CN106446684B - A kind of network account guard method and system based on password control - Google Patents

A kind of network account guard method and system based on password control Download PDF

Info

Publication number
CN106446684B
CN106446684B CN201610841169.9A CN201610841169A CN106446684B CN 106446684 B CN106446684 B CN 106446684B CN 201610841169 A CN201610841169 A CN 201610841169A CN 106446684 B CN106446684 B CN 106446684B
Authority
CN
China
Prior art keywords
module
modules
live streaming
program
application program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201610841169.9A
Other languages
Chinese (zh)
Other versions
CN106446684A (en
Inventor
周志刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Douyu Network Technology Co Ltd
Original Assignee
Wuhan Douyu Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Douyu Network Technology Co Ltd filed Critical Wuhan Douyu Network Technology Co Ltd
Priority to CN201610841169.9A priority Critical patent/CN106446684B/en
Publication of CN106446684A publication Critical patent/CN106446684A/en
Application granted granted Critical
Publication of CN106446684B publication Critical patent/CN106446684B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of network account guard method and system based on password control are related to network account protection field.Steps of the method are: all normal modules to be loaded are needed when obtaining live streaming safety operation of applied program, all normal modules are saved to form white list;All modules loaded when timing acquisition live streaming application program operation;In all modules, after filtering out all normal modules in white list, the remaining module in addition to the module in white list is obtained;Judge whether each remaining module is hook program respectively, if so, determining that current block is abnormal module, otherwise determines that current block is normal mode block.The present invention can periodically detect whether the operation of live streaming application program is safe, and the account for significantly reducing live streaming application program usurps rate, ensure that main broadcaster uses the safety of live streaming application program.

Description

A kind of network account guard method and system based on password control
Technical field
The present invention relates to network accounts to protect field, and in particular to a kind of network account guard method based on password control And system.
Background technique
Currently, live streaming platform can be provided on PC (personal computer, personal computer) it is a kind of for main broadcaster be broadcast live Software (application program), the software is for acquiring main broadcaster's video content and be broadcast live.When main broadcaster uses the software, need defeated Enter itself unique account and corresponding password is logged in.
Currently, the operating system program of PC generally uses Windows, and Windows provides a kind of Hook Mechanism, wherein Including keyboard hook program, which can be prior to getting all keyboard operations before application program.Therefore, if using straight Keyboard hook program is opened in the case where " ignorant " while broadcasting application program, then the publisher of hook program can obtain Know the account and password of the main broadcaster using current PC computer.
Therefore, the existing live streaming application program being installed on PC using when often there is the risk of steal-number, main broadcaster's makes It is difficult to ensure with safety.
Summary of the invention
In view of the deficiencies in the prior art, present invention solves the technical problem that are as follows: detection live streaming application program operation When the abnormal module that loads.Whether safely the present invention can periodically detect the operation of live streaming application program, significantly reduce live streaming and answer Rate is usurped with the account of program, ensure that main broadcaster uses the safety of live streaming application program.
To achieve the above objectives, the network account guard method provided by the invention based on password control, including following step It is rapid:
S1: needing all normal modules to be loaded when obtaining live streaming safety operation of applied program, and all normal modules are protected It deposits to form white list, goes to S2;
S2: all modules loaded when timing acquisition live streaming application program operation go to S3;
S3: it in all modules, after filtering out all normal modules in white list, obtains arranging except white list Remaining module except module in table, goes to S4;
S4: judge whether each remaining module is hook program respectively, if so, determining that current block is abnormal module, turn To S5;Otherwise determine that current block is normal mode block, goes to S5;
S5: judging whether current live application program runs and finish, if so, terminating, otherwise continues to execute S2.
The network account based on password control provided by the invention for realizing the above method protects system, including white list column Table obtains module, timing detection module, abnormal filtering module, abnormal investigation module and program use state monitoring module;
White list obtains module and is used for: needing all normal modes to be loaded when obtaining live streaming safety operation of applied program All normal modules are saved to form white list by block, detect signal to timing detection module transmission timing;
Timing detection module is used for: after receiving timing detection signal, what timing acquisition live streaming application program loaded when running All modules, Xiang Yichang filtering module send abnormal trap signal;
Abnormal filtering module is used for: after receiving abnormal trap signal, in all modules, filtering out white list In all normal modules after, obtain the remaining module in addition to the module in white list, sent to abnormal investigation module Abnormal investigation signal;
Abnormal investigation module is used for: after receiving abnormal investigation signal, judging whether each remaining module is hook journey respectively Sequence, if so, determining that current block is abnormal module, Xiang Chengxu use state monitoring module sends program use state monitoring letter Number;Otherwise determine that current block is normal mode block, Xiang Chengxu use state monitoring module sends program use state monitoring signal;
Program use state monitoring module is used for: after receiving program use state monitoring signal, judging timing detection module Whether the live streaming application program of detection, which runs, finishes, if so, terminating, otherwise detects signal to timing detection module transmission timing.
Compared with the prior art, the advantages of the present invention are as follows:
All modules for the loading when present invention understands timing acquisition live streaming application program operation, after filtering safe module, to surplus Remaining each module carries out detecting whether that there are hook programs, if so, proving that the module is abnormal module.Therefore, with it is existing Live streaming application program in technology there are steal-number risk is compared, and the present invention can periodically detect whether live streaming application program operation is pacified Entirely, the account for significantly reducing live streaming application program usurps rate, ensure that main broadcaster uses the safety of live streaming application program.
Detailed description of the invention
Fig. 1 is the flow chart of the network account guard method based on password control in the embodiment of the present invention.
Specific embodiment
Invention is further described in detail with reference to the accompanying drawings and embodiments.
It is shown in Figure 1, the network account guard method based on password control in the embodiment of the present invention, including following step It is rapid:
S1: needing all normal modules to be loaded when obtaining live streaming safety operation of applied program, and all normal modules are protected It deposits to form white list, goes to S2.
The acquisition process of all normal modules to be loaded is needed when safety operation of applied program being broadcast live in S1 are as follows: safety in advance A PC is authenticated, the operation live streaming application program on the PC obtains all modules of live streaming application program load, as normal mode Block (module that live streaming application program is loaded when running on the PC of safety, centainly need normal module to be loaded).
S2: add when application program operation is broadcast live by Windows api function EnumProcessModules timing acquisition All modules carried, go to S3.
S3: in all modules that S2 is obtained, filtering out all normal modules in white list, obtains except white list Remaining module except module in list, is further detected to go to S4.
S4: judging whether each remaining module is hook program respectively, if so, determining that current block is abnormal module, hair S5 is gone to after alarm (such as prompting the user whether to carry out checking and killing virus etc.) out, otherwise determines that current block is normal mode block, directly It is switched to S5.Since hook program inherently uses the function in Windows module User32.dll SetWindowsHookEx, therefore whether the present invention uses function SetWindowsHookEx by the remaining module of detection, if It is then to prove that current block is abnormal module, otherwise proves that current block is normal mode block.
S5: judging whether current live application program runs and finish, if so, terminating, otherwise continues to execute S2.
The detailed process of all modules loaded when live streaming application program operation is obtained in S2 are as follows:
S201: the handle hProcess of process corresponding with live streaming application program is obtained:
HANDLE hProcess=GetCurrentProcess ();
Wherein GetCurrentProcess represents the acquisition process handle API of Windows offer.
S202: according to the handle of process in S201, the handle of all modules of process load is obtained EnumProcessModules:
EnumProcessModules(
HANDLE hProcess,
HMODULE*lphModule,
DWORD cb,
LPDWORD lpcbNeeded);
Wherein parameter hProcess inserts the handle of the process obtained in S201, and parameter lphModule, which is represented, to be used to save The module handle list got, parameter cb represent the number of handles that lphModule can be stored;Parameter lpcbNeeded is represented The number of handles actually got.
S203: the corresponding module title of each handle is obtained by GetModuleFileNameEx:
GetModuleFileNameEx(
HANDLE hProcess,
HMODULE hModule,
LPTSTR lpFilename,
DWORD nSize);
Wherein parameter hProcess is identical as S202, the handle of all modules obtained in parameter hModule filling S202, Parameter lpFilename represents the corresponding module title of each handle, and parameter nSize represents the space size of lpFilename.
The principle whether remaining module uses function SetWindowsHookEx is detected in S4 are as follows: one module of detection makes When using which function, needs to read the importing table of the module, the function that the module uses is stored in importing table.In this base On plinth, the detailed process whether remaining module uses function SetWindowsHookEx is detected are as follows:
S401: according to the handle (hMoudle) of remaining module, obtaining the DOS head (DosHeader) of current residual module, The NT head (NtHeader) of current residual module is obtained according to DOS:
PIMAGE_DOS_HEADER pDosHeader=(PIMAGE_DOS_HEADER) hMoudle;
PIMAGE_NT_HEADERS pNtHeader=(PIMAGE_NT_HEADERS) (hMoudle+pDosHeader- > e_lfanew)。
S402: the importing table index (MAGE_DIRECTORY_ENTRY_IMPORT) of current residual module is determined, according to this Index obtains the importing table of current residual module;Determine starting of the importing table relative to the current residual module stored in NT The offset (dwIat) of memory address:
DWORD=pNtHeader- > OptionalHeader.DataDirectory [IMAGE_DIRECTORY_ENTRY_ IMP ORT].VirtualAddress。
S403: the current memory address (pImport) for importing table is determined according to dwIat:
PIMAGE_IMPORT_DESCRIPTOR pImport=(PIMAGE_IMPORT_DESCRIPTOR) (hMoudle+ dwIat)。
S404: the function used that current residual module uses is obtained in importing table, judges to whether there is in all functions Otherwise function SetWindowsHookEx proves to work as if so, proving that current block uses function SetWindowsHookEx Function SetWindowsHookEx is not used in front module.
The network account based on password control provided by the invention for realizing the above method protects system, including white list column Table obtains module, timing detection module, abnormal filtering module, abnormal investigation module and program use state monitoring module.
White list obtains module and is used for: needing all normal modes to be loaded when obtaining live streaming safety operation of applied program (one PC of advanced security authentication, the operation live streaming application program on the PC, obtains all moulds of live streaming application program load to block Block), all normal modules are saved to form white list, detect signal to timing detection module transmission timing.
Timing detection module is used for: after receiving timing detection signal, what timing acquisition live streaming application program loaded when running All modules (obtain the handle of process corresponding with live streaming application program;According to the handle of the process, process load is obtained The handle of all modules;Obtain the corresponding module title of each handle), Xiang Yichang filtering module sends abnormal trap signal.
Abnormal filtering module is used for: after receiving abnormal trap signal, in all modules, filtering out white list In all normal modules after, obtain the remaining module in addition to the module in white list, sent to abnormal investigation module Abnormal investigation signal.
Abnormal investigation module is used for: after receiving abnormal investigation signal, judging whether each remaining module is hook journey respectively Whether sequence (uses function SetWindowsHookEx), if so, determining that current block is abnormal module, issues Xiang Cheng after alarm Sequence use state monitoring module sends program use state monitoring signal;Otherwise determine that current block is normal mode block, Xiang Chengxu Use state monitoring module sends program use state monitoring signal;Detailed process are as follows:
According to the handle of remaining module, the DOS head of current residual module is obtained, according to DOS acquisition current residual modules NT head, storage has the starting memory address of current residual module in NT;Determine the importing table index of current residual module, root The importing table of current residual module is obtained according to the index;Determine starting memory address of the importing table relative to current residual module Offset;
According to offset of the table relative to the starting memory address of current residual module is imported, the current memory for importing table is determined Address;The function used that current residual module uses is obtained in importing table, is judged in all functions with the presence or absence of function Otherwise SetWindowsHookEx proves current mould if so, proving that current block uses function SetWindowsHookEx Function SetWindowsHookEx is not used in block.
Program use state monitoring module is used for: after receiving program use state monitoring signal, judging timing detection module Whether the live streaming application program of detection, which runs, finishes, if so, terminating, otherwise detects signal to timing detection module transmission timing.
The present invention is not limited to the above-described embodiments, for those skilled in the art, is not departing from Under the premise of the principle of the invention, several improvements and modifications can also be made, these improvements and modifications are also considered as protection of the invention Within the scope of.The content being not described in detail in this specification belongs to the prior art well known to professional and technical personnel in the field.

Claims (10)

1. a kind of network account guard method based on password control, which is characterized in that method includes the following steps:
S1: needing all normal modules to be loaded when obtaining live streaming safety operation of applied program, and all normal modules are saved shape At white list, S2 is gone to;
S2: all modules loaded when timing acquisition live streaming application program operation go to S3;
S3: it in all modules, after filtering out all normal modules in white list, obtains except in white list Module except remaining module, go to S4;
S4: judging whether each remaining module is keyboard hook program respectively, if the remaining module of judgement is keyboard hook program, It then determines that current block is abnormal module, goes to S5 after issuing alarm;If the remaining module of judgement is not keyboard hook program, It determines that current block is normal mode block, goes to S5;
S5: Xiang Chengxu use state monitoring module sends program use state monitoring signal, for judging that application program, which is broadcast live, is No operation finishes, if so, terminating, otherwise continues to execute S2.
2. as described in claim 1 based on the network account guard method of password control, it is characterised in that: be broadcast live described in S1 The acquisition process of all normal modules to be loaded is needed when safety operation of applied program are as follows: one PC of pre-authentication, on the PC Operation live streaming application program, obtains all modules of live streaming application program load, all modules are normal module.
3. as described in claim 1 based on the network account guard method of password control, it is characterised in that: obtained described in S2 The detailed process of all modules loaded when live streaming application program operation are as follows:
S201: the handle of process corresponding with live streaming application program is obtained;
S202: according to the handle of the process, the handle of all modules of process load is obtained;
S203: the corresponding module title of each handle is obtained.
4. as described in claim 1 based on the network account guard method of password control, it is characterised in that: the detailed process of S4 Are as follows: detect whether each remaining module uses function SetWindowsHookEx respectively, if so, determining that current block is different Otherwise norm block determines that current block is normal mode block.
5. as claimed in claim 4 based on the network account guard method of password control, it is characterised in that: detected described in S4 Whether each residue module uses the detailed process of function SetWindowsHookEx are as follows:
S401: according to the handle of remaining module, the DOS head of current residual module is obtained, according to DOS acquisition current residual modules NT head, storage has the starting memory address of current residual module in NT;
S402: determining the importing table index of current residual module, and the importing table of current residual module is obtained according to the index;It determines Offset of the importing table relative to the starting memory address of current residual module;
S403: according to offset of the table relative to the starting memory address of current residual module is imported, the interior of current importing table is determined Deposit address;
S404: all functions that current residual module uses are obtained in importing table, are judged in all functions with the presence or absence of function Otherwise SetWindowsHookEx proves current mould if so, proving that current block uses function SetWindowsHookEx Function SetWindowsHookEx is not used in block.
6. a kind of network account protection system based on password control for realizing any one of claim 1 to 5 the method, special Sign is, the system include white list obtain module, timing detection module, abnormal filtering module, abnormal investigation module and Program use state monitoring module;
White list obtains module and is used for: all normal modules to be loaded are needed when obtaining live streaming safety operation of applied program, All normal modules are saved to form white list, detect signal to timing detection module transmission timing;
Timing detection module is used for: after receiving timing detection signal, timing acquisition live streaming application program loads all when running Module, Xiang Yichang filtering module send abnormal trap signal;
Abnormal filtering module is used for: after receiving abnormal trap signal, in all modules, being filtered out in white list After all normal modules, the remaining module in addition to the module in white list is obtained, is sent to abnormal investigation module abnormal Check signal;
Abnormal investigation module is used for: after receiving abnormal investigation signal, judging whether each remaining module is keyboard hook journey respectively Sequence, if the remaining module of judgement is keyboard hook program, it is determined that current block is abnormal module, the monitoring of Xiang Chengxu use state Module sends program use state monitoring signal;If the remaining module of judgement is not keyboard hook program, it is determined that current block For normal mode block, Xiang Chengxu use state monitoring module sends program use state monitoring signal;
Program use state monitoring module is used for: after receiving program use state monitoring signal, judging that timing detection module detects Live streaming application program whether run and finish, if so, terminating, otherwise detect signal to timing detection module transmission timing.
7. the network account based on password control protects system as claimed in claim 6, it is characterised in that: the white list column Table obtains the workflow that all normal modules to be loaded are needed when module obtains live streaming safety operation of applied program are as follows: recognizes in advance A PC is demonstrate,proved, the operation live streaming application program on the PC obtains all modules of live streaming application program load, all modules It is normal module.
8. the network account based on password control protects system as claimed in claim 6, it is characterised in that: the timing detection The detailed process of all modules loaded when live streaming application program operation is obtained in module are as follows: obtain corresponding with live streaming application program The handle of process;According to the handle of the process, the handle of all modules of process load is obtained;It is corresponding to obtain each handle Module title.
9. the network account based on password control protects system as claimed in claim 6, it is characterised in that: the abnormal investigation The specific workflow of module are as follows: detect whether each remaining module uses function SetWindowsHookEx respectively, if so, It then determines that current block is abnormal module, otherwise determines that current block is normal mode block.
10. the network account based on password control protects system as claimed in claim 9, it is characterised in that: the abnormal row It looks into module and detects the detailed process whether each remaining module uses function SetWindowsHookEx are as follows:
According to the handle of remaining module, the DOS head of current residual module is obtained, the NT of current residual module is obtained according to DOS Head, storage has the starting memory address of current residual module in NT;The importing table index for determining current residual module, according to this Index obtains the importing table of current residual module;Determine that the importing table originates the inclined of memory address relative to current residual module It moves;
According to offset of the table relative to the starting memory address of current residual module is imported, with determining the current memory for importing table Location;All functions that current residual module uses are obtained in importing table, are judged in all functions with the presence or absence of function Otherwise SetWindowsHookEx proves current mould if so, proving that current block uses function SetWindowsHookEx Function SetWindowsHookEx is not used in block.
CN201610841169.9A 2016-09-22 2016-09-22 A kind of network account guard method and system based on password control Expired - Fee Related CN106446684B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610841169.9A CN106446684B (en) 2016-09-22 2016-09-22 A kind of network account guard method and system based on password control

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610841169.9A CN106446684B (en) 2016-09-22 2016-09-22 A kind of network account guard method and system based on password control

Publications (2)

Publication Number Publication Date
CN106446684A CN106446684A (en) 2017-02-22
CN106446684B true CN106446684B (en) 2019-12-03

Family

ID=58167345

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610841169.9A Expired - Fee Related CN106446684B (en) 2016-09-22 2016-09-22 A kind of network account guard method and system based on password control

Country Status (1)

Country Link
CN (1) CN106446684B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102663318A (en) * 2012-03-22 2012-09-12 百度在线网络技术(北京)有限公司 Browser and client
CN102999726A (en) * 2012-12-14 2013-03-27 北京奇虎科技有限公司 File macro virus immunization method and device
CN103034809A (en) * 2012-12-14 2013-04-10 北京奇虎科技有限公司 Method and device for immunizing file macro virus
CN104536981A (en) * 2014-12-05 2015-04-22 北京奇虎科技有限公司 Browser safety achieving method, browser client-side and device
CN105844146A (en) * 2016-03-16 2016-08-10 北京金山安全软件有限公司 Method and device for protecting driver and electronic equipment

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101114323A (en) * 2006-07-28 2008-01-30 上海山丽信息安全有限公司 Device for monitoring keyboard hook
US20080247746A1 (en) * 2007-04-05 2008-10-09 David Law Tripod Mounting, Stand, or Support Attachment, Accessory, or Mechanism for Cameras and Similar Devices or Objects
CN101483658B (en) * 2009-01-09 2012-11-28 招商银行股份有限公司 System and method for input content protection of browser
CN102866893B (en) * 2012-09-24 2014-11-26 南京工业大学 Legacy software structure extracting method based on intermediate language IL
CN103034800B (en) * 2012-12-14 2017-06-20 北京奇虎科技有限公司 Device and a method for intercepting pop-up windows
CN105069351A (en) * 2015-07-23 2015-11-18 浪潮电子信息产业股份有限公司 Apparatus and method for preventing stealing of login information of application program

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102663318A (en) * 2012-03-22 2012-09-12 百度在线网络技术(北京)有限公司 Browser and client
CN102999726A (en) * 2012-12-14 2013-03-27 北京奇虎科技有限公司 File macro virus immunization method and device
CN103034809A (en) * 2012-12-14 2013-04-10 北京奇虎科技有限公司 Method and device for immunizing file macro virus
CN104536981A (en) * 2014-12-05 2015-04-22 北京奇虎科技有限公司 Browser safety achieving method, browser client-side and device
CN105844146A (en) * 2016-03-16 2016-08-10 北京金山安全软件有限公司 Method and device for protecting driver and electronic equipment

Also Published As

Publication number Publication date
CN106446684A (en) 2017-02-22

Similar Documents

Publication Publication Date Title
US11914693B2 (en) Fingerprint recognition method and apparatus, and touchscreen terminal
CN102624677B (en) Method and server for monitoring network user behavior
CN102413221B (en) Method for protecting privacy information and mobile terminal
CN109829297A (en) Monitoring device, method and its computer storage medium
CN107792009A (en) Vehicle starting method and device based on driver identity certification
EP2278523A3 (en) Network access protection
CN109413091A (en) A kind of network security monitoring method and apparatus based on internet-of-things terminal
CN106656455B (en) Website access method and device
CN102413220B (en) Method for controlling right of using connection function and mobile terminal
CN105589647A (en) Unlocking system and method
CN104063642A (en) Intelligent terminal safety authentication method and device based on pressure sensor
CN105184135A (en) Fingerprint recognition method and fingerprint recognition system
CN101561855B (en) Method and system for controlling computer to access USB device
CN105701386A (en) Security certification method and device
WO2019071810A1 (en) Device unlocking control method, apparatus, device and storage medium
CN105530637A (en) Method for protecting subscriber privacy of intelligent terminal and intelligent terminal
CN106446684B (en) A kind of network account guard method and system based on password control
CN106598661A (en) Method and system for dynamically updating plug-in
CN106599843A (en) Fingerprint authentication method and device
CN109284636A (en) A kind of webpage tamper resistant systems and method
CN104754574A (en) SIM card, anti-cloning method thereof and device
CN102968588B (en) Intelligent terminal system
CN104937602B (en) Privacy protection method and electronic equipment
CN111212041B (en) Mobile storage medium illegal external connection alarm system and method
CN103916391B (en) A kind of method and system preventing illegal external connection

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20191203