WO2013185569A1 - 控制终端关闭的方法和系统、计算机存储介质 - Google Patents

控制终端关闭的方法和系统、计算机存储介质 Download PDF

Info

Publication number
WO2013185569A1
WO2013185569A1 PCT/CN2013/076948 CN2013076948W WO2013185569A1 WO 2013185569 A1 WO2013185569 A1 WO 2013185569A1 CN 2013076948 W CN2013076948 W CN 2013076948W WO 2013185569 A1 WO2013185569 A1 WO 2013185569A1
Authority
WO
WIPO (PCT)
Prior art keywords
shutdown
security
terminal
safe
mode
Prior art date
Application number
PCT/CN2013/076948
Other languages
English (en)
French (fr)
Inventor
黄翚
张英皓
陈起儒
李世平
赵卫国
Original Assignee
腾讯科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 腾讯科技(深圳)有限公司 filed Critical 腾讯科技(深圳)有限公司
Priority to SG11201405747WA priority Critical patent/SG11201405747WA/en
Publication of WO2013185569A1 publication Critical patent/WO2013185569A1/zh
Priority to US14/484,652 priority patent/US20140380479A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/81Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer by operating on the power supply, e.g. enabling or disabling power-on, sleep or resume operations

Definitions

  • the present invention relates to security detection technologies, and in particular, to a method and system for controlling terminal shutdown, and a computer storage medium.
  • the shutdown of the terminal is generally controlled by the operating system of the terminal.
  • the traditional method of controlling the terminal to be turned off is usually to pop up a dialog box for closing the terminal when the shutdown command is detected, including the options of standby, shutdown, and restart.
  • the terminal is directly closed.
  • a method for controlling terminal shutdown includes the following steps: intercepting a shutdown operation; performing corresponding security detection according to a preset security detection item; performing corresponding processing on a security risk, and closing the terminal after the processing ends.
  • a system for controlling terminal shutdown includes: an intercepting module for intercepting a shutdown operation; a security detecting module for performing a corresponding security detection according to a preset security detection item; and a security shutdown module for performing corresponding processing on a security risk And close the terminal after processing ends.
  • one or more computer storage media that provide increased security must be provided.
  • One or more computer storage media containing computer executable instructions for performing a method of controlling terminal shutdown, the method comprising the steps of:
  • the method and system for controlling the terminal to be closed and the computer storage medium intercept the shutdown operation when the terminal is closed, perform security detection according to the preset security detection item, and perform corresponding processing on the security risk, and then close the terminal after the processing ends. Since some security risks that may exist in the terminal are handled before the terminal is shut down, the security of the terminal can be improved, so that the terminal is in a more secure environment in the next operation, and the next startup speed, running speed, and the like of the terminal are also improved.
  • FIG. 1 is a schematic flow chart of a method for controlling a terminal to be closed in an embodiment
  • FIG. 2 is a schematic diagram of a secure shutdown selection interface in an operating system
  • FIG. 3 is a schematic diagram of a secure shutdown operation interface in an operating system
  • FIG. 4 is a schematic diagram of a secure shutdown processing interface in an operating system
  • FIG. 5 is a structural block diagram of a system for controlling a terminal to be closed in an embodiment
  • FIG. 6 is a structural block diagram of a safety shutdown module in an embodiment
  • FIG. 7 is a structural block diagram of a safety shutdown module in another embodiment.
  • a method for controlling terminal shutdown includes the following steps:
  • Step S102 intercepting the shutdown operation.
  • the shutdown process is intercepted, the security detection process is invoked, and the security detection process is performed, and the security detection is completed, and the security risks in the terminal are correspondingly processed, and then Activate the shutdown process to shut down the terminal.
  • the shutdown operation is intercepted when a shutdown command is detected.
  • This mode is an automatic interception mode, that is, when the user triggers the shutdown, the shutdown operation is intercepted.
  • the safe shutdown selection interface when the shutdown command is detected, the safe shutdown selection interface is entered, and the safe shutdown command is obtained through the safe shutdown selection interface to intercept the shutdown operation.
  • the safe shutdown command may be an instruction generated by a safe shutdown drop-down list item selected by the safe shutdown selection interface or a safety shutdown button or a safety shutdown extended menu item. This mode triggers the interception mode for the user, that is, when the user triggers the shutdown, the preset safe shutdown drop-down list item or the safe shutdown button or the safe shutdown extended menu item is selected to intercept the shutdown operation.
  • the way to set the secure shutdown option is different for different operating systems running on the terminal.
  • a safe shutdown button can be inserted in the original terminal close selection interface to generate a safe shutdown selection interface.
  • the dialog box function called by HOOK can be used to change the incoming dialog template resource, and modify the form process function to complete the button creation and response of the safe shutdown entry.
  • the security shutdown selection interface in the operating system enters the security shutdown selection interface when the user-triggered shutdown command is detected, and the preset security is included in the security shutdown selection interface.
  • the shutdown button when the user clicks the safe shutdown button, intercepts the shutdown operation.
  • Step S104 performing corresponding security detection according to the preset security detection item.
  • the predetermined security detections include at least one of Trojan killing, garbage removal, trace removal, repair vulnerability, security check, and software upgrade.
  • step S104 is specifically: reading and/or scanning the registry according to the preset security detection item; and/or scanning the terminal key position according to the preset security detection item.
  • the registry needs to be read.
  • the software registry is read, the current version number of the software is obtained, and the software needs to be upgraded according to the current version number of the software.
  • Terminal key locations include, but are not limited to, folders where Trojan viruses are common, registry locations, folders generated by common software spam, and so on.
  • the corresponding terminal key position can be set in advance when setting the safety detection item. For example, when the preset security detection includes Trojan killing, the registry and/or the terminal key location are scanned, and when the Trojan virus is scanned, the scan result is generated.
  • the preset security detection item includes garbage removal, the folder generated by the common software garbage is scanned, the scanned garbage file is obtained, and the scan result is generated.
  • step S106 corresponding processing is performed on the security risk, and the terminal is closed after the processing ends.
  • the step S106 specifically includes: obtaining a safe shutdown mode corresponding to the result of the security detection according to the preset relationship between the security detection result and the security shutdown mode; and displaying the obtained secure shutdown mode through the security shutdown operation interface.
  • different security detection results are preset to correspond to different security shutdown modes. For example, when scanning a Trojan virus, the user may be reminded to close the terminal after detecting the killing of the Trojan virus; when detecting that the software has an updated version, the user may be reminded to perform the software upgrade before closing the terminal; when detecting an operating system vulnerability The user can be reminded to fix the vulnerability and then close the terminal; when detecting the presence of junk files in the critical location of the terminal, the user can be reminded to clear the garbage and then close the terminal. Further, the safe shutdown mode can be demonstrated through the safe shutdown operation interface.
  • FIG. 3 it is a safe shutdown operation interface of an operating system, and the safe shutdown mode corresponding to the generated security detection result is displayed on the security shutdown operation interface, including the whole file detection and killing of the Trojan virus and the removal of traces.
  • the user can select the corresponding safe shutdown mode and click the safe shutdown button to process the security risk according to the safe shutdown mode selected by the user.
  • step S106 further includes: acquiring a safe shutdown mode selected by the security shutdown operation interface, processing the security vulnerability according to the selected security shutdown mode, and closing the terminal after the processing ends.
  • the terminal when the user selects the option of killing the virus Trojan and clicks the safe shutdown button, the terminal is completely checked and killed, and the terminal is closed after the killing is completed. After the user clicks the safe shutdown button, the terminal will automatically shut down after the virus Trojan kills, which will not affect the operation of other applications of the terminal, and will not waste user time.
  • the direct shutdown button may also be set in the safe shutdown operation interface.
  • the safe shutdown mode is skipped, and the terminal is directly controlled to be closed.
  • the direct shutdown option may also be set in the interface. It is convenient for the user to interrupt the processing and directly close the terminal. It is noted that FIG. 4 is only a safe shutdown processing interface provided by an embodiment, and is not intended to limit the present invention.
  • step S106 may further include: if it is detected that the selected safe shutdown mode is not acquired within the set time, the safe shutdown mode is automatically selected after the set time, according to the selected safe shutdown mode. The security risk is handled and the terminal is closed after processing.
  • the set time can be set to 10 seconds, 15 seconds, 20 seconds or 1 minute, and the like.
  • the safe shutdown mode can be automatically selected according to the default setting. As shown in Figure 3, you can automatically select the entire virus-killing Trojan and remove the traces, and then shut down the terminal after performing a full-scale check on the virus Trojan and clearing the trace.
  • the safe shutdown mode can also be automatically selected for the user according to the default setting, and the user can confirm whether to shut down according to the safe shutdown mode automatically selected by the default setting.
  • a setting interface of a default setting may be set in the security shutdown operation interface, and the user may set a default security shutdown mode through the setting interface, and when detecting that the safe shutdown mode selected by the user is not obtained within the set time, The security risks can be handled according to the safe shutdown mode in the default settings, and the terminal is closed after the processing ends.
  • an option to always shut down in the recommended safe shutdown mode can also be set in the safe shutdown operation interface.
  • the user selects the option of "no more reminder, safe shutdown is performed according to this"
  • the terminal intercepts the shutdown operation
  • the user does not need to participate in the selection again, and the terminal automatically performs the security detection result.
  • the user selects the corresponding safe shutdown mode.
  • the security detection of the terminal and the security risk are automatically processed, and the user does not need to initiate security detection actively, thereby saving user operation cost and operation time.
  • a system for controlling terminal shutdown includes an interception module 100, a security detection module 200, and a security shutdown module 300, wherein:
  • the intercept module 100 is used to intercept the shutdown operation.
  • the interception module 100 intercepts the shutdown process when the shutdown operation is triggered.
  • the security detection process is invoked by the security detection module 200, and the security detection process is performed. After the security detection is completed and the security risks in the terminal are processed correspondingly, the security shutdown module 300 activates the shutdown process to shut down the terminal.
  • the intercept module 100 is configured to intercept the shutdown operation when a shutdown command is detected.
  • This mode is an automatic interception mode, that is, when the user triggers the shutdown, the shutdown operation is intercepted.
  • the intercepting module 100 is configured to enter a safe shutdown selection interface when the shutdown command is detected, obtain a safe shutdown command through the secure shutdown selection interface, and intercept the shutdown operation.
  • the safe shutdown command may be an instruction generated by a safe shutdown drop-down list item selected by the safe shutdown selection interface or a safety shutdown button or a safety shutdown extended menu item. This mode triggers the interception mode for the user, that is, when the user triggers the shutdown, the preset safe shutdown drop-down list item or the safe shutdown button or the safe shutdown extended menu item is selected to intercept the shutdown operation.
  • the security detection module 200 is configured to perform corresponding security detection according to a preset security detection item.
  • the security detection item includes at least one of a Trojan killing, cleaning up garbage, clearing traces, repairing a vulnerability, a security check, and a software upgrade.
  • the security detection module 200 is configured to read and/or scan the registry according to the preset security detection item; and/or scan the terminal key location according to the preset security detection item.
  • the security shutdown module 300 is configured to perform corresponding processing on security risks and close the terminal after the processing ends.
  • the security shutdown module 300 includes a secure shutdown mode acquisition module 310, a security shutdown mode display module 320, and a first terminal shutdown control module 330, where:
  • the security shutdown mode obtaining module 310 is configured to obtain a security shutdown mode corresponding to the result obtained by the security detection according to the preset relationship between the security detection result and the security shutdown mode.
  • the safe shutdown mode display module 320 is configured to display a safe shutdown mode through a secure shutdown operation interface.
  • the first terminal shutdown control module 330 is configured to acquire a safe shutdown mode selected by the security shutdown operation interface, process the security vulnerability according to the selected security shutdown mode, and close the terminal after the process ends.
  • the security shutdown module 300 includes the security shutdown mode acquisition module 310 and the security shutdown mode display module 320, and a second terminal shutdown control module 340, wherein:
  • the second terminal shutdown control module 430 is configured to automatically select a safe shutdown mode after the set time, and if the security shutdown mode is not obtained within the set time, automatically select a safe shutdown mode according to the selected security shutdown mode. And close the terminal after processing ends.
  • the security shutdown module 300 can also include the security shutdown mode acquisition module 310, the security shutdown mode display module 320, the first terminal shutdown control module 330, and the second terminal shutdown control module 340.
  • an option to always shut down in the recommended safe shutdown mode can also be set in the safe shutdown operation interface. After the terminal intercepts the shutdown operation, the user does not need to participate in the selection again, and the terminal automatically selects the corresponding safe shutdown mode for the user according to the security detection result. In this embodiment, the security detection of the terminal and the security risk are automatically processed, and the user does not need to initiate security detection actively, thereby saving user operation cost and operation time.
  • the method and system for controlling the terminal to be closed may improve the security of the terminal by processing the security risks of the terminal before the terminal is shut down, so that the terminal is in a more secure environment in the next operation, and the terminal is improved next time. Start speed, running speed, etc.
  • the security risk is dealt with before the terminal is shut down, and the terminal is automatically shut down after the security threat is processed.
  • the user needs to take the initiative to initiate the security detection. Processing when the terminal is closed does not affect the operation of other applications of the terminal, which saves time and cost.
  • the Safe Shutdown drop-down list item or the Safe Shutdown button or the Safe Shutdown Extended menu item can be set in the Safe Shutdown Selection interface to implement the interception shutdown operation. Therefore, the above method and system for controlling the terminal to be closed are applicable to various terminals (such as Various operating systems running on personal computers, mobile phones, tablets, etc. (such as Windows, andriod, Mac) OS, etc.).
  • the ease of use is improved, and the user can select multiple safe shutdown modes through the safe shutdown operation interface, or can set the subsequent security detection when the terminal is closed without the user participating in the selection. It saves the user's operating cost and time and improves the user's experience.
  • the storage medium may be a magnetic disk, an optical disk, or a read-only storage memory (Read-Only) Memory, ROM) or Random Access Memory (RAM).

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Power Sources (AREA)
  • Safety Devices In Control Systems (AREA)

Abstract

提供了一种控制终端关闭的方法,包括以下步骤:拦截关机操作(S102);根据预设的安全检测项执行对应的安全检测(S104);对安全隐患进行处理,并在处理结束后关闭终端(S106)。所述方法可以在终端关闭前处理终端可能存在的一些安全隐患,从而提高了终端的安全性。还提供了一种控制终端关闭的系统和计算机存储介质。

Description

控制终端关闭的方法和系统、计算机存储介质
本申请要求于2012年06月11日提交中国专利局、申请号为201210190831.0、发明名称为“控制终端关闭的方法和系统”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
【技术领域】
本发明涉及安全检测技术,特别是涉及一种控制终端关闭的方法和系统、计算机存储介质。
【背景技术】
终端的关闭一般由终端的操作系统所控制。传统的控制终端关闭的方法通常是在检测到关机指令时,弹出关闭终端的对话框,包括待机、关闭和重新启动的选项,当用户选择关闭时,则直接将终端关闭。
终端在使用一段时间后,往往会出现一些安全隐患。例如,受到木马病毒入侵、存在系统漏洞、软件需要升级等。终端在关闭的时候很可能处于病毒入侵、性能状况不良的状态。然而,传统的这种控制终端关闭的方式,由于是直接将终端关闭,终端在下一次运行时很可能会处于不安全的环境中,也会影响终端下一次的启动速度、运行速度等。
【发明内容】
基于此,有必要针对传统的控制终端关闭的方法会影响到终端下一次运行的安全性的问题,提供一种能提高安全性的控制终端关闭的方法。
一种控制终端关闭的方法,包括以下步骤:拦截关机操作;根据预设的安全检测项执行对应的安全检测;对安全隐患进行对应处理,并在处理结束后关闭终端。
此外,还有必要提供一种能提高安全性的控制终端关闭的系统。
一种控制终端关闭的系统,包括:拦截模块,用于拦截关机操作;安全检测模块,用于根据预设的安全检测项执行对应的安全检测;安全关机模块,用于对安全隐患进行对应处理,并在处理结束后关闭终端。
另外,还有必提供一个或多个能提高安全性的计算机存储介质。
一个或多个包含计算机可执行指令的计算机存储介质,所述计算机可执行指令用于执行一种控制终端关闭的方法,所述方法包括以下步骤:
拦截关机操作;
根据预设的安全检测项执行对应的安全检测;
对安全隐患进行对应处理,并在处理结束后关闭终端。
上述控制终端关闭的方法和系统、计算机存储介质,在终端关闭时拦截关机操作,根据预设的安全检测项执行安全检测,并对安全隐患进行对应处理,在处理结束后才关闭终端。由于在终端关闭前处理了终端可能存在的一些安全隐患,能够提高终端的安全性,使得终端在下一次运行时处于更加安全的环境中,也改善了终端下一次的启动速度、运行速度等。
【附图说明】
图1为一个实施例中控制终端关闭的方法的流程示意图;
图2为一种操作系统中的安全关机选择界面的示意图;
图3为一种操作系统中的安全关机操作界面的示意图;
图4为一种操作系统中的安全关机处理界面的示意图;
图5为一个实施例中控制终端关闭的系统的结构框图;
图6为一个实施例中安全关机模块的结构框图;
图7为另一个实施例中的安全关机模块的结构框图。
【具体实施方式】
如图1所示,在一个实施例中,一种控制终端关闭的方法,包括以下步骤:
步骤S102,拦截关机操作。
进一步的,在一个实施例中,当触发关机操作时,需截取关机进程,调用安全检测进程,通过安全检测进程执行安全检测,待安全检测完成并对终端中的安全隐患进行对应处理后,再激活关机进程,从而关闭终端。
在一个实施例中,当监测到关机指令时则拦截关机操作。该方式为自动拦截方式,即当用户一触发关机则拦截关机操作。
在另一个实施例中,当监测到关机指令时进入安全关机选择界面,通过所述安全关机选择界面获取安全关机指令,拦截关机操作。具体的,安全关机指令可以是通过安全关机选择界面选择的安全关机下拉列表项或安全关机按钮或安全关机扩展菜单项所生成的指令。该方式为用户触发拦截方式,即当用户触发关机后需选择预设的安全关机下拉列表项或安全关机按钮或安全关机扩展菜单项才拦截关机操作。
具体的,对于运行在终端上的不同的操作系统,设置安全关机选项的方式也有所不同。例如,可在原有的终端关闭选择界面中插入安全关机按钮,生成安全关机选择界面。进一步的,可通过HOOK调用的对话框函数,更改传入的对话框模板资源,并修改窗体过程函数,完成安全关机入口的按钮创建及响应。
如图2所示,为一种操作系统中的安全关机选择界面,当监测到用户触发的关机指令时,则进入到该安全关机选择界面,在该安全关机选择界面中包含了预设的安全关机按钮,用户点击该安全关机按钮,则拦截关机操作。对于其他类型的操作系统(如andriod、Mac OS系统等),则可在安全关机选择界面中创建安全关机下拉列表项或安全关机扩展菜单项。
步骤S104,根据预设的安全检测项执行对应的安全检测。
在一个实施例中,预设的安全检测项包括木马查杀、清理垃圾、清除痕迹、修护漏洞、安全体检和软件升级中的至少一种。
不同的安全检测项对应设置了不同的安全检测。具体的,在一个实施例中,步骤S104具体为:根据预设的安全检测项读取和/或扫描注册表;和/或根据预设的安全检测项扫描终端关键位置。
对于一些安全检测项,需读取注册表。例如,当预设的安全检测项包括软件升级,则读取软件注册表,获取软件当前的版本号,根据软件当前的版本号判断软件是否需要升级。
对于一些安全检测项,则需要扫描注册表和/或终端关键位置。终端关键位置包括但不限于木马病毒常存在的文件夹、注册表位置、常用软件垃圾产生的文件夹等。可在设置安全检测项时预先设置对应的终端关键位置。例如,当预设的安全检测项包括木马查杀,则扫描注册表和/或终端关键位置,当扫描到木马病毒时,生成扫描结果。当预设的安全检测项包括清除垃圾,则扫描常用软件垃圾产生的文件夹,获取扫描到的垃圾文件,生成扫描结果。
步骤S106,对安全隐患进行对应处理,并在处理结束后关闭终端。
在一个实施例中,步骤S106具体包括:根据预设的安全检测结果与安全关机方式的对应关系获取与安全检测得到的结果对应的安全关机方式;通过安全关机操作界面展示获取的安全关机方式。
本实施例中,预先设置了不同的安全检测结果对应了不同的安全关机方式。例如,当扫描到木马病毒时可提醒用户进行木马病毒的查杀后再关闭终端;当检测到软件还有更新版本时可提醒用户进行软件升级后再关闭终端;当检测到操作系统存在漏洞时可提醒用户修复漏洞后再关闭终端;当检测到终端关键位置存在垃圾文件时可提醒用户清除垃圾后再关闭终端等等。进一步的,可通过安全关机操作界面展示安全关机方式。
如图3所示,为一种操作系统的安全关机操作界面,在该安全关机操作界面上展示了获取的与生成的安全检测结果对应的安全关机方式,包括全盘查杀木马病毒和清除痕迹的选项。用户可以通过选择相应的安全关机方式,并点击安全关机按钮,则可根据用户选择的安全关机方式对安全隐患进行处理。
在一个实施例中,步骤S106还包括:获取通过安全关机操作界面选择的安全关机方式,根据选择的安全关机方式对安全隐患进行处理,并在处理结束后关闭终端。
如图3所示,当用户选择全盘查杀病毒木马的选项并点击安全关机按钮时,则对终端进行全盘查杀病毒木马,在查杀结束后再关闭终端。在用户点击安全关机按钮后,由于终端在病毒木马查杀结束后会自动关闭,不会影响终端的其他应用程序的运行,也不会浪费用户时间。
在一个实施例中,还可在安全关机操作界面中设置直接关机按钮,用户点击该直接关机按钮,则跳过安全关机方式,直接控制终端关闭。如图4所示,在对终端的安全隐患进行处理的过程中,可通过安全关机处理界面提示用户正在进行处理安全隐患,处理结束后自动关闭终端,还可在该界面中设置直接关机选项,方便用户中断处理过程,直接关闭终端。在此说明的是,图4仅仅是一个实施例所提供的一种安全关机处理界面,并不用于限制本发明。
在另一个实施例中,步骤S106还可包括:若检测到在设定时间内未获取到选择的安全关机方式,则在设定时间后自动选择安全关机方式,根据该选择的安全关机方式对安全隐患进行处理,并在处理结束后关闭终端。
所述的设定时间可以设置为10秒、15秒、20秒或1分钟等。本实施例中,当通过安全关机操作界面展示安全关机方式后,若用户在该设定时间内未选择安全关机,则可根据默认设置自动选择安全关机方式。如图3所示,可自动选择全盘查杀病毒木马和清除痕迹后,对终端进行全盘查杀病毒木马和清除痕迹后再关闭终端。
在一个实施例中,也可根据默认设置自动为用户选择安全关机方式,由用户确认是否按照默认设置自动选择的安全关机方式进行关机。
具体的,可在安全关机操作界面中设置默认设置的设置界面,用户可通过该设置界面设置默认的安全关机方式,当检测到在设定时间内未获取到用户选择的安全关机方式时,则可按照默认设置中的安全关机方式对安全隐患进行处理,并在处理结束后关闭终端。
在一个实施例中,还可在安全关机操作界面中设置始终按推荐安全关机方式关机的选项。如图3所示,当用户选择“不再提醒,安全关机均按此执行”的选项时,则在以后终端拦截到关机操作后,则无需用户再参与选择,终端会根据安全检测结果自动为用户选择对应的安全关机方式。本实施例可以自动对终端进行安全检测并对安全隐患进行处理,无需用户主动发起安全检测,节省了用户操作成本和操作时间。
如图5所示,在一个实施例中,一种控制终端关闭的系统,包括拦截模块100、安全检测模块200和安全关机模块300,其中:
拦截模块100用于拦截关机操作。
进一步的,在一个实施例中,拦截模块100当触发关机操作时截取关机进程。通过安全检测模块200调用安全检测进程,通过安全检测进程执行安全检测,待安全检测完成并对终端中的安全隐患进行对应处理后,安全关机模块300再激活关机进程,从而关闭终端。
在一个实施例中,拦截模块100用于当监测到关机指令时则拦截关机操作。该方式为自动拦截方式,即当用户一触发关机则拦截关机操作。
在另一个实施例中,拦截模块100用于当监测到关机指令时进入安全关机选择界面,通过所述安全关机选择界面获取安全关机指令,拦截关机操作。具体的,安全关机指令可以是通过安全关机选择界面选择的安全关机下拉列表项或安全关机按钮或安全关机扩展菜单项所生成的指令。该方式为用户触发拦截方式,即当用户触发关机后需选择预设的安全关机下拉列表项或安全关机按钮或安全关机扩展菜单项才拦截关机操作。
安全检测模块200用于根据预设的安全检测项执行对应的安全检测。
在一个实施例中,安全检测项包括木马查杀、清理垃圾、清除痕迹、修复漏洞、安全体检和软件升级中的至少一种。
不同的安全检测项对应设置了不同的安全检测。进一步的,在一个实施例中,安全检测模块200用于根据预设的安全检测项读取和/或扫描注册表;和/或根据预设的安全检测项扫描终端关键位置。
安全关机模块300用于对安全隐患进行对应处理,并在处理结束后关闭终端。
在一个实施例中,如图6所示,安全关机模块300包括安全关机方式获取模块310、安全关机方式展示模块320和第一终端关闭控制模块330,其中:
安全关机方式获取模块310用于根据预设的安全检测结果与安全关机方式的对应关系获取与安全检测得到的结果对应的安全关机方式。
安全关机方式展示模块320用于通过安全关机操作界面展示安全关机方式。
第一终端关机控制模块330用于获取通过所述安全关机操作界面选择的安全关机方式,根据选择的安全关机方式对安全隐患进行处理,并在处理结束后关闭终端。
在另一个实施例中,如图7所示,安全关机模块300包括上述安全关机方式获取模块310和安全关机方式展示模块320外,还包括第二终端关闭控制模块340,其中:
第二终端关闭控制模块430用于若检测到在设定时间内未获取到选择的安全关机方式,则在设定时间后自动选择安全关机方式,根据该选择的安全关机方式对安全隐患进行处理,并在处理结束后关闭终端。
在其他实施例中,安全关机模块300还可同时包括上述安全关机方式获取模块310、安全关机方式展示模块320、第一终端关闭控制模块330和第二终端关闭控制模块340。
在一个实施例中,还可在安全关机操作界面中设置始终按推荐安全关机方式关机的选项。则在以后终端拦截到关机操作后,无需用户再参与选择,终端会根据安全检测结果自动为用户选择对应的安全关机方式。本实施例可以自动对终端进行安全检测并对安全隐患进行处理,无需用户主动发起安全检测,节省了用户操作成本和操作时间。
上述控制终端关闭的方法和系统,由于在终端关闭前处理了终端可能存在的一些安全隐患,能够提高终端的安全性,使得终端在下一次运行时处于更加安全的环境中,也改善了终端下一次的启动速度、运行速度等。
此外,在终端关闭前处理安全隐患,安全隐患处理结束后自动关闭终端,相对于传统的在发现终端有安全隐患时用户再主动发起安全检测的方式,由于安全隐患的处理需要花费一定时间,在终端关闭时进行处理不会影响终端的其他应用程序的运行,更加节省时间成本。
对于不同的操作系统,可在安全关机选择界面中设置安全关机下拉列表项或安全关机按钮或安全关机扩展菜单项实现拦截关闭操作,因此上述控制终端关闭的方法和系统适用于各种终端(如个人计算机、手机、平板电脑等)上运行的各种操作系统(如Windows、andriod、Mac OS等)。
另外,通过设置安全关机选择界面和安全关机操作界面,提高了易用性,用户可以通过安全关机操作界面选择多种安全关机方式,也可以设置后续的终端关闭时的安全检测无需用户参与选择,节省了用户的操作成本和时间,提高了用户的体验需求。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机程序来指令相关的硬件来完成,所述的程序可存储于一计算机可读取存储介质中,该程序在执行时,可包括如上述各方法的实施例的流程。其中,所述的存储介质可为磁碟、光盘、只读存储记忆体(Read-Only Memory,ROM)或随机存储记忆体(Random Access Memory,RAM)等。
以上所述实施例仅表达了本发明的几种实施方式,其描述较为具体和详细,但并不能因此而理解为对本发明专利范围的限制。应当指出的是,对于本领域的普通技术人员来说,在不脱离本发明构思的前提下,还可以做出若干变形和改进,这些都属于本发明的保护范围。因此,本发明专利的保护范围应以所附权利要求为准。

Claims (24)

  1. 一种控制终端关闭的方法,应用于终端,所述方法包括以下步骤:
    拦截关机操作;
    根据预设的安全检测项执行对应的安全检测;
    对安全隐患进行对应处理,并在处理结束后关闭终端。
  2. 根据权利要求1所述的控制终端关闭的方法,其特征在于,所述拦截关机操作的步骤为:当监测到关机指令时则拦截关机操作。
  3. 根据权利要求1所述的控制终端关闭的方法,其特征在于,所述拦截关机操作的步骤为:当监测到关机指令时进入安全关机选择界面,通过所述安全关机选择界面获取安全关机指令,拦截关机操作。
  4. 根据权利要求1所述的控制终端关闭的方法,其特征在于,所述预设的安全检测项包括木马查杀、清理垃圾、清除痕迹、修复漏洞、安全体检和软件升级中的至少一种。
  5. 根据权利要求4所述的控制终端关闭的方法,其特征在于,所述根据预设的安全检测项执行对应的安全检测的步骤为:
    根据预设的安全检测项读取和/或扫描注册表;和/或
    根据预设的安全检测项扫描终端关键位置。
  6. 根据权利要求1所述的控制终端关闭的方法,其特征在于,所述对安全隐患进行对应处理,并在处理结束后关闭终端的步骤包括:
    根据预设的安全检测结果与安全关机方式的对应关系获取与所述安全检测得到的结果对应的安全关机方式;
    通过安全关机操作界面展示所述安全关机方式。
  7. 根据权利要求6所述的控制终端关闭的方法,其特征在于,所述根据安全检测结果对安全隐患进行处理,并在处理结束后关闭终端的步骤还包括:
    获取通过所述安全关机操作界面选择的安全关机方式,根据所述选择的安全关机方式对安全隐患进行处理,并在处理结束后关闭终端。
  8. 根据权利要求6所述的控制终端关闭的方法,其特征在于,所述对安全隐患进行对应处理,并在处理结束后关闭终端的步骤还包括:
    若检测到在设定时间内未获取到选择的安全关机方式,则在所述设定时间后自动选择安全关机方式,根据所述选择的安全关机方式对安全隐患进行处理,并在处理结束后关闭终端。
  9. 一种控制终端关闭的系统,运行于终端,其特征在于,所述系统包括:
    拦截模块,用于拦截关机操作;
    安全检测模块,用于根据预设的安全检测项执行对应的安全检测;
    安全关机模块,用于对安全隐患进行对应处理,并在处理结束后关闭终端。
  10. 根据权利要求9所述的控制终端关闭的系统,其特征在于,所述拦截模块用于当监测到关机指令时则拦截关机操作。
  11. 根据权利要求9所述的控制终端关闭的系统,其特征在于,所述拦截模块用于当监测到关机指令时进入安全关机选择界面,通过所述安全关机选择界面获取安全关机指令,拦截关机操作。
  12. 根据权利要求9所述的控制终端关闭的系统,其特征在于,所述预设的安全检测项包括木马查杀、清理垃圾、清除痕迹、修复漏洞、安全体检和软件升级中的至少一种。
  13. 根据权利要求12所述的控制终端关闭的系统,其特征在于,所述安全检测模块用于根据预设的安全检测项读取和/或扫描注册表;和/或根据预设的安全检测项扫描终端关键位置。
  14. 根据权利要求9所述的控制终端关闭的系统,其特征在于,所述安全关机模块包括:
    安全关机方式获取模块,用于根据预设的安全检测结果与安全关机方式的对应关系获取与所述安全检测得到的结果对应的安全关机方式;
    安全关机方式展示模块,用于通过安全关机操作界面展示所述安全关机方式。
  15. 根据权利要求14所述的控制终端关闭的系统,其特征在于,所述安全关机模块还包括:
    第一终端关闭控制模块,用于获取通过所述安全关机操作界面选择的安全关机方式,根据所述选择的安全关机方式对安全隐患进行处理,并在处理结束后关闭终端。
  16. 根据权利要求14所述的控制终端关闭的系统,其特征在于,所述安全关机模块还包括:
    第二终端关闭控制模块,用于若检测到在设定时间内未获取到选择的安全关机方式,则在所述设定时间后自动选择安全关机方式,根据所述选择的安全关机方式对安全隐患进行处理,并在处理结束后关闭终端。
  17. 一个或多个包含计算机可执行指令的计算机存储介质,所述计算机可执行指令用于执行一种控制终端关闭的方法,其特征在于,所述方法包括以下步骤:
    拦截关机操作;
    根据预设的安全检测项执行对应的安全检测;
    对安全隐患进行对应处理,并在处理结束后关闭终端。
  18. 根据权利要求17所述的计算机存储介质,其特征在于,所述拦截关机操作的步骤为:当监测到关机指令时则拦截关机操作。
  19. 根据权利要求17所述的计算机存储介质,其特征在于,所述拦截关机操作的步骤为:当监测到关机指令时进入安全关机选择界面,通过所述安全关机选择界面获取安全关机指令,拦截关机操作。
  20. 根据权利要求17所述的计算机存储介质,其特征在于,所述预设的安全检测项包括木马查杀、清理垃圾、清除痕迹、修复漏洞、安全体检和软件升级中的至少一种。
  21. 根据权利要求20所述的计算机存储介质,其特征在于,所述根据预设的安全检测项执行对应的安全检测的步骤为:
    根据预设的安全检测项读取和/或扫描注册表;和/或
    根据预设的安全检测项扫描终端关键位置。
  22. 根据权利要求17所述的计算机存储介质,其特征在于,所述对安全隐患进行对应处理,并在处理结束后关闭终端的步骤包括:
    根据预设的安全检测结果与安全关机方式的对应关系获取与所述安全检测得到的结果对应的安全关机方式;
    通过安全关机操作界面展示所述安全关机方式。
  23. 根据权利要求22所述的计算机存储介质,其特征在于,所述根据安全检测结果对安全隐患进行处理,并在处理结束后关闭终端的步骤还包括:
    获取通过所述安全关机操作界面选择的安全关机方式,根据所述选择的安全关机方式对安全隐患进行处理,并在处理结束后关闭终端。
  24. 根据权利要求22所述的计算机存储介质,其特征在于,所述对安全隐患进行对应处理,并在处理结束后关闭终端的步骤还包括:
    若检测到在设定时间内未获取到选择的安全关机方式,则在所述设定时间后自动选择安全关机方式,根据所述选择的安全关机方式对安全隐患进行处理,并在处理结束后关闭终端。
PCT/CN2013/076948 2012-06-11 2013-06-07 控制终端关闭的方法和系统、计算机存储介质 WO2013185569A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
SG11201405747WA SG11201405747WA (en) 2012-06-11 2013-06-07 Method and system for controlling switch-off of terminal, and computer storage medium
US14/484,652 US20140380479A1 (en) 2012-06-11 2014-09-12 Method and System for Controlling Closing of Terminal, and Computer Storage Medium

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201210190831.0 2012-06-11
CN201210190831.0A CN102750477B (zh) 2012-06-11 2012-06-11 控制终端关闭的方法和系统

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US14/484,652 Continuation US20140380479A1 (en) 2012-06-11 2014-09-12 Method and System for Controlling Closing of Terminal, and Computer Storage Medium

Publications (1)

Publication Number Publication Date
WO2013185569A1 true WO2013185569A1 (zh) 2013-12-19

Family

ID=47030650

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2013/076948 WO2013185569A1 (zh) 2012-06-11 2013-06-07 控制终端关闭的方法和系统、计算机存储介质

Country Status (4)

Country Link
US (1) US20140380479A1 (zh)
CN (1) CN102750477B (zh)
SG (1) SG11201405747WA (zh)
WO (1) WO2013185569A1 (zh)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102750477B (zh) * 2012-06-11 2014-03-19 腾讯科技(深圳)有限公司 控制终端关闭的方法和系统
US20140325689A1 (en) * 2013-04-26 2014-10-30 Tencent Technology (Shenzhen) Company Limited Shutdown verification method and device
KR20170070694A (ko) * 2015-12-14 2017-06-22 삼성전자주식회사 전자 장치 및 그 동작방법
CN106203096B (zh) * 2016-07-13 2019-02-15 珠海豹趣科技有限公司 一种应用程序识别处理方法以及装置
CN106325457A (zh) * 2016-08-25 2017-01-11 广州御银科技股份有限公司 一种关机监控系统
CN108345798A (zh) * 2018-01-26 2018-07-31 北京奇虎科技有限公司 漏洞修复方法及装置
CN110134460B (zh) * 2019-05-17 2022-04-22 联想(北京)有限公司 系统控制方法、控制器、处理器及计算机可读介质
AU2019455635B2 (en) * 2019-06-24 2023-04-20 Nippon Telegraph And Telephone Corporation Information processing device, control method, and control program

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1399193A (zh) * 2001-07-24 2003-02-26 英业达股份有限公司 安全关闭主机的方法
CN1148646C (zh) * 2001-02-15 2004-05-05 英业达股份有限公司 保护Windows 9x系统安全关机的方法
CN102467218A (zh) * 2010-11-11 2012-05-23 英业达股份有限公司 电源关闭处理方法
CN102750477A (zh) * 2012-06-11 2012-10-24 腾讯科技(深圳)有限公司 控制终端关闭的方法和系统

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6105140A (en) * 1998-02-10 2000-08-15 Compaq Computer Corporation Secure power supply
US20020065869A1 (en) * 2000-11-29 2002-05-30 Brad Calder Method and process for virtualizing user interfaces
TW200428190A (en) * 2003-06-03 2004-12-16 Icp Electronics Inc Safe power-off system and method thereof
US8307443B2 (en) * 2007-09-28 2012-11-06 Microsoft Corporation Securing anti-virus software with virtualization
US9665712B2 (en) * 2010-02-22 2017-05-30 F-Secure Oyj Malware removal
US8694738B2 (en) * 2011-10-11 2014-04-08 Mcafee, Inc. System and method for critical address space protection in a hypervisor environment
US20140325689A1 (en) * 2013-04-26 2014-10-30 Tencent Technology (Shenzhen) Company Limited Shutdown verification method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1148646C (zh) * 2001-02-15 2004-05-05 英业达股份有限公司 保护Windows 9x系统安全关机的方法
CN1399193A (zh) * 2001-07-24 2003-02-26 英业达股份有限公司 安全关闭主机的方法
CN102467218A (zh) * 2010-11-11 2012-05-23 英业达股份有限公司 电源关闭处理方法
CN102750477A (zh) * 2012-06-11 2012-10-24 腾讯科技(深圳)有限公司 控制终端关闭的方法和系统

Also Published As

Publication number Publication date
SG11201405747WA (en) 2014-11-27
CN102750477A (zh) 2012-10-24
CN102750477B (zh) 2014-03-19
US20140380479A1 (en) 2014-12-25

Similar Documents

Publication Publication Date Title
WO2013185569A1 (zh) 控制终端关闭的方法和系统、计算机存储介质
EP3465517B1 (en) Hardware-based virtualized security isolation
US20200366694A1 (en) Methods and systems for malware host correlation
US9065725B1 (en) Techniques for virtual environment-based web client management
US9838417B1 (en) Intelligent context aware user interaction for malware detection
US20210306360A1 (en) Cybersecurity incident detection systems and techniques
EP2766846B1 (en) System and method for profile based filtering of outgoing information in a mobile environment
US10075457B2 (en) Sandboxing protection for endpoints
WO2013055029A1 (ko) 워터마크를 화면상에 표시하는 장치 및 방법
WO2010078812A1 (zh) 对文档的操作进行控制的方法和装置
US20200044893A1 (en) Providing on-demand vpn connectivity on a per-application basis
WO2013117148A1 (zh) 检测远程入侵计算机行为的方法及系统
WO2018201808A1 (zh) 病毒程序清理方法、存储介质及电子终端
WO2017161761A1 (zh) 一种启动应用app的方法及终端
US11228910B2 (en) Mobile communication device and method of determining security status thereof
CN111711656A (zh) 一种具有安全功能的网络边缘存储装置
CN108268223B (zh) 基于http数据传输的打印方法和打印控件
US8973145B2 (en) Antivirus computing system
CN115378686A (zh) 一种工控网络的沙盒应用方法、装置及存储介质
WO2015023088A1 (ko) 이메일의 첨부파일 처리시스템과 처리방법
WO2021022434A1 (zh) 一种应用监控方法、装置、存储介质及电子设备
CN112597492A (zh) 一种基于Windows内核的二进制可执行文件更改监测方法
US9805180B2 (en) Message sender authentication
Ko et al. A mantrap-inspired, user-centric data leakage prevention (DLP) approach
WO2018035927A1 (zh) 一种冻结应用的方法、装置以及终端

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13804174

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 30/04/2015)

122 Ep: pct application non-entry in european phase

Ref document number: 13804174

Country of ref document: EP

Kind code of ref document: A1