CN109614797A - Software checking and killing method, device and equipment are extorted in the screen locking of vehicle-mounted information and entertainment system - Google Patents
Software checking and killing method, device and equipment are extorted in the screen locking of vehicle-mounted information and entertainment system Download PDFInfo
- Publication number
- CN109614797A CN109614797A CN201811534936.7A CN201811534936A CN109614797A CN 109614797 A CN109614797 A CN 109614797A CN 201811534936 A CN201811534936 A CN 201811534936A CN 109614797 A CN109614797 A CN 109614797A
- Authority
- CN
- China
- Prior art keywords
- software
- vehicle
- extorted
- screen locking
- killing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/033—Test or assess software
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Virology (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- User Interface Of Digital Computer (AREA)
- Fittings On The Vehicle Exterior For Carrying Loads, And Devices For Holding Or Mounting Articles (AREA)
Abstract
Embodiment of the invention discloses a kind of screen lockings of vehicle-mounted information and entertainment system to extort software checking and killing method, device, equipment and computer readable storage medium, wherein, this method comprises: instructing in response to software installation, which, which is included in sandbox, installs the corresponding software to be installed of software installation instruction;The dry run software to be installed in sandbox;Intercept the front-end interface figure of software to be installed;Whether comprising extorting text information in identification front-end interface figure, if so, being that software is extorted in screen locking by software tags to be installed.The present invention cultivates detection screen locking using sandbox and extorts software, sandbox cultivating system includes the front-end operations functions such as software installation, simulation click, screenshotss, and the information processing function for intercepted picture, the deficiency of traditional killing scheme is compensated for, has very strong perspective and practicability.With the mode of text information detection wooden horse, the limitation of the relevant technologies is surmounted, can speculate the intention of application program more accurately.
Description
Technical field
The present invention relates to technical field of vehicle, in particular to a kind of vehicle-mounted information and entertainment system screen locking extort it is soft
Part checking and killing method, a kind of screen locking of vehicle-mounted information and entertainment system extort software killing device, a kind of vehicle-mounted information and entertainment system
Software killing equipment, a kind of computer readable storage medium and a kind of vehicle are extorted in screen locking.
Background technique
Vehicle-mounted information and entertainment system (IVI, In-Vehicle Infotainment) on vehicle be using it is vehicle-mounted it is dedicated in
Central processor, the vehicle integrated information processing system formed based on Vehicle Body Bus system and Internet service.Software is extorted in screen locking
Be a kind of wooden horse of prevalence, forcibly occupy the means of user's screen by forcing, make user can not normal use terminal, and as item
Part is to user's extortionist.If being equipped with screen locking in vehicle-mounted information and entertainment system extorts software, serious traffic safety will cause
Problem, therefore it is particularly significant to extort software killing to the screen locking of vehicle-mounted information and entertainment system.
Whether it includes wooden horse that killing includes using technological means inspection software, and is carried out clearly after finding wooden horse in the terminal
Except the work of two aspects.Existing killing technology is mainly for mobile phone, PC (abbreviation PC, personal computer)
Equal conventional terminals, the system type of covering includes Android, iOS and Windows.Main detection means includes static detection
With two kinds of detection means of dynamic detection, static detection mainly passes through traditional antivirus engine and is detected, and dynamic detection mainly uses
Sandbox (Sandbox) is cultivated;Main reset mode is manually to remove, or in the case where there is ROOT permission, lead to
Mobile phone sensor wake-up antivirus software is crossed to be purged.
These killing technologies have very big defect: 1, traditional killing technology is mainly for mobile phone and PC, and on-vehicle information is entertained
The hardware configuration and use environment and mobile phone and PC of system (IVI, In-Vehicle Infotainment) are all different, at present
Killing technology can fail on vehicle-mounted information and entertainment system;2, the mutation speed of wooden horse is getting faster, so that used in it
Character string, the pace of change of Opcode are very fast, and traditional static detection method is caused to fail, as feature string detection,
Opcode detection etc.;3, existing dynamic detection technology mainly passes through HOOK system API (Application Programming
Interface, application programming interface) it realizes, but the method for HOOK system API can not directly judge that malice screen locking is dynamic
Make, this causes existing dynamic detection technology to be difficult to detect that software is extorted in screen locking.In conclusion in existing killing technology,
Wooden horse is extorted to the screen locking for vehicle-mounted information and entertainment system not support well.
Summary of the invention
Embodiment disclosed by the invention aim to solve the problem that the prior art or in the related technology killing technology to for on-vehicle information
The problem of wooden horse is not supported well is extorted in the screen locking of entertainment systems.
For this purpose, the screen locking that the first aspect of embodiment disclosed by the invention proposes a kind of vehicle-mounted information and entertainment system is extorted
Software checking and killing method.
Software is extorted in the screen locking that the second aspect of embodiment disclosed by the invention proposes a kind of vehicle-mounted information and entertainment system
Killing device.
Software is extorted in the screen locking that the third aspect of embodiment disclosed by the invention proposes a kind of vehicle-mounted information and entertainment system
Killing equipment.
The fourth aspect of embodiment disclosed by the invention proposes a kind of computer readable storage medium.
5th aspect of embodiment disclosed by the invention proposes a kind of vehicle.
In view of above-mentioned, according to the present invention disclosed embodiment in a first aspect, providing a kind of vehicle-mounted information and entertainment system
Screen locking extort software checking and killing method, comprising: in response to software installation instruct, which, which is included in sandbox, installs software installation
Instruct corresponding software to be installed;The dry run software to be installed in sandbox;Intercept the front-end interface figure of software to be installed;Know
Whether comprising extorting text information in other front-end interface figure, if so, being that software is extorted in screen locking by software tags to be installed.
Software checking and killing method is extorted in the screen locking for the vehicle-mounted information and entertainment system that embodiment disclosed by the invention provides, and utilizes sand
Cage breeding grows detection screen locking and extorts software, and sandbox cultivating system includes the front-end operations functions such as software installation, simulation click, screenshotss,
And the information processing function for intercepted picture.Specifically, having been surmounted general with the mode of text information detection wooden horse
The limitation of static state and dynamic detection means inspection software installation kit and software action in meaning, can be more with text information
Accurately speculate the intention of application program.The special killing of the present invention extorts software for the screen locking of vehicle-mounted information and entertainment system, more
The deficiency for having mended traditional killing scheme, has very strong perspective and practicability.
In addition, the screen locking of the vehicle-mounted information and entertainment system in the above-mentioned technical proposal that embodiment disclosed by the invention provides is strangled
Rope software checking and killing method, can also have following additional technical feature:
In the above-mentioned technical solutions, it is preferable that whether include the operation packet for extorting text information in identification front-end interface figure
It includes: extracting the text information in front-end interface figure;Whether comprising extorting in operation Scikit-Learn module identification text information
Text information.
In any of the above-described technical solution, it is preferable that the step of extracting the text information in front-end interface figure includes: to call
OCR program extracts text information from the surface chart of front end.
In any of the above-described technical solution, it is preferable that whether comprising extorting text information in identification front-end interface figure
After operation, further includes: when receiving long-range vehicle control instruction, the operation of control vehicle is instructed according to long-range vehicle control.
In any of the above-described technical solution, it is preferable that whether comprising extorting text information in identification front-end interface figure
After operation, further includes: when receiving remote virus-killing instruction, start built-in antivirus software, built-in antivirus software is for removing
Current interface top set software.
The second aspect of disclosed embodiment according to the present invention, the screen locking for providing a kind of vehicle-mounted information and entertainment system are extorted
Software killing device, comprising: sandbox cultivates unit, and sandbox cultivation unit includes installation unit, running unit, screenshotss unit and looks into
Unit is killed, installation unit is used to instruct in response to software installation, which, which is included in sandbox, installs software installation instruction correspondence
Software to be installed;Running unit is used for the dry run software to be installed in sandbox;Screenshotss unit is to be installed soft for intercepting
The front-end interface figure of part;Whether killing unit is for identification in front-end interface figure comprising extorting text information, if so, will be wait pacify
Dress software tags are that software is extorted in screen locking.
Software killing device is extorted in the screen locking for the vehicle-mounted information and entertainment system that embodiment disclosed by the invention provides, and utilizes sand
Cage breeding grows unit detection screen locking and extorts software, and it includes installation unit, running unit and screenshotss unit that sandbox, which cultivates unit, with respectively
Realize the front-end operations functions such as software installation, simulation click, screenshotss, it also includes killing unit that sandbox, which cultivates unit, to realize needle
To the information processing function of intercepted picture.Specifically, sandbox cultivates the mode that unit detects wooden horse with text information, surmount
The limitation of static state and dynamic detection means inspection software installation kit and software action in general sense, can with text information
To speculate the intention of application program more accurately.The special killing of the present invention is extorted soft for the screen locking of vehicle-mounted information and entertainment system
Part compensates for the deficiency of traditional killing scheme, has very strong perspective and practicability.
In addition, the screen locking of the vehicle-mounted information and entertainment system in the above-mentioned technical proposal that embodiment disclosed by the invention provides is strangled
Rope software killing device, can also have following additional technical feature:
In the above-mentioned technical solutions, it is preferable that killing unit includes: extraction unit, for extracting in front-end interface figure
Text information;Recognition unit, for whether running in Scikit-Learn module identification text information comprising extorting text information.
In any of the above-described technical solution, it is preferable that extraction unit is specifically used for calling OCR program from the surface chart of front end
Extract text information.
In any of the above-described technical solution, it is preferable that the screen locking of vehicle-mounted information and entertainment system extorts software killing device also
It include: built-in controlled end unit, equipped with built-in controlled end program on built-in controlled end unit, built-in controlled end program, which belongs to, is
System service routine, built-in controlled end unit is for receiving teleinstruction after vehicle-mounted information and entertainment system failure.
In any of the above-described technical solution, it is preferable that built-in controlled end unit is specifically used for referring to receiving long-range vehicle control
When enabling, the operation of control vehicle is instructed according to long-range vehicle control.
In any of the above-described technical solution, it is preferable that built-in controlled end unit is specifically used for referring to receiving remote virus-killing
When enabling, start built-in unit of killing virus;Software killing device is extorted in the screen locking of vehicle-mounted information and entertainment system further include: built-in antivirus is single
Member, for removing current interface top set software.
The third aspect of disclosed embodiment according to the present invention, the screen locking for providing a kind of vehicle-mounted information and entertainment system are extorted
Software killing equipment, comprising: memory is configured to storage executable instruction;Processor is configured to execute the instruction of storage with reality
Now such as the step of any of the above-described technical solution the method.
The fourth aspect of disclosed embodiment according to the present invention provides a kind of computer readable storage medium, deposits thereon
Computer program is contained, is realized when computer program is executed by processor such as the step of any of the above-described technical solution the method.
5th aspect of disclosed embodiment according to the present invention, provides a kind of vehicle, comprising: as above-mentioned second aspect is appointed
Software killing device is extorted in the screen locking of vehicle-mounted information and entertainment system described in one technical solution;Or such as above-mentioned third aspect technical side
Software killing equipment is extorted in the screen locking of vehicle-mounted information and entertainment system described in case;Or as described in the fourth aspect technical solution
Computer readable storage medium, therefore have that software killing device is extorted in above-mentioned screen locking, software killing equipment and meter are extorted in screen locking
Whole technical effects of calculation machine readable storage medium storing program for executing, details are not described herein.
The additional aspect and advantage of disclosed embodiment will provide in following description section according to the present invention, partially will
Become obvious from the following description, or practice through the invention is recognized.
Detailed description of the invention
The above-mentioned and/or additional aspect and advantage of embodiment disclosed by the invention are from combination following accompanying drawings to embodiment
It will be apparent and be readily appreciated that in description, in which:
Software killing side is extorted in the screen locking that Fig. 1 shows vehicle-mounted information and entertainment system according to an embodiment of the invention
The schematic flow diagram of method;
Fig. 2 shows the screen lockings of vehicle-mounted information and entertainment system according to another embodiment of the invention to extort software killing
The schematic flow diagram of method;
Software killing is extorted in the screen locking that Fig. 3 shows the vehicle-mounted information and entertainment system of still another embodiment in accordance with the present invention
The schematic flow diagram of method;
Software killing dress is extorted in the screen locking that Fig. 4 shows vehicle-mounted information and entertainment system according to an embodiment of the invention
The schematic block diagram set;
Software killing is extorted in the screen locking that Fig. 5 shows vehicle-mounted information and entertainment system according to another embodiment of the invention
The schematic block diagram of device;
Software killing is extorted in the screen locking that Fig. 6 shows the vehicle-mounted information and entertainment system of still another embodiment in accordance with the present invention
The schematic block diagram of device;
Software killing is extorted in the screen locking that Fig. 7 shows vehicle-mounted information and entertainment system according to still another embodiment of the invention
The schematic block diagram of device;
The screen locking that Fig. 8 shows vehicle-mounted information and entertainment system according to an embodiment of the invention is extorted software killing and is set
Standby schematic block diagram.
Specific embodiment
To better understand the objects, features and advantages of the present invention, with reference to the accompanying drawing and specific real
Applying mode, the present invention is further described in detail.It should be noted that in the absence of conflict, the implementation of the application
Feature in example and embodiment can be combined with each other.
In the following description, numerous specific details are set forth in order to facilitate a full understanding of the present invention, still, the present invention may be used also
To be implemented using other than the one described here other modes, therefore, protection scope of the present invention is not by described below
Specific embodiment limitation.
Software killing side is extorted in the screen locking that the embodiment of first aspect present invention provides a kind of vehicle-mounted information and entertainment system
Method is applied to vehicle entertainment system.
Software killing side is extorted in the screen locking that Fig. 1 shows vehicle-mounted information and entertainment system according to an embodiment of the invention
The schematic flow diagram of method.As shown in Figure 1, this method comprises:
S102 is instructed in response to software installation, and it is corresponding wait pacify which is included in installation software installation instruction in sandbox
Fill software.
S104, the dry run software to be installed in sandbox.
Software to be installed can first be devoted to sandbox and carry out dynamic cultivation before being installed to vehicle-mounted information and entertainment system.
The first step of cultivation is installation software, and then sandboxing techniques real user clicks software, triggers its operation.
S106 intercepts the front-end interface figure of software to be installed.
During dynamic cultivates, when detecting the front-end interface of software to be installed, it is not possible to distinguish current scene
It whether is that software scene is extorted in screen locking, therefore is first carried out screenshot to interface and saved, for subsequent step processing.
Whether S108 identifies comprising extorting text information in front-end interface figure, if so, S110 is gone to, if it is not, then going to
S112。
When software attacks vehicle-mounted information and entertainment system is extorted in screen locking, can lock screen causes user that can not execute operation, and
To user's extortionist, including send transfer account, jump to payment interface etc., it often shows and locks in front-end interface at this time
Fixed, ransom money etc. is relevant to extort text information, and after front-end interface figure when obtaining software to be installed operation at this time, identification is wherein
No includes to extort text information, and using recognition result as judging whether software to be installed is standard that software is extorted in screen locking.
If determining that software to be installed extorts software for screen locking comprising extorting text information in front-end interface figure, otherwise determining to be installed
Software is not that software is extorted in screen locking.
Software tags to be installed are that software is extorted in screen locking by S110.
Specifically, just no longer by the software installation to on-vehicle information after identifying that software to be installed extorts software for screen locking
Entertainment systems, and delete its installation kit.Further, software is extorted for the screen locking identified, recognition result can be also fed back
To application market management terminal, software is extorted from application market undercarriage with the screen locking that will identify that.
Software tags to be installed are security software by S112, so that vehicle-mounted information and entertainment system installs software to be installed.
It is contemplated that ground, by software tags to be installed be security software be in order to after killing passes through export killing as a result,
Therefore software to be installed can not also be marked, and send the instruction that killing passes through, if can enable vehicle-mounted information and entertainment system after
Continuous to install the software to be installed, it would have been obvious for a person skilled in the art for this.
Software checking and killing method is extorted in the screen locking for the vehicle-mounted information and entertainment system that embodiment disclosed by the invention provides, and utilizes sand
Cage breeding grows detection screen locking and extorts software, and sandbox cultivating system includes the front-end operations functions such as software installation, simulation click, screenshotss,
And the information processing function for intercepted picture.Specifically, having been surmounted general with the mode of text information detection wooden horse
The limitation of static state and dynamic detection means inspection software installation kit and software action in meaning, can be more with text information
Accurately speculate the intention of application program.The special killing of the present invention extorts software for the screen locking of vehicle-mounted information and entertainment system, more
The deficiency for having mended traditional killing scheme, has very strong perspective and practicability.
Fig. 2 shows the screen lockings of vehicle-mounted information and entertainment system according to another embodiment of the invention to extort software killing
The schematic flow diagram of method.As shown in Fig. 2, this method comprises:
S202 is instructed in response to software installation, and it is corresponding wait pacify which is included in installation software installation instruction in sandbox
Fill software.
S204, the dry run software to be installed in sandbox.
S206 intercepts the front-end interface figure of software to be installed.
S208 extracts the text information in front-end interface figure.
After obtaining the front-end interface figure that software to be installed intercepts when dry run in sandbox, text is first extracted from screenshot
Information, for future use.Preferably, OCR (Optical Character Recognition, optical character identification) program is called
Text information is extracted from the surface chart of front end, OCR program determines its shape by dark, the bright mode of character in detection image,
Then shape is translated into computword with character identifying method.
S210, whether operation Scikit-Learn module identifies comprising extorting text information in text information, if so, turning
To S212, if it is not, then going to S214.
After obtaining text information, sandbox calling rule engine is realized together with OCR program for the front end intercepted
The information processing function of surface chart.The core algorithm of regulation engine realized using Scikit-Learn module, Scikit-Learn
It is a kind of machine learning library, is convenient Data Mining Tools wherein including a large amount of machine learning algorithms, data set.It uses
Scikit-Learn module identifies the mode for extorting text, than traditional character string fuzzy matching and canonical in technological means
With more flexible and accurate.Specifically, by the NB Algorithm API of Scikit-Learn module to extorting text information
Identified there is that intuitive, calculation amount is small.
Software tags to be installed are that software is extorted in screen locking by S212.
Specifically, when recognize extort text information when, software to be installed is determined as high-risk soft by regulation engine automatically
Part refuses restocking application market or is installed to vehicle-mounted information and entertainment system.
Software tags to be installed are security software by S214, so that vehicle-mounted information and entertainment system installs software to be installed.
Software killing is extorted in the screen locking that Fig. 3 shows the vehicle-mounted information and entertainment system of still another embodiment in accordance with the present invention
The schematic flow diagram of method.As shown in figure 3, this method comprises:
S302 is instructed in response to software installation, and it is corresponding wait pacify which is included in installation software installation instruction in sandbox
Fill software.
S304, the dry run software to be installed in sandbox.
S306 intercepts the front-end interface figure of software to be installed.
S308 extracts the text information in front-end interface figure.
S310, whether operation Scikit-Learn module identifies comprising extorting text information in text information, if so, turning
To S312, if it is not, then going to S314.
Software tags to be installed are that software is extorted in screen locking by S312.
Software tags to be installed are security software by S314, so that vehicle-mounted information and entertainment system installs software to be installed.
S316 instructs the operation of control vehicle according to long-range vehicle control when receiving long-range vehicle control instruction.
Traditional antivirus software is not directed to the emergency bodyfixed frame that scene is extorted in screen locking, because temporarily unavailable in system
In the case of, it can't jeopardize to personal safety, but vehicle-mounted information and entertainment system, once being locked, will lead to vehicle, much service can not
With.In extreme circumstances, screen locking extorts software or even can encrypt part system file, such as local database files, and kills
Current operation process, this will lead to account system, vehicle control instruction system is paralysed completely, vehicle operating and operation be influenced, when serious
It may cause personal injury, it is therefore desirable to provide the emergency measure to come into force.In embodiment disclosed by the invention, work as screen locking
Software is extorted around sandbox cultivation detection and after lockking vehicle-mounted information and entertainment system, user can pass through remote control terminal program
(remote control terminal can be mobile phone, tablet computer, PC) sends long-range vehicle control instruction to controlled end program built in system, with this side
Formula substitutes screen operator, completes vehicle control task in case of emergency, avoids any personal injury, ensure that the people of occupant
Body safety.Specifically, the screen operator substituted can be to stop in emergency, open double sudden strain of a muscle, close door, closing windows etc., execute
When the long-range vehicle control instruction can be forwarded to entire car controller.
S318 starts built-in antivirus software when receiving remote virus-killing instruction, and built-in antivirus software is current for removing
Interface top set software.
After mobile terminal poisoning, antivirus software is generally waken up by way of shaking this operation sensor and removes wood
Horse, but vehicle-mounted information and entertainment system is not available the function.In embodiment disclosed by the invention, remote control terminal can also be with
It is soft to wake up antivirus software removing current interface top set built in system to send remote virus-killing instruction to controlled end program built in system
Part including killing the current interface top set program being currently running, and removes corresponding application program installation kit, automatic to avoid it
Installation, is attacked again.Further, vehicle-mounted information and entertainment system, system are restarted after built-in antivirus software completes clean-up task
Restore to operate normally.Wherein, current interface top set software is the software that top set state is under current interface, when system is locked
When screen extorts software latching, information (such as extorting text information) can be extorted in front-end interface displaying, therefore current interface top set is soft
Part is that software is extorted in the screen locking.
Specifically, with system service (system server, refer to execute the program of appointing system function, routine or into
Journey can transport to support other programs, especially underlying programs in the case where no user logs in and user has been logged out
Row) form deploy to ensure effective monitoring and control of illegal activities controlled end built in system, that is to say, that built-in controlled end program exists with a part of system service, protects
Demonstrate,proving it will not be killed by any wooden horse, so that built-in controlled end program still can connect when vehicle-mounted information and entertainment system is locked
The instruction that remote control terminal program issues is received, ensure that built-in controlled end program and built-in antivirus software after system infections wooden horse
Availability, it is more reliable and more stable than individual third party's antivirus applet.
It is contemplated that ground can also be by built-in after detecting that software to be installed extorts software for screen locking after sandbox cultivation
Antivirus software removes the software to be installed.
Software killing dress is extorted in the screen locking that the embodiment of second aspect of the present invention provides a kind of vehicle-mounted information and entertainment system
It sets, is applied to vehicle entertainment system.
Software killing dress is extorted in the screen locking that Fig. 4 shows vehicle-mounted information and entertainment system according to an embodiment of the invention
Set 100 schematic block diagram.As shown in figure 4, the device 100 includes:
Sandbox cultivates unit 102, and sandbox cultivation unit 102 includes:
Installation unit 104, for instructing in response to software installation, which, which is included in sandbox, installs software installation instruction
Corresponding software to be installed.
Running unit 106, for the dry run software to be installed in sandbox.
Software to be installed can first be devoted to sandbox and carry out dynamic cultivation before being installed to vehicle-mounted information and entertainment system.
The first step that sandbox cultivation unit 102 cultivates software is to install software by installation unit 104, and then running unit 106 is simulated very
Real user clicks software, triggers its operation.
Screenshotss unit 108, for intercepting the front-end interface figure of software to be installed.
During dynamic cultivates, when detecting the front-end interface of software to be installed, it is not possible to distinguish current scene
It whether is that software scene is extorted in screen locking, therefore is first carried out screenshot to interface by screenshotss unit 108 and saved, for subsequent processing.
Killing unit 110, for identification whether comprising extorting text information in front-end interface figure, if so, by be installed
Software tags are that software is extorted in screen locking, if it is not, being then security software by software tags to be installed, for vehicle-mounted information and entertainment system
Software to be installed is installed.
When software attacks vehicle-mounted information and entertainment system is extorted in screen locking, can lock screen causes user that can not execute operation, and
To user's extortionist, including send transfer account, jump to payment interface etc., it often shows and locks in front-end interface at this time
Fixed, ransom money etc. is relevant to extort text information, after front-end interface figure when obtaining software to be installed operation at this time, killing unit
110 identification wherein whether include extort text information, and using recognition result as judge software to be installed whether be screen locking Le
The standard of rope software.Specifically, just no longer by the software installation to vehicle after identifying that software to be installed extorts software for screen locking
Information entertainment is carried, and deletes its installation kit.Further, software is extorted for the screen locking identified, identification can be also tied
Fruit feeds back to application market management terminal, extorts software from application market undercarriage with the screen locking that will identify that.It is contemplated that ground, it will
Software tags to be installed are that security software is to export killing after killing passes through as a result, therefore can not also mark to be installed
Software, and the instruction that killing passes through is sent, as long as vehicle-mounted information and entertainment system can be enabled to continue to install the software to be installed,
It would have been obvious for a person skilled in the art for this.
Software killing device 100 is extorted in the screen locking for the vehicle-mounted information and entertainment system that embodiment disclosed by the invention provides, benefit
Screen locking is detected with sandbox cultivation unit 102 and extorts software, and it includes installation unit 104, running unit 106 that sandbox, which cultivates unit 102,
With screenshotss unit 108, to realize software installation respectively, simulate the front-end operations functions such as click, screenshotss, sandbox cultivates unit 102
It also include killing unit 110, to realize the information processing function for being directed to intercepted picture.Specifically, sandbox cultivates unit 102
With text information detection wooden horse mode, surmounted in general sense static state and dynamic detection means inspection software installation kit and
The limitation of software action can speculate the intention of application program with text information more accurately.The special killing needle of the present invention
Software is extorted to the screen locking of vehicle-mounted information and entertainment system, compensates for the deficiency of traditional killing scheme, have it is very strong it is perspective and
Practicability.
Software killing is extorted in the screen locking that Fig. 5 shows vehicle-mounted information and entertainment system according to another embodiment of the invention
The schematic block diagram of device 200.As shown in figure 5, the device 200 includes:
Sandbox cultivates unit 202, and sandbox cultivation unit 202 includes:
Installation unit 204, for instructing in response to software installation, which, which is included in sandbox, installs software installation instruction
Corresponding software to be installed.
Running unit 206, for the dry run software to be installed in sandbox.
Screenshotss unit 208, for intercepting the front-end interface figure of software to be installed.
Killing unit 210, for identification whether comprising extorting text information in front-end interface figure;Killing unit 210 includes:
Extraction unit 212, for extracting the text information in front-end interface figure;
After obtaining the front-end interface figure that software to be installed intercepts when dry run in sandbox, extraction unit 212 is first from cutting
Text information is extracted in figure, for future use.Preferably, extraction unit 212 is specifically used for calling OCR program from the surface chart of front end
Text information is extracted, OCR program determines its shape by dark, the bright mode of character in detection image, then uses character recognition
Shape is translated into computword by method.
Recognition unit 214, for whether running in Scikit-Learn module identification text information comprising extorting text envelope
Breath, if so, software tags to be installed are extorted into software for screen locking, if it is not, be then security software by software tags to be installed, with
Software to be installed is installed for vehicle-mounted information and entertainment system.
After obtaining text information, 214 calling rule engine of recognition unit, the OCR program one called with extraction unit 212
Act the information processing function realized for the front-end interface figure intercepted.The core algorithm of regulation engine uses Scikit-
Learn module realizes that Scikit-Learn is a kind of machine learning library, wherein including a large amount of machine learning algorithms, data set, is
Convenient Data Mining Tools.Recognition unit 214 extorts the mode of text using the identification of Scikit-Learn module, in technology hand
It is more more flexible and accurate than traditional character string fuzzy matching and canonical matching in section.Specifically, pass through Scikit-Learn mould
The NB Algorithm API of block identifies there is that intuitive, calculation amount is small to text information is extorted.When recognizing
When extorting text information, software to be installed is determined as high-risk software automatically by regulation engine, refuses restocking application market or installation
To vehicle-mounted information and entertainment system.
Software killing is extorted in the screen locking that Fig. 6 shows the vehicle-mounted information and entertainment system of still another embodiment in accordance with the present invention
The schematic block diagram of device 300.As shown in fig. 6, the device 300 includes:
Sandbox cultivates unit 302, and sandbox cultivation unit 302 includes:
Installation unit 304, for instructing in response to software installation, which, which is included in sandbox, installs software installation instruction
Corresponding software to be installed.
Running unit 306, for the dry run software to be installed in sandbox.
Screenshotss unit 308, for intercepting the front-end interface figure of software to be installed.
Killing unit 310, for identification whether comprising extorting text information in front-end interface figure;Killing unit includes 310:
Extraction unit 312, for extracting the text information in front-end interface figure;
Recognition unit 314, for whether running in Scikit-Learn module identification text information comprising extorting text envelope
Breath, if so, software tags to be installed are extorted into software for screen locking, if it is not, be then security software by software tags to be installed, with
Software to be installed is installed for vehicle-mounted information and entertainment system.
Software killing device 300 is extorted in the screen locking of vehicle-mounted information and entertainment system further include:
Built-in controlled end unit 316, equipped with built-in controlled end program, built-in controlled end on built-in controlled end unit 316
Program belongs to system service program, and built-in controlled end unit 316, which is used to receive after vehicle-mounted information and entertainment system failure, remotely to be referred to
It enables.
In this embodiment, controlled end unit 316 built in being deployed to ensure effective monitoring and control of illegal activities in the form of system service, that is to say, that built-in controlled
It holds program to exist with a part of system service, guarantees that it will not be killed by any wooden horse, when screen locking extorts software around sandbox
The detection of unit 302 is cultivated after lockking vehicle-mounted information and entertainment system, built-in controlled end unit 316 still can receive remotely
The teleinstruction that control terminal (such as mobile phone, tablet computer, PC) issues, i.e. user can be by remote control terminals to built-in controlled end
Unit 316 sends teleinstruction, substitutes screen operator in this way, to provide the emergency measure to come into force, ensures
Traffic safety.
In one embodiment of the invention, it is preferable that built-in controlled end unit 316 is specifically used for receiving long-range vehicle
When control instruction, the operation of control vehicle is instructed according to long-range vehicle control.
Traditional antivirus software is not directed to the emergency bodyfixed frame that scene is extorted in screen locking, because temporarily unavailable in system
In the case of, it can't jeopardize to personal safety, but vehicle-mounted information and entertainment system, once being locked, will lead to vehicle, much service can not
With.In extreme circumstances, screen locking extorts software or even can encrypt part system file, such as local database files, and kills
Current operation process, this will lead to account system, vehicle control instruction system is paralysed completely, vehicle operating and operation be influenced, when serious
It may cause personal injury, it is therefore desirable to provide the emergency measure to come into force.
In this embodiment, built-in controlled end unit 316 specifically can receive long-range vehicle control instruction, in this way substitution screen
Curtain operation, completes vehicle control task in case of emergency, avoids any personal injury, ensure that the personal safety of occupant.
Specifically, the screen operator substituted can be to stop in emergency, open double sudden strain of a muscle, close door, closing windows etc., can should when execution
Long-range vehicle control instruction is forwarded to entire car controller.
Software killing is extorted in the screen locking that Fig. 7 shows vehicle-mounted information and entertainment system according to still another embodiment of the invention
The schematic block diagram of device 400.As shown in fig. 7, the device 400 includes:
Sandbox cultivates unit 402, and sandbox cultivation unit 402 includes:
Installation unit 404, for instructing in response to software installation, which, which is included in sandbox, installs software installation instruction
Corresponding software to be installed.
Running unit 406, for the dry run software to be installed in sandbox.
Screenshotss unit 408, for intercepting the front-end interface figure of software to be installed.
Killing unit 410, for identification whether comprising extorting text information in front-end interface figure;Killing unit includes 410:
Extraction unit 412, for extracting the text information in front-end interface figure;
Recognition unit 414, for whether running in Scikit-Learn module identification text information comprising extorting text envelope
Breath, if so, software tags to be installed are extorted into software for screen locking, if it is not, be then security software by software tags to be installed, with
Software to be installed is installed for vehicle-mounted information and entertainment system.
Software killing device 400 is extorted in the screen locking of vehicle-mounted information and entertainment system further include:
Built-in controlled end unit 416, equipped with built-in controlled end program, built-in controlled end on built-in controlled end unit 416
Program belongs to system service program, and built-in controlled end unit 416, which is used to receive after vehicle-mounted information and entertainment system failure, remotely to be referred to
It enables, built-in controlled end unit 416 is specifically used for when receiving remote virus-killing instruction, starts built-in unit 418 of killing virus.
Built-in antivirus unit 418, for removing current interface top set software, it is contemplated that ground, when recognition unit 414 identifies
After software is extorted in screen locking out, the software to be installed can also be removed by built-in antivirus unit 418.
After mobile terminal poisoning, antivirus software is generally waken up by way of shaking this operation sensor and removes wood
Horse, but vehicle-mounted information and entertainment system is not available the function.
In this embodiment, built-in controlled end unit 416 is specific can receive remote virus-killing instruction also to wake up built in system
Unit 418 of killing virus removes current interface top set software, including killing the current interface top set program being currently running, and removes correspondence
Application program installation kit, to avoid its it is automatic install, attack again.As built in being carried on built-in controlled end unit 416
Controlled end program belongs to system service program, it is ensured that built-in controlled end unit 416 and built-in antivirus unit 418 are in system infections
Availability after wooden horse, it is more reliable and more stable than individual third party's antivirus applet.
Further, vehicle-mounted information and entertainment system is restarted after built-in antivirus unit completes clean-up task, system is restored just
Often operation.Wherein, current interface top set software is the software that top set state is under current interface, when system is extorted by screen locking
When software locks, it can be extorted information (such as extorting text information) in front-end interface displaying, therefore current interface top set software is
Software is extorted in the screen locking.
As shown in figure 8, the screen locking that the embodiment of third aspect present invention provides a kind of vehicle-mounted information and entertainment system is extorted
Software killing equipment 1, comprising: memory 12 is configured to storage executable instruction;Processor 14 is configured to execute the finger of storage
Enable to realize such as the step of above-mentioned any embodiment the method, thus the screen locking for having the vehicle-mounted information and entertainment system extort it is soft
Whole technical effects of part checking and killing method, details are not described herein.
Specifically, memory 12 may include the mass storage for data or instruction.For example it rather than limits,
Memory 12 may include hard disk drive (Hard Disk Drive, HDD), floppy disk drive, flash memory, CD, magneto-optic disk, magnetic
The group of band or universal serial bus (Universal Serial Bus, USB) driver or two or more the above
It closes.In a suitable case, memory 12 may include the medium of removable or non-removable (or fixed).In suitable situation
Under, memory 12 can be inside or outside synthesized gateway disaster tolerance equipment.In a particular embodiment, memory 12 is non-volatile
Solid-state memory.In a particular embodiment, memory 12 includes read-only memory (ROM).In a suitable case, which can
ROM, programming ROM (PROM), erasable PROM (EPROM), electric erasable PROM (EEPROM), electricity to be masked edit program can
Rewrite the combination of ROM (EAROM) or flash memory or two or more the above.
Above-mentioned processor 14 may include central processing unit (CPU) or specific integrated circuit (Application
Specific Integrated Circuit, ASIC), or may be configured to implement one or more of the embodiment of the present invention
A integrated circuit.
The embodiment of fourth aspect present invention provides a kind of computer readable storage medium, is stored thereon with computer journey
Sequence is realized when computer program is executed by processor such as the step of above-mentioned any embodiment the method, thus it is vehicle-mounted to have this
Whole technical effects of software checking and killing method are extorted in the screen locking of information entertainment, and details are not described herein.
Computer readable storage medium may include any medium for capableing of storage or transmission information.Computer-readable storage
The example of medium include electronic circuit, semiconductor memory devices, ROM, flash memory, erasable ROM (EROM), floppy disk, CD-ROM,
CD, hard disk, fiber medium, radio frequency (RF) link, etc..Code segment can be via the calculating of internet, Intranet etc.
Machine network is downloaded.
The embodiment of fifth aspect present invention provides a kind of vehicle, comprising: such as above-mentioned second aspect any embodiment institute
Software killing device is extorted in the screen locking for the vehicle-mounted information and entertainment system stated;Or the vehicle-mounted letter as described in above-mentioned third aspect embodiment
Software killing equipment is extorted in the screen locking of breath entertainment systems;Or the computer-readable storage medium as described in the fourth aspect embodiment
Matter, therefore have that software killing device is extorted in above-mentioned screen locking, software killing equipment and computer readable storage medium are extorted in screen locking
Whole technical effects, details are not described herein.
In conclusion software killing side is extorted in the screen locking for the vehicle-mounted information and entertainment system that embodiment disclosed by the invention provides
Case, comprising antivirus applet four built in controlled end program, mobile phone terminal control program and system built in sandbox cultivating system, system
Main modular, sandbox cultivating system include that the front-end operations functions such as software installation, simulation click, screenshotss and OCR, rule are drawn
Hold up equal message processing modules.The present invention is the special killing skill for solving to extort wooden horse for the screen locking of vehicle-mounted information and entertainment system
Art also can avoid the problem of causing personal injury to occupant after vehicle-mounted information and entertainment system is locked.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field
For art personnel, embodiment disclosed by the invention can have various modifications and variations.All within the spirits and principles of the present invention,
Any modification, equivalent replacement, improvement and so on should all be included in the protection scope of the present invention.
Claims (14)
1. software checking and killing method is extorted in a kind of screen locking of vehicle-mounted information and entertainment system characterized by comprising
It is instructed in response to software installation, the response is included in sandbox that install software installation instruction corresponding to be installed soft
Part;
The software to be installed described in dry run in the sandbox;
Intercept the front-end interface figure of the software to be installed;
It identifies whether comprising extorting text information in the front-end interface figure, if so, being lock by the software tags to be installed
Screen extorts software.
2. software checking and killing method is extorted in the screen locking of vehicle-mounted information and entertainment system according to claim 1, which is characterized in that institute
It states and identifies whether the operation comprising extorting text information includes: in the front-end interface figure
Extract the text information in the front-end interface figure;
Operation Scikit-Learn module identifies in the text information whether comprising described to extort text information.
3. software checking and killing method is extorted in the screen locking of vehicle-mounted information and entertainment system according to claim 2, which is characterized in that institute
Stating the step of extracting the text information in the front-end interface figure includes:
OCR program is called to extract the text information from the front-end interface figure.
4. software checking and killing method is extorted in the screen locking of vehicle-mounted information and entertainment system according to any one of claim 1 to 3,
It is characterized in that, after whether including to extort the operation of text information in the identification front-end interface figure, further includes:
When receiving long-range vehicle control instruction, according to the operation of the long-range vehicle control instruction control vehicle.
5. software checking and killing method is extorted in the screen locking of vehicle-mounted information and entertainment system according to any one of claim 1 to 3,
It is characterized in that, after whether including to extort the operation of text information in the identification front-end interface figure, further includes:
When receiving remote virus-killing instruction, start built-in antivirus software, the built-in antivirus software is for removing current interface
Top set software.
6. software killing device is extorted in a kind of screen locking of vehicle-mounted information and entertainment system characterized by comprising
Sandbox cultivates unit, and the sandbox cultivation unit includes:
Installation unit, for instructing in response to software installation, the response, which is included in sandbox, installs the software installation instruction
Corresponding software to be installed;
Running unit, for software to be installed described in the dry run in the sandbox;
Screenshotss unit, for intercepting the front-end interface figure of the software to be installed;And
Killing unit, for identification whether comprising extorting text information in the front-end interface figure, if so, by described to be installed
Software tags are that software is extorted in screen locking.
7. software killing device is extorted in the screen locking of vehicle-mounted information and entertainment system according to claim 6, which is characterized in that institute
Stating killing unit includes:
Extraction unit, for extracting the text information in the front-end interface figure;
Recognition unit identifies in the text information whether comprising described to extort text envelope for running Scikit-Learn module
Breath.
8. software killing device is extorted in the screen locking of vehicle-mounted information and entertainment system according to claim 7, which is characterized in that institute
Extraction unit is stated to be specifically used for that OCR program is called to extract the text information from the front-end interface figure.
9. software killing device is extorted in the screen locking of the vehicle-mounted information and entertainment system according to any one of claim 6 to 8,
It is characterized in that, software killing device is extorted in the screen locking of the vehicle-mounted information and entertainment system further include:
Built-in controlled end unit, equipped with built-in controlled end program, the built-in controlled end journey on the built-in controlled end unit
Sequence belongs to system service program, and the built-in controlled end unit is used to receive after the vehicle-mounted information and entertainment system failure long-range
Instruction.
10. software killing device is extorted in the screen locking of vehicle-mounted information and entertainment system according to claim 9, which is characterized in that
The built-in controlled end unit is specifically used for when receiving long-range vehicle control instruction, according to the long-range vehicle control instruction control vehicle
Operation.
11. software killing device is extorted in the screen locking of vehicle-mounted information and entertainment system according to claim 9, which is characterized in that
The built-in controlled end unit is specifically used for when receiving remote virus-killing instruction, starts the built-in unit of killing virus;
Software killing device is extorted in the screen locking of the vehicle-mounted information and entertainment system further include:
The built-in unit of killing virus, for removing current interface top set software.
12. software killing equipment is extorted in a kind of screen locking of vehicle-mounted information and entertainment system characterized by comprising
Memory is configured to storage executable instruction;
Processor is configured to execute the instruction of storage to realize such as the step of any one of claims 1 to 5 the method.
13. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program
It realizes when being executed by processor such as the step of any one of claims 1 to 5 the method.
14. a kind of vehicle characterized by comprising
Software killing device is extorted in the screen locking of vehicle-mounted information and entertainment system as described in any one of claim 6 to 11;Or
Software killing equipment is extorted in the screen locking of vehicle-mounted information and entertainment system as claimed in claim 12;Or
Computer readable storage medium as claimed in claim 13.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811534936.7A CN109614797A (en) | 2018-12-14 | 2018-12-14 | Software checking and killing method, device and equipment are extorted in the screen locking of vehicle-mounted information and entertainment system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811534936.7A CN109614797A (en) | 2018-12-14 | 2018-12-14 | Software checking and killing method, device and equipment are extorted in the screen locking of vehicle-mounted information and entertainment system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109614797A true CN109614797A (en) | 2019-04-12 |
Family
ID=66010033
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811534936.7A Pending CN109614797A (en) | 2018-12-14 | 2018-12-14 | Software checking and killing method, device and equipment are extorted in the screen locking of vehicle-mounted information and entertainment system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109614797A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110781483A (en) * | 2019-11-05 | 2020-02-11 | 深圳市欧瑞博科技有限公司 | Control method, platform and storage medium for intelligent household control program transmission permission |
CN111291379A (en) * | 2019-12-30 | 2020-06-16 | 上海上讯信息技术股份有限公司 | Android-based vehicle-mounted system application detection method and device and electronic equipment |
CN113190835A (en) * | 2021-02-04 | 2021-07-30 | 恒安嘉新(北京)科技股份公司 | Application program violation detection method, device, equipment and storage medium |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104182688A (en) * | 2014-08-26 | 2014-12-03 | 北京软安科技有限公司 | Android malicious code detection device and method based on dynamic activation and behavior monitoring |
CN107273747A (en) * | 2017-05-22 | 2017-10-20 | 中国人民公安大学 | The method for extorting software detection |
CN107294912A (en) * | 2016-03-31 | 2017-10-24 | 比亚迪股份有限公司 | Vehicle safety communications method, device, vehicle multimedia system and vehicle |
CN107563189A (en) * | 2017-08-24 | 2018-01-09 | 东软集团股份有限公司 | One kind applies detection method and terminal |
CN107679403A (en) * | 2017-10-11 | 2018-02-09 | 北京理工大学 | It is a kind of to extort software mutation detection method based on sequence alignment algorithms |
CN108021806A (en) * | 2017-11-24 | 2018-05-11 | 北京奇虎科技有限公司 | A kind of recognition methods of malice installation kit and device |
US20180191739A1 (en) * | 2015-10-20 | 2018-07-05 | Sophos Limited | Mitigation of anti-sandbox malware techniques |
CN108932429A (en) * | 2017-05-27 | 2018-12-04 | 腾讯科技(深圳)有限公司 | Analysis method, terminal and the storage medium of application program |
CN108959917A (en) * | 2017-05-25 | 2018-12-07 | 腾讯科技(深圳)有限公司 | A kind of method, apparatus, equipment and the readable storage medium storing program for executing of Email detection |
-
2018
- 2018-12-14 CN CN201811534936.7A patent/CN109614797A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104182688A (en) * | 2014-08-26 | 2014-12-03 | 北京软安科技有限公司 | Android malicious code detection device and method based on dynamic activation and behavior monitoring |
US20180191739A1 (en) * | 2015-10-20 | 2018-07-05 | Sophos Limited | Mitigation of anti-sandbox malware techniques |
CN107294912A (en) * | 2016-03-31 | 2017-10-24 | 比亚迪股份有限公司 | Vehicle safety communications method, device, vehicle multimedia system and vehicle |
CN107273747A (en) * | 2017-05-22 | 2017-10-20 | 中国人民公安大学 | The method for extorting software detection |
CN108959917A (en) * | 2017-05-25 | 2018-12-07 | 腾讯科技(深圳)有限公司 | A kind of method, apparatus, equipment and the readable storage medium storing program for executing of Email detection |
CN108932429A (en) * | 2017-05-27 | 2018-12-04 | 腾讯科技(深圳)有限公司 | Analysis method, terminal and the storage medium of application program |
CN107563189A (en) * | 2017-08-24 | 2018-01-09 | 东软集团股份有限公司 | One kind applies detection method and terminal |
CN107679403A (en) * | 2017-10-11 | 2018-02-09 | 北京理工大学 | It is a kind of to extort software mutation detection method based on sequence alignment algorithms |
CN108021806A (en) * | 2017-11-24 | 2018-05-11 | 北京奇虎科技有限公司 | A kind of recognition methods of malice installation kit and device |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110781483A (en) * | 2019-11-05 | 2020-02-11 | 深圳市欧瑞博科技有限公司 | Control method, platform and storage medium for intelligent household control program transmission permission |
CN111291379A (en) * | 2019-12-30 | 2020-06-16 | 上海上讯信息技术股份有限公司 | Android-based vehicle-mounted system application detection method and device and electronic equipment |
CN111291379B (en) * | 2019-12-30 | 2023-09-26 | 上海上讯信息技术股份有限公司 | Android-based vehicle-mounted system application detection method and device and electronic equipment |
CN113190835A (en) * | 2021-02-04 | 2021-07-30 | 恒安嘉新(北京)科技股份公司 | Application program violation detection method, device, equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10924502B2 (en) | Network security using inflated files for anomaly detection | |
US8424090B2 (en) | Apparatus and method for detecting obfuscated malicious web page | |
CN109614797A (en) | Software checking and killing method, device and equipment are extorted in the screen locking of vehicle-mounted information and entertainment system | |
CN111931166B (en) | Application program anti-attack method and system based on code injection and behavior analysis | |
CN109167781B (en) | Network attack chain identification method and device based on dynamic correlation analysis | |
CN107609396B (en) | Escape detection method based on sandbox virtual machine | |
CN107992739A (en) | User authentication method, apparatus and system | |
CN106156619A (en) | Application safety means of defence and device | |
CN103051627B (en) | A kind of detection method of rebound trojan horse | |
CN104199688A (en) | Mobile terminal and system reinstallation control method and device thereof | |
CN106845223B (en) | Method and apparatus for detecting malicious code | |
CN104751054B (en) | The recognition methods of rogue program and device, mobile terminal | |
CN106815522A (en) | Mobile terminal software vacation interface identification method and device | |
CN103902900A (en) | External extraction type detecting device and method for mobile terminal malicious code | |
CN109600362A (en) | Zombie host recognition methods, identification equipment and medium based on identification model | |
CN109800571B (en) | Event processing method and device, storage medium and electronic device | |
CN112134893A (en) | Internet of things safety protection method and device, electronic equipment and storage medium | |
CN106611313A (en) | A payment method, a terminal and a payment server | |
CN108965251B (en) | A kind of safe mobile phone guard system that cloud combines | |
CN109727027A (en) | Account recognition methods, device, equipment and storage medium | |
KR102022058B1 (en) | Method and system for detecting counterfeit of web page | |
CN106156613B (en) | Method for protecting firewall device for application program layer and computer system thereof | |
CN109995751B (en) | Internet access equipment marking method and device, storage medium and computer equipment | |
CN108108618B (en) | Application interface detection method and device for counterfeiting attack | |
CN106127473A (en) | A kind of safe payment method and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190412 |
|
RJ01 | Rejection of invention patent application after publication |