CN109033820A - User rs credentials guard method, device and equipment - Google Patents

User rs credentials guard method, device and equipment Download PDF

Info

Publication number
CN109033820A
CN109033820A CN201810701188.0A CN201810701188A CN109033820A CN 109033820 A CN109033820 A CN 109033820A CN 201810701188 A CN201810701188 A CN 201810701188A CN 109033820 A CN109033820 A CN 109033820A
Authority
CN
China
Prior art keywords
user
credentials
reading process
safety detection
detection result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810701188.0A
Other languages
Chinese (zh)
Inventor
何博
彭岩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201810701188.0A priority Critical patent/CN109033820A/en
Publication of CN109033820A publication Critical patent/CN109033820A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/031Protect user input by software means

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The present invention provides a kind of user rs credentials guard method, device and equipment, wherein this method comprises: being read out when monitor user rs credentials, obtains reading process;Safety detection is carried out to the reading process, obtains safety detection result;Security protection processing is carried out to the user rs credentials according to safety detection result.The protection to user rs credentials may be implemented in technical solution provided by the invention, reduces threat suffered by the property and terminal security of user.

Description

User rs credentials guard method, device and equipment
Technical field
The present invention relates to field of computer technology more particularly to a kind of user rs credentials guard methods, device and equipment.
Background technique
Authority management is the function that Windows is provided, in Windows system, when user inputs user for the first time When name and password are to access certain server, these access authoritys can be stored in local by the authority manager of Windows, When accessing the server again in this way, windows, which will make a spontaneous offer to help, completes the verification process of authority, with user-friendly.
However, Microsoft is there is no excessive protection is done to the user rs credentials locally saved, some rogue programs can in this way With the interface provided by Microsoft, these authoritys are directly read, steal use, the property and terminal security to user are brought seriously It threatens.
Summary of the invention
In view of this, the present invention provides a kind of user rs credentials guard method, device and equipment, for carrying out to user rs credentials Security protection.
To achieve the goals above, in a first aspect, the embodiment of the present invention provides a kind of user rs credentials guard method, comprising:
It is read out when monitoring user rs credentials, obtains reading process;
Safety detection is carried out to the reading process, obtains safety detection result;
Security protection processing is carried out to the user rs credentials according to safety detection result.
By being read out monitoring user rs credentials, reading process is obtained;Safety detection, root are carried out to the process of reading Security protection processing is carried out to user rs credentials according to safety detection result, the protection to user rs credentials may be implemented, reduce user Property and terminal security suffered by threat.
As a kind of optional embodiment of the embodiment of the present invention, it is read out described when monitoring user rs credentials, obtains Before the process of reading, the method also includes;
Monitor preset application programming interface api function;
When monitor any one api function in the preset api function it is called when, determine the user rs credentials It is read.
By monitoring preset api function, it can timely find the operation for reading user rs credentials, improve user rs credentials Safety.
As a kind of optional embodiment of the embodiment of the present invention, the preset api function includes: that reading process is being read Take all api functions that can be called when the user rs credentials.
It can be improved in this way and read the comprehensive of process detection, and then improve the safety of user rs credentials.
As a kind of optional embodiment of the embodiment of the present invention, the preset api function includes: that authority collection enumerates letter Number, domain authority function reading and best authority collection search function.
It is described that safety detection is carried out to the reading process as a kind of optional embodiment of the embodiment of the present invention, Obtain safety detection result, comprising:
Extract the characteristic information of the reading process;
The reading process is matched with the characteristic information in preset black and white lists;
The safety detection result is determined according to matching result.
Safety detection is carried out by using feature matching method, the standard of reading process safety detection result can be improved True property.
As a kind of optional embodiment of the embodiment of the present invention, it is described according to safety detection result to the user with According to progress security protection processing, comprising:
When the safety detection result indicates that the reading process is risk process, indicating risk information is exported, and It prompts the user whether to prevent the reading process;
When receiving the instruction of the prevention reading process of user, prevent the reading process continue to read user with According to.
In above embodiment, instruction determines how processing reading process depending on the user's operation, can be in protection user While authority, user experience is improved.
As a kind of optional embodiment of the embodiment of the present invention, the method also includes:
Pop-up provides the interface of overall killing, whether carries out overall killing to system for selection by the user.
Interface by providing overall killing is selected for user, can preferably be protected comprehensively to system, and improve User experience.
Second aspect, the embodiment of the present invention provide a kind of user rs credentials protective device, comprising:
Module is obtained, is read out for user rs credentials ought to be monitored, reading process is obtained;
Detection module, the reading process for obtaining to the acquisition module carry out safety detection, obtain safety inspection Survey result;
Processing module, the safety detection result for being detected according to detection module carry out safety to the user rs credentials Protective treatment.
As a kind of optional embodiment of the embodiment of the present invention, described device further includes;
Monitoring module, for monitoring preset application programming interface api function;When monitoring the preset API When any one api function in function is called, determine that the user rs credentials are read.
As a kind of optional embodiment of the embodiment of the present invention, the preset api function includes: that reading process is being read Take all api functions that can be called when the user rs credentials.
As a kind of optional embodiment of the embodiment of the present invention, the preset api function includes: that authority collection enumerates letter Number, domain authority function reading and best authority collection search function.
As a kind of optional embodiment of the embodiment of the present invention, the detection module is specifically used for:
Extract the characteristic information for the reading process that the acquisition module obtains;
The reading process is matched with the characteristic information in preset black and white lists;
The safety detection result is determined according to matching result.
As a kind of optional embodiment of the embodiment of the present invention, described device further include: cue module, the processing mould Block is specifically used for:
When the safety detection result that the detection module detects indicates that the reading process is risk process, instruction The cue module exports indicating risk information, and prompts the user whether to prevent the reading process;
When receiving the instruction of the prevention reading process of user, prevent the reading process continue to read user with According to.
As a kind of optional embodiment of the embodiment of the present invention, the cue module is also used to:
Pop-up provides the interface of overall killing, whether carries out overall killing to system for selection by the user.
Device provided by each possible embodiment of above-mentioned second aspect and above-mentioned second aspect, its advantages It may refer to beneficial effect brought by each possible embodiment of above-mentioned first aspect and first aspect, it is no longer superfluous herein It states.
The third aspect, the embodiment of the present invention provide a kind of user rs credentials protection equipment, comprising: memory and processor are deposited Reservoir is for storing computer program;Processor is for executing above-mentioned first aspect or first aspect when calling computer program Any embodiment described in method.
Equipment provided by each possible embodiment of the above-mentioned third aspect and the above-mentioned third aspect, its advantages It may refer to beneficial effect brought by each possible embodiment of above-mentioned first aspect and first aspect, it is no longer superfluous herein It states.
Fourth aspect, the embodiment of the present invention provide a kind of computer readable storage medium, are stored thereon with computer program, Method described in any embodiment of above-mentioned first aspect or first aspect is realized when computer program is executed by processor.
Computer-readable storage provided by each possible embodiment of above-mentioned fourth aspect and above-mentioned fourth aspect Medium, its advantages may refer to brought by each possible embodiment of above-mentioned first aspect and first aspect beneficial to effect Fruit, details are not described herein.
Detailed description of the invention
Fig. 1 is the flow diagram of user rs credentials guard method provided in an embodiment of the present invention;
Fig. 2 is a kind of prompting interface schematic diagram provided in an embodiment of the present invention;
Fig. 3 is the structural schematic diagram of user rs credentials protective device provided in an embodiment of the present invention;
Fig. 4 is the structural schematic diagram that user rs credentials provided in an embodiment of the present invention protect equipment.
Specific embodiment
The information preservations such as the username and password that Windows authority manager inputs when can be by user access server exist It is local, to access the verification process for being automatically performed authority when the server again.It is stored in what the authority of ontology was generally shown Inside have: the information such as station address, username and password.
And the interface that some rogue programs can be provided by Microsoft, directly read these authoritys.Windows XP and with System afterwards, attacker generally can directly acquire user rs credentials by the following two kinds mode: the first, it is enumerated by authority collection Function (CredEnumerate) enumerates the associated all authoritys of current account;Second, pass through domain authority function reading (CredReadDomainCredentials), the associated domain authority of current account is read.Windows Vista and later it is System, attacker can search for from authority manager by best authority collection search function (CredFindBestCredential) and Current login sessions association and the general authority collection for being best suitable for specified target resource.
After rogue program usurps these authoritys, it is possible to carry out some illegal operations or extort user, thus can be to use The property and terminal security at family, which are brought, to be seriously threatened.
In order to solve the above-mentioned technical problem, the embodiment of the present invention provides a kind of user rs credentials guard method, device and equipment, Mainly by being read out monitoring user rs credentials, reading process is obtained;Safety detection is carried out to the process of reading, according to peace Full property testing result, which carries out security protection processing to user rs credentials, reduces the property of user to realize the protection to user rs credentials With threat suffered by terminal security.
With reference to the accompanying drawing, the embodiment of the present invention is described.
Fig. 1 is the flow diagram of user rs credentials guard method provided in an embodiment of the present invention, the executing subject of this method It can be user rs credentials protective device or equipment.As shown in Figure 1, method provided in this embodiment may include steps of:
S101, it is read out when monitoring user rs credentials, obtains reading process.
In the present embodiment, in order to protect user rs credentials, the read operation of user rs credentials is monitored.It is implementing When, preset application programming interface (Application Programming Interface, API) function can be monitored; When monitor any one api function in preset api function it is called when, determine that user rs credentials are read.
Wherein, preset api function includes: all api functions that reading process can be called when reading user rs credentials.Tool Body, preset api function may include: authority collection enumeration function (CredEnumerate), domain authority function reading (CredReadDomainCredentials) and best authority collection search function (CredFindBestCredential).Wherein, CredEnumerate function includes: again specifically CredEnumerateA function and CredEnumerateW function, CredReadDomainCredentials function specifically includes: CredReadDomainCredentialsA function and CredReadDomainCredentialsW function, CredFindBestCredential function specifically include CredFindBestCredentialA function and CredFindBestCredentialW function.
When monitor in above-mentioned preset api function any one it is called when, obtain the reading for reading user rs credentials Process, it is, obtaining the process for calling above-mentioned api function.
S102, safety detection is carried out to the process of reading, obtains safety detection result.
Specifically, wooden horse killing engine can be called to detect the safety of the reading process after getting reading process, It determines that this inserts reading process whether after safety by safety detection result, then determines how to handle the reading behaviour of the reading process Make.
In specific detection, the characteristic information of reading process can be first extracted;Process and preset black and white name will be read again Characteristic information in list is matched;Then safety detection result is determined according to matching result.
Wherein, the characteristic information for reading process may include the title of reading process, message digest algorithm (Message Digest Algorithm 5, MD5) value, size, content, signature and version information etc..
It can store the characteristic information of risk process in black and white lists, also can store the characteristic information of security procedure, also The characteristic information of risk process and security procedure can be stored simultaneously, this is not specially limited in the present embodiment.
It, can be according to a spy when being matched the characteristic information for the process that reads with the characteristic information in black and white lists Reference breath (such as signature) is matched, can also using multiple characteristic informations (such as: title, MD5 value, signature and version) into Row matching;When being matched using multiple characteristic informations, it can be multiple characteristic informations and all match expression successful match, The characteristic information that can be preset quantity in multiple characteristic informations matches i.e. expression successful match, specifically can be according to practical need It was determined that the present embodiment is not specially limited this.
For storing the characteristic information of risk process in black and white lists, when successful match, indicates current and read user The reading process of authority is risk process;When matching unsuccessful, indicates that the reading process of user rs credentials is security procedure, that is, pacify Full property testing result can indicate that reading process is risk process or security procedure.
S103, security protection processing is carried out to user rs credentials according to safety detection result.
After obtaining safety detection result, so that it may carry out security protection to user rs credentials according to safety detection result Processing.
Specifically, reading process can be prevented to continue when safety detection result instruction reading process is risk process User rs credentials are read, or indicating risk information can also be exported, and prompt the user whether to prevent reading process;Receiving use When the instruction of the prevention reading process at family, reading process is prevented to continue to read user rs credentials, so as in the same of protection user rs credentials When, promote user experience.
It when being prompted, can be prompted by the way of pop-up, can also be prompted, can also be used using voice mode Pop-up adds the other modes such as voice to prompt.Fig. 2 is a kind of prompting interface schematic diagram provided in an embodiment of the present invention, as shown in Fig. 2, A kind of interface schematic diagram of pop-up is illustratively shown in figure, can show indicating risk information in pop-up, such as can wrap Include title: " having program obtaining your account number cipher, it is proposed that prevent " and specific suggestion content: " account number cipher is by suspicious journey Sequence is read, and be may result in the relevant content of your account and is falsely used and stolen, cause damages to you, actively awards if not you Power is established and is prevented ".Wherein, it can also include the relevant information of reading process in specific suggestion content, such as can show: " can Doubt program: C Trojan.exe ".The option of operation of prevention reading process is prompted the user whether in pop-up together, such as: " permission " and " prevention ";In order to facilitate user's use, it is also an option that one of option of operation does not receive as preset time " prevention " to the default selection of user operation instruction, such as in figure can show the remaining selection time in option of operation.Bullet It can also show that other improve the information of user experience in window, such as: the pop-up upper right corner can show close button "×", supply User clicks to close pop-up, and the present embodiment is without limitation.
In the present embodiment, when safety detection result instruction reading process is risk process, illustrate that there are wind in system Dangerous file can provide the interface of overall killing at this time with pop-up, whether carry out overall killing to system for selection by the user, with Just preferably system is protected.
Wherein, the interface of overall killing can merge display in above-mentioned pop-up shown in Fig. 2, can also increase by one newly Pop-up show that specific implementation the present embodiment is not specially limited.
When user selects the interface of overall killing, equipment will call each killing engine to be scanned whole drives.
User rs credentials guard method provided in this embodiment is obtained and is read by being read out monitoring user rs credentials Process;Safety detection is carried out to the process of reading, security protection processing is carried out to user rs credentials according to safety detection result, it can To realize the protection to user rs credentials, threat suffered by the property and terminal security of user is reduced.
Fig. 3 is the structural schematic diagram of user rs credentials protective device provided in an embodiment of the present invention, as shown in figure 3, this implementation Example provide device include:
Module 110 is obtained, is read out for user rs credentials ought to be monitored, reading process is obtained;
Detection module 120 obtains safety for carrying out safety detection to the reading process for obtaining the acquisition of module 110 Testing result;
Processing module 130, the safety detection result for being detected according to detection module 120 pacify user rs credentials Full protection processing.
As a kind of optional embodiment of the embodiment of the present invention, device further includes;
Monitoring module 140, for monitoring preset application programming interface api function;When monitoring preset API letter When any one api function in number is called, determine that user rs credentials are read.
As a kind of optional embodiment of the embodiment of the present invention, preset api function includes: that reading process is reading use All api functions that can be called when the authority of family.
As a kind of optional embodiment of the embodiment of the present invention, preset api function include: authority collection enumeration function, Domain authority function reading and best authority collection search function.
As a kind of optional embodiment of the embodiment of the present invention, detection module 120 is specifically used for:
Extract the characteristic information for obtaining the reading process that module 110 obtains;
Reading process is matched with the characteristic information in preset black and white lists;
Safety detection result is determined according to matching result.
As a kind of optional embodiment of the embodiment of the present invention, device further include: cue module 150, processing module 130 It is specifically used for:
When the safety detection result instruction reading process that detection module 120 detects is risk process, instruction prompt Module 150 exports indicating risk information, and prompts the user whether to prevent reading process;
When receiving the instruction of prevention reading process of user, reading process is prevented to continue to read user rs credentials.
As a kind of optional embodiment of the embodiment of the present invention, cue module 150 is also used to:
Pop-up provides the interface of overall killing, whether carries out overall killing to system for selection by the user.
User rs credentials protective device provided in an embodiment of the present invention can be individual equipment, also can integrate user with According in protection equipment, the present embodiment is not specially limited this.
User rs credentials protective device provided in this embodiment can execute above method embodiment, realize philosophy and technique Effect is similar, and details are not described herein again.
Fig. 4 is the structural schematic diagram that user rs credentials provided in an embodiment of the present invention protect equipment, as shown in figure 4, this implementation The user rs credentials protection equipment that example provides includes: memory 210 and processor 220, and memory 210 is for storing computer journey Sequence;Processor 220 is used to execute method described in above method embodiment when calling computer program.
User rs credentials protection equipment provided in this embodiment can execute above method embodiment, realize philosophy and technique Effect is similar, and details are not described herein again.
The embodiment of the present invention also provides a kind of computer readable storage medium, is stored thereon with computer program, computer Method described in above method embodiment is realized when program is executed by processor.
It will be understood by those skilled in the art that embodiments herein can provide as the production of method, system or computer program Product.Therefore, complete hardware embodiment, complete software embodiment or implementation combining software and hardware aspects can be used in the application The form of example.Moreover, can be used can in the computer that one or more wherein includes computer usable program code by the application With the form for the computer program product implemented on storage medium.
The application is referring to method, the process of equipment (system) and computer program product according to the embodiment of the present application Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
In a typical configuration, calculating equipment includes one or more processors (CPU), input/output interface, net Network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/ Or the forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable Jie The example of matter.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM), Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including element There is also other identical elements in process, method, commodity or equipment.
Finally, it should be noted that the above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent Pipe present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: its according to So be possible to modify the technical solutions described in the foregoing embodiments, or to some or all of the technical features into Row equivalent replacement;And these are modified or replaceed, various embodiments of the present invention technology that it does not separate the essence of the corresponding technical solution The range of scheme.

Claims (10)

1. a kind of user rs credentials guard method characterized by comprising
It is read out when monitoring user rs credentials, obtains reading process;
Safety detection is carried out to the reading process, obtains safety detection result;
Security protection processing is carried out to the user rs credentials according to safety detection result.
2. being obtained the method according to claim 1, wherein being read out described when monitoring user rs credentials Before reading process, the method also includes;
Monitor preset application programming interface api function;
When monitor any one api function in the preset api function it is called when, determine that the user rs credentials are read It takes.
3. according to the method described in claim 2, it is characterized in that, the preset api function includes: that reading process is being read All api functions that can be called when the user rs credentials.
4. according to the method described in claim 3, it is characterized in that, the preset api function includes: that authority collection enumerates letter Number, domain authority function reading and best authority collection search function.
5. being obtained the method according to claim 1, wherein described carry out safety detection to the reading process To safety detection result, comprising:
Extract the characteristic information of the reading process;
The reading process is matched with the characteristic information in preset black and white lists;
The safety detection result is determined according to matching result.
6. method according to claim 1-5, which is characterized in that it is described according to safety detection result to described User rs credentials carry out security protection processing, comprising:
When the safety detection result indicates that the reading process is risk process, indicating risk information is exported, and prompt Whether user prevents the reading process;
When receiving the instruction of the prevention reading process of user, the reading process is prevented to continue to read user rs credentials.
7. according to the method described in claim 6, it is characterized in that, the method also includes:
Pop-up provides the interface of overall killing, whether carries out overall killing to system for selection by the user.
8. a kind of user rs credentials protective device characterized by comprising
Module is obtained, is read out for user rs credentials ought to be monitored, reading process is obtained;
Detection module obtains safety detection result for carrying out safety detection to the reading process;
Processing module, for carrying out security protection processing to the user rs credentials according to safety detection result.
9. a kind of user rs credentials protect equipment characterized by comprising memory and processor, the memory is for storing Computer program;The processor is used to executed when calling the computer program as claim 1-7 is described in any item Method.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program The method according to claim 1 to 7 is realized when being executed by processor.
CN201810701188.0A 2018-06-29 2018-06-29 User rs credentials guard method, device and equipment Pending CN109033820A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810701188.0A CN109033820A (en) 2018-06-29 2018-06-29 User rs credentials guard method, device and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810701188.0A CN109033820A (en) 2018-06-29 2018-06-29 User rs credentials guard method, device and equipment

Publications (1)

Publication Number Publication Date
CN109033820A true CN109033820A (en) 2018-12-18

Family

ID=65521019

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810701188.0A Pending CN109033820A (en) 2018-06-29 2018-06-29 User rs credentials guard method, device and equipment

Country Status (1)

Country Link
CN (1) CN109033820A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113536307A (en) * 2021-06-10 2021-10-22 安徽安恒数智信息技术有限公司 Identification method and system of credential scanning process

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101408917A (en) * 2008-10-22 2009-04-15 厦门市美亚柏科资讯科技有限公司 Method and system for detecting application program behavior legality
CN103679035A (en) * 2012-09-24 2014-03-26 腾讯科技(深圳)有限公司 Safety detection method and device
CN104156661A (en) * 2014-07-26 2014-11-19 珠海市君天电子科技有限公司 Device and method for preventing account passwords from being tampered
US20150319183A1 (en) * 2009-04-22 2015-11-05 Trusted Knight Corporation System and method for protecting against point of sale malware using memory scraping

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101408917A (en) * 2008-10-22 2009-04-15 厦门市美亚柏科资讯科技有限公司 Method and system for detecting application program behavior legality
US20150319183A1 (en) * 2009-04-22 2015-11-05 Trusted Knight Corporation System and method for protecting against point of sale malware using memory scraping
CN103679035A (en) * 2012-09-24 2014-03-26 腾讯科技(深圳)有限公司 Safety detection method and device
CN104156661A (en) * 2014-07-26 2014-11-19 珠海市君天电子科技有限公司 Device and method for preventing account passwords from being tampered

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113536307A (en) * 2021-06-10 2021-10-22 安徽安恒数智信息技术有限公司 Identification method and system of credential scanning process

Similar Documents

Publication Publication Date Title
US11126716B2 (en) System security method and apparatus
JP6703616B2 (en) System and method for detecting security threats
CN106156619B (en) Application security protection method and device
CN112487383B (en) Computer system for guaranteeing information security and control method thereof
WO2016015680A1 (en) Security detection method and security detection apparatus for mobile terminal input window
WO2015124018A1 (en) Method and apparatus for application access based on intelligent terminal device
CN110933104B (en) Malicious command detection method, device, equipment and medium
US20210234877A1 (en) Proactively protecting service endpoints based on deep learning of user location and access patterns
CN105303107A (en) Abnormal process detection method and apparatus
CN110245495B (en) BIOS checking method, configuration method, device and system
CN105930726B (en) A kind of processing method and user terminal of malicious operation behavior
DK2767922T3 (en) Password Verification System
US9152790B1 (en) Systems and methods for detecting fraudulent software applications that generate misleading notifications
CN106844097A (en) A kind of means of defence and device for malice encryption software
CN104915594B (en) Application program operation method and device
CN106603230B (en) A kind of DRM key saves, read method and preservation, reads system
CN111767537A (en) Tamper verification method of application program based on IOS (operating system) and related equipment
WO2016197827A1 (en) Method and apparatus for processing malicious bundled software
CN109033820A (en) User rs credentials guard method, device and equipment
CN114417326A (en) Abnormality detection method, abnormality detection device, electronic apparatus, and storage medium
CN110020531A (en) Internet of things equipment risk checking method and device
US8375460B2 (en) Electronic device and method of protecting software
CN106991307A (en) Using time slot scrambling and device
CN108197475B (en) Malicious so module detection method and related device
CN108959937A (en) Plug-in unit processing method, device and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181218