CN110096874A - Program page security alarm method, apparatus, computer equipment and storage medium - Google Patents

Program page security alarm method, apparatus, computer equipment and storage medium Download PDF

Info

Publication number
CN110096874A
CN110096874A CN201910198863.7A CN201910198863A CN110096874A CN 110096874 A CN110096874 A CN 110096874A CN 201910198863 A CN201910198863 A CN 201910198863A CN 110096874 A CN110096874 A CN 110096874A
Authority
CN
China
Prior art keywords
program
page
application
preset
white list
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910198863.7A
Other languages
Chinese (zh)
Inventor
许剑勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
OneConnect Smart Technology Co Ltd
Original Assignee
OneConnect Smart Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by OneConnect Smart Technology Co Ltd filed Critical OneConnect Smart Technology Co Ltd
Priority to CN201910198863.7A priority Critical patent/CN110096874A/en
Publication of CN110096874A publication Critical patent/CN110096874A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities

Abstract

The invention discloses a kind of program page security alarm method, apparatus, computer equipment and storage mediums, comprising: the display state of the first program of monitor terminal front stage operation, to judge whether the corresponding first program page of first program is capped;When the first program page is capped, obtain the second program page being covered on the first program page, and corresponding second program of the second program page is compared with preset program white list, to judge that second program whether there is in the preset program white list;When second program is not present in the preset program white list, Xiang Suoshu terminal sends security alarm information.The present invention avoids and is judged one by one the life cycle of activity object, using simple by monitoring each of the operation program page;Solves third party's integration problem that activity can not be modified, it is mixed in together with page logic to avoid monitoring logic, so that page switching not Caton.

Description

Program page security alarm method, apparatus, computer equipment and storage medium
Technical field
The present invention relates to internet security technical fields, specifically, the present invention relates to a kind of program page security alarms Method, apparatus, computer equipment and storage medium.
Background technique
With the rapid development of Internet technology, more and more such as Web banks, net for relying on carrier network to use The network application in upper store or the like occurs in people's lives, provides a kind of quick convenient life style for people.But It is, since the interests driving of click access behavior of the user on network is increasing, to lead to the general of various Pagejack behaviors Excessively, meeting Pagejack is easy to cause userspersonal information to leak or be stolen, and damages the personal safety as well as the property safety of user.Moreover, The monitoring page in the related technology, monitoring process complexity is cumbersome, and monitoring logic is easy mixed in together with page logic, causes Monitoring logic may influence the execution of normal page logic, influence the performance of handoffs of the page.
Summary of the invention
The purpose of the present invention aims to solve at least one of above-mentioned technological deficiency, especially userspersonal information is easy to cause to let out It leaks or is stolen, damage the technological deficiency of the personal safety as well as the property safety of user.
In order to solve the above technical problems, the present invention provides a kind of program page security alarm methods, comprising the following steps:
The display state of first program of monitor terminal front stage operation, to judge corresponding first program of first program Whether the page is capped;
When the first program page is capped, the second program page being covered on the first program page is obtained Face, and corresponding second program of the second program page is compared with preset program white list, described in judgement Second program whether there is in the preset program white list;
When second program is not present in the preset program white list, Xiang Suoshu terminal sends security alarm Information.
Optionally, the display state of the first program of the monitor terminal front stage operation, to judge first program pair The step whether first program page answered is capped, further includes:
One is created in the object of the Application class in first program is built-in with onTrimMemory readjustment The Application derived class of function, and initialization is carried out to the global variable value in the Application derived class and is set It sets;
Whether the global variable value monitored in the Application derived class changes, to realize to first program Carry out global monitoring;
When the global variable value in the Application derived class changes, call the Application after The onTrimMemory call back function in class is held, to judge whether the corresponding first program page of first program is capped.
Optionally, the onTrimMemory call back function in the Application derived class is called, to judge described When whether the corresponding first program page of one program is capped, further includes:
Identify the memory use state of first program;
When the memory use state of first program is hidden for all UI components in low memory and process, sentence The corresponding first program page of first program of breaking is capped.
Optionally, described to compare corresponding second program of the second program page with preset program white list It is right, to judge second program with the presence or absence of the step in the preset program white list, further includes:
Obtain the corresponding application package name of second program;
The preset program white list is traversed according to the application package name, to judge that the application package name is It is no to be present in the preset program white list.
Optionally, comprise at least one of the following application program in the preset program white list: the system in terminal is answered Reach the third party application of terminal preset threshold with program and confidence level.
Optionally, corresponding second program of the second program page is being compared with preset program white list Before, further includes:
Obtain the mounted program listing of terminal;
Application program in described the application list is identified, to judge whether the application program is that system is answered Use program;
When the application program is system application, the system application is added to the white name of preset program Dan Zhong, to generate the preset program white list.
Optionally, corresponding second program of the second program page is being compared with preset program white list Before, further includes:
Collect third party application;
The confidence level of the third party application is calculated according to preset confidence level computation rule, and judges the third Whether the confidence level of square application program reaches preset believability threshold;
When the confidence level of the third party application reaches preset believability threshold, by the third-party application journey Sequence is added in preset program white list, to generate the preset program white list.
In order to solve the above technical problems, the present invention also provides a kind of program page security alarm devices, comprising:
Monitor module, the display state of the first program for monitor terminal front stage operation, to judge first program Whether the corresponding first program page is capped;
Processing module, for when the first program page is capped, acquisition to be covered on the first program page The second program page, and corresponding second program of the second program page is compared with preset program white list It is right, to judge that second program whether there is in the preset program white list;
Execution module, for when second program is not present in the preset program white list, to the end End sends security alarm information.
Optionally, described program Pages Security alarm device further include:
First Initialize installation submodule, for being created in the object of the Application class in first program One is built-in with the Application derived class of onTrimMemory call back function, and in the Application derived class Global variable value carry out Initialize installation;
First monitors submodule, for monitoring whether the global variable value in the Application derived class changes, with It realizes and global monitoring is carried out to first program;
First calls submodule, for adjusting when the global variable value in the Application derived class changes With the onTrimMemory call back function in the Application derived class, to judge first program corresponding first Whether the program page is capped.
Optionally, described program Pages Security alarm device further include:
First identifies submodule, for identification the memory use state of first program;
First judging submodule is the institute in low memory and process for the memory use state when first program When thering is UI component to be hidden, judge that the corresponding first program page of first program is capped.
Optionally, described program Pages Security alarm device further include:
First acquisition submodule, for obtaining the corresponding application package name of second program;
Second judgment submodule, for traversing the preset program white list according to the application package name, to sentence The application package name of breaking whether there is in the preset program white list.
Optionally, in described program Pages Security alarm device, in the preset program white list include it is following at least A kind of application program: system application and confidence level in terminal reach the third party application of terminal preset threshold.
Optionally, described program Pages Security alarm device further include:
Second acquisition submodule, for obtaining the mounted program listing of terminal;
Second identification submodule, for being identified to the application program in described the application list, described in judgement Whether application program is system application;
First addition submodule, is used for when the application program is system application, by the system application It is added in preset program white list, to generate the preset program white list.
Optionally, described program Pages Security alarm device further include:
First collects submodule, for collecting third party application;
Third judging submodule, for according to preset confidence level computation rule calculate the third party application can Reliability, and judge whether the confidence level of the third party application reaches preset believability threshold;
Second addition submodule, reaches preset believability threshold for the confidence level when the third party application When, the third party application is added in preset program white list, to generate the preset program white list.
In order to solve the above technical problems, the present invention also provides a kind of computer equipment, including memory and processor, it is described Computer-readable instruction is stored in memory, when the computer-readable instruction is executed by the processor, so that the place Manage the step of device executes above procedure Pages Security alarm method.
In order to solve the above technical problems, the present invention also provides a kind of storage medium for being stored with computer-readable instruction, institute When stating computer-readable instruction and being executed by one or more processors, so that one or more processors execute the above procedure page The step of security alarm method.
The beneficial effects of the present invention are:
The present invention passes through the display state of the first program of monitor terminal front stage operation, to judge that first program is corresponding The first program page whether be capped;When the first program page is capped, obtains and cover the first program page The second program page, and corresponding second program of the second program page is compared with preset program white list It is right, to judge that second program whether there is in the preset program white list;When second program is not present in When in the preset program white list, Xiang Suoshu terminal sends security alarm information.So, the present invention can monitor To when having the rogue program page to be covered on above the page of terminal current operation program, security alarm letter is sent to terminal in time Breath, to prompt user to judge whether the current operation program page is held as a hostage, and then avoids user without knowing it by it Personal relevant information input causes userspersonal information to leak or be stolen and damage user's into the rogue program page The appearance of the problems such as personal safety as well as the property safety.
The additional aspect of the present invention and advantage will be set forth in part in the description, these will become from the following description Obviously, or practice through the invention is recognized.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for For those skilled in the art, without creative efforts, it can also be obtained according to these attached drawings other attached Figure.
Fig. 1 is the basic skills flow diagram of program page security alarm method provided in an embodiment of the present invention;
Fig. 2 is to judge whether the first program page is coated in program page security alarm method provided in an embodiment of the present invention A kind of method flow schematic diagram when lid;
Fig. 3 is in program page security alarm method provided in an embodiment of the present invention according to onTrimMemory call back function A kind of method flow schematic diagram when whether the first program page is capped judged;
Fig. 4 is to judge that second program whether there is in program page security alarm method provided in an embodiment of the present invention In a kind of method flow schematic diagram of the preset program white list;
Fig. 5 is when generating preset program white list in program page security alarm method provided in an embodiment of the present invention A kind of method flow schematic diagram;
Fig. 6 is when generating preset program white list in program page security alarm method provided in an embodiment of the present invention Another method flow schematic diagram;
Fig. 7 is program page security alarm device basic structure block diagram provided in an embodiment of the present invention;
Fig. 8 is computer equipment basic structure block diagram provided in an embodiment of the present invention.
Specific embodiment
In order to enable those skilled in the art to better understand the solution of the present invention, below in conjunction in the embodiment of the present invention Attached drawing, technical scheme in the embodiment of the invention is clearly and completely described.
In some processes of the description in description and claims of this specification and above-mentioned attached drawing, contain according to Multiple operations that particular order occurs, but it should be clearly understood that these operations can not be what appears in this article suitable according to its Sequence is executed or is executed parallel, and the serial number of the operation is only used for distinguishing each different operation, serial number not generation itself Table it is any execute sequence.In addition, these processes may include more or fewer operations, and these operations can be in order It executes or executes parallel.It should be noted that the description such as herein " first ", " second ", be for distinguish different message, Equipment, module etc. do not represent sequencing, also do not limit " first " and " second " and are different type.
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, those skilled in the art's every other embodiment obtained under the premise of no creative work, It shall fall within the protection scope of the present invention.
Embodiment
Those skilled in the art of the present technique are appreciated that " terminal " used herein above, " terminal device " both include wireless communication The equipment of number receiver, only has the equipment of the wireless signal receiver of non-emissive ability, and including receiving and emitting hardware Equipment, have on bidirectional communication link, can execute two-way communication reception and emit hardware equipment.This equipment It may include: honeycomb or other communication equipments, shown with single line display or multi-line display or without multi-line The honeycomb of device or other communication equipments;PCS (Personal Communications Service, PCS Personal Communications System), can With combine voice, data processing, fax and/or communication ability;PDA (Personal Digital Assistant, it is personal Digital assistants), it may include radio frequency receiver, pager, the Internet/intranet access, web browser, notepad, day It goes through and/or GPS (Global Positioning System, global positioning system) receiver;Conventional laptop and/or palm Type computer or other equipment, have and/or the conventional laptop including radio frequency receiver and/or palmtop computer or its His equipment." terminal " used herein above, " terminal device " can be it is portable, can transport, be mounted on the vehicles (aviation, Sea-freight and/or land) in, or be suitable for and/or be configured in local runtime, and/or with distribution form, operate in the earth And/or any other position operation in space." terminal " used herein above, " terminal device " can also be communication terminal, on Network termination, music/video playback terminal, such as can be PDA, MID (Mobile Internet Device, mobile Internet Equipment) and/or mobile phone with music/video playing function, it is also possible to the equipment such as smart television, set-top box.
The user terminal referred in the present embodiment is above-mentioned terminal.
Referring to Fig. 1, the basic skills process that Fig. 1 is program page security alarm method provided in an embodiment of the present invention is shown It is intended to.
As shown in Figure 1, described program Pages Security alarm method, comprising the following steps:
S100: the display state of the first program of monitor terminal front stage operation, to judge first program corresponding Whether the one program page is capped.
In the application, Activity is most basic display module, referred to as " activity ", and an Activity is usual A corresponding individual screen.In the present embodiment, the background server of terminal passes through the first journey of monitor terminal front stage operation All Activity objects in sequence carry out the display state of the first program of monitor terminal front stage operation, to judge described Whether its corresponding first program page is covered one program by the second program page in the process of running.When first program When the page is covered by the second program page, illustrate that the first program page enters running background.Second program page Face is the corresponding program page of at least one random procedure other than the program page in first program.
S200: when the first program page is capped, the second journey being covered on the first program page is obtained The sequence page, and corresponding second program of the second program page is compared with preset program white list, with judgement Second program whether there is in the preset program white list.
In the present embodiment, when judging that the first program page is covered by the second program page, by the end The background server at end obtains the second program page, then carries out identification to the second program page again and show that its is corresponding Second program, such as you can get it described the by the header information in the corresponding page address in identification second program page face The corresponding program information of second program corresponding to the two program pages.Identification obtain the corresponding program information of the second program it Afterwards, according to the corresponding program information of second program, second program is compared with preset program white list, from And judges second program and whether there is in the preset program white list.For example, according to the spy of second program Sign identification information traverses the program in the preset program white list, and whether compare has in the preset program white list The program consistent with the signature identification information of second program, if so, it is described pre- then to prove that second program is present in If program white list in.The signature identification information of second program is to characterize the unique identification of second program.
S300: when second program is not present in the preset program white list, Xiang Suoshu terminal sends peace Full warning information.
In the present embodiment, when second program is not present in the preset program white list, described in explanation Second program may be the rogue program of intentional attack terminal, and risk is higher, at this point, being touched by the terminal background server The alarm event built in it is sent out, Xiang Suoshu terminal foreground sends security alarm information, judges current operation with warning terminal user Whether the program page is held as a hostage.The security alarm information can be popping up safety in the form of prompt window or call tag Warning information is simultaneously showed in the terminal foreground.For example, being shown " after APP has entered using prompt window on the terminal foreground The security alarm information of the printed words such as platform operation, if enter Pages Security inspection ".Moreover, when the prompt window is showed in institute When stating terminal foreground, the terminal foreground program page is locked, operation can not be executed, when the user clicks in the prompt window Instruction button after could restore that the function of operating can be performed, the instruction button in the prompt window includes "Yes" and "No" Two buttons.
Program page security alarm method described in above-described embodiment is by being covered on having listened to the rogue program page When above the page of terminal current operation program, security alarm information is sent to terminal in time, to prompt the current fortune of user's judgement Whether the line program page is held as a hostage, and then avoids user without knowing it by the relevant information input of its people to malice The appearance for the problems such as causing userspersonal information to leak or be stolen and damage the personal safety as well as the property safety of user in the program page.
In some embodiments, referring to Fig. 2, Fig. 2 is program page security alarm method provided in an embodiment of the present invention A kind of middle method flow schematic diagram judged when whether the first program page is capped.
As shown in Fig. 2, the step S100 further includes step S110 to step S130.Wherein, S110: in first journey Created in the object of Application class in sequence Application that one is built-in with onTrimMemory call back function after Class is held, and Initialize installation is carried out to the global variable value in the Application derived class.S120: described in monitoring Whether the global variable value in Application derived class changes, and carries out global monitoring to first program to realize. S130: when the global variable value in the Application derived class changes, the Application is called to inherit OnTrimMemory call back function in class, to judge whether the corresponding first program page of first program is capped.
Application class is to save global variable and the basic class that designs, as Activity and Service When Android frame in a system component, when be located at the android system in application program launching when, system meeting The object of an Application class corresponding with the application program is automatically created, and only creates one, for storing system Some global informations of system.In addition, system will also create a process, so that all in the application program having been turned on Activity can be run in the process.In this way, the global change in the object for passing through the initialization Application class Amount, can make all Activity in the same application program that can acquire these global variables.It ought apply Global variable value in some Activity of program changes, then other Activity's in the application program is complete Office's variate-value can also change correspondingly.
In the present embodiment, the background server of the terminal is by the methods of override in first program An Application derived class is created in the object of Application class, to complete in the Application derived class Office's variate-value carries out Initialize installation, and onTrimMemory is arranged in the Application derived class of the creation and returns Letter of transfer number, the onTrimMemory call back function is for instructing application APP to carry out memory in the case where different memories Release.After global variable value in the Application derived class described in Initialize installation, due to some of application program Global variable value in Activity changes, and the global variable value that will lead to other Activity also changes correspondingly, therefore, By monitoring whether the global variable value in the Application derived class changes, first program is carried out to realize The overall situation is monitored.When the global variable value in the Application class changes, illustrate that program is possible to meeting because of quilt at this time Other applications cover and enter running background, at this point it is possible to by calling in the Application derived class OnTrimMemory call back function to judge whether the corresponding first program page of first program is capped, and then determines Whether first program enters running background.
It in the present embodiment, is the program page provided in an embodiment of the present invention security alarm side also referring to Fig. 3, Fig. 3 A kind of method flow schematic diagram when judging whether the first program page is capped according to onTrimMemory call back function in method.
As shown in figure 3, the step S130 further includes step S131 to S132.Wherein, S131: identification first program Memory use state.S132: when the memory use state of first program is all UI groups in low memory and process When part is hidden, judge that the corresponding first program page of first program is capped, that is, after determining that first program enters Platform operation.
In the present embodiment, the background server of the terminal is by calling in the Application derived class OnTrimMemory call back function, to identify the memory of first program from fine-grained Memory recycle management readjustment API Use state, the memory use state are broadly divided into following four state: owning in application program low memory and process UI component is hidden, application program low memory and process are in background process list, application program low memory and process In the middle part of background process list and application program low memory and process background process list the last one, it is at once clear Reason.Wherein, the generation of the first state representation application program is visible sexually revises and reflects application program thence into running background;And Three kinds of states next then characterize application program and run and reflect position of the application program in background program list in the background. When the result of onTrimMemory call back function output is that all UI components are hidden in application program low memory and process When hiding, judge that the corresponding first program page of first program is capped, first program enters running background.
Above-described embodiment is by monitoring whether the global variable value of activity in the Application derived class becomes Change, may be implemented to carry out first program global monitoring, avoid the Onstop Life Cycle to single activity object Phase is monitored and is judged one by one, so that snoop procedure is simple and fast;Solve activity by third party sdk band or Broken into aar and caused by the third party's integration problem that can not be modified;And it avoids snoop logic and mixes with page logic Together, so that page switching not Caton.
In some embodiments, referring to Fig. 4, Fig. 4 is program page security alarm method provided in an embodiment of the present invention Middle judgement second program whether there is in a kind of method flow schematic diagram of the preset program white list.
As shown in figure 4, told step S200 further includes step S210 to step S220.Wherein, S210: described second is obtained The corresponding application package name of program.S220: the preset program white list is traversed according to the application package name, to sentence The application package name of breaking whether there is in the preset program white list.
In the present embodiment, obtain the corresponding program information of the second program corresponding to the second program page it Afterwards, by the background server of the terminal by the way that the corresponding program information of second program is input to the terminal built-in In api interface for inquiry application packet name information, with from the api interface for inquiry application packet name information Middle retrieval obtains the corresponding application package name of second program, then traverses further according to the application package name described pre- If program white list, the application package name whether having in the preset program white list with second program compared Consistent program, to judge that the application package name whether there is in the preset white name of program according to comparison result Dan Zhong.Wherein, when having the consistent journey of application package famous prime minister with second program in the preset program white list When sequence, then judge that second program is present in the preset program white list.
In some embodiments, by corresponding second program of the second program page and preset program white list Before being compared, it is also necessary to generate preset program white list according to certain create-rule, with for be covered on it is described The second program page on the first program page is compared.In the present embodiment, include in the preset program white list The system application and confidence level of terminal reach at least one of the third party application of terminal preset threshold.
In the present embodiment, referring to Fig. 5, Fig. 5 is in program page security alarm method provided in an embodiment of the present invention Generate a kind of method flow schematic diagram when preset program white list.
As shown in figure 5, when in the preset program white list including the system application of terminal, the step It can also include step S400 to step S600 before S200.Wherein, S400: the mounted program listing of terminal is obtained.S500: Application program in described the application list is identified one by one, to judge whether the application program is system application journey Sequence.S600: when the application program is system application, the system application is added to the white name of preset program Dan Zhong, to generate the preset program white list.
In the present embodiment, it is inquired by the background server of the terminal by all memory spaces to terminal, The program that can be run in the terminal is obtained, and the program of the acquisition is ranked up according to application package name, is generated Program listing, to acquire the mounted program listing of the terminal.Then, by being arranged for filtering out system application The program of program screens logic, and screens logic according to described program and carry out one to the application program in described the application list One identification, for example, judging the app.flags&ApplicationInfo.FLAG_SYSTEM of each application program)!Value whether be 0, if so, indicating that the application program is system application, then the application package name of the application program is obtained and records, as general After application program in described the application list has all identified, the application program of all application programs that will acquire and record In the preset program white list of Bao Mingzhi, to generate the preset program white list.It is in the preset program white list The application program of safety.
In the present embodiment, referring to Figure 6 together, Fig. 6 is the program page provided in an embodiment of the present invention security alarm side Another method flow schematic diagram when preset program white list is generated in method.
As shown in fig. 6, as the third party for reaching terminal preset threshold in the preset program white list including confidence level It can also include step S700 to step S900 before the step S200 when application program.Wherein, S700: third party is collected Application program.S800: the confidence level of the third party application is calculated according to preset confidence level computation rule, and judges institute Whether the confidence level for stating third party application reaches preset believability threshold.S900: when the third party application When confidence level reaches preset believability threshold, the third party application is added in preset program white list, with Generate the preset program white list.
In the present embodiment, the background server of the terminal can collect third-party application by way of web crawlers Program, and include the application package name for collecting the third party application, source when collecting third party application The relevant informations such as company information, user's in-service evaluation, download time.The related letter of the third party application is obtained collecting After breath, according to preset confidence level computation rule, confidence level calculating is carried out to each third party application come is collected, After its corresponding confidence level out to be calculated, judge whether the confidence level of the calculated third party application reaches eventually Pre-set believability threshold requirement in end.When the confidence level of the third party application reaches preset believability threshold When, illustrate that the third party application is safe.It is obtained by terminal background server and records the third party application pair The application package name answered, when the third party application come to all collections all judges whether its confidence level reaches in terminal It is safe third party by the identification for being obtained and being recorded by terminal background server after pre-set believability threshold requires Application program is added in preset program white list, to generate the preset program white list.
In the present embodiment, the preset confidence level computation rule can according to the third party application come The relevant informations such as source company information, user's in-service evaluation, download time calculate.For example, according to above-mentioned three relevant informations point Not Ji Suan confidence level score value, the weight that shared by the pre-set each single item relevant information of synthesis confidence level calculates finally determines The confidence level of the calculated third party application.According to the source enterprise popularity in the third party application Come when calculating confidence level, the preset confidence level computation rule are as follows: source popularity of enterprise is divided into five stars, In, a star is 20 points, and two stars are 40 points, and three-star is 60 points, and four-star is 80 points, and five-star is 100 points, and source is looked forward to Industry popularity be arranged weight be 35%, at this point, if the source enterprise popularity of the third party application be it is three-star, should Third party application calculated confidence score in this information of source enterprise information is 21 points.According to described User's in-service evaluation in tripartite's application program is come when calculating confidence level, the preset confidence level computation rule are as follows: will use Family in-service evaluation is also classified into five stars, wherein a star is 20 points, and two stars are 40 points, and three-star is 60 points, four-star to be 80 points, five-star is 100 points, and user's in-service evaluation setting weight is 35%, at this point, if the use of the third party application Family in-service evaluation is four-star, the then third party application calculated confidence level in this information of user's in-service evaluation It is scored at 28 points.When according to the download time in the third party application to calculate confidence level, it is described it is preset can Reliability computation rule are as follows: download time is divided into five ranks, wherein 5,000 person-times or less ranks are 20 points, 5,000-2 ten thousand person-times Rank is 40 points, and 20,000-5 ten thousand person-times of people ranks are 60 points, and 50,000-10 ten thousand person-times of people ranks are 80 points, and 10 hundred million person-times with higher level Wei not be 100 points, and user's in-service evaluation setting weight is 40%, at this point, if the download time of the third party application is 8 Ten thousand+person-time, then the third party application calculated confidence score in this information of download time is 28 points.It is comprehensive Three relevant informations show that the confidence level of the third party application is 77 points, at this point, can if pre-set in terminal Confidence threshold is 75 points, then 77 points of > 75 divide, and judge that the confidence level of the third party application reaches preset confidence level threshold Value, that is, illustrate that the third party application is safe.
The embodiment of the present invention also provides a kind of program page security alarm device to solve above-mentioned technical problem.Please specifically it join Fig. 7 is read, Fig. 7 is program page security alarm device basic structure block diagram provided in an embodiment of the present invention.
As shown in fig. 7, a kind of program page security alarm device, comprising: monitor module, processing module and execute mould Block.Wherein, the display state monitored module and be used for the first program of monitor terminal front stage operation, to judge first journey Whether the corresponding first program page of sequence is capped;The processing module is used to obtain when the first program page is capped Take the second program page being covered on the first program page, and by corresponding second program of the second program page It is compared with preset program white list, to judge that second program whether there is in the preset program white list In;The execution module is used for the Xiang Suoshu terminal when second program is not present in the preset program white list Send security alarm information.
Program page security alarm device described in above-described embodiment is by being covered on having listened to the rogue program page When above the page of terminal current operation program, security alarm information is sent to terminal in time, to prompt the current fortune of user's judgement Whether the line program page is held as a hostage, and then avoids user without knowing it by the relevant information input of its people to malice The appearance for the problems such as causing userspersonal information to leak or be stolen and damage the personal safety as well as the property safety of user in the program page.
In some embodiments, described program Pages Security alarm device further include: the first Initialize installation submodule, One, which monitors submodule and first, calls submodule.Wherein, the first Initialize installation submodule is used in first program In Application class object in the Application that is built-in with onTrimMemory call back function of creation one inherit Class, and Initialize installation is carried out to the global variable value in the Application derived class;Described first, which monitors submodule, uses Whether change in the global variable value monitored in the Application derived class, first program is carried out entirely with realizing Office monitors;Described first calls submodule to be used for when the global variable value in the Application derived class changes, The onTrimMemory call back function in the Application derived class is called, to judge first program corresponding Whether the one program page is capped.
In some embodiments, described program Pages Security alarm device further include: the first identification submodule and first is sentenced Disconnected submodule.Wherein, the memory use state of the first identification submodule first program for identification;Described first sentences Disconnected submodule is used to be hidden when the memory use state of first program for all UI components in low memory and process When, judge that the corresponding first program page of first program is capped.
In some embodiments, described program Pages Security alarm device further include: the first acquisition submodule and second is sentenced Disconnected submodule.Wherein, first acquisition submodule is for obtaining the corresponding application package name of second program;Described Two judging submodules are used to traverse the preset program white list according to the application package name, described using journey to judge Sequence packet name whether there is in the preset program white list.
In some embodiments, in described program Pages Security alarm device, include in the preset program white list Following at least one application program: the third party that system application and confidence level in terminal reach terminal preset threshold answers Use program.
In some embodiments, described program Pages Security alarm device further include: the second acquisition submodule, the second identification Submodule and the first addition submodule.Wherein, second acquisition submodule is for obtaining the mounted program listing of terminal;Institute The second identification submodule is stated for identifying to the application program in described the application list, to judge the application program It whether is system application;The first addition submodule is used for when the application program is system application, by institute It states system application to be added in preset program white list, to generate the preset program white list.
In some embodiments, described program Pages Security alarm device further include: first collects submodule, third judgement Submodule and the second addition submodule.Wherein, the first collection submodule is for collecting third party application;The third Judging submodule is used to calculate the confidence level of the third party application according to preset confidence level computation rule, and judges institute Whether the confidence level for stating third party application reaches preset believability threshold;The second addition submodule is used for when described When the confidence level of third party application reaches preset believability threshold, the third party application is added to preset In program white list, to generate the preset program white list.
In order to solve the above technical problems, the embodiment of the invention also provides a kind of computer equipments.Referring specifically to Fig. 8, Fig. 8 is computer equipment basic structure block diagram provided in an embodiment of the present invention.
As shown in figure 8, the schematic diagram of internal structure of computer equipment.As shown in figure 8, the computer equipment includes passing through to be Processor, non-volatile memory medium, memory and the network interface of bus of uniting connection.Wherein, the computer equipment is non-easy The property lost storage medium is stored with operating system, database and computer-readable instruction, can be stored with control information sequence in database Column, when which is executed by processor, may make processor to realize a kind of program page security alarm method.It should The processor of computer equipment supports the operation of entire computer equipment for providing calculating and control ability.The computer is set It can be stored with computer-readable instruction in standby memory, when which is executed by processor, may make processing Device executes a kind of program page security alarm method.The network interface of the computer equipment is used for and terminal connection communication.Ability Field technique personnel are appreciated that structure shown in Fig. 8, only the block diagram of part-structure relevant to application scheme, and The restriction for the computer equipment being applied thereon to application scheme is not constituted, and specific computer equipment may include than figure Shown in more or fewer components, perhaps combine certain components or with different component layouts.
In the present embodiment, the processor monitors module 10, processing module 20 and execution module 30 for executing in Fig. 7 Concrete function, and the memory is stored with program code and Various types of data needed for executing above-mentioned module.The network connects Mouth to the data between user terminal or server for transmitting.Memory in the present embodiment is stored with program Pages Security announcement Program code needed for executing all submodules in alarm device and data, server are capable of the program code and number of invoking server According to the function of executing all submodules.
Computer equipment described in above-described embodiment is by currently transporting having listened to the rogue program page and be covered on terminal When above the page of line program, security alarm information is sent to terminal in time, to prompt user to judge the current operation program page Whether it is held as a hostage, and then avoids user without knowing it by the relevant information input of its people into the rogue program page And the appearance for the problems such as causing userspersonal information to leak or be stolen and damage the personal safety as well as the property safety of user.
The present invention also provides a kind of storage mediums for being stored with computer-readable instruction, and the computer-readable instruction is by one When a or multiple processors execute, so that one or more processors execute any of the above-described embodiment described program Pages Security and accuse The step of alarm method.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, which can be stored in a computer-readable storage and be situated between In matter, the program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, storage medium above-mentioned can be The non-volatile memory mediums such as magnetic disk, CD, read-only memory (Read-Only Memory, ROM) or random storage note Recall body (Random Access Memory, RAM) etc..
It should be understood that although each step in the flow chart of attached drawing is successively shown according to the instruction of arrow, These steps are not that the inevitable sequence according to arrow instruction successively executes.Unless expressly stating otherwise herein, these steps Execution there is no stringent sequences to limit, can execute in the other order.Moreover, at least one in the flow chart of attached drawing Part steps may include that perhaps these sub-steps of multiple stages or stage are not necessarily in synchronization to multiple sub-steps Completion is executed, but can be executed at different times, execution sequence, which is also not necessarily, successively to be carried out, but can be with other At least part of the sub-step or stage of step or other steps executes in turn or alternately.
The above is only some embodiments of the invention, it is noted that for the ordinary skill people of the art For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications are also answered It is considered as protection scope of the present invention.

Claims (10)

1. a kind of program page security alarm method, which comprises the following steps:
The display state of first program of monitor terminal front stage operation, to judge the corresponding first program page of first program Whether it is capped;
When the first program page is capped, the second program page being covered on the first program page is obtained, and Corresponding second program of the second program page is compared with preset program white list, to judge second journey Sequence whether there is in the preset program white list;
When second program is not present in the preset program white list, Xiang Suoshu terminal sends security alarm letter Breath.
2. program page security alarm method according to claim 1, which is characterized in that the monitor terminal front stage operation The first program display state, to judge step that whether the corresponding first program page of first program is capped, also Include:
One, which is created, in the object of the Application class in first program is built-in with onTrimMemory call back function Application derived class, and in the Application derived class global variable value carry out Initialize installation;
Whether the global variable value monitored in the Application derived class changes, and is carried out with realizing to first program The overall situation is monitored;
When the global variable value in the Application derived class changes, the Application derived class is called In onTrimMemory call back function, to judge whether the corresponding first program page of first program is capped.
3. program page security alarm method according to claim 2, which is characterized in that call the Application OnTrimMemory call back function in derived class, to judge whether the corresponding first program page of first program is capped When, further includes:
Identify the memory use state of first program;
When the memory use state of first program is hidden for all UI components in low memory and process, institute is judged It is capped to state the corresponding first program page of the first program.
4. program page security alarm method according to claim 1, which is characterized in that described by second program page Corresponding second program in face is compared with preset program white list, to judge that second program whether there is in described Step in preset program white list, further includes:
Obtain the corresponding application package name of second program;
The preset program white list is traversed according to the application package name, to judge whether the application package name deposits It is in the preset program white list.
5. program page security alarm method according to claim 1, which is characterized in that the preset program white list In comprise at least one of the following application program: system application and confidence level in terminal reach the of terminal preset threshold Tripartite's application program.
6. program page security alarm method according to claim 5, which is characterized in that by the second program page Before corresponding second program is compared with preset program white list, further includes:
Obtain the mounted program listing of terminal;
Application program in described the application list is identified, to judge whether the application program is system application journey Sequence;
When the application program is system application, the system application is added to preset program white list In, to generate the preset program white list.
7. program page security alarm method according to claim 5, which is characterized in that by the second program page Before corresponding second program is compared with preset program white list, further includes:
Collect third party application;
The confidence level of the third party application is calculated according to preset confidence level computation rule, and judges that the third party answers Whether reach preset believability threshold with the confidence level of program;
When the confidence level of the third party application reaches preset believability threshold, the third party application is added It adds in preset program white list, to generate the preset program white list.
8. a kind of program page security alarm device characterized by comprising
Monitor module, the display state of the first program for monitor terminal front stage operation, to judge that first program is corresponding The first program page whether be capped;
Processing module, for when the first program page is capped, obtaining be covered on the first program page the The two program pages, and corresponding second program of the second program page is compared with preset program white list, with Judge that second program whether there is in the preset program white list;
Execution module, for when second program is not present in the preset program white list, Xiang Suoshu terminal to be sent out Send security alarm information.
9. a kind of electronic equipment, including memory and processor, computer-readable instruction, the meter are stored in the memory When calculation machine readable instruction is executed by the processor, so that the processor executes described in 1 to 7 any one of the claims Program page security alarm method.
10. a kind of storage medium for being stored with computer-readable instruction, the computer-readable instruction is handled by one or more When device executes, so that one or more processors execute program described in any one of the claims 1 to 7 claim Pages Security alarm method.
CN201910198863.7A 2019-03-15 2019-03-15 Program page security alarm method, apparatus, computer equipment and storage medium Pending CN110096874A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910198863.7A CN110096874A (en) 2019-03-15 2019-03-15 Program page security alarm method, apparatus, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910198863.7A CN110096874A (en) 2019-03-15 2019-03-15 Program page security alarm method, apparatus, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN110096874A true CN110096874A (en) 2019-08-06

Family

ID=67443071

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910198863.7A Pending CN110096874A (en) 2019-03-15 2019-03-15 Program page security alarm method, apparatus, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110096874A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114463730A (en) * 2021-07-15 2022-05-10 荣耀终端有限公司 Page identification method and terminal equipment

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150281260A1 (en) * 2013-03-07 2015-10-01 Inquest Integrated network threat analysis
US20150286485A1 (en) * 2012-12-20 2015-10-08 Tencent Technology (Shenzhen) Company Limited Method, apparatus, and system for human-machine interaction
CN107707768A (en) * 2017-10-27 2018-02-16 广东欧珀移动通信有限公司 The processing method and Related product of running game application
CN107995156A (en) * 2017-10-18 2018-05-04 东软集团股份有限公司 Pagejack processing method and processing device, storage medium, electronic equipment
CN108196930A (en) * 2018-01-18 2018-06-22 腾讯科技(深圳)有限公司 Applied program processing method, device, storage medium and computer equipment
CN108345486A (en) * 2018-01-31 2018-07-31 上海连尚网络科技有限公司 A kind of interface covering method, equipment and readable medium
US20180268129A1 (en) * 2017-03-16 2018-09-20 AVAST Software s.r.o. Detecting suspicious application overlays on a device
CN108920266A (en) * 2018-06-27 2018-11-30 努比亚技术有限公司 program switching method, intelligent terminal and computer readable storage medium
CN109062626A (en) * 2018-07-09 2018-12-21 北京奇艺世纪科技有限公司 Exchange method, device and the equipment of Web page component and Native component

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150286485A1 (en) * 2012-12-20 2015-10-08 Tencent Technology (Shenzhen) Company Limited Method, apparatus, and system for human-machine interaction
US20150281260A1 (en) * 2013-03-07 2015-10-01 Inquest Integrated network threat analysis
US20180268129A1 (en) * 2017-03-16 2018-09-20 AVAST Software s.r.o. Detecting suspicious application overlays on a device
CN107995156A (en) * 2017-10-18 2018-05-04 东软集团股份有限公司 Pagejack processing method and processing device, storage medium, electronic equipment
CN107707768A (en) * 2017-10-27 2018-02-16 广东欧珀移动通信有限公司 The processing method and Related product of running game application
CN108196930A (en) * 2018-01-18 2018-06-22 腾讯科技(深圳)有限公司 Applied program processing method, device, storage medium and computer equipment
CN108345486A (en) * 2018-01-31 2018-07-31 上海连尚网络科技有限公司 A kind of interface covering method, equipment and readable medium
CN108920266A (en) * 2018-06-27 2018-11-30 努比亚技术有限公司 program switching method, intelligent terminal and computer readable storage medium
CN109062626A (en) * 2018-07-09 2018-12-21 北京奇艺世纪科技有限公司 Exchange method, device and the equipment of Web page component and Native component

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
JUN LI 等: "App Genome: Callback Sequencing in Android", 《2017 IEEE/ACM 39TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING COMPANION (ICSE-C)》, 28 May 2017 (2017-05-28), pages 149 - 151, XP033113059, DOI: 10.1109/ICSE-C.2017.82 *
杨哲慜: "Java语言的程序漏洞检测与诊断技术", 《中国博士学位论文全文数据库 信息科技辑》, no. 3, 15 March 2015 (2015-03-15), pages 138 - 12 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114463730A (en) * 2021-07-15 2022-05-10 荣耀终端有限公司 Page identification method and terminal equipment

Similar Documents

Publication Publication Date Title
WO2017118340A1 (en) Notification message processing method and apparatus
CN109492423A (en) Method, apparatus, computer equipment and the storage medium of sensitive information filtering
CN108140088A (en) Disable the extension of malice browser
KR20190046960A (en) A method, device and mobile terminal for associating a notification message
CN111597065B (en) Method and device for collecting equipment information
CN113032766B (en) Application authority management method and device
CN111291206B (en) Method and device for marking house source, electronic equipment and storage medium
CN110471738A (en) Method for switching theme, device, electronic equipment and the storage medium of application program
CN111596971B (en) Application cleaning method and device, storage medium and electronic equipment
CN115037709B (en) Information processing method, apparatus, electronic device and storage medium
CN110796552A (en) Risk prompting method and device
US20240089223A1 (en) Information display method and apparatus, and electronic device
CN114117225A (en) Book recommendation method and book recommendation equipment
CN110096874A (en) Program page security alarm method, apparatus, computer equipment and storage medium
CN111552620B (en) Data acquisition method, device, terminal and storage medium
CN115146815A (en) Service processing method, device, computer and readable storage medium
CN105389241B (en) The performance test methods and system of the anti-harassment instrument of mobile terminal
CN111753191A (en) Advertisement popup intercepting method and device, electronic equipment and storage medium
CN110083525A (en) Localization method, device, computer equipment and the storage medium of RAM leakage
CN110717126A (en) Page browsing method and device, electronic equipment and computer readable storage medium
CN112306487A (en) Buried point data reporting method, device, equipment and storage medium
CN114461909A (en) Information processing method, information processing apparatus, electronic device, and storage medium
CN105868182B (en) A kind of text message processing method and device
CN114513527B (en) Information processing method, terminal equipment and distributed network
TWI754627B (en) Method and device for processing notification messages

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination