CN109614797A - Software checking and killing method, device and equipment are extorted in the screen locking of vehicle-mounted information and entertainment system - Google Patents

Software checking and killing method, device and equipment are extorted in the screen locking of vehicle-mounted information and entertainment system Download PDF

Info

Publication number
CN109614797A
CN109614797A CN201811534936.7A CN201811534936A CN109614797A CN 109614797 A CN109614797 A CN 109614797A CN 201811534936 A CN201811534936 A CN 201811534936A CN 109614797 A CN109614797 A CN 109614797A
Authority
CN
China
Prior art keywords
software
vehicle
extorted
screen locking
killing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811534936.7A
Other languages
Chinese (zh)
Inventor
马东辉
李平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing CHJ Automotive Information Technology Co Ltd
Original Assignee
Beijing CHJ Automotive Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing CHJ Automotive Information Technology Co Ltd filed Critical Beijing CHJ Automotive Information Technology Co Ltd
Priority to CN201811534936.7A priority Critical patent/CN109614797A/en
Publication of CN109614797A publication Critical patent/CN109614797A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Virology (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • User Interface Of Digital Computer (AREA)
  • Fittings On The Vehicle Exterior For Carrying Loads, And Devices For Holding Or Mounting Articles (AREA)

Abstract

Embodiment of the invention discloses a kind of screen lockings of vehicle-mounted information and entertainment system to extort software checking and killing method, device, equipment and computer readable storage medium, wherein, this method comprises: instructing in response to software installation, which, which is included in sandbox, installs the corresponding software to be installed of software installation instruction;The dry run software to be installed in sandbox;Intercept the front-end interface figure of software to be installed;Whether comprising extorting text information in identification front-end interface figure, if so, being that software is extorted in screen locking by software tags to be installed.The present invention cultivates detection screen locking using sandbox and extorts software, sandbox cultivating system includes the front-end operations functions such as software installation, simulation click, screenshotss, and the information processing function for intercepted picture, the deficiency of traditional killing scheme is compensated for, has very strong perspective and practicability.With the mode of text information detection wooden horse, the limitation of the relevant technologies is surmounted, can speculate the intention of application program more accurately.

Description

Software checking and killing method, device and equipment are extorted in the screen locking of vehicle-mounted information and entertainment system
Technical field
The present invention relates to technical field of vehicle, in particular to a kind of vehicle-mounted information and entertainment system screen locking extort it is soft Part checking and killing method, a kind of screen locking of vehicle-mounted information and entertainment system extort software killing device, a kind of vehicle-mounted information and entertainment system Software killing equipment, a kind of computer readable storage medium and a kind of vehicle are extorted in screen locking.
Background technique
Vehicle-mounted information and entertainment system (IVI, In-Vehicle Infotainment) on vehicle be using it is vehicle-mounted it is dedicated in Central processor, the vehicle integrated information processing system formed based on Vehicle Body Bus system and Internet service.Software is extorted in screen locking Be a kind of wooden horse of prevalence, forcibly occupy the means of user's screen by forcing, make user can not normal use terminal, and as item Part is to user's extortionist.If being equipped with screen locking in vehicle-mounted information and entertainment system extorts software, serious traffic safety will cause Problem, therefore it is particularly significant to extort software killing to the screen locking of vehicle-mounted information and entertainment system.
Whether it includes wooden horse that killing includes using technological means inspection software, and is carried out clearly after finding wooden horse in the terminal Except the work of two aspects.Existing killing technology is mainly for mobile phone, PC (abbreviation PC, personal computer) Equal conventional terminals, the system type of covering includes Android, iOS and Windows.Main detection means includes static detection With two kinds of detection means of dynamic detection, static detection mainly passes through traditional antivirus engine and is detected, and dynamic detection mainly uses Sandbox (Sandbox) is cultivated;Main reset mode is manually to remove, or in the case where there is ROOT permission, lead to Mobile phone sensor wake-up antivirus software is crossed to be purged.
These killing technologies have very big defect: 1, traditional killing technology is mainly for mobile phone and PC, and on-vehicle information is entertained The hardware configuration and use environment and mobile phone and PC of system (IVI, In-Vehicle Infotainment) are all different, at present Killing technology can fail on vehicle-mounted information and entertainment system;2, the mutation speed of wooden horse is getting faster, so that used in it Character string, the pace of change of Opcode are very fast, and traditional static detection method is caused to fail, as feature string detection, Opcode detection etc.;3, existing dynamic detection technology mainly passes through HOOK system API (Application Programming Interface, application programming interface) it realizes, but the method for HOOK system API can not directly judge that malice screen locking is dynamic Make, this causes existing dynamic detection technology to be difficult to detect that software is extorted in screen locking.In conclusion in existing killing technology, Wooden horse is extorted to the screen locking for vehicle-mounted information and entertainment system not support well.
Summary of the invention
Embodiment disclosed by the invention aim to solve the problem that the prior art or in the related technology killing technology to for on-vehicle information The problem of wooden horse is not supported well is extorted in the screen locking of entertainment systems.
For this purpose, the screen locking that the first aspect of embodiment disclosed by the invention proposes a kind of vehicle-mounted information and entertainment system is extorted Software checking and killing method.
Software is extorted in the screen locking that the second aspect of embodiment disclosed by the invention proposes a kind of vehicle-mounted information and entertainment system Killing device.
Software is extorted in the screen locking that the third aspect of embodiment disclosed by the invention proposes a kind of vehicle-mounted information and entertainment system Killing equipment.
The fourth aspect of embodiment disclosed by the invention proposes a kind of computer readable storage medium.
5th aspect of embodiment disclosed by the invention proposes a kind of vehicle.
In view of above-mentioned, according to the present invention disclosed embodiment in a first aspect, providing a kind of vehicle-mounted information and entertainment system Screen locking extort software checking and killing method, comprising: in response to software installation instruct, which, which is included in sandbox, installs software installation Instruct corresponding software to be installed;The dry run software to be installed in sandbox;Intercept the front-end interface figure of software to be installed;Know Whether comprising extorting text information in other front-end interface figure, if so, being that software is extorted in screen locking by software tags to be installed.
Software checking and killing method is extorted in the screen locking for the vehicle-mounted information and entertainment system that embodiment disclosed by the invention provides, and utilizes sand Cage breeding grows detection screen locking and extorts software, and sandbox cultivating system includes the front-end operations functions such as software installation, simulation click, screenshotss, And the information processing function for intercepted picture.Specifically, having been surmounted general with the mode of text information detection wooden horse The limitation of static state and dynamic detection means inspection software installation kit and software action in meaning, can be more with text information Accurately speculate the intention of application program.The special killing of the present invention extorts software for the screen locking of vehicle-mounted information and entertainment system, more The deficiency for having mended traditional killing scheme, has very strong perspective and practicability.
In addition, the screen locking of the vehicle-mounted information and entertainment system in the above-mentioned technical proposal that embodiment disclosed by the invention provides is strangled Rope software checking and killing method, can also have following additional technical feature:
In the above-mentioned technical solutions, it is preferable that whether include the operation packet for extorting text information in identification front-end interface figure It includes: extracting the text information in front-end interface figure;Whether comprising extorting in operation Scikit-Learn module identification text information Text information.
In any of the above-described technical solution, it is preferable that the step of extracting the text information in front-end interface figure includes: to call OCR program extracts text information from the surface chart of front end.
In any of the above-described technical solution, it is preferable that whether comprising extorting text information in identification front-end interface figure After operation, further includes: when receiving long-range vehicle control instruction, the operation of control vehicle is instructed according to long-range vehicle control.
In any of the above-described technical solution, it is preferable that whether comprising extorting text information in identification front-end interface figure After operation, further includes: when receiving remote virus-killing instruction, start built-in antivirus software, built-in antivirus software is for removing Current interface top set software.
The second aspect of disclosed embodiment according to the present invention, the screen locking for providing a kind of vehicle-mounted information and entertainment system are extorted Software killing device, comprising: sandbox cultivates unit, and sandbox cultivation unit includes installation unit, running unit, screenshotss unit and looks into Unit is killed, installation unit is used to instruct in response to software installation, which, which is included in sandbox, installs software installation instruction correspondence Software to be installed;Running unit is used for the dry run software to be installed in sandbox;Screenshotss unit is to be installed soft for intercepting The front-end interface figure of part;Whether killing unit is for identification in front-end interface figure comprising extorting text information, if so, will be wait pacify Dress software tags are that software is extorted in screen locking.
Software killing device is extorted in the screen locking for the vehicle-mounted information and entertainment system that embodiment disclosed by the invention provides, and utilizes sand Cage breeding grows unit detection screen locking and extorts software, and it includes installation unit, running unit and screenshotss unit that sandbox, which cultivates unit, with respectively Realize the front-end operations functions such as software installation, simulation click, screenshotss, it also includes killing unit that sandbox, which cultivates unit, to realize needle To the information processing function of intercepted picture.Specifically, sandbox cultivates the mode that unit detects wooden horse with text information, surmount The limitation of static state and dynamic detection means inspection software installation kit and software action in general sense, can with text information To speculate the intention of application program more accurately.The special killing of the present invention is extorted soft for the screen locking of vehicle-mounted information and entertainment system Part compensates for the deficiency of traditional killing scheme, has very strong perspective and practicability.
In addition, the screen locking of the vehicle-mounted information and entertainment system in the above-mentioned technical proposal that embodiment disclosed by the invention provides is strangled Rope software killing device, can also have following additional technical feature:
In the above-mentioned technical solutions, it is preferable that killing unit includes: extraction unit, for extracting in front-end interface figure Text information;Recognition unit, for whether running in Scikit-Learn module identification text information comprising extorting text information.
In any of the above-described technical solution, it is preferable that extraction unit is specifically used for calling OCR program from the surface chart of front end Extract text information.
In any of the above-described technical solution, it is preferable that the screen locking of vehicle-mounted information and entertainment system extorts software killing device also It include: built-in controlled end unit, equipped with built-in controlled end program on built-in controlled end unit, built-in controlled end program, which belongs to, is System service routine, built-in controlled end unit is for receiving teleinstruction after vehicle-mounted information and entertainment system failure.
In any of the above-described technical solution, it is preferable that built-in controlled end unit is specifically used for referring to receiving long-range vehicle control When enabling, the operation of control vehicle is instructed according to long-range vehicle control.
In any of the above-described technical solution, it is preferable that built-in controlled end unit is specifically used for referring to receiving remote virus-killing When enabling, start built-in unit of killing virus;Software killing device is extorted in the screen locking of vehicle-mounted information and entertainment system further include: built-in antivirus is single Member, for removing current interface top set software.
The third aspect of disclosed embodiment according to the present invention, the screen locking for providing a kind of vehicle-mounted information and entertainment system are extorted Software killing equipment, comprising: memory is configured to storage executable instruction;Processor is configured to execute the instruction of storage with reality Now such as the step of any of the above-described technical solution the method.
The fourth aspect of disclosed embodiment according to the present invention provides a kind of computer readable storage medium, deposits thereon Computer program is contained, is realized when computer program is executed by processor such as the step of any of the above-described technical solution the method.
5th aspect of disclosed embodiment according to the present invention, provides a kind of vehicle, comprising: as above-mentioned second aspect is appointed Software killing device is extorted in the screen locking of vehicle-mounted information and entertainment system described in one technical solution;Or such as above-mentioned third aspect technical side Software killing equipment is extorted in the screen locking of vehicle-mounted information and entertainment system described in case;Or as described in the fourth aspect technical solution Computer readable storage medium, therefore have that software killing device is extorted in above-mentioned screen locking, software killing equipment and meter are extorted in screen locking Whole technical effects of calculation machine readable storage medium storing program for executing, details are not described herein.
The additional aspect and advantage of disclosed embodiment will provide in following description section according to the present invention, partially will Become obvious from the following description, or practice through the invention is recognized.
Detailed description of the invention
The above-mentioned and/or additional aspect and advantage of embodiment disclosed by the invention are from combination following accompanying drawings to embodiment It will be apparent and be readily appreciated that in description, in which:
Software killing side is extorted in the screen locking that Fig. 1 shows vehicle-mounted information and entertainment system according to an embodiment of the invention The schematic flow diagram of method;
Fig. 2 shows the screen lockings of vehicle-mounted information and entertainment system according to another embodiment of the invention to extort software killing The schematic flow diagram of method;
Software killing is extorted in the screen locking that Fig. 3 shows the vehicle-mounted information and entertainment system of still another embodiment in accordance with the present invention The schematic flow diagram of method;
Software killing dress is extorted in the screen locking that Fig. 4 shows vehicle-mounted information and entertainment system according to an embodiment of the invention The schematic block diagram set;
Software killing is extorted in the screen locking that Fig. 5 shows vehicle-mounted information and entertainment system according to another embodiment of the invention The schematic block diagram of device;
Software killing is extorted in the screen locking that Fig. 6 shows the vehicle-mounted information and entertainment system of still another embodiment in accordance with the present invention The schematic block diagram of device;
Software killing is extorted in the screen locking that Fig. 7 shows vehicle-mounted information and entertainment system according to still another embodiment of the invention The schematic block diagram of device;
The screen locking that Fig. 8 shows vehicle-mounted information and entertainment system according to an embodiment of the invention is extorted software killing and is set Standby schematic block diagram.
Specific embodiment
To better understand the objects, features and advantages of the present invention, with reference to the accompanying drawing and specific real Applying mode, the present invention is further described in detail.It should be noted that in the absence of conflict, the implementation of the application Feature in example and embodiment can be combined with each other.
In the following description, numerous specific details are set forth in order to facilitate a full understanding of the present invention, still, the present invention may be used also To be implemented using other than the one described here other modes, therefore, protection scope of the present invention is not by described below Specific embodiment limitation.
Software killing side is extorted in the screen locking that the embodiment of first aspect present invention provides a kind of vehicle-mounted information and entertainment system Method is applied to vehicle entertainment system.
Software killing side is extorted in the screen locking that Fig. 1 shows vehicle-mounted information and entertainment system according to an embodiment of the invention The schematic flow diagram of method.As shown in Figure 1, this method comprises:
S102 is instructed in response to software installation, and it is corresponding wait pacify which is included in installation software installation instruction in sandbox Fill software.
S104, the dry run software to be installed in sandbox.
Software to be installed can first be devoted to sandbox and carry out dynamic cultivation before being installed to vehicle-mounted information and entertainment system. The first step of cultivation is installation software, and then sandboxing techniques real user clicks software, triggers its operation.
S106 intercepts the front-end interface figure of software to be installed.
During dynamic cultivates, when detecting the front-end interface of software to be installed, it is not possible to distinguish current scene It whether is that software scene is extorted in screen locking, therefore is first carried out screenshot to interface and saved, for subsequent step processing.
Whether S108 identifies comprising extorting text information in front-end interface figure, if so, S110 is gone to, if it is not, then going to S112。
When software attacks vehicle-mounted information and entertainment system is extorted in screen locking, can lock screen causes user that can not execute operation, and To user's extortionist, including send transfer account, jump to payment interface etc., it often shows and locks in front-end interface at this time Fixed, ransom money etc. is relevant to extort text information, and after front-end interface figure when obtaining software to be installed operation at this time, identification is wherein No includes to extort text information, and using recognition result as judging whether software to be installed is standard that software is extorted in screen locking. If determining that software to be installed extorts software for screen locking comprising extorting text information in front-end interface figure, otherwise determining to be installed Software is not that software is extorted in screen locking.
Software tags to be installed are that software is extorted in screen locking by S110.
Specifically, just no longer by the software installation to on-vehicle information after identifying that software to be installed extorts software for screen locking Entertainment systems, and delete its installation kit.Further, software is extorted for the screen locking identified, recognition result can be also fed back To application market management terminal, software is extorted from application market undercarriage with the screen locking that will identify that.
Software tags to be installed are security software by S112, so that vehicle-mounted information and entertainment system installs software to be installed.
It is contemplated that ground, by software tags to be installed be security software be in order to after killing passes through export killing as a result, Therefore software to be installed can not also be marked, and send the instruction that killing passes through, if can enable vehicle-mounted information and entertainment system after Continuous to install the software to be installed, it would have been obvious for a person skilled in the art for this.
Software checking and killing method is extorted in the screen locking for the vehicle-mounted information and entertainment system that embodiment disclosed by the invention provides, and utilizes sand Cage breeding grows detection screen locking and extorts software, and sandbox cultivating system includes the front-end operations functions such as software installation, simulation click, screenshotss, And the information processing function for intercepted picture.Specifically, having been surmounted general with the mode of text information detection wooden horse The limitation of static state and dynamic detection means inspection software installation kit and software action in meaning, can be more with text information Accurately speculate the intention of application program.The special killing of the present invention extorts software for the screen locking of vehicle-mounted information and entertainment system, more The deficiency for having mended traditional killing scheme, has very strong perspective and practicability.
Fig. 2 shows the screen lockings of vehicle-mounted information and entertainment system according to another embodiment of the invention to extort software killing The schematic flow diagram of method.As shown in Fig. 2, this method comprises:
S202 is instructed in response to software installation, and it is corresponding wait pacify which is included in installation software installation instruction in sandbox Fill software.
S204, the dry run software to be installed in sandbox.
S206 intercepts the front-end interface figure of software to be installed.
S208 extracts the text information in front-end interface figure.
After obtaining the front-end interface figure that software to be installed intercepts when dry run in sandbox, text is first extracted from screenshot Information, for future use.Preferably, OCR (Optical Character Recognition, optical character identification) program is called Text information is extracted from the surface chart of front end, OCR program determines its shape by dark, the bright mode of character in detection image, Then shape is translated into computword with character identifying method.
S210, whether operation Scikit-Learn module identifies comprising extorting text information in text information, if so, turning To S212, if it is not, then going to S214.
After obtaining text information, sandbox calling rule engine is realized together with OCR program for the front end intercepted The information processing function of surface chart.The core algorithm of regulation engine realized using Scikit-Learn module, Scikit-Learn It is a kind of machine learning library, is convenient Data Mining Tools wherein including a large amount of machine learning algorithms, data set.It uses Scikit-Learn module identifies the mode for extorting text, than traditional character string fuzzy matching and canonical in technological means With more flexible and accurate.Specifically, by the NB Algorithm API of Scikit-Learn module to extorting text information Identified there is that intuitive, calculation amount is small.
Software tags to be installed are that software is extorted in screen locking by S212.
Specifically, when recognize extort text information when, software to be installed is determined as high-risk soft by regulation engine automatically Part refuses restocking application market or is installed to vehicle-mounted information and entertainment system.
Software tags to be installed are security software by S214, so that vehicle-mounted information and entertainment system installs software to be installed.
Software killing is extorted in the screen locking that Fig. 3 shows the vehicle-mounted information and entertainment system of still another embodiment in accordance with the present invention The schematic flow diagram of method.As shown in figure 3, this method comprises:
S302 is instructed in response to software installation, and it is corresponding wait pacify which is included in installation software installation instruction in sandbox Fill software.
S304, the dry run software to be installed in sandbox.
S306 intercepts the front-end interface figure of software to be installed.
S308 extracts the text information in front-end interface figure.
S310, whether operation Scikit-Learn module identifies comprising extorting text information in text information, if so, turning To S312, if it is not, then going to S314.
Software tags to be installed are that software is extorted in screen locking by S312.
Software tags to be installed are security software by S314, so that vehicle-mounted information and entertainment system installs software to be installed.
S316 instructs the operation of control vehicle according to long-range vehicle control when receiving long-range vehicle control instruction.
Traditional antivirus software is not directed to the emergency bodyfixed frame that scene is extorted in screen locking, because temporarily unavailable in system In the case of, it can't jeopardize to personal safety, but vehicle-mounted information and entertainment system, once being locked, will lead to vehicle, much service can not With.In extreme circumstances, screen locking extorts software or even can encrypt part system file, such as local database files, and kills Current operation process, this will lead to account system, vehicle control instruction system is paralysed completely, vehicle operating and operation be influenced, when serious It may cause personal injury, it is therefore desirable to provide the emergency measure to come into force.In embodiment disclosed by the invention, work as screen locking Software is extorted around sandbox cultivation detection and after lockking vehicle-mounted information and entertainment system, user can pass through remote control terminal program (remote control terminal can be mobile phone, tablet computer, PC) sends long-range vehicle control instruction to controlled end program built in system, with this side Formula substitutes screen operator, completes vehicle control task in case of emergency, avoids any personal injury, ensure that the people of occupant Body safety.Specifically, the screen operator substituted can be to stop in emergency, open double sudden strain of a muscle, close door, closing windows etc., execute When the long-range vehicle control instruction can be forwarded to entire car controller.
S318 starts built-in antivirus software when receiving remote virus-killing instruction, and built-in antivirus software is current for removing Interface top set software.
After mobile terminal poisoning, antivirus software is generally waken up by way of shaking this operation sensor and removes wood Horse, but vehicle-mounted information and entertainment system is not available the function.In embodiment disclosed by the invention, remote control terminal can also be with It is soft to wake up antivirus software removing current interface top set built in system to send remote virus-killing instruction to controlled end program built in system Part including killing the current interface top set program being currently running, and removes corresponding application program installation kit, automatic to avoid it Installation, is attacked again.Further, vehicle-mounted information and entertainment system, system are restarted after built-in antivirus software completes clean-up task Restore to operate normally.Wherein, current interface top set software is the software that top set state is under current interface, when system is locked When screen extorts software latching, information (such as extorting text information) can be extorted in front-end interface displaying, therefore current interface top set is soft Part is that software is extorted in the screen locking.
Specifically, with system service (system server, refer to execute the program of appointing system function, routine or into Journey can transport to support other programs, especially underlying programs in the case where no user logs in and user has been logged out Row) form deploy to ensure effective monitoring and control of illegal activities controlled end built in system, that is to say, that built-in controlled end program exists with a part of system service, protects Demonstrate,proving it will not be killed by any wooden horse, so that built-in controlled end program still can connect when vehicle-mounted information and entertainment system is locked The instruction that remote control terminal program issues is received, ensure that built-in controlled end program and built-in antivirus software after system infections wooden horse Availability, it is more reliable and more stable than individual third party's antivirus applet.
It is contemplated that ground can also be by built-in after detecting that software to be installed extorts software for screen locking after sandbox cultivation Antivirus software removes the software to be installed.
Software killing dress is extorted in the screen locking that the embodiment of second aspect of the present invention provides a kind of vehicle-mounted information and entertainment system It sets, is applied to vehicle entertainment system.
Software killing dress is extorted in the screen locking that Fig. 4 shows vehicle-mounted information and entertainment system according to an embodiment of the invention Set 100 schematic block diagram.As shown in figure 4, the device 100 includes:
Sandbox cultivates unit 102, and sandbox cultivation unit 102 includes:
Installation unit 104, for instructing in response to software installation, which, which is included in sandbox, installs software installation instruction Corresponding software to be installed.
Running unit 106, for the dry run software to be installed in sandbox.
Software to be installed can first be devoted to sandbox and carry out dynamic cultivation before being installed to vehicle-mounted information and entertainment system. The first step that sandbox cultivation unit 102 cultivates software is to install software by installation unit 104, and then running unit 106 is simulated very Real user clicks software, triggers its operation.
Screenshotss unit 108, for intercepting the front-end interface figure of software to be installed.
During dynamic cultivates, when detecting the front-end interface of software to be installed, it is not possible to distinguish current scene It whether is that software scene is extorted in screen locking, therefore is first carried out screenshot to interface by screenshotss unit 108 and saved, for subsequent processing.
Killing unit 110, for identification whether comprising extorting text information in front-end interface figure, if so, by be installed Software tags are that software is extorted in screen locking, if it is not, being then security software by software tags to be installed, for vehicle-mounted information and entertainment system Software to be installed is installed.
When software attacks vehicle-mounted information and entertainment system is extorted in screen locking, can lock screen causes user that can not execute operation, and To user's extortionist, including send transfer account, jump to payment interface etc., it often shows and locks in front-end interface at this time Fixed, ransom money etc. is relevant to extort text information, after front-end interface figure when obtaining software to be installed operation at this time, killing unit 110 identification wherein whether include extort text information, and using recognition result as judge software to be installed whether be screen locking Le The standard of rope software.Specifically, just no longer by the software installation to vehicle after identifying that software to be installed extorts software for screen locking Information entertainment is carried, and deletes its installation kit.Further, software is extorted for the screen locking identified, identification can be also tied Fruit feeds back to application market management terminal, extorts software from application market undercarriage with the screen locking that will identify that.It is contemplated that ground, it will Software tags to be installed are that security software is to export killing after killing passes through as a result, therefore can not also mark to be installed Software, and the instruction that killing passes through is sent, as long as vehicle-mounted information and entertainment system can be enabled to continue to install the software to be installed, It would have been obvious for a person skilled in the art for this.
Software killing device 100 is extorted in the screen locking for the vehicle-mounted information and entertainment system that embodiment disclosed by the invention provides, benefit Screen locking is detected with sandbox cultivation unit 102 and extorts software, and it includes installation unit 104, running unit 106 that sandbox, which cultivates unit 102, With screenshotss unit 108, to realize software installation respectively, simulate the front-end operations functions such as click, screenshotss, sandbox cultivates unit 102 It also include killing unit 110, to realize the information processing function for being directed to intercepted picture.Specifically, sandbox cultivates unit 102 With text information detection wooden horse mode, surmounted in general sense static state and dynamic detection means inspection software installation kit and The limitation of software action can speculate the intention of application program with text information more accurately.The special killing needle of the present invention Software is extorted to the screen locking of vehicle-mounted information and entertainment system, compensates for the deficiency of traditional killing scheme, have it is very strong it is perspective and Practicability.
Software killing is extorted in the screen locking that Fig. 5 shows vehicle-mounted information and entertainment system according to another embodiment of the invention The schematic block diagram of device 200.As shown in figure 5, the device 200 includes:
Sandbox cultivates unit 202, and sandbox cultivation unit 202 includes:
Installation unit 204, for instructing in response to software installation, which, which is included in sandbox, installs software installation instruction Corresponding software to be installed.
Running unit 206, for the dry run software to be installed in sandbox.
Screenshotss unit 208, for intercepting the front-end interface figure of software to be installed.
Killing unit 210, for identification whether comprising extorting text information in front-end interface figure;Killing unit 210 includes:
Extraction unit 212, for extracting the text information in front-end interface figure;
After obtaining the front-end interface figure that software to be installed intercepts when dry run in sandbox, extraction unit 212 is first from cutting Text information is extracted in figure, for future use.Preferably, extraction unit 212 is specifically used for calling OCR program from the surface chart of front end Text information is extracted, OCR program determines its shape by dark, the bright mode of character in detection image, then uses character recognition Shape is translated into computword by method.
Recognition unit 214, for whether running in Scikit-Learn module identification text information comprising extorting text envelope Breath, if so, software tags to be installed are extorted into software for screen locking, if it is not, be then security software by software tags to be installed, with Software to be installed is installed for vehicle-mounted information and entertainment system.
After obtaining text information, 214 calling rule engine of recognition unit, the OCR program one called with extraction unit 212 Act the information processing function realized for the front-end interface figure intercepted.The core algorithm of regulation engine uses Scikit- Learn module realizes that Scikit-Learn is a kind of machine learning library, wherein including a large amount of machine learning algorithms, data set, is Convenient Data Mining Tools.Recognition unit 214 extorts the mode of text using the identification of Scikit-Learn module, in technology hand It is more more flexible and accurate than traditional character string fuzzy matching and canonical matching in section.Specifically, pass through Scikit-Learn mould The NB Algorithm API of block identifies there is that intuitive, calculation amount is small to text information is extorted.When recognizing When extorting text information, software to be installed is determined as high-risk software automatically by regulation engine, refuses restocking application market or installation To vehicle-mounted information and entertainment system.
Software killing is extorted in the screen locking that Fig. 6 shows the vehicle-mounted information and entertainment system of still another embodiment in accordance with the present invention The schematic block diagram of device 300.As shown in fig. 6, the device 300 includes:
Sandbox cultivates unit 302, and sandbox cultivation unit 302 includes:
Installation unit 304, for instructing in response to software installation, which, which is included in sandbox, installs software installation instruction Corresponding software to be installed.
Running unit 306, for the dry run software to be installed in sandbox.
Screenshotss unit 308, for intercepting the front-end interface figure of software to be installed.
Killing unit 310, for identification whether comprising extorting text information in front-end interface figure;Killing unit includes 310:
Extraction unit 312, for extracting the text information in front-end interface figure;
Recognition unit 314, for whether running in Scikit-Learn module identification text information comprising extorting text envelope Breath, if so, software tags to be installed are extorted into software for screen locking, if it is not, be then security software by software tags to be installed, with Software to be installed is installed for vehicle-mounted information and entertainment system.
Software killing device 300 is extorted in the screen locking of vehicle-mounted information and entertainment system further include:
Built-in controlled end unit 316, equipped with built-in controlled end program, built-in controlled end on built-in controlled end unit 316 Program belongs to system service program, and built-in controlled end unit 316, which is used to receive after vehicle-mounted information and entertainment system failure, remotely to be referred to It enables.
In this embodiment, controlled end unit 316 built in being deployed to ensure effective monitoring and control of illegal activities in the form of system service, that is to say, that built-in controlled It holds program to exist with a part of system service, guarantees that it will not be killed by any wooden horse, when screen locking extorts software around sandbox The detection of unit 302 is cultivated after lockking vehicle-mounted information and entertainment system, built-in controlled end unit 316 still can receive remotely The teleinstruction that control terminal (such as mobile phone, tablet computer, PC) issues, i.e. user can be by remote control terminals to built-in controlled end Unit 316 sends teleinstruction, substitutes screen operator in this way, to provide the emergency measure to come into force, ensures Traffic safety.
In one embodiment of the invention, it is preferable that built-in controlled end unit 316 is specifically used for receiving long-range vehicle When control instruction, the operation of control vehicle is instructed according to long-range vehicle control.
Traditional antivirus software is not directed to the emergency bodyfixed frame that scene is extorted in screen locking, because temporarily unavailable in system In the case of, it can't jeopardize to personal safety, but vehicle-mounted information and entertainment system, once being locked, will lead to vehicle, much service can not With.In extreme circumstances, screen locking extorts software or even can encrypt part system file, such as local database files, and kills Current operation process, this will lead to account system, vehicle control instruction system is paralysed completely, vehicle operating and operation be influenced, when serious It may cause personal injury, it is therefore desirable to provide the emergency measure to come into force.
In this embodiment, built-in controlled end unit 316 specifically can receive long-range vehicle control instruction, in this way substitution screen Curtain operation, completes vehicle control task in case of emergency, avoids any personal injury, ensure that the personal safety of occupant. Specifically, the screen operator substituted can be to stop in emergency, open double sudden strain of a muscle, close door, closing windows etc., can should when execution Long-range vehicle control instruction is forwarded to entire car controller.
Software killing is extorted in the screen locking that Fig. 7 shows vehicle-mounted information and entertainment system according to still another embodiment of the invention The schematic block diagram of device 400.As shown in fig. 7, the device 400 includes:
Sandbox cultivates unit 402, and sandbox cultivation unit 402 includes:
Installation unit 404, for instructing in response to software installation, which, which is included in sandbox, installs software installation instruction Corresponding software to be installed.
Running unit 406, for the dry run software to be installed in sandbox.
Screenshotss unit 408, for intercepting the front-end interface figure of software to be installed.
Killing unit 410, for identification whether comprising extorting text information in front-end interface figure;Killing unit includes 410:
Extraction unit 412, for extracting the text information in front-end interface figure;
Recognition unit 414, for whether running in Scikit-Learn module identification text information comprising extorting text envelope Breath, if so, software tags to be installed are extorted into software for screen locking, if it is not, be then security software by software tags to be installed, with Software to be installed is installed for vehicle-mounted information and entertainment system.
Software killing device 400 is extorted in the screen locking of vehicle-mounted information and entertainment system further include:
Built-in controlled end unit 416, equipped with built-in controlled end program, built-in controlled end on built-in controlled end unit 416 Program belongs to system service program, and built-in controlled end unit 416, which is used to receive after vehicle-mounted information and entertainment system failure, remotely to be referred to It enables, built-in controlled end unit 416 is specifically used for when receiving remote virus-killing instruction, starts built-in unit 418 of killing virus.
Built-in antivirus unit 418, for removing current interface top set software, it is contemplated that ground, when recognition unit 414 identifies After software is extorted in screen locking out, the software to be installed can also be removed by built-in antivirus unit 418.
After mobile terminal poisoning, antivirus software is generally waken up by way of shaking this operation sensor and removes wood Horse, but vehicle-mounted information and entertainment system is not available the function.
In this embodiment, built-in controlled end unit 416 is specific can receive remote virus-killing instruction also to wake up built in system Unit 418 of killing virus removes current interface top set software, including killing the current interface top set program being currently running, and removes correspondence Application program installation kit, to avoid its it is automatic install, attack again.As built in being carried on built-in controlled end unit 416 Controlled end program belongs to system service program, it is ensured that built-in controlled end unit 416 and built-in antivirus unit 418 are in system infections Availability after wooden horse, it is more reliable and more stable than individual third party's antivirus applet.
Further, vehicle-mounted information and entertainment system is restarted after built-in antivirus unit completes clean-up task, system is restored just Often operation.Wherein, current interface top set software is the software that top set state is under current interface, when system is extorted by screen locking When software locks, it can be extorted information (such as extorting text information) in front-end interface displaying, therefore current interface top set software is Software is extorted in the screen locking.
As shown in figure 8, the screen locking that the embodiment of third aspect present invention provides a kind of vehicle-mounted information and entertainment system is extorted Software killing equipment 1, comprising: memory 12 is configured to storage executable instruction;Processor 14 is configured to execute the finger of storage Enable to realize such as the step of above-mentioned any embodiment the method, thus the screen locking for having the vehicle-mounted information and entertainment system extort it is soft Whole technical effects of part checking and killing method, details are not described herein.
Specifically, memory 12 may include the mass storage for data or instruction.For example it rather than limits, Memory 12 may include hard disk drive (Hard Disk Drive, HDD), floppy disk drive, flash memory, CD, magneto-optic disk, magnetic The group of band or universal serial bus (Universal Serial Bus, USB) driver or two or more the above It closes.In a suitable case, memory 12 may include the medium of removable or non-removable (or fixed).In suitable situation Under, memory 12 can be inside or outside synthesized gateway disaster tolerance equipment.In a particular embodiment, memory 12 is non-volatile Solid-state memory.In a particular embodiment, memory 12 includes read-only memory (ROM).In a suitable case, which can ROM, programming ROM (PROM), erasable PROM (EPROM), electric erasable PROM (EEPROM), electricity to be masked edit program can Rewrite the combination of ROM (EAROM) or flash memory or two or more the above.
Above-mentioned processor 14 may include central processing unit (CPU) or specific integrated circuit (Application Specific Integrated Circuit, ASIC), or may be configured to implement one or more of the embodiment of the present invention A integrated circuit.
The embodiment of fourth aspect present invention provides a kind of computer readable storage medium, is stored thereon with computer journey Sequence is realized when computer program is executed by processor such as the step of above-mentioned any embodiment the method, thus it is vehicle-mounted to have this Whole technical effects of software checking and killing method are extorted in the screen locking of information entertainment, and details are not described herein.
Computer readable storage medium may include any medium for capableing of storage or transmission information.Computer-readable storage The example of medium include electronic circuit, semiconductor memory devices, ROM, flash memory, erasable ROM (EROM), floppy disk, CD-ROM, CD, hard disk, fiber medium, radio frequency (RF) link, etc..Code segment can be via the calculating of internet, Intranet etc. Machine network is downloaded.
The embodiment of fifth aspect present invention provides a kind of vehicle, comprising: such as above-mentioned second aspect any embodiment institute Software killing device is extorted in the screen locking for the vehicle-mounted information and entertainment system stated;Or the vehicle-mounted letter as described in above-mentioned third aspect embodiment Software killing equipment is extorted in the screen locking of breath entertainment systems;Or the computer-readable storage medium as described in the fourth aspect embodiment Matter, therefore have that software killing device is extorted in above-mentioned screen locking, software killing equipment and computer readable storage medium are extorted in screen locking Whole technical effects, details are not described herein.
In conclusion software killing side is extorted in the screen locking for the vehicle-mounted information and entertainment system that embodiment disclosed by the invention provides Case, comprising antivirus applet four built in controlled end program, mobile phone terminal control program and system built in sandbox cultivating system, system Main modular, sandbox cultivating system include that the front-end operations functions such as software installation, simulation click, screenshotss and OCR, rule are drawn Hold up equal message processing modules.The present invention is the special killing skill for solving to extort wooden horse for the screen locking of vehicle-mounted information and entertainment system Art also can avoid the problem of causing personal injury to occupant after vehicle-mounted information and entertainment system is locked.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field For art personnel, embodiment disclosed by the invention can have various modifications and variations.All within the spirits and principles of the present invention, Any modification, equivalent replacement, improvement and so on should all be included in the protection scope of the present invention.

Claims (14)

1. software checking and killing method is extorted in a kind of screen locking of vehicle-mounted information and entertainment system characterized by comprising
It is instructed in response to software installation, the response is included in sandbox that install software installation instruction corresponding to be installed soft Part;
The software to be installed described in dry run in the sandbox;
Intercept the front-end interface figure of the software to be installed;
It identifies whether comprising extorting text information in the front-end interface figure, if so, being lock by the software tags to be installed Screen extorts software.
2. software checking and killing method is extorted in the screen locking of vehicle-mounted information and entertainment system according to claim 1, which is characterized in that institute It states and identifies whether the operation comprising extorting text information includes: in the front-end interface figure
Extract the text information in the front-end interface figure;
Operation Scikit-Learn module identifies in the text information whether comprising described to extort text information.
3. software checking and killing method is extorted in the screen locking of vehicle-mounted information and entertainment system according to claim 2, which is characterized in that institute Stating the step of extracting the text information in the front-end interface figure includes:
OCR program is called to extract the text information from the front-end interface figure.
4. software checking and killing method is extorted in the screen locking of vehicle-mounted information and entertainment system according to any one of claim 1 to 3, It is characterized in that, after whether including to extort the operation of text information in the identification front-end interface figure, further includes:
When receiving long-range vehicle control instruction, according to the operation of the long-range vehicle control instruction control vehicle.
5. software checking and killing method is extorted in the screen locking of vehicle-mounted information and entertainment system according to any one of claim 1 to 3, It is characterized in that, after whether including to extort the operation of text information in the identification front-end interface figure, further includes:
When receiving remote virus-killing instruction, start built-in antivirus software, the built-in antivirus software is for removing current interface Top set software.
6. software killing device is extorted in a kind of screen locking of vehicle-mounted information and entertainment system characterized by comprising
Sandbox cultivates unit, and the sandbox cultivation unit includes:
Installation unit, for instructing in response to software installation, the response, which is included in sandbox, installs the software installation instruction Corresponding software to be installed;
Running unit, for software to be installed described in the dry run in the sandbox;
Screenshotss unit, for intercepting the front-end interface figure of the software to be installed;And
Killing unit, for identification whether comprising extorting text information in the front-end interface figure, if so, by described to be installed Software tags are that software is extorted in screen locking.
7. software killing device is extorted in the screen locking of vehicle-mounted information and entertainment system according to claim 6, which is characterized in that institute Stating killing unit includes:
Extraction unit, for extracting the text information in the front-end interface figure;
Recognition unit identifies in the text information whether comprising described to extort text envelope for running Scikit-Learn module Breath.
8. software killing device is extorted in the screen locking of vehicle-mounted information and entertainment system according to claim 7, which is characterized in that institute Extraction unit is stated to be specifically used for that OCR program is called to extract the text information from the front-end interface figure.
9. software killing device is extorted in the screen locking of the vehicle-mounted information and entertainment system according to any one of claim 6 to 8, It is characterized in that, software killing device is extorted in the screen locking of the vehicle-mounted information and entertainment system further include:
Built-in controlled end unit, equipped with built-in controlled end program, the built-in controlled end journey on the built-in controlled end unit Sequence belongs to system service program, and the built-in controlled end unit is used to receive after the vehicle-mounted information and entertainment system failure long-range Instruction.
10. software killing device is extorted in the screen locking of vehicle-mounted information and entertainment system according to claim 9, which is characterized in that The built-in controlled end unit is specifically used for when receiving long-range vehicle control instruction, according to the long-range vehicle control instruction control vehicle Operation.
11. software killing device is extorted in the screen locking of vehicle-mounted information and entertainment system according to claim 9, which is characterized in that
The built-in controlled end unit is specifically used for when receiving remote virus-killing instruction, starts the built-in unit of killing virus;
Software killing device is extorted in the screen locking of the vehicle-mounted information and entertainment system further include:
The built-in unit of killing virus, for removing current interface top set software.
12. software killing equipment is extorted in a kind of screen locking of vehicle-mounted information and entertainment system characterized by comprising
Memory is configured to storage executable instruction;
Processor is configured to execute the instruction of storage to realize such as the step of any one of claims 1 to 5 the method.
13. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program It realizes when being executed by processor such as the step of any one of claims 1 to 5 the method.
14. a kind of vehicle characterized by comprising
Software killing device is extorted in the screen locking of vehicle-mounted information and entertainment system as described in any one of claim 6 to 11;Or
Software killing equipment is extorted in the screen locking of vehicle-mounted information and entertainment system as claimed in claim 12;Or
Computer readable storage medium as claimed in claim 13.
CN201811534936.7A 2018-12-14 2018-12-14 Software checking and killing method, device and equipment are extorted in the screen locking of vehicle-mounted information and entertainment system Pending CN109614797A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811534936.7A CN109614797A (en) 2018-12-14 2018-12-14 Software checking and killing method, device and equipment are extorted in the screen locking of vehicle-mounted information and entertainment system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811534936.7A CN109614797A (en) 2018-12-14 2018-12-14 Software checking and killing method, device and equipment are extorted in the screen locking of vehicle-mounted information and entertainment system

Publications (1)

Publication Number Publication Date
CN109614797A true CN109614797A (en) 2019-04-12

Family

ID=66010033

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811534936.7A Pending CN109614797A (en) 2018-12-14 2018-12-14 Software checking and killing method, device and equipment are extorted in the screen locking of vehicle-mounted information and entertainment system

Country Status (1)

Country Link
CN (1) CN109614797A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110781483A (en) * 2019-11-05 2020-02-11 深圳市欧瑞博科技有限公司 Control method, platform and storage medium for intelligent household control program transmission permission
CN111291379A (en) * 2019-12-30 2020-06-16 上海上讯信息技术股份有限公司 Android-based vehicle-mounted system application detection method and device and electronic equipment
CN113190835A (en) * 2021-02-04 2021-07-30 恒安嘉新(北京)科技股份公司 Application program violation detection method, device, equipment and storage medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104182688A (en) * 2014-08-26 2014-12-03 北京软安科技有限公司 Android malicious code detection device and method based on dynamic activation and behavior monitoring
CN107273747A (en) * 2017-05-22 2017-10-20 中国人民公安大学 The method for extorting software detection
CN107294912A (en) * 2016-03-31 2017-10-24 比亚迪股份有限公司 Vehicle safety communications method, device, vehicle multimedia system and vehicle
CN107563189A (en) * 2017-08-24 2018-01-09 东软集团股份有限公司 One kind applies detection method and terminal
CN107679403A (en) * 2017-10-11 2018-02-09 北京理工大学 It is a kind of to extort software mutation detection method based on sequence alignment algorithms
CN108021806A (en) * 2017-11-24 2018-05-11 北京奇虎科技有限公司 A kind of recognition methods of malice installation kit and device
US20180191739A1 (en) * 2015-10-20 2018-07-05 Sophos Limited Mitigation of anti-sandbox malware techniques
CN108932429A (en) * 2017-05-27 2018-12-04 腾讯科技(深圳)有限公司 Analysis method, terminal and the storage medium of application program
CN108959917A (en) * 2017-05-25 2018-12-07 腾讯科技(深圳)有限公司 A kind of method, apparatus, equipment and the readable storage medium storing program for executing of Email detection

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104182688A (en) * 2014-08-26 2014-12-03 北京软安科技有限公司 Android malicious code detection device and method based on dynamic activation and behavior monitoring
US20180191739A1 (en) * 2015-10-20 2018-07-05 Sophos Limited Mitigation of anti-sandbox malware techniques
CN107294912A (en) * 2016-03-31 2017-10-24 比亚迪股份有限公司 Vehicle safety communications method, device, vehicle multimedia system and vehicle
CN107273747A (en) * 2017-05-22 2017-10-20 中国人民公安大学 The method for extorting software detection
CN108959917A (en) * 2017-05-25 2018-12-07 腾讯科技(深圳)有限公司 A kind of method, apparatus, equipment and the readable storage medium storing program for executing of Email detection
CN108932429A (en) * 2017-05-27 2018-12-04 腾讯科技(深圳)有限公司 Analysis method, terminal and the storage medium of application program
CN107563189A (en) * 2017-08-24 2018-01-09 东软集团股份有限公司 One kind applies detection method and terminal
CN107679403A (en) * 2017-10-11 2018-02-09 北京理工大学 It is a kind of to extort software mutation detection method based on sequence alignment algorithms
CN108021806A (en) * 2017-11-24 2018-05-11 北京奇虎科技有限公司 A kind of recognition methods of malice installation kit and device

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110781483A (en) * 2019-11-05 2020-02-11 深圳市欧瑞博科技有限公司 Control method, platform and storage medium for intelligent household control program transmission permission
CN111291379A (en) * 2019-12-30 2020-06-16 上海上讯信息技术股份有限公司 Android-based vehicle-mounted system application detection method and device and electronic equipment
CN111291379B (en) * 2019-12-30 2023-09-26 上海上讯信息技术股份有限公司 Android-based vehicle-mounted system application detection method and device and electronic equipment
CN113190835A (en) * 2021-02-04 2021-07-30 恒安嘉新(北京)科技股份公司 Application program violation detection method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
US10924502B2 (en) Network security using inflated files for anomaly detection
US8424090B2 (en) Apparatus and method for detecting obfuscated malicious web page
CN109614797A (en) Software checking and killing method, device and equipment are extorted in the screen locking of vehicle-mounted information and entertainment system
CN111931166B (en) Application program anti-attack method and system based on code injection and behavior analysis
CN109167781B (en) Network attack chain identification method and device based on dynamic correlation analysis
CN107609396B (en) Escape detection method based on sandbox virtual machine
CN107992739A (en) User authentication method, apparatus and system
CN106156619A (en) Application safety means of defence and device
CN103051627B (en) A kind of detection method of rebound trojan horse
CN104199688A (en) Mobile terminal and system reinstallation control method and device thereof
CN106845223B (en) Method and apparatus for detecting malicious code
CN104751054B (en) The recognition methods of rogue program and device, mobile terminal
CN106815522A (en) Mobile terminal software vacation interface identification method and device
CN103902900A (en) External extraction type detecting device and method for mobile terminal malicious code
CN109600362A (en) Zombie host recognition methods, identification equipment and medium based on identification model
CN109800571B (en) Event processing method and device, storage medium and electronic device
CN112134893A (en) Internet of things safety protection method and device, electronic equipment and storage medium
CN106611313A (en) A payment method, a terminal and a payment server
CN108965251B (en) A kind of safe mobile phone guard system that cloud combines
CN109727027A (en) Account recognition methods, device, equipment and storage medium
KR102022058B1 (en) Method and system for detecting counterfeit of web page
CN106156613B (en) Method for protecting firewall device for application program layer and computer system thereof
CN109995751B (en) Internet access equipment marking method and device, storage medium and computer equipment
CN108108618B (en) Application interface detection method and device for counterfeiting attack
CN106127473A (en) A kind of safe payment method and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190412

RJ01 Rejection of invention patent application after publication