety detection request is included specifying Detection object;
Safety detection result information receiving module, suitable for receiving what the mobile device side returned in the computing device side joint For the safety detection request safety detection result information, the safety detection result information by the mobile device side according to Obtained according to the specified detection object;
Execute instruction sending module, suitable for being held in computing device side according to corresponding to safety detection result information generation Row is instructed and sent to the mobile device side, and the execute instruction is performed by the mobile device side.
D33, the device as described in D32, in addition to:
Installation kit data obtaining module, suitable for laterally the mobile device side is sent to mobile device in the computing device Safety detection request before, all installation kits letters for having installed application in the mobile device side are read in computing device side Breath, the installation kit information identify including installation kit;
Searching modul, suitable for judging third-party application installation kit mark is not present in the installation kit mark in computing device side During knowledge, the download address of the third-party application installation kit is obtained from server;
Installation kit sending module, suitable for being downloaded in computing device side according to the download address of the third-party application installation kit The third-party application installation kit is simultaneously sent to mobile device side.
D34, the device as described in D32 or D33, in addition to:
Interface channel establishes module, suitable in the computing device, laterally the mobile device side is sent to mobile device Before safety detection request, the SOCKET interface channels of the mobile device and the computing device, the computing device are established Safety detection request is sent by the interface channel and receives safety detection result information and sends execute instruction.
D35, the device as described in D32, the safety detection result information have the information of type identification, and the execution refers to Sending module is made to be further adapted for:
Computing device side is searched in default mapping table and advisory information is performed corresponding to the type identification, and described preset is reflected Computing device and the type identification that mobile device is made an appointment and the mapping relations for performing advisory information are stored with firing table;
The safety detection result information and corresponding execution advisory information are shown in computing device side;
Selected instruction of the user to one or more of execution advisory informations is received in computing device side joint;
According to execute instruction corresponding to the selected one or more execution advisory informations of instruction generation and send to movement Equipment side.
D36, the device as described in D32, the specified detection object include one of the following service for mobile device It is or multinomial:Mobile device extension horse Hole Detection, detect whether to open cloud killing, detect whether dangerous software, detect whether Updated virus base, detection security service whether open, detect mobile device whether have mountain vallage application, detect mobile device on be It is no to have malice advertisement applications, Initiative Defense function open detection.
D37, the device as described in D32, the specified detection object include one of the following service for mobile device It is or multinomial:Internal memory optimization detection, detect whether to exist daemon software, the software detection of automatic start, garbage data cleaning detection, Existing Stub File detection, installation kit cleaning detection, big file consolidation, privacy after the detection of cleaning caching, cleaning application unloading Vestige cleaning detection.
D38, the device as described in D36 or D37, the safety detection result information include safety detection progress msg, phase Ying Di, the execute instruction include halt instruction, pause instruction, continue executing with instruction.
D39, the device as described in D36, the safety detection result information includes safety detection result, correspondingly, described Execute instruction includes following one or more:The reparation of mobile device extension horse leak, open cloud killing, dangerous software reparation, disease Malicious storehouse renewal, open security service, mountain vallage application reparation, the reparation of malice advertisement applications, unlatching Initiative Defense function.
D40, the device as described in D37, the safety detection result information includes safety detection result, correspondingly, described Execute instruction includes following one or more:Software, the rubbish number of automatic start are closed, closed to internal memory optimization, daemon software It is clear according to existing Stub File, installation kit cleaning, big file consolidation, privacy vestige after cleaning, cleaning caching, cleaning application unloading Reason.

Claims (34)

1. a kind of method that safety detection is carried out to equipment, including:
Mobile device side joint receives the third-party application installation kit that computing device side is sent, and the third-party application installation kit is described Download and obtain from server when detecting that the mobile device side is fitted without third-party application in computing device side;It is described Mobile device side is provided with the first client-side program;
Third-party application is installed according to the third-party application installation kit in the mobile device side;
When mobile device is connected to computing device, in the mobile device side using described in first client-side program reception The safety detection to mobile device that computing device side is sent is asked, and the safety detection request includes specifying detection object;
Safety detection request is sent to the third party using first client-side program in the mobile device side Using, by the third-party application according to the safety detection ask perform to specify detection object safety detection operate, obtain Obtain safety detection result information and return in the first client-side program;
The safety detection result information is back to the computing device side by first client-side program;
The execute instruction of computing device side transmission is received in the mobile device side joint, the execute instruction is computing device according to institute State the generation of safety detection result information;
The execute instruction is performed in the mobile device side;
Wherein, it is described to be the step of the mobile device side performs the execute instruction:
The execute instruction is sent to third-party application using first client-side program in the mobile device side, by institute State third-party application and perform the execute instruction.
2. the method as described in claim 1, it is characterised in that receive the computing device side in the mobile device side joint and send The step of request the safety detection of mobile device before, in addition to:
The SOCKET interface channels of the mobile device and the computing device are established, the mobile device passes through the SOCKET Interface channel receives safety detection request and sends safety detection result information and receive execute instruction.
3. the method as described in claim 1, it is characterised in that described to receive the transmission of computing device side in the mobile device side joint Execute instruction the step of be:
The execute instruction of computing device side transmission is received using first client-side program in the mobile device side.
4. method as claimed in claim 3, it is characterised in that the safety detection is asked to send out by first client-side program The step of delivering to the third-party application includes:
First client-side program calls the interface of the service of the third-party application according to the specified detection object, by institute Safety detection request is stated to send to the third-party application.
5. the method as described in claim 1, it is characterised in that the specified detection object is included for the as follows of mobile device What is serviced is one or more:Mobile device extension horse Hole Detection, detect whether to open cloud killing, detect whether it is dangerous soft Part, detect whether updated virus base, detection security service are opened, detect whether mobile device has mountain vallage application, detection Whether malice advertisement applications, Initiative Defense function open detection are had on mobile device.
6. the method as described in claim 1, it is characterised in that the specified detection object is included for the as follows of mobile device What is serviced is one or more:Internal memory optimization detection, detect whether daemon software, the software detection of automatic start, rubbish number be present According to existing Stub File detection, installation kit cleaning detection, big text after cleaning detection, the detection of cleaning caching, cleaning application unloading Part arranges, the cleaning detection of privacy vestige.
7. the method as described in claim 5 or 6, it is characterised in that the safety detection result information is entered including safety detection Information is spent, correspondingly, the execute instruction includes halt instruction, pause instruction, continues executing with instruction.
8. method as claimed in claim 5, it is characterised in that the safety detection result information includes safety detection result, Correspondingly, the execute instruction includes following one or more:The reparation of mobile device extension horse leak, open cloud killing, danger Software reparation, virus base renewal, open security service, mountain vallage application reparation, the reparation of malice advertisement applications, unlatching Initiative Defense work( Energy.
9. method as claimed in claim 6, it is characterised in that the safety detection result information includes safety detection result, Correspondingly, the execute instruction includes following one or more:Internal memory optimization, daemon software are closed, close automatic start Existing Stub File, installation kit cleaning, big file are whole after software, garbage data cleaning, cleaning caching, cleaning application unloading Reason, the cleaning of privacy vestige.
10. a kind of method that safety detection is carried out to equipment, including:
All installation package informatins for having installed application in mobile device side are read in computing device side, the installation kit information includes Installation kit identifies;
When judging third-party application installation kit mark is not present in the installation kit mark in computing device side, obtained from server Take the download address of the third-party application installation kit;
In computing device side the third-party application installation kit is downloaded according to the download address of the third-party application installation kit simultaneously Send to mobile device side;
When computing device side safety detection is to when having mobile device access, in computing device, laterally the mobile device side is sent pair The safety detection request of mobile device, the safety detection request include specifying detection object;
The safety detection knot for safety detection request of the mobile device side return is received in the computing device side joint Fruit information, the safety detection result information are obtained by the mobile device side according to the specified detection object;In the shifting Dynamic equipment side is sent safety detection request to the third-party application using the first client-side program, by the third party The safety detection for specifying detection object is operated using asking to perform according to the safety detection, obtains safety detection result information And return in the first client-side program;The safety detection result information is back to the calculating by first client-side program Equipment side;
Set in computing device side according to execute instruction corresponding to safety detection result information generation and sending to the movement Standby side, the execute instruction is performed by the mobile device side;
Wherein, the mobile device side is provided with the first client-side program;
It is described by the mobile device side perform the execute instruction the step of be:
The execute instruction is sent to third-party application using first client-side program in the mobile device side, by institute State third-party application and perform the execute instruction.
11. method as claimed in claim 10, it is characterised in that laterally the mobile device side is sent in the computing device Before the step of asking the safety detection of mobile device, in addition to:
The SOCKET interface channels of the mobile device and the computing device are established, the computing device is logical by the connection Road sends safety detection request and receives safety detection result information and send execute instruction.
12. method as claimed in claim 10, it is characterised in that the safety detection result information has the letter of type identification Breath, it is described according to execute instruction corresponding to safety detection result information generation and to be sent in computing device side to the movement The step of equipment side, includes:
Computing device side is searched in default mapping table and advisory information is performed corresponding to the type identification, the default mapping table In be stored with the mapping relations of type identification that computing device and mobile device are made an appointment with performing advisory information;
The safety detection result information and corresponding execution advisory information are shown in computing device side;
Selected instruction of the user to one or more of execution advisory informations is received in computing device side joint;
According to execute instruction corresponding to the selected one or more execution advisory informations of instruction generation and send to mobile device Side.
13. method as claimed in claim 10, it is characterised in that the specified detection object include for mobile device as Lower service it is one or more:Mobile device extension horse Hole Detection, detect whether to open cloud killing, detect whether it is dangerous soft Part, detect whether updated virus base, detection security service are opened, detect whether mobile device has mountain vallage application, detection Whether malice advertisement applications, Initiative Defense function open detection are had on mobile device.
14. method as claimed in claim 10, it is characterised in that the specified detection object include for mobile device as Lower service it is one or more:Internal memory optimization detection, detect whether daemon software, the software detection of automatic start, rubbish be present Data scrubbing detects, cleaning caching detects, clears up to clear up using existing Stub File detection, installation kit after unloading and detects, greatly File consolidation, the cleaning detection of privacy vestige.
15. the method as described in claim 13 or 14, it is characterised in that the safety detection result information includes safety detection Progress msg, correspondingly, the execute instruction include halt instruction, pause instruction, continue executing with instruction.
16. method as claimed in claim 13, it is characterised in that the safety detection result information includes safety detection knot Fruit, correspondingly, the execute instruction include following one or more:The reparation of mobile device extension horse leak, open cloud killing, danger Dangerous software reparation, virus base renewal, open security service, mountain vallage application reparation, the reparation of malice advertisement applications, unlatching Initiative Defense Function.
17. method as claimed in claim 14, it is characterised in that the safety detection result information includes safety detection knot Fruit, correspondingly, the execute instruction include following one or more:Internal memory optimization, daemon software are closed, close automatic start Software, garbage data cleaning, cleaning caching, cleaning application unloading after existing Stub File, installation kit cleaning, big file it is whole Reason, the cleaning of privacy vestige.
18. a kind of device that safety detection is carried out to equipment, including:
Safety detection request receiving module, suitable for when mobile device is connected to computing device, being used in the mobile device side First client-side program receives the safety detection to mobile device that the computing device side is sent and asked, and the safety detection please Ask including specifying detection object;It is further adapted for receiving the computing device side using the first client-side program in the mobile device side The safety detection to mobile device sent is asked;
Safety detection result information sending module, suitable for using first client-side program by described in the mobile device side Safety detection request is sent to third-party application, asks to perform to specifying inspection according to the safety detection by the third-party application The safety detection operation of object is surveyed, safety detection result information is obtained and returns in the first client-side program;First client The safety detection result information is back to the computing device side by end program;
Execute instruction receiving module, it is described to hold suitable for receiving the execute instruction of computing device side transmission in the mobile device side joint Row instruction generates for computing device according to the safety detection result information;
Execute instruction execution module, suitable for performing the execute instruction in the mobile device side;
Installation kit receiving module, suitable for the peace to mobile device sent in the mobile device side joint receipts computing device side Full inspection is surveyed before request, and the mobile device side joint receives the third-party application installation kit that the computing device side is sent, and described the Tripartite's application installation package be the computing device side when detecting that the mobile device side is fitted without third-party application, from clothes Download and obtain in business device;
Installation kit installs module, and third-party application is installed according to the third-party application installation kit suitable for the mobile device side;
The execute instruction execution module is further adapted for:
The execute instruction is sent to third-party application using first client-side program in the mobile device side, by institute State third-party application and perform the execute instruction.
19. device as claimed in claim 18, it is characterised in that also include:
Path setup module, suitable for the safety to mobile device sent in the mobile device side joint receipts computing device side Before detection request, the SOCKET interface channels of the mobile device and the computing device are established, the mobile device passes through The SOCKET interface channels receive safety detection request and send safety detection result information and receive execute instruction.
20. device as claimed in claim 18, it is characterised in that
The execute instruction receiving module is further adapted for:
The execute instruction of computing device side transmission is received using first client-side program in the mobile device side.
21. device as claimed in claim 20, it is characterised in that first client-side program asks the safety detection Send to the third-party application, be specially:
First client-side program calls the interface of the service of the third-party application according to the specified detection object, by institute Safety detection request is stated to send to the third-party application.
22. device as claimed in claim 18, it is characterised in that the specified detection object include for mobile device as Lower service it is one or more:Mobile device extension horse Hole Detection, detect whether to open cloud killing, detect whether it is dangerous soft Part, detect whether updated virus base, detection security service are opened, detect whether mobile device has mountain vallage application, detection Whether malice advertisement applications, Initiative Defense function open detection are had on mobile device.
23. device as claimed in claim 18, it is characterised in that the specified detection object include for mobile device as Lower service it is one or more:Internal memory optimization detection, detect whether daemon software, the software detection of automatic start, rubbish be present Data scrubbing detects, cleaning caching detects, clears up to clear up using existing Stub File detection, installation kit after unloading and detects, greatly File consolidation, the cleaning detection of privacy vestige.
24. the device as described in claim 22 or 23, it is characterised in that the safety detection result information includes safety detection Progress msg, correspondingly, the execute instruction include halt instruction, pause instruction, continue executing with instruction.
25. device as claimed in claim 22, it is characterised in that the safety detection result information includes safety detection knot Fruit, correspondingly, the execute instruction include following one or more:The reparation of mobile device extension horse leak, open cloud killing, danger Dangerous software reparation, virus base renewal, open security service, mountain vallage application reparation, the reparation of malice advertisement applications, unlatching Initiative Defense Function.
26. device as claimed in claim 23, it is characterised in that the safety detection result information includes safety detection knot Fruit, correspondingly, the execute instruction include following one or more:Internal memory optimization, daemon software are closed, close automatic start Software, garbage data cleaning, cleaning caching, cleaning application unloading after existing Stub File, installation kit cleaning, big file it is whole Reason, the cleaning of privacy vestige.
27. a kind of device that safety detection is carried out to equipment, including:
Safety detection request sending module, suitable for, to when having mobile device access, being set in computing device side safety detection in calculating The standby lateral mobile device side sends the safety detection request to mobile device, and the safety detection request includes specifying detection Object;
Safety detection result information receiving module, suitable for receiving being directed to for the mobile device side return in the computing device side joint The safety detection result information of the safety detection request, the safety detection result information is by the mobile device side according to institute Specified detection object is stated to obtain;Safety detection request is sent extremely using the first client-side program in the mobile device side Third-party application, ask to perform according to the safety detection by the third-party application and the safety detection for specifying detection object is grasped Make, obtain safety detection result information and return in the first client-side program;First client-side program examines the safety Survey object information and be back to the computing device side;
Execute instruction sending module, refer to suitable for generating corresponding perform according to the safety detection result information in computing device side Make and send to the mobile device side, the execute instruction is performed by the mobile device side;
Installation kit data obtaining module, suitable for laterally the mobile device side sends peace to mobile device in the computing device Full inspection is surveyed before request, and all installation package informatins for having installed application in the mobile device side, institute are read in computing device side Installation kit information is stated to identify including installation kit;
Searching modul, suitable for judging that third-party application installation kit, which is not present, in the installation kit mark identifies in computing device side When, the download address of the third-party application installation kit is obtained from server;
Installation kit sending module, suitable for computing device side according to the third-party application installation kit download address download described in Third-party application installation kit is simultaneously sent to mobile device side;
Wherein, the mobile device side is provided with the first client-side program;
The mobile device side includes execute instruction execution module, suitable for using first client in the mobile device side Program sends the execute instruction to third-party application, and the execute instruction is performed by the third-party application.
28. device as claimed in claim 27, it is characterised in that also include:
Interface channel establishes module, suitable in the computing device, laterally the mobile device side sends safety to mobile device Before detection request, the SOCKET interface channels of the mobile device and the computing device are established, the computing device passes through The interface channel sends safety detection request and receives safety detection result information and send execute instruction.
29. device as claimed in claim 27, it is characterised in that the safety detection result information has the letter of type identification Breath, the execute instruction sending module are further adapted for:
Computing device side is searched in default mapping table and advisory information is performed corresponding to the type identification, the default mapping table In be stored with the mapping relations of type identification that computing device and mobile device are made an appointment with performing advisory information;
The safety detection result information and corresponding execution advisory information are shown in computing device side;
Selected instruction of the user to one or more of execution advisory informations is received in computing device side joint;
According to execute instruction corresponding to the selected one or more execution advisory informations of instruction generation and send to mobile device Side.
30. device as claimed in claim 27, it is characterised in that the specified detection object include for mobile device as Lower service it is one or more:Mobile device extension horse Hole Detection, detect whether to open cloud killing, detect whether it is dangerous soft Part, detect whether updated virus base, detection security service are opened, detect whether mobile device has mountain vallage application, detection Whether malice advertisement applications, Initiative Defense function open detection are had on mobile device.
31. device as claimed in claim 27, it is characterised in that the specified detection object include for mobile device as Lower service it is one or more:Internal memory optimization detection, detect whether daemon software, the software detection of automatic start, rubbish be present Data scrubbing detects, cleaning caching detects, clears up to clear up using existing Stub File detection, installation kit after unloading and detects, greatly File consolidation, the cleaning detection of privacy vestige.
32. the device as described in claim 30 or 31, it is characterised in that the safety detection result information includes safety detection Progress msg, correspondingly, the execute instruction include halt instruction, pause instruction, continue executing with instruction.
33. device as claimed in claim 30, it is characterised in that the safety detection result information includes safety detection knot Fruit, correspondingly, the execute instruction include following one or more:The reparation of mobile device extension horse leak, open cloud killing, danger Dangerous software reparation, virus base renewal, open security service, mountain vallage application reparation, the reparation of malice advertisement applications, unlatching Initiative Defense Function.
34. device as claimed in claim 31, it is characterised in that the safety detection result information includes safety detection knot Fruit, correspondingly, the execute instruction include following one or more:Internal memory optimization, daemon software are closed, close automatic start Software, garbage data cleaning, cleaning caching, cleaning application unloading after existing Stub File, installation kit cleaning, big file it is whole Reason, the cleaning of privacy vestige.
CN201310632733.2A 2013-11-29 2013-11-29 A kind of method and apparatus that safety detection is carried out to equipment Expired - Fee Related CN103632096B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310632733.2A CN103632096B (en) 2013-11-29 2013-11-29 A kind of method and apparatus that safety detection is carried out to equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310632733.2A CN103632096B (en) 2013-11-29 2013-11-29 A kind of method and apparatus that safety detection is carried out to equipment

Publications (2)

Publication Number Publication Date
CN103632096A CN103632096A (en) 2014-03-12
CN103632096B true CN103632096B (en) 2018-01-16

Family

ID=50213132

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310632733.2A Expired - Fee Related CN103632096B (en) 2013-11-29 2013-11-29 A kind of method and apparatus that safety detection is carried out to equipment

Country Status (1)

Country Link
CN (1) CN103632096B (en)

Families Citing this family (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103944802B (en) * 2014-04-17 2017-07-04 新华三技术有限公司 Control mobile device uses the method and device of exchange mailbox
CN104050417B (en) * 2014-07-04 2018-03-27 北京奇虎科技有限公司 A kind of method and device detected in mobile terminal to application state
CN104199682A (en) * 2014-08-04 2014-12-10 联想(北京)有限公司 Information processing method and electronic equipment
CN104360884A (en) * 2014-11-18 2015-02-18 久邦计算机技术(广州)有限公司 Plug-in resource packet loading method based on Android system
CN104484484B (en) * 2015-01-08 2018-05-01 北京奇虎科技有限公司 Clear up the method and device of cache file
CN104809394B (en) * 2015-04-08 2017-04-05 北京奇虎科技有限公司 The method of checking and killing virus, device and terminal
CN105224397A (en) * 2015-10-30 2016-01-06 中国民生银行股份有限公司 Intelligence POS management method and device
CN105589723A (en) * 2015-12-22 2016-05-18 广州三星通信技术研究有限公司 Method for installing application in electronic terminal, and electronic terminal
CN105678161A (en) * 2015-12-23 2016-06-15 北京奇虎科技有限公司 Installation monitoring method and apparatus of applications
CN107086978B (en) * 2016-02-15 2019-12-10 中国移动通信集团福建有限公司 Method and device for identifying Trojan horse virus
CN106027575A (en) * 2016-08-01 2016-10-12 湖南润安危物联科技发展有限公司 Client and security check device and method
CN107102885A (en) * 2017-04-14 2017-08-29 北京洋浦伟业科技发展有限公司 The method and device of Android simulator is detected using ADB modes
CN107301346A (en) * 2017-05-23 2017-10-27 成都联宇云安科技有限公司 One kind realizes Android device APP fast and safely detection methods using white list mechanism
CN108093416B (en) * 2017-11-30 2021-09-21 厦门市美亚柏科信息股份有限公司 Mobile APP push data acquisition method and terminal
CN110287087B (en) * 2018-03-19 2023-06-13 百度在线网络技术(北京)有限公司 Method and device for detecting application
CN109861979B (en) * 2018-12-28 2021-08-10 努比亚技术有限公司 Program processing method, electronic device, and computer-readable storage medium
CN110058871A (en) * 2019-04-23 2019-07-26 湖南快乐阳光互动娱乐传媒有限公司 It detects the illegal decompiling of program and updates the method and system of official release
CN110727945B (en) * 2019-09-20 2021-10-22 上海连尚网络科技有限公司 Virus scanning method, device and computer readable medium
CN114024697A (en) * 2020-07-16 2022-02-08 青岛海尔工业智能研究院有限公司 Security control method, device, system, electronic device, and storage medium
CN112269993A (en) * 2020-11-02 2021-01-26 商丘经济贸易学校 Method for protecting computer system safety

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1862508A (en) * 2005-05-13 2006-11-15 中兴通讯股份有限公司 Automatic testing system of person digital aid cell phone function and method thereof
CN102255676A (en) * 2010-05-19 2011-11-23 广东新支点技术服务有限公司 Automatic end-user oriented testing method for mobile phone
CN102708048A (en) * 2012-04-21 2012-10-03 北京迈凯互动网络科技有限公司 Method and system for testing mobile application
CN102752457A (en) * 2012-07-19 2012-10-24 腾讯科技(深圳)有限公司 Method and system for installing applications

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI322350B (en) * 2006-12-15 2010-03-21 Inst Information Industry Test device, method, application program, and computer readable medium for deriving a qualified test case plan from a test case database

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1862508A (en) * 2005-05-13 2006-11-15 中兴通讯股份有限公司 Automatic testing system of person digital aid cell phone function and method thereof
CN102255676A (en) * 2010-05-19 2011-11-23 广东新支点技术服务有限公司 Automatic end-user oriented testing method for mobile phone
CN102708048A (en) * 2012-04-21 2012-10-03 北京迈凯互动网络科技有限公司 Method and system for testing mobile application
CN102752457A (en) * 2012-07-19 2012-10-24 腾讯科技(深圳)有限公司 Method and system for installing applications

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Android平台远程终端控制系统的研究与设计;黄兴;《中国优秀硕士学位论文全文数据库 信息科技辑》;20131115(第11期);I136-891 *

Also Published As

Publication number Publication date
CN103632096A (en) 2014-03-12

Similar Documents

Publication Publication Date Title
CN103632096B (en) A kind of method and apparatus that safety detection is carried out to equipment
US11336458B2 (en) Evaluating authenticity of applications based on assessing user device context for increased security
Rastogi et al. Are these Ads Safe: Detecting Hidden Attacks through the Mobile App-Web Interfaces.
CN103761472B (en) Application program accessing method and device based on intelligent terminal
CN104517054B (en) Method, device, client and server for detecting malicious APK
Grace et al. Unsafe exposure analysis of mobile in-app advertisements
US9336389B1 (en) Rapid malware inspection of mobile applications
Feng et al. Mobidroid: A performance-sensitive malware detection system on mobile platform
Hu et al. Migdroid: Detecting app-repackaging android malware via method invocation graph
US20170068810A1 (en) Method and apparatus for installing an application program based on an intelligent terminal device
CN104268476B (en) A kind of method for running application program
CN104484599A (en) Behavior processing method and device based on application program
CN105554137B (en) A kind of standby system and method
CN105844155B (en) Macro-virus searching and killing method and system
US9747449B2 (en) Method and device for preventing application in an operating system from being uninstalled
CN104268475B (en) A kind of system for running application program
CN103793649A (en) Method and device for cloud-based safety scanning of files
WO2018121266A1 (en) Method and device for obtaining application and terminal device
Wang et al. Understanding malicious cross-library data harvesting on android
CN104239798B (en) Mobile terminal, server end in mobile office system and its virus method and system
CN106682513A (en) Detection method for target sample file and device
CN105095758B (en) Screen locking applied program processing method, device and mobile terminal
CN103713945B (en) The recognition methods of game and device
CN109558732A (en) A kind of method for preventing application file to be tampered and server
CN110110521A (en) It is a kind of based on iOS application safety detection method, apparatus and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180116

Termination date: 20211129