CN106250765A - Program monitoring method in broadcast system and system - Google Patents

Program monitoring method in broadcast system and system Download PDF

Info

Publication number
CN106250765A
CN106250765A CN201610639481.XA CN201610639481A CN106250765A CN 106250765 A CN106250765 A CN 106250765A CN 201610639481 A CN201610639481 A CN 201610639481A CN 106250765 A CN106250765 A CN 106250765A
Authority
CN
China
Prior art keywords
application program
program
analysis result
application
unit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610639481.XA
Other languages
Chinese (zh)
Inventor
黄新勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201610639481.XA priority Critical patent/CN106250765A/en
Publication of CN106250765A publication Critical patent/CN106250765A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides the program monitoring method in a kind of broadcast system and system, described method comprises the steps: to obtain the application program that user opens;It is input to the mark of this application program in the support vector machine trained be analyzed obtaining analysis result;Determine whether this application program is malicious application according to this analysis result.The technical scheme that the present invention provides has the advantage that safety is high.

Description

Program monitoring method in broadcast system and system
Technical field
The present invention relates to television broadcasting field, particularly relate to the program monitoring method in a kind of broadcast system and system.
Background technology
TV, is equipment conventional in people's daily life, and along with development slowly, TV is also considered as Broadcasting Group (such as television station) provides a kind of address of service, and TV develops into cable television and present net from initial radiovision Network TV, broadcast mode also divides television broadcasting and TV multicast, for TV, more or television broadcasting.As The television broadcasting provider that Shenzhen area is main, it can provide the user high-quality many sets TV programme.
But cannot realize the monitoring of application program in existing television broadcasting, safety is low.
Summary of the invention
Program monitoring method in a kind of broadcast system is provided, which solves the shortcoming that prior art safety is low.
On the one hand, it is provided that the program monitoring method in a kind of broadcast system, described method comprises the steps:
Obtain the application program that user opens;
It is input to the mark of this application program in the support vector machine trained be analyzed obtaining analysis result;
Determine whether this application program is malicious application according to this analysis result.
Optionally, described method also includes:
As for rogue program, issue alarm information to client.
Optionally, described method also includes:
By the information record of this application program.
Second aspect, it is provided that the Program Monitoring System in a kind of broadcast system, described system includes:
Acquiring unit, for obtaining the application program that user opens;
Analytic unit, for being input in the support vector machine trained be analyzed obtaining by the mark of this application program Analysis result;
According to this analysis result, judging unit, for determining whether this application program is malicious application.
Optionally, described system also includes:
Alarm Unit, for as rogue program, issuing alarm information to client.
Optionally, described system also includes:
Record unit, for by the information record of this application program.
The technical scheme that the specific embodiment of the invention provides obtains the application program that user opens, by this application program Mark is input in the support vector machine trained be analyzed obtaining analysis result, determines this application journey according to this analysis result Whether sequence is malicious application, so it has the advantage that safety is high.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing In having technology to describe, the required accompanying drawing used is briefly described, it should be apparent that, the accompanying drawing in describing below is only this Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, it is also possible to Other accompanying drawing is obtained according to these accompanying drawings.
The flow chart of the program monitoring method in a kind of broadcast system that Fig. 1 provides for the present invention;
The structure chart of the Program Monitoring System in a kind of broadcast system that Fig. 2 provides for the present invention.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Describe, it is clear that described embodiment is only a part of embodiment of the present invention rather than whole embodiments wholely.Based on Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under not making creative work premise Embodiment, broadly falls into the scope of protection of the invention.
Program monitoring method in a kind of broadcast system provided for the present invention the first better embodiment refering to Fig. 1, Fig. 1 Flow chart, the method is completed by server, and the method is as it is shown in figure 1, comprise the steps:
The application program that step S101, acquisition user open;
Step S102, it is input to the mark of this application program in the support vector machine trained be analyzed being analyzed Result;
Step S103, determine according to this analysis result whether this application program is malicious application.
The technical scheme that the specific embodiment of the invention provides obtains the application program that user opens, by this application program Mark is input in the support vector machine trained be analyzed obtaining analysis result, determines this application journey according to this analysis result Whether sequence is malicious application, so it has the advantage that safety is high.
Optionally, said method can also include after step s 103:
As for rogue program, issue alarm information to client.
Optionally, said method can also include after step s 103:
By the information record of this application program.
Program monitoring system in a kind of broadcast system provided for the present invention the second better embodiment refering to Fig. 2, Fig. 2 System:
Acquiring unit 201, for obtaining the application program that user opens;
Analytic unit 202, for being input in the support vector machine trained be analyzed by the mark of this application program Obtain analysis result;
According to this analysis result, judging unit 203, for determining whether this application program is malicious application.
The technical scheme that the specific embodiment of the invention provides obtains the application program that user opens, by this application program Mark is input in the support vector machine trained be analyzed obtaining analysis result, determines this application journey according to this analysis result Whether sequence is malicious application, so it has the advantage that safety is high.
Optionally, said system can also include:
Alarm Unit 204, for as rogue program, issuing alarm information to client.
Optionally, said system can also include:
Record unit 205, for by the information record of this application program.
It should be noted that for aforesaid each method embodiment or embodiment, in order to be briefly described, therefore by its all table Stating as a series of combination of actions, but those skilled in the art should know, the present invention is not by described sequence of movement Restriction, because of according to the present invention, some step can use other orders or carry out simultaneously.Secondly, people in the art Member also should know, embodiment described in the specification or embodiment belong to preferred embodiment, involved action and list Necessary to the unit not necessarily present invention.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and does not has the portion described in detail in certain embodiment Point, may refer to the associated description of other embodiments.
Step in embodiment of the present invention method can carry out order according to actual needs and adjust, merges and delete.
Unit in embodiment of the present invention device can merge according to actual needs, divides and delete.This area The feature of the different embodiments described in this specification and different embodiment can be combined or combine by technical staff.
Through the above description of the embodiments, those skilled in the art it can be understood that to the present invention permissible Realize with hardware, or firmware realizes, or combinations thereof mode realizes.When implemented in software, can be by above-mentioned functions It is stored in computer-readable medium or is transmitted as the one or more instructions on computer-readable medium or code.Meter Calculation machine computer-readable recording medium includes computer-readable storage medium and communication media, and wherein communication media includes being easy to from a place to another The individual local any medium transmitting computer program.Storage medium can be any usable medium that computer can access.With As a example by this but be not limited to: computer-readable medium can include random access memory (Random Access Memory, RAM), read only memory (Read-Only Memory, ROM), EEPROM (Electrically Erasable Programmable Read-Only Memory, EEPROM), read-only optical disc (Compact Disc Read- Only Memory, CD-ROM) or other optical disc storage, magnetic disk storage medium or other magnetic storage apparatus or can be used in Carry or store and there is instruction or the desired program code of data structure form can be by any other of computer access Medium.In addition.Any connection can be suitable become computer-readable medium.Such as, if software is to use coaxial cable, light Fine optical cable, twisted-pair feeder, Digital Subscriber Line (Digital Subscriber Line, DSL) or such as infrared ray, radio and The wireless technology of microwave etc from website, server or other remote source, then coaxial cable, optical fiber cable, double The wireless technology of twisted wire, DSL or such as infrared ray, wireless and microwave etc be included in affiliated medium fixing in.Such as this Bright used, dish (Disk) and dish (disc) include compress laser disc (CD), laser dish, laser disc, Digital Versatile Disc (DVD), Floppy disk and Blu-ray Disc, the duplication data of the usual magnetic of its mid-game, dish then carrys out the duplication data of optics with laser.Group above Close within should also be as being included in the protection domain of computer-readable medium.
In a word, the foregoing is only the preferred embodiment of technical solution of the present invention, be not intended to limit the present invention's Protection domain.All within the spirit and principles in the present invention, any modification, equivalent substitution and improvement etc. made, should be included in Within protection scope of the present invention.

Claims (6)

1. the program monitoring method in a broadcast system, it is characterised in that described method comprises the steps:
Obtain the application program that user opens;
It is input to the mark of this application program in the support vector machine trained be analyzed obtaining analysis result;
Determine whether this application program is malicious application according to this analysis result.
Method the most according to claim 1, it is characterised in that described method also includes:
As for rogue program, issue alarm information to client.
Method the most according to claim 1, it is characterised in that described method also includes:
By the information record of this application program.
4. the Program Monitoring System in a broadcast system, it is characterised in that described system includes:
Acquiring unit, for obtaining the application program that user opens;
Analytic unit, for being input in the support vector machine trained be analyzed being analyzed by the mark of this application program Result;
According to this analysis result, judging unit, for determining whether this application program is malicious application.
System the most according to claim 4, it is characterised in that described system also includes:
Alarm Unit, for as rogue program, issuing alarm information to client.
System the most according to claim 4, it is characterised in that described system also includes:
Record unit, for by the information record of this application program.
CN201610639481.XA 2016-08-05 2016-08-05 Program monitoring method in broadcast system and system Pending CN106250765A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610639481.XA CN106250765A (en) 2016-08-05 2016-08-05 Program monitoring method in broadcast system and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610639481.XA CN106250765A (en) 2016-08-05 2016-08-05 Program monitoring method in broadcast system and system

Publications (1)

Publication Number Publication Date
CN106250765A true CN106250765A (en) 2016-12-21

Family

ID=58077741

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610639481.XA Pending CN106250765A (en) 2016-08-05 2016-08-05 Program monitoring method in broadcast system and system

Country Status (1)

Country Link
CN (1) CN106250765A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018023708A1 (en) * 2016-08-05 2018-02-08 黄新勇 Method and system for monitoring program in broadcast system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101834982A (en) * 2010-05-28 2010-09-15 上海交通大学 Hierarchical screening method of violent videos based on multiplex mode
CN103617393A (en) * 2013-11-28 2014-03-05 北京邮电大学 Method for mobile internet malicious application software detection based on support vector machines
CN103870754A (en) * 2010-11-29 2014-06-18 北京奇虎科技有限公司 Malicious program recognition and training model generation method and device
CN105306931A (en) * 2015-11-17 2016-02-03 小米科技有限责任公司 Smart TV anomaly detection method and device
CN105335655A (en) * 2015-09-22 2016-02-17 南京大学 Android application safety analysis method based on sensitive behavior identification
WO2016082284A1 (en) * 2014-11-26 2016-06-02 中国科学院沈阳自动化研究所 Modbus tcp communication behaviour anomaly detection method based on ocsvm dual-profile model

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101834982A (en) * 2010-05-28 2010-09-15 上海交通大学 Hierarchical screening method of violent videos based on multiplex mode
CN103870754A (en) * 2010-11-29 2014-06-18 北京奇虎科技有限公司 Malicious program recognition and training model generation method and device
CN103617393A (en) * 2013-11-28 2014-03-05 北京邮电大学 Method for mobile internet malicious application software detection based on support vector machines
WO2016082284A1 (en) * 2014-11-26 2016-06-02 中国科学院沈阳自动化研究所 Modbus tcp communication behaviour anomaly detection method based on ocsvm dual-profile model
CN105335655A (en) * 2015-09-22 2016-02-17 南京大学 Android application safety analysis method based on sensitive behavior identification
CN105306931A (en) * 2015-11-17 2016-02-03 小米科技有限责任公司 Smart TV anomaly detection method and device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018023708A1 (en) * 2016-08-05 2018-02-08 黄新勇 Method and system for monitoring program in broadcast system

Similar Documents

Publication Publication Date Title
CN106446009A (en) Method and system for recommending house to user in agency app
CN106131691A (en) Icon based on television broadcasting highlights method and system
CN106157196A (en) The evaluation methodology in house and system
CN106250765A (en) Program monitoring method in broadcast system and system
CN106254662A (en) Interior of mobile phone control method and system
CN106228363A (en) The quick method of payment of member's formula and system
CN106231409A (en) Method for real-time monitoring in the radio network of audio frequency and system
CN106231296A (en) Energy consumption monitoring reminding method in radio network and system
CN106231361A (en) Home icon application process in television broadcasting and system
CN106210784A (en) Video security player method and system
CN106326404A (en) Method and system for searching house resources in internet
CN106295818A (en) Customization method and system when of English course
CN106294856A (en) House matching process and system in house app
CN106253787A (en) The rotating speed method and system of closed loop control horizontal coil winding machine
CN106296859A (en) The attendance recording method of GPRS and system in security protection
CN106210893A (en) The video grabber method and system of television broadcasting
CN106162347A (en) Audio frequency acquisition methods in television broadcasting and system
CN106210894A (en) The method and system of image zooming-out
CN106231403A (en) The extracting method of television broadcasting captions and system
CN106060586A (en) Method and system for acquiring director name in broadcast television
CN106210912A (en) Channel pays the application process in radio and television and system
CN106231370A (en) The renewal reminding method of the brief introduction of radio and television and system
CN106254894A (en) Video quickly method for down loading the most in the broadcast and system
CN106210890A (en) Icon display strategy method and system in television broadcasting
CN106210789A (en) Radio and television method of payment based on VIP and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20161221