CN106250765A - Program monitoring method in broadcast system and system - Google Patents
Program monitoring method in broadcast system and system Download PDFInfo
- Publication number
- CN106250765A CN106250765A CN201610639481.XA CN201610639481A CN106250765A CN 106250765 A CN106250765 A CN 106250765A CN 201610639481 A CN201610639481 A CN 201610639481A CN 106250765 A CN106250765 A CN 106250765A
- Authority
- CN
- China
- Prior art keywords
- application program
- program
- analysis result
- application
- unit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/033—Test or assess software
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides the program monitoring method in a kind of broadcast system and system, described method comprises the steps: to obtain the application program that user opens;It is input to the mark of this application program in the support vector machine trained be analyzed obtaining analysis result;Determine whether this application program is malicious application according to this analysis result.The technical scheme that the present invention provides has the advantage that safety is high.
Description
Technical field
The present invention relates to television broadcasting field, particularly relate to the program monitoring method in a kind of broadcast system and system.
Background technology
TV, is equipment conventional in people's daily life, and along with development slowly, TV is also considered as Broadcasting Group
(such as television station) provides a kind of address of service, and TV develops into cable television and present net from initial radiovision
Network TV, broadcast mode also divides television broadcasting and TV multicast, for TV, more or television broadcasting.As
The television broadcasting provider that Shenzhen area is main, it can provide the user high-quality many sets TV programme.
But cannot realize the monitoring of application program in existing television broadcasting, safety is low.
Summary of the invention
Program monitoring method in a kind of broadcast system is provided, which solves the shortcoming that prior art safety is low.
On the one hand, it is provided that the program monitoring method in a kind of broadcast system, described method comprises the steps:
Obtain the application program that user opens;
It is input to the mark of this application program in the support vector machine trained be analyzed obtaining analysis result;
Determine whether this application program is malicious application according to this analysis result.
Optionally, described method also includes:
As for rogue program, issue alarm information to client.
Optionally, described method also includes:
By the information record of this application program.
Second aspect, it is provided that the Program Monitoring System in a kind of broadcast system, described system includes:
Acquiring unit, for obtaining the application program that user opens;
Analytic unit, for being input in the support vector machine trained be analyzed obtaining by the mark of this application program
Analysis result;
According to this analysis result, judging unit, for determining whether this application program is malicious application.
Optionally, described system also includes:
Alarm Unit, for as rogue program, issuing alarm information to client.
Optionally, described system also includes:
Record unit, for by the information record of this application program.
The technical scheme that the specific embodiment of the invention provides obtains the application program that user opens, by this application program
Mark is input in the support vector machine trained be analyzed obtaining analysis result, determines this application journey according to this analysis result
Whether sequence is malicious application, so it has the advantage that safety is high.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
In having technology to describe, the required accompanying drawing used is briefly described, it should be apparent that, the accompanying drawing in describing below is only this
Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, it is also possible to
Other accompanying drawing is obtained according to these accompanying drawings.
The flow chart of the program monitoring method in a kind of broadcast system that Fig. 1 provides for the present invention;
The structure chart of the Program Monitoring System in a kind of broadcast system that Fig. 2 provides for the present invention.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Describe, it is clear that described embodiment is only a part of embodiment of the present invention rather than whole embodiments wholely.Based on
Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under not making creative work premise
Embodiment, broadly falls into the scope of protection of the invention.
Program monitoring method in a kind of broadcast system provided for the present invention the first better embodiment refering to Fig. 1, Fig. 1
Flow chart, the method is completed by server, and the method is as it is shown in figure 1, comprise the steps:
The application program that step S101, acquisition user open;
Step S102, it is input to the mark of this application program in the support vector machine trained be analyzed being analyzed
Result;
Step S103, determine according to this analysis result whether this application program is malicious application.
The technical scheme that the specific embodiment of the invention provides obtains the application program that user opens, by this application program
Mark is input in the support vector machine trained be analyzed obtaining analysis result, determines this application journey according to this analysis result
Whether sequence is malicious application, so it has the advantage that safety is high.
Optionally, said method can also include after step s 103:
As for rogue program, issue alarm information to client.
Optionally, said method can also include after step s 103:
By the information record of this application program.
Program monitoring system in a kind of broadcast system provided for the present invention the second better embodiment refering to Fig. 2, Fig. 2
System:
Acquiring unit 201, for obtaining the application program that user opens;
Analytic unit 202, for being input in the support vector machine trained be analyzed by the mark of this application program
Obtain analysis result;
According to this analysis result, judging unit 203, for determining whether this application program is malicious application.
The technical scheme that the specific embodiment of the invention provides obtains the application program that user opens, by this application program
Mark is input in the support vector machine trained be analyzed obtaining analysis result, determines this application journey according to this analysis result
Whether sequence is malicious application, so it has the advantage that safety is high.
Optionally, said system can also include:
Alarm Unit 204, for as rogue program, issuing alarm information to client.
Optionally, said system can also include:
Record unit 205, for by the information record of this application program.
It should be noted that for aforesaid each method embodiment or embodiment, in order to be briefly described, therefore by its all table
Stating as a series of combination of actions, but those skilled in the art should know, the present invention is not by described sequence of movement
Restriction, because of according to the present invention, some step can use other orders or carry out simultaneously.Secondly, people in the art
Member also should know, embodiment described in the specification or embodiment belong to preferred embodiment, involved action and list
Necessary to the unit not necessarily present invention.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and does not has the portion described in detail in certain embodiment
Point, may refer to the associated description of other embodiments.
Step in embodiment of the present invention method can carry out order according to actual needs and adjust, merges and delete.
Unit in embodiment of the present invention device can merge according to actual needs, divides and delete.This area
The feature of the different embodiments described in this specification and different embodiment can be combined or combine by technical staff.
Through the above description of the embodiments, those skilled in the art it can be understood that to the present invention permissible
Realize with hardware, or firmware realizes, or combinations thereof mode realizes.When implemented in software, can be by above-mentioned functions
It is stored in computer-readable medium or is transmitted as the one or more instructions on computer-readable medium or code.Meter
Calculation machine computer-readable recording medium includes computer-readable storage medium and communication media, and wherein communication media includes being easy to from a place to another
The individual local any medium transmitting computer program.Storage medium can be any usable medium that computer can access.With
As a example by this but be not limited to: computer-readable medium can include random access memory (Random Access Memory,
RAM), read only memory (Read-Only Memory, ROM), EEPROM (Electrically
Erasable Programmable Read-Only Memory, EEPROM), read-only optical disc (Compact Disc Read-
Only Memory, CD-ROM) or other optical disc storage, magnetic disk storage medium or other magnetic storage apparatus or can be used in
Carry or store and there is instruction or the desired program code of data structure form can be by any other of computer access
Medium.In addition.Any connection can be suitable become computer-readable medium.Such as, if software is to use coaxial cable, light
Fine optical cable, twisted-pair feeder, Digital Subscriber Line (Digital Subscriber Line, DSL) or such as infrared ray, radio and
The wireless technology of microwave etc from website, server or other remote source, then coaxial cable, optical fiber cable, double
The wireless technology of twisted wire, DSL or such as infrared ray, wireless and microwave etc be included in affiliated medium fixing in.Such as this
Bright used, dish (Disk) and dish (disc) include compress laser disc (CD), laser dish, laser disc, Digital Versatile Disc (DVD),
Floppy disk and Blu-ray Disc, the duplication data of the usual magnetic of its mid-game, dish then carrys out the duplication data of optics with laser.Group above
Close within should also be as being included in the protection domain of computer-readable medium.
In a word, the foregoing is only the preferred embodiment of technical solution of the present invention, be not intended to limit the present invention's
Protection domain.All within the spirit and principles in the present invention, any modification, equivalent substitution and improvement etc. made, should be included in
Within protection scope of the present invention.
Claims (6)
1. the program monitoring method in a broadcast system, it is characterised in that described method comprises the steps:
Obtain the application program that user opens;
It is input to the mark of this application program in the support vector machine trained be analyzed obtaining analysis result;
Determine whether this application program is malicious application according to this analysis result.
Method the most according to claim 1, it is characterised in that described method also includes:
As for rogue program, issue alarm information to client.
Method the most according to claim 1, it is characterised in that described method also includes:
By the information record of this application program.
4. the Program Monitoring System in a broadcast system, it is characterised in that described system includes:
Acquiring unit, for obtaining the application program that user opens;
Analytic unit, for being input in the support vector machine trained be analyzed being analyzed by the mark of this application program
Result;
According to this analysis result, judging unit, for determining whether this application program is malicious application.
System the most according to claim 4, it is characterised in that described system also includes:
Alarm Unit, for as rogue program, issuing alarm information to client.
System the most according to claim 4, it is characterised in that described system also includes:
Record unit, for by the information record of this application program.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610639481.XA CN106250765A (en) | 2016-08-05 | 2016-08-05 | Program monitoring method in broadcast system and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610639481.XA CN106250765A (en) | 2016-08-05 | 2016-08-05 | Program monitoring method in broadcast system and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106250765A true CN106250765A (en) | 2016-12-21 |
Family
ID=58077741
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610639481.XA Pending CN106250765A (en) | 2016-08-05 | 2016-08-05 | Program monitoring method in broadcast system and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106250765A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018023708A1 (en) * | 2016-08-05 | 2018-02-08 | 黄新勇 | Method and system for monitoring program in broadcast system |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101834982A (en) * | 2010-05-28 | 2010-09-15 | 上海交通大学 | Hierarchical screening method of violent videos based on multiplex mode |
CN103617393A (en) * | 2013-11-28 | 2014-03-05 | 北京邮电大学 | Method for mobile internet malicious application software detection based on support vector machines |
CN103870754A (en) * | 2010-11-29 | 2014-06-18 | 北京奇虎科技有限公司 | Malicious program recognition and training model generation method and device |
CN105306931A (en) * | 2015-11-17 | 2016-02-03 | 小米科技有限责任公司 | Smart TV anomaly detection method and device |
CN105335655A (en) * | 2015-09-22 | 2016-02-17 | 南京大学 | Android application safety analysis method based on sensitive behavior identification |
WO2016082284A1 (en) * | 2014-11-26 | 2016-06-02 | 中国科学院沈阳自动化研究所 | Modbus tcp communication behaviour anomaly detection method based on ocsvm dual-profile model |
-
2016
- 2016-08-05 CN CN201610639481.XA patent/CN106250765A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101834982A (en) * | 2010-05-28 | 2010-09-15 | 上海交通大学 | Hierarchical screening method of violent videos based on multiplex mode |
CN103870754A (en) * | 2010-11-29 | 2014-06-18 | 北京奇虎科技有限公司 | Malicious program recognition and training model generation method and device |
CN103617393A (en) * | 2013-11-28 | 2014-03-05 | 北京邮电大学 | Method for mobile internet malicious application software detection based on support vector machines |
WO2016082284A1 (en) * | 2014-11-26 | 2016-06-02 | 中国科学院沈阳自动化研究所 | Modbus tcp communication behaviour anomaly detection method based on ocsvm dual-profile model |
CN105335655A (en) * | 2015-09-22 | 2016-02-17 | 南京大学 | Android application safety analysis method based on sensitive behavior identification |
CN105306931A (en) * | 2015-11-17 | 2016-02-03 | 小米科技有限责任公司 | Smart TV anomaly detection method and device |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018023708A1 (en) * | 2016-08-05 | 2018-02-08 | 黄新勇 | Method and system for monitoring program in broadcast system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106131691A (en) | Icon based on television broadcasting highlights method and system | |
CN106157196A (en) | The evaluation methodology in house and system | |
CN106250765A (en) | Program monitoring method in broadcast system and system | |
CN106254662A (en) | Interior of mobile phone control method and system | |
CN106228363A (en) | The quick method of payment of member's formula and system | |
CN106231409A (en) | Method for real-time monitoring in the radio network of audio frequency and system | |
CN106231296A (en) | Energy consumption monitoring reminding method in radio network and system | |
CN106231361A (en) | Home icon application process in television broadcasting and system | |
CN106210784A (en) | Video security player method and system | |
CN106326404A (en) | Method and system for searching house resources in internet | |
CN106295818A (en) | Customization method and system when of English course | |
CN106294856A (en) | House matching process and system in house app | |
CN106253787A (en) | The rotating speed method and system of closed loop control horizontal coil winding machine | |
CN106296859A (en) | The attendance recording method of GPRS and system in security protection | |
CN106210893A (en) | The video grabber method and system of television broadcasting | |
CN106162347A (en) | Audio frequency acquisition methods in television broadcasting and system | |
CN106210894A (en) | The method and system of image zooming-out | |
CN106231403A (en) | The extracting method of television broadcasting captions and system | |
CN106060586A (en) | Method and system for acquiring director name in broadcast television | |
CN106210912A (en) | Channel pays the application process in radio and television and system | |
CN106231370A (en) | The renewal reminding method of the brief introduction of radio and television and system | |
CN106254894A (en) | Video quickly method for down loading the most in the broadcast and system | |
CN106210890A (en) | Icon display strategy method and system in television broadcasting | |
CN106210789A (en) | Radio and television method of payment based on VIP and system | |
CN106231366A (en) | The image downloading method of television broadcasting and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20161221 |