WO2015120756A1 - Method and device for identifying security of application process - Google Patents

Method and device for identifying security of application process Download PDF

Info

Publication number
WO2015120756A1
WO2015120756A1 PCT/CN2015/070361 CN2015070361W WO2015120756A1 WO 2015120756 A1 WO2015120756 A1 WO 2015120756A1 CN 2015070361 W CN2015070361 W CN 2015070361W WO 2015120756 A1 WO2015120756 A1 WO 2015120756A1
Authority
WO
WIPO (PCT)
Prior art keywords
file
feature
change
application
security
Prior art date
Application number
PCT/CN2015/070361
Other languages
French (fr)
Chinese (zh)
Inventor
李宇
温铭
张家柱
郑振宇
Original Assignee
北京奇虎科技有限公司
奇智软件(北京)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from CN201410051841.5A external-priority patent/CN104850775B/en
Priority claimed from CN201410076768.7A external-priority patent/CN104899515B/en
Application filed by 北京奇虎科技有限公司, 奇智软件(北京)有限公司 filed Critical 北京奇虎科技有限公司
Publication of WO2015120756A1 publication Critical patent/WO2015120756A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication

Definitions

  • the present invention relates to Internet technologies, and in particular, to an authentication method for application security, and an authentication device for application security.
  • Cloud is a metaphor for the Internet and the network. It represents the abstraction of the Internet and the underlying infrastructure. It can be roughly divided into public cloud security systems and private cloud security systems.
  • a public cloud security system usually refers to a cloud security system that third-party vendors can use directly to external users through their own infrastructure.
  • the private cloud security system is placed in a private environment. For example, enterprises, governments, and other organizations establish themselves in the equipment room, or the operators are well-built, but the whole is leased to an organization. Users outside the organization cannot access or use it.
  • Private cloud security systems are built by an organization to provide the most effective control over data, security, and quality of service.
  • the private cloud security system is applicable to a fully enclosed enterprise intranet environment, and is composed of multiple terminals and servers for managing the terminal.
  • the terminal can upload the identifier of the application to be authenticated to the server, and the server according to the local security authentication database.
  • the corresponding relationship between the saved program identifier and its security, the application is authenticated securely, and the authentication result is returned to the terminal, thereby realizing the security management of the terminal.
  • the security authentication database of the private cloud security system is updated from the public cloud security system, and some programs specific to the intranet may not be authenticated. In this case, the server needs to further obtain other files of the program from the terminal for security authentication. According to some reasons, if the related files of the program are lost on the original terminal for some reason, for example, some virus files may delete all related files after running, in which case the program cannot be authenticated securely. .
  • the present invention has been made in order to provide an authentication method for application security and an authentication device for application security that overcome the above problems or at least partially solve the above problems.
  • an authentication method for application security including:
  • the feature server receives an authentication request of the first feature terminal for security of the application
  • the service server is a server that performs security management on the first feature terminal and the second feature terminal based on an intranet;
  • the present invention provides a method for changing the security of an application, including:
  • the first feature server authenticates the security of the application of the feature terminal, and sends the authenticated security to the feature terminal for saving.
  • the first feature server is accessible to the feature terminal through the intranet. Server side;
  • an authentication method for application security including:
  • the second feature terminal receives the acquisition request of the executable file corresponding to the application sent by the feature server, and the acquisition request is sent after the feature server receives the authentication request of the first feature terminal for the security of the application.
  • the obtaining request carries the unique identification information of the application, wherein the executable file records an operation behavior of the application when the application is running, and the feature server is based on the intranet to the first feature terminal and a server that performs security management on the second feature terminal;
  • an apparatus for authenticating application security including:
  • a program authentication request module configured to receive, by the feature server, an authentication request of the security of the first feature terminal to the application
  • a first executable file requesting module configured to send, to the at least one second feature terminal, an acquisition request for an executable file corresponding to the application, where the acquisition request carries unique identification information of the application, where The executable file records an operation behavior of the application when the application is running, and the feature server is a server that performs security management on the first feature terminal and the second feature terminal based on an intranet;
  • An executable file receiving module configured to search for an executable file corresponding to the application according to the unique identifier information
  • the first security authentication module is configured to authenticate the security of the application according to the executable file.
  • the present invention provides an apparatus for changing the security of an application, comprising:
  • a security authentication module configured to identify, by the first feature server, the security of the application of the feature terminal, and send the authenticated security to the feature terminal for saving, where the first feature server is the feature The server that the terminal can access through the intranet;
  • a change obtaining request configured to receive an acquisition request of the feature terminal for multiple change files, where the change file is used to correct security of an application saved by the feature terminal;
  • a file extraction module configured to extract a plurality of change files according to the obtaining request, where the change file carries a corresponding file processing level
  • a file classification module configured to perform multiple extracted change files according to different file processing levels classification
  • the file sending module is configured to separately send the change file to the feature terminal according to the classification, so that the feature terminal processes the change files of different file processing levels according to different processing manners.
  • an apparatus for authenticating application security including:
  • Obtaining a request receiving module configured to receive, by the second feature terminal, an acquisition request for an executable file corresponding to the application sent by the feature server, where the obtaining request receives, by the feature server, the first feature terminal to the application After the authentication request is sent, the obtaining request carries unique identification information of the application, wherein the executable file records an operation behavior of the application when the application is running, and the feature server is based on an intranet pair
  • the first feature terminal and the second feature terminal perform a security management server;
  • An executable file searching module configured to locally search for an executable file corresponding to the application according to the unique identifier information, and send the executable file to the feature server to follow the executable file pair The security of the application is authenticated.
  • the present invention provides a program comprising readable code that, when executed on a terminal device, causes the terminal device to perform the method of authenticating the application security.
  • the present invention provides a readable medium in which the program is stored.
  • the second feature terminal after receiving the authentication request of the first feature terminal for the application security, the second feature terminal is requested to acquire the executable file of the application program to identify the security of the application according to the executable file.
  • the executable file can also be searched for on the second feature terminal different from the first feature terminal.
  • the terminal does not actively upload the executable file, but needs to further request the executable file from the server to the terminal. Therefore, the terminal does not need to upload the executable file of all the unknown security applications, only when needed. When uploading, it saves network bandwidth resources and server disk space.
  • FIG. 1 shows a flow chart of an authentication method for application security according to an embodiment of the present invention
  • FIG. 2 is a flow chart showing an authentication method of application security according to another embodiment of the present invention.
  • FIG. 3 is a block diagram showing the structure of an authentication device for application security according to an embodiment of the present invention.
  • FIG. 4 is a block diagram showing the structure of an authentication device for application security according to another embodiment of the present invention.
  • FIG. 5 is a flow chart showing a method for changing the security of an application according to an embodiment of the present invention.
  • FIG. 6 is a flow chart showing a method for changing the security of an application according to another embodiment of the present invention.
  • FIG. 7 is a block diagram showing the structure of a device for changing the security of an application according to an embodiment of the present invention.
  • FIG. 8 is a block diagram showing the structure of a device for changing the security of an application according to another embodiment of the present invention.
  • Figure 9 shows a block diagram of a server configured to perform the method according to the present invention.
  • Figure 10 illustrates a memory unit configured to hold or carry program code that implements the method in accordance with the present invention.
  • Embodiments of the invention may be applied to computer systems/servers that operate with numerous other general purpose or special purpose computing system environments or configurations.
  • Examples of well-known computing systems, environments, and/or configurations suitable for use with computer systems/servers include, but are not limited to, personal computer systems, server computer systems, thin clients, thick clients, handheld or laptop devices, based on Microprocessor systems, set-top boxes, programmable consumer electronics, networked personal computers, small computer systems, mainframe computer systems, and distributed cloud computing technology environments including any of the above, and the like.
  • the computer system/server can be described in the general context of computer system executable instructions (such as program modules) being executed by a computer system.
  • program modules may include routines, programs, target programs, components, logic, data structures, and the like that perform particular tasks or implement particular abstract data types.
  • the computer system/server can be implemented in a distributed cloud computing environment where tasks are performed by remote processing devices that are linked through a communication network.
  • program modules may be located on a local or remote computing system storage medium including storage devices.
  • FIG. 1 a flowchart of an authentication method for application security according to an embodiment of the present invention is shown, which may specifically include:
  • Step 101 The first feature server receives an authentication request of the first feature terminal for security of the application.
  • the first feature server is a server accessible by a specific terminal, that is, a private cloud security system.
  • the private cloud security system is mostly installed in the intranet of the enterprise, and can manage each terminal of the intranet.
  • the specific terminal that can access the private cloud security system and the first feature server are in the same intranet.
  • the first feature terminal and the second feature terminal are used to distinguish two different specific terminals, that is, the second The feature terminal and the first feature terminal are two different terminals in the same network, and the first feature server can be accessed through the intranet.
  • the first feature terminal may send an authentication request to the application to the first feature server, requesting the first feature server to authenticate the security of the application.
  • the application may be an application that the first feature terminal is downloading, installing, starting, or saving.
  • the first feature terminal may request the first feature server to authenticate the security of the application in multiple application scenarios, and the first feature terminal may request the first feature server to the application when downloading the application.
  • the security is authenticated; when installing the application, the first feature server can also be requested to authenticate the security of the application; when the application is launched by clicking an application shortcut or a program file, The first feature server may also be requested to authenticate the security of the application; or the first feature terminal may locally store multiple applications, and may request the first feature server pair according to a certain frequency.
  • the security of the saved application is authenticated.
  • Step 102 Send, to the at least one second feature terminal, an acquisition request for an executable file corresponding to the application, where the acquisition request carries unique identification information of the application, where the executable file records the application.
  • the first feature server is a server that performs security management on the first feature terminal and the second feature terminal based on the intranet.
  • the system after receiving the authentication request sent by the first feature terminal, the system further requests the executable file corresponding to the application to perform security identification according to the executable file. For various reasons, the executable file of the application is often lost on the original terminal.
  • the method for the entire network in the local area network to pass the original file is proposed, that is, different from other methods.
  • the second feature terminal of the first feature terminal requests the executable file.
  • An executable file is a file that records the operational behavior of an application when it runs, and can be part of the application file or part of the application file, or other file that characterizes the operational behavior of the application at runtime.
  • the application file can be a executable file (PE file)
  • the PE file is a program file on the Microsoft Windows operating system
  • common EXE, DLL, OCX, SYS, COM are PE files
  • each application is There is a corresponding PE file.
  • the acquiring request for the executable file of the application may be sent to one or more second feature terminals, and when the obtaining request for the executable file is sent to a second feature terminal, the second feature terminal may be There is also no executable file, and the request needs to be sent again. Therefore, it is preferable to send an acquisition request for the executable file to the plurality of second feature terminals.
  • the unique identification information is a hash value of the executable file of the application, or digital certificate information that uniquely identifies the publisher of the application.
  • the PE file is composed of an MS-DOS executable body, a file header, an optional header, a data directory, a section header, and a section.
  • keywords of each structure in the file header of the PE file may be used as a preset. Keywords, to determine whether each file corresponding to the application is an application file.
  • the unique HASH value of the executable file can then be calculated by the MD5 algorithm (Message Digest Algorithm MD5, Information Digest Algorithm Fifth Edition).
  • MD5 algorithm Message Digest Algorithm MD5, Information Digest Algorithm Fifth Edition.
  • a typical application of the MD5 algorithm is to generate a message-digest for a piece of information, so that the large-capacity information is "compressed" into a secret format before signing the private key with the digital signature software, that is, an arbitrary length.
  • the byte string is transformed into a string of hexadecimal digits of a certain length to ensure complete and consistent information transmission. To prevent being tampered with.
  • the unique 32-bit HASH value of the executable file WINWORD.EXE is calculated to be 54525786F76E6CD2BA29E2B7B1B28939.
  • the unique identification information may also be digital certificate information that uniquely identifies the publisher of the application.
  • Digital certificate information is part of a digital signature, which is a digital signature that uses digital certificate information to identify the publisher of the software and a code signing certificate issued by a Windows trusted root certification authority.
  • the software code is guaranteed to come from the real issuer and the software code is not illegally tampered with.
  • the data certificate information of different application publishers is different, therefore, the number The certificate information uniquely identifies the publisher of the application.
  • the digital signature consists of the hash value of the executable file of the application that is encrypted and the digital certificate information of the publisher.
  • the publisher's digital certificate information contained in the digital signature of the executable WINDOW.EXE is Microsoft Code Signing PCA.
  • Step 103 Search for an executable file corresponding to the application according to the unique identifier information, and identify the security of the application according to the executable file.
  • the application When the unique identification information is a hash value of the executable file of the application, the application may be uniquely identified, and the corresponding application may be uniquely determined according to the unique identification information, and the unique identification information is a publisher that uniquely identifies the application.
  • the digital certificate information when only one application of the publisher exists in the private cloud security system, the corresponding application may be uniquely determined according to the unique identification information, and when the application exists on the second feature terminal, the unique application may be The identification information determines the corresponding application, and further finds the corresponding executable file, and returns the executable file to the feature server for security authentication.
  • the security of the application may be determined by analyzing the executable file, or may be further analyzed by uploading the executable file to the server side of the public cloud security system, and the specific analysis method may adopt the prior art. In any way, the invention is not limited thereto.
  • the second feature terminal after receiving the authentication request of the first feature terminal for the application security, the second feature terminal is requested to acquire the executable file of the application program to identify the security of the application according to the executable file. Therefore, in the case that the executable file of the first feature terminal is lost, the executable file can also be searched for maximum in the internal network by using the second feature terminal different from the first feature terminal, thereby avoiding file loss as much as possible. In the case, and because the terminal does not actively upload the executable file, but needs to further request the executable file from the server to the terminal, the terminal does not need to upload the executable file of all the unknown security applications, only in need When uploading, it saves network bandwidth resources and server disk space.
  • the step of authenticating the security of the application according to the executable file may further include:
  • Sub-step S11 determining whether the operational behavior of the application running by the executable file has a target behavior characteristic to identify the security of the application, and the target behavior characteristic is a virus file running. Behavioral characteristics.
  • Virus files have some common destructive behaviors at runtime, such as duplicate code replication, rewriting system files, and sending data to the outside world over the network.
  • virus activity the most basic action is to copy itself, attach the virus code to other program files that are not infected with the virus or other files related to computer execution, or copy it to key parts of the computer system so that it can be obtained frequently.
  • Opportunities to perform can even be controlled first when the computer is booted; or copied to removable storage media so that it can be propagated to other computers.
  • a vicious virus performs various destructive operations, such as rewriting system files, maliciously deleting viruses, and destroying various useful files on a computer system. These malicious operations can cause some key problems in the system. The loss of sexual information or the destruction of important programs eventually leads to the collapse of the computer system.
  • Some viruses also automatically connect to the external network, and the fixed IP of the external network always sends data, which affects the security of the computer.
  • the application's executable records the operational behavior of the application at run time and can be analyzed by the executable Whether the operation behavior of the file record has the characteristics of the operational behavior of the virus, so as to judge whether the application is safe or not, and the destructive operation behavior generally includes unconventional operations on the computer system or operations that cause malicious results, such as connecting the external network to send data. , performing multiple copies of code operations or accessing and rewriting system files, etc., can also include other kinds of virus behavior characteristics.
  • the sub-step S11 may specifically include:
  • Sub-step S11-1 disassembling the executable file of the application to obtain an assembly source corresponding to the application
  • Sub-step S11-2 analyzing whether the operation behavior of the assembly source at runtime is a target behavior characteristic, and the target behavior characteristic is a behavior characteristic of a virus file runtime, if the operation behavior of the assembly source at runtime is at least A target behavior feature, wherein the security of the application is a dangerous file, and if the operational behavior of the assembly source at runtime does not have any one of the target behavior characteristics, the security of the application is a security file.
  • Disassembly is the process of turning object code into assembly code.
  • the program is written in a high-level language such as C, Pascal, etc., and then compiled to generate executable files that can be directly executed by the computer system.
  • Disassembly means that the machine language of these executable files is decompiled into Assembly language or other high-level language.
  • the executable file corresponds to the source code of the application by disassembling the executable file.
  • the executable file records the behavior characteristics of the application runtime, and the recorded operation behavior can be obtained by analyzing the source code, if the operation behavior of the application is At least one target behavior characteristic of the virus determines that the security of the application is a dangerous file. If there is no target behavior characteristic, the security of the application is a security file.
  • the virtual operating environment when determining whether the operation behavior of the application has the target behavior feature, may be virtualized in a real operating system by using a software-implemented method, the data of the environment, and the running result and the real The operating system is completely isolated.
  • the source code is run, and the operational behavior of the application is recorded, and the behavioral characteristics of the operational behavior are analyzed and further compared with the target behavior characteristics.
  • the instruction or instruction set corresponding to the virus destructive behavior may be preset, and in the judgment, the application source code is encoded.
  • the contained instruction or set of instructions is extracted, and since a corrupted behavior of the virus consists of a series of instructions or sets of instructions that perform destructive operations, each of said instructions or sets of instructions produces at least one independent destructive operation. Behavior, therefore, if the application's instruction or instruction set contains at least one virus corresponding instruction code, it can be known that the application has a virus-like operation behavior, and if it does not contain any virus corresponding instruction code, it can be determined The security of the application is a dangerous file.
  • the authentication request may carry unique identification information of the application, where the unique identification information is a hash value of the executable file of the application, or a certificate that uniquely identifies the application. Digital certificate information for the first feature server to authenticate the application according to the unique identification information.
  • the first feature server is configured with a security identification database that includes the unique identification information of the application and the security correspondence.
  • the method may further include:
  • the first feature server determines that the unique identifier information does not exist in the security authentication database, or finds the security corresponding to the application in the security identification database according to the unique identifier information.
  • Non-secure documents are not exist in the security authentication database, or finds the security corresponding to the application in the security identification database according to the unique identifier information.
  • the private cloud security system is deployed in a closed intranet environment, and may use some applications that are dedicated to the intranet but not used by the external network, because the security of the private cloud security system is authenticated.
  • the database is updated from the public cloud security system. Therefore, using the security authentication database may not be able to authenticate the application requesting authentication.
  • the first feature server searches for the unique identifier of the application in the security authentication database. Information, and may determine that the unique identification information does not exist in the security authentication database, and therefore, the executable file of the application may be further requested to perform security authentication.
  • the executable file corresponding to the application may be further requested.
  • the security of an application is divided into security files, unknown files, and disabled files.
  • the executable file is further requested.
  • the types and the number of security classifications may also be set as needed, and the present invention does not limit this.
  • the method may further include: before the step of sending an acquisition request for the executable file corresponding to the application to the at least one second feature terminal, the method may further include:
  • the executable file before the executable file is requested by the second feature terminal, the executable file may be requested from the first feature terminal, and returned to the first feature server when the first feature terminal does not have the executable file. The message that does not exist, and then further requests the executable file to the second feature terminal.
  • the second feature terminal stores a correspondence between the unique identification information of the application and the save path of the executable file in the second feature terminal, where the receiving The step of the second executable terminal corresponding to the executable file corresponding to the application searched by the unique identifier information includes:
  • Sub-step S21 Receive an executable file that is extracted by the second feature terminal according to the unique identification information and the corresponding relationship, and is extracted according to the save path.
  • the second feature terminal may record a save path of the executable file of the application, and record a correspondence between the save path and the unique identifier information of the application, so that the application may be found in the corresponding relationship according to the unique identifier information of the application.
  • the executable file of the program is in the save path of the second feature terminal, and the executable file is extracted according to the save path.
  • FIG. 2 a flowchart of an authentication method for application security according to another embodiment of the present invention is shown, which may specifically include:
  • Step 201 The second feature terminal receives a request for acquiring an executable file corresponding to the application sent by the first feature server, where the acquiring request receives, by the first feature server, the first feature terminal for the application.
  • the obtaining request carries unique identification information of the application, wherein the executable file records an operation behavior of the application when the application is running, and the first feature server is based on the internal The server that performs security management on the first feature terminal and the second feature terminal by the network.
  • Step 202 Search for an executable file corresponding to the application locally according to the unique identifier information, and send the executable file to the first feature server to use the executable file according to the executable file. Program The safety is identified.
  • the unique identification information is a hash value of an executable file of the application, or digital certificate information that uniquely identifies a publisher of the application.
  • the second feature terminal stores a correspondence between the unique identification information of the application and the save path of the executable file in the second feature terminal, where the unique identifier is
  • the steps to find the executable file corresponding to the application locally include:
  • Sub-step S31 determining, according to the unique identifier information and the correspondence, a save path of the executable file in the second feature terminal;
  • Sub-step S32 the executable file corresponding to the application extracted according to the save path.
  • the method further includes:
  • the first feature server may request the executable file from the one or more second feature terminals.
  • the feature terminal requests the executable file, and more than one second feature terminal may exist the executable file, and only one of the second feature terminals needs to upload the executable file, so after the second feature terminal finds the executable file, And sending a query request for the executable file to the first feature server, and if the first feature server does not receive the executable file sent by the other second feature terminal, notifying the message to the second feature of sending the query request
  • the terminal then uploads the executable file by the second feature terminal, and has received the executable file uploaded by the other second feature terminal, and the notification has been received, and the second feature terminal that does not need to send the query request uploads the executable file again. This can avoid the waste of bandwidth resources when multiple terminals repeatedly upload files.
  • the second feature terminal after receiving the authentication request of the first feature terminal for the application security, the second feature terminal is requested to acquire the executable file of the application program to identify the security of the application according to the executable file.
  • the executable file can also be searched for on the second feature terminal different from the first feature terminal.
  • the terminal does not actively upload the executable file, but needs to further request the executable file from the server to the terminal. Therefore, the terminal does not need to upload the executable file of all the unknown security applications, only when needed. When uploading, it saves network bandwidth resources and server disk space.
  • FIG. 3 a block diagram of an apparatus for authenticating an application security according to an embodiment of the present invention is shown.
  • the program identification requesting module 301 is configured to receive, by the first feature server, an authentication request of the first feature terminal for security of the application;
  • the first executable file requesting module 302 is configured to send, to the at least one second feature terminal, an acquisition request for the executable file corresponding to the application, where the acquisition request carries the unique identification information of the application, where The executable file records an operation behavior of the application when the application is running, and the first feature server is a server that performs security management on the first feature terminal and the second feature terminal based on an intranet;
  • An executable file receiving module configured to search for an executable file corresponding to the application according to the unique identifier information
  • the first security authentication module is configured to authenticate the security of the application according to the executable file.
  • the unique identification information is a hash value of an executable file of the application, or digital certificate information that uniquely identifies a publisher of the application.
  • the authentication request carries unique identification information of the application
  • the first feature server is preset with security including a unique identifier information of the application and a security correspondence relationship.
  • Identification database
  • the device also includes:
  • a second security authentication module configured to determine, by the first feature server, that the unique identifier information does not exist in the security authentication database, or find the foregoing in the security identification database according to the unique identifier information
  • the security corresponding to the application is not a secure file.
  • the device further includes:
  • a second executable file requesting module configured to send, to the first feature terminal, an acquisition request for an executable file corresponding to the application, and receive the executable file that is not fed back by the first feature terminal Message.
  • the first security authentication module is specifically configured to analyze whether the operation behavior of the application program recorded by the executable file has a target behavior feature to the application
  • the security of the program is characterized, and the target behavior is characterized by behavioral characteristics of the virus file at runtime.
  • the first security authentication module includes:
  • the security of the application is a dangerous file
  • the security of the application is a secure file.
  • the target behavior feature includes connecting an external network to send data, performing an operation of copying the code multiple times, or accessing and rewriting the system file.
  • the second feature terminal stores a unique identification letter of the application. Corresponding relationship between the information and the executable file in the save path of the second feature terminal;
  • the executable file receiving module is configured to receive an executable file that is determined by the second feature terminal to determine a save path according to the unique identifier information and the corresponding relationship, and is extracted according to the save path.
  • the second feature terminal after receiving the authentication request of the first feature terminal for the application security, the second feature terminal is requested to acquire the executable file of the application program to identify the security of the application according to the executable file.
  • the executable file can also be searched for on the second feature terminal different from the first feature terminal.
  • the terminal does not actively upload the executable file, but needs to further request the executable file from the server to the terminal. Therefore, the terminal does not need to upload the executable file of all the unknown security applications, only when needed. When uploading, it saves network bandwidth resources and server disk space.
  • FIG. 4 a block diagram of an apparatus for identifying an application security according to an embodiment of the present invention is shown.
  • the obtaining request receiving module 401 is configured to receive, by the first feature terminal, an acquisition request for the executable file corresponding to the application sent by the first feature server, where the obtaining request receives the first feature terminal pair at the first feature server After the authentication request of the security of the application is sent, the obtaining request carries unique identification information of the application, wherein the executable file records an operation behavior of the application when the application is running, the first feature
  • the server is a server that performs security management on the first feature terminal and the second feature terminal based on the intranet;
  • the executable file searching module 402 is configured to locally search for an executable file corresponding to the application according to the unique identifier information, and send the executable file to the first feature server to follow the The execution file authenticates the security of the application.
  • the unique identification information is a hash value of an executable file of the application, or digital certificate information that uniquely identifies a publisher of the application.
  • the second feature terminal stores a correspondence between the unique identification information of the application and the save path of the executable file in the second feature terminal, and the executable file
  • the lookup module includes:
  • a path determining submodule configured to determine, according to the unique identifier information and the correspondence, a save path of the executable file in the second feature terminal
  • An executable file extraction submodule configured to execute the executable file corresponding to the application according to the save path.
  • the device further includes:
  • a query request sending module configured to send a query request for the executable file to the first feature server
  • the message receiving module is configured to receive, by the first feature server, a message that is not received by the other second feature terminal and is sent by the executable file.
  • the second feature terminal after receiving the authentication request of the first feature terminal for the application security, the second feature terminal is requested to acquire the executable file of the application program to identify the security of the application according to the executable file. So that in the case where the executable file of the first feature terminal is lost, it may also be different from the first feature The executable file is searched for on the second feature terminal of the terminal.
  • the terminal does not actively upload the executable file, but needs to further request the executable file from the server to the terminal. Therefore, the terminal does not need to upload the executable file of all the unknown security applications, only when needed. When uploading, it saves network bandwidth resources and server disk space.
  • FIG. 5 a flowchart of a method for changing the security of an application according to an embodiment of the present invention is shown.
  • Step 501 The first feature server authenticates the security of the application of the first feature terminal, and sends the authenticated security to the first feature terminal for saving.
  • the first feature server is the The first feature terminal is a server accessible through an intranet.
  • the first feature server is a server accessible by a specific terminal, that is, a private cloud security system, and the feature terminal that can access the private cloud security system and the private cloud security system server are in the same intranet, in a specific
  • the private cloud security system is mostly installed in the intranet of the enterprise, and can manage each terminal of the intranet of the enterprise.
  • the first feature terminal may request the first feature server to authenticate the security of the application when downloading, installing, starting, or saving the application.
  • the feature identifier of the application may be sent to the first feature server, where the first feature server saves the correspondence between the feature identifier and the security of the application, and determines the application according to the feature identifier.
  • the security can be sent to the first feature terminal.
  • the feature identifier may be a hash value of the executable file of the application, or may be digital certificate information that uniquely identifies the publisher of the application.
  • the security of the application includes three levels of normal, disabled, and unknown, and may also be set according to specific requirements, which is not limited by the present invention.
  • Step 502 Receive an acquisition request of the first feature terminal for multiple change files, where the change file is used to modify security of an application saved by the first feature terminal.
  • file security changes often occur. Changes to an application's security can be recorded in the change file.
  • the change file is stored on the feature server according to the security of the application.
  • the first feature terminal may request the change file from the first feature server to obtain a change in the security of the application, and let the terminal use the new file security to implement terminal security management.
  • Step 503 Extract a plurality of change files according to the obtaining request, where the change file carries a corresponding file processing level.
  • the requested change file may be further extracted according to the terminal's request for obtaining the change file.
  • the change file corresponding to an application may be requested or the change file generated by a certain time period may be requested.
  • the file processing level is set separately for the change file of the application program.
  • the file processing level may be set according to specific application requirements, for example, the file processing level is performed according to the source of the change file. Setting, you can also set the file processing level according to the program type corresponding to the change file.
  • file processing level When the file processing level is set according to the source of the change file, different file processing levels are set for the change that the administrator actively modifies and the changes of other sources, and can be divided into the first file processing level and the second file processing level. Or divided into advanced file processing level and low-level file processing level.
  • Step 504 classify the extracted multiple change files according to different file processing levels, and send the change files to the first feature terminal according to the classification, so that the first feature terminal is targeted to different files.
  • the processing level change files are processed according to different processing methods.
  • the change file according to the file processing level can be classified, and the change files having the same file processing level are classified into one class, and are respectively sent to the first feature terminal according to the classification, and the first feature terminal receives the change file respectively sent by the classification.
  • the change files for different classes that is, different file processing levels
  • a change file having a high file processing level and a change file having a low file processing level can be separately sent and processed separately, so that a change file having a higher processing level can be processed in the case of a large number of changed files. It is sent separately from the change file with higher processing level, which avoids the security risk caused by the high-level change file being sent to the terminal in time, and can make the process of file security change effective, fast and reliable.
  • the step of separately transmitting the change file to the first feature terminal according to the classification may include:
  • Sub-step S41 Sending the change files having different file processing levels to the first feature terminal through different transmission paths.
  • the change file with different file processing levels When the change file with different file processing levels is sent to the first feature terminal, the change can be sent through different transmission paths, and the first feature terminal can receive the change file with different file processing levels through different transmission paths, thereby making the file
  • the change files with different processing levels will not interfere with each other in the process of transmission to the terminal, and avoid the security risks caused by the high-level change files being sent to the terminal in time, so that the process of file security change becomes effective. Fast and reliable.
  • sub-step S41 may include:
  • Sub-step S41-1 sending the change files with different file processing levels to the first feature terminal through different preset ports or communication channels of the first feature server;
  • step S41-2 the change files having different file processing levels are respectively sent to the first feature terminal through different preset interfaces of the first feature terminal;
  • the change files having different file processing levels are respectively sent to different preset folders of the first feature terminal.
  • the change file with different file processing levels is transmitted through different transmission paths, which may be sent to the first feature terminal through different preset ports of the server, and different preset ports and first features of the server Different data transmission paths are formed between the terminals.
  • the terminal and the server issue one of the file processing level change files according to the original protocol (for example, HTTP-Hypertext Transfer Protoco, HTTP hypertext transfer protocol), and add a new change file notification protocol respectively.
  • the other file processing level change files are issued, and the protocol format can be consistent with the original format.
  • the file processing level includes a high file processing level and a low file processing level. A high file processing level change notification is sent through a new notification protocol, and a low file processing level change notification is delivered through the original notification protocol.
  • the first feature terminal may be sent to the first feature terminal through a different communication channel, and multiple communication channels are constructed between the server link layer and the first feature terminal link layer for respectively transmitting different file processing levels.
  • the change file may be sent by the server to the first feature terminal through a different preset interface of the first feature terminal.
  • the first feature terminal has a plurality of different preset interfaces, and different preset interfaces form different data transmission paths with the server; or different folders may be preset in the feature terminal for storing different file processing levels. Change files, each folder and server form a different data transmission path.
  • the step of separately transmitting the change file to the first feature terminal according to the classification may include:
  • Sub-step S51 sorting the extracted plurality of change files according to corresponding file processing levels, and extracting the change files one by one according to the sorting and transmitting the change files to the first feature terminal.
  • the change file with a high file processing level may be preferentially sent to the first feature terminal, specifically
  • the change file is sorted according to the level of the corresponding file processing level, and the change file with the higher file processing level is preferentially sent to the first feature terminal, and the change file with higher processing level can be avoided. Failure to send the terminal to the terminal poses a security risk, making the process of file security change effective, fast, and reliable.
  • the step of processing, by the first feature terminal, the change files of different file processing levels according to different processing manners includes:
  • Sub-step S61 the first feature terminal respectively creates a corresponding process for the change files of different file processing levels or respectively processes with different threads.
  • the first feature terminal may establish multiple threads to process different file processing level change files, or may use different threads for different file processing level change files to process different file processing levels. The processing of the files does not interfere with each other.
  • the processing speed of the thread corresponding to the file with a higher file processing level is higher than the file with the lower file processing level. Threads, which allow for faster processing of change files at high file processing levels.
  • the obtaining request is generated according to the change file that the first feature terminal already exists, and the step 503 may further include:
  • Sub-step S71 extracting a change file after the generation time of the change file existing in the first feature terminal is generated according to the acquisition request.
  • the first feature server After receiving the acquisition request, the first feature server returns the change file according to the acquisition request.
  • the terminal may already have a partial change file, and the change file returned according to the acquisition request is generated at the terminal.
  • the change file after the generation time of the change file that is, the change file for generating the time update, in other words, the terminal receives the change file that does not exist locally, and returns the change file in an incremental manner, thereby avoiding the terminal meeting. Requesting the same change file multiple times will not result in repeated downloading of data, avoiding wasting the bandwidth of the upgraded server.
  • the acquisition request carries time information
  • the time information is used to mark a generation time of a recent change file
  • the latest change file is a change existing in the first feature terminal.
  • a change file whose time is closest to the current time is generated in the file;
  • the sub-step S71 includes:
  • Sub-step S71-1 extracting the generation time at which the generation time is marked by the time information carried in the acquisition request After the change file.
  • the time information is added to the acquisition request, and the time information is used to mark the generation time of the latest change file, which is described in the embodiment of the present invention.
  • the latest change file is a change file that is generated by the terminal and has the closest time to the current time. For example, the terminal has 95 change files, and the search time can be found according to the information identifier carried in the change file.
  • the latest change file is sent to the first feature server according to the generation time of the change file.
  • the time information may be the number of the change file determined by the first feature server according to the sequence of generation time of each change file, or the change file may be served by the first feature.
  • the change file of the first feature server carries the information identifier
  • the information identifier may be the number of the change file determined by the first feature server according to the generation time sequence of each change file, or may be The generation time of the change file on the first feature server.
  • the information identifier When the information identifier is the number of the change file determined by the first feature server according to the generation time sequence of each change file, the information identifier may be directly used as time information; when the information identifier is the change file, the first The generation time of the feature server may directly use the information identifier as time information or other information generated according to the generation time of the latest change file as time information.
  • the information identifier is the number of the change file determined in the order of generation of each change file, such as 1, 2, 3, ... 95
  • the most recent change file is a change file with the information identifier of 95
  • the information can be
  • the identifier 95 is sent to the first feature server as the time information, so that the first feature server returns the change file according to the latest information identifier; when the information identifier is the time when the first feature server generates the change file, the time can be extracted.
  • the information identifier of the change file closest to the present is 2013-11-12-11:14 as time information, and other information generated according to the generation time of the latest change file may be used as time information, for example, the generation time is 12 bits.
  • the digital combination 201311121114 is sent to the first feature server.
  • the acquisition request carries time information
  • the time information is used to indicate that the first feature terminal does not exist and the generation of a certain change file exists in the first feature server Time
  • the time information is obtained by comparing a change file list requested by the first feature server with a change file local to the first feature terminal;
  • the sub-step S71 includes:
  • the generation time is the generation time marked by the time information carried in the acquisition request, and the change file after the generation time indicated by the time information carried by the acquisition request is generated.
  • the first feature terminal may first request, from the first feature server, a list of change files that exists in the first feature server, and the change file list may be It includes all the change files existing on the first feature server or the generation time of all the change files after the specified time. According to the generation time of each change file existing on the change file list and the generation time of each change file existing in the terminal, it is possible to know which change files exist in the terminal. According to the result of the comparison, the generation time information of the change file does not exist according to the terminal.
  • the specified time may be the time when the terminal last acquired the change file, and may be set according to specific application requirements.
  • the terminal when the information is identified as a number, the terminal has 95 change files, and the first feature server has 100 change files.
  • the change file list includes the generation time of 100 change files or the time after the terminal last acquired the change file.
  • the terminal compares the change file list with the generation time of the change file existing in the terminal, and the change file that does not exist is the five change files with the information identifiers 96 to 100, and the time information can identify the five change files. Change the generation time of a change file in the file.
  • the first feature server may generate the time indicated by the time information carried in the acquisition request, and the time when the generation time is carried in the acquisition request.
  • the change file after the generation time indicated by the information is returned to the terminal, in other words, the change file that does not exist in the terminal, and the other change file whose generation time is after the change file are returned to the terminal, and the returned ones are returned.
  • the number can be set in advance, and the present invention does not limit this.
  • the acquisition request carries time information, and the time information is used to indicate that the first feature terminal does not exist and the at least one change file of the first feature server exists.
  • Time the time information is obtained by comparing a change file list requested to the first feature server with a change file local to the first feature terminal;
  • the sub-step S71 includes:
  • Sub-step S71-3 extracting a change file in which the generation time is the generation time indicated by the time information carried in the acquisition request.
  • the time information indicates the generation time of at least one change file that the terminal does not exist.
  • the information identifier is a number
  • the terminal has 95 change files
  • the first feature server has 100 change files
  • the change file that the terminal does not exist is the five change files whose information identifiers are 96 to 100, and the time information can be identified.
  • the generation time of one or more change files in these five change files is the generation time of one or more change files in these five change files.
  • the first feature server may return the change file whose generation time is the generation time indicated by the time information carried in the acquisition request to the terminal. In other words, a change file that does not exist in the terminal indicated by the time information is returned to the terminal.
  • the acquiring request may further carry the number of the changed file that is requested to be acquired, and the first feature server extracts the number of the changed files that are less than or equal to the requested change file in the found change file. At least one change file is returned to the terminal.
  • the change file may be returned according to the number of requests, since each downloaded file only contains the required files and there is no repeated download, thereby avoiding the problem of large amount of downloaded data, Upgrading the bandwidth of the server creates a lot of stress.
  • the change file is respectively sent to the first feature terminal according to the classification, and the first feature terminal processes the file for different files.
  • the change files of the level are processed according to different processing manners.
  • the change file with a high file processing level and the change file with a low file processing level can be separately sent according to the file processing level, and are processed for different file processing levels.
  • the files are processed separately by different processing methods, so that in the case of a large number of changed files, it is possible to avoid the change of the processing file with a lower processing level affecting the transmission of the change file with a higher processing level, and avoid the failure of the processing file with a higher processing level.
  • the security risks caused by timely sending to the terminal to the terminal make the process of file security change effective, fast and reliable.
  • FIG. 6 a flowchart of a method for changing the security of an application according to another embodiment of the present invention is shown.
  • Step 601 The first feature server authenticates the security of the application of the first feature terminal, and sends the authenticated security to the feature terminal for saving, where the first feature server is the first The server that the feature terminal can access through the intranet.
  • Step 602 The first feature server generates the change file, and adds a file processing level to the change file according to the change source, where the change file is used for an application saved by the first feature terminal. Security is corrected, the file processing level including a first file processing level and a second file processing level.
  • file security changes caused by import or file proxy queries.
  • the file processing level is divided into two according to the source of the change, which are the first file processing level and the second file processing level respectively, and the file source corresponding to the first file processing level may be the administrator actively acting on the server.
  • the change made, the file source corresponding to the second file processing level may be a change made after the public cloud security system queries security by offline or online, and the first file processing level is higher than the second file processing level.
  • the step 602 may include:
  • Sub-step S81 receiving security for the application modification submitted by the first feature server, and correcting the security of the first feature server authentication saved by the feature terminal according to the modified security.
  • the security of the application may be modified on the first feature server, and after receiving the modified security, the server generates a change file according to the modified security to perform security on the application.
  • the change and since the source of the change is a change submitted by the server, the first file processing level can be added for the generated change file.
  • the step 602 includes:
  • Sub-step S82 the first feature server requests the second feature server to authenticate the security of the application, and the second feature server is a server that is accessible through the Internet in the Internet;
  • Sub-step S83 generating, according to the security of the second feature server, a change file that corrects the security of the first feature server authentication saved by the feature terminal, where the change file carries the second file processing level.
  • the first feature terminal After the first feature terminal requests the first feature server to authenticate the security of the application, when the authentication result is unknown security, the first feature server may further request the second feature server to secure the application.
  • the second feature server is a server that is accessible through the Internet in the Internet, that is, a public cloud security system. For example, in the initial stage of the deployment of the private cloud security system, the first feature terminal reports a large number of files to the first feature server, and the first feature server accumulates a large number of files whose file level is unknown.
  • the second feature server may be further requested to perform security authentication on the application. Since the identification result of the first feature server is unknown security, the server is authenticated according to the second feature.
  • Security can generate a change file that corrects application security. Since the source of the change is a file security change caused by a file agent query, a second file processing level can be added to the change file.
  • the step 602 includes:
  • the first feature server connects the second feature server to identify the security of the application by using the first feature terminal, and the second feature server is configured to pass through the Internet.
  • Internet accessible server
  • Sub-step S85 generating, according to the security of the second feature server, a change file that corrects the security of the first feature server authentication saved by the first feature terminal, where the change file carries the second file. Processing level.
  • the second feature server can be used to query the security of the application in an off-line manner.
  • the first feature terminal reports a large number of files to the server.
  • the first feature server accumulates a large number of files with unknown file levels. You can export the list of unknown security applications through offline query tools, and then connect to the Internet.
  • the first feature terminal performs a file cloud security system query, that is, the first feature terminal requests the second feature server to authenticate the security of the application by connecting to the Internet, and then the query result is imported into the offline query tool.
  • the first feature server of a private cloud security system Since the source of the change is a file security change caused by the offline query tool import, a second file processing level can be added to the change file.
  • an administrator-adjusted security policy is an important program or an emergency program that compares priority to file security changes caused by offline query tool import or file agent query. Higher, these file security changes require fast and reliable notification to the terminal to help enterprise users reduce security risks.
  • the corresponding file processing level can be set for the change of different sources.
  • the file security change corresponding setting caused by the administrator directly modifying the security of the application on the first server end A file processing level, the file security change caused by the offline query tool import or the file proxy query corresponds to the second file processing level, so that the change files of different sources are respectively sent to the terminal, thereby avoiding the influence of the second file processing level change file.
  • a file processing level change file is sent.
  • the extracted multiple modified files are sorted according to the corresponding file processing level, and the modified file is sent to the feature terminal one by one according to the sorting, since the first file processing level is higher than the second file processing level, The change file of the first file processing level is preferentially sent to the terminal, and the administrator's change to the application is prioritized.
  • two different processes may be created or two different threads are used to process two levels of change files.
  • the processing speed of the thread corresponding to the first file processing level may be The thread corresponding to the second file processing level is higher, so that the change made by the administrator on the first server can be quickly issued, and the security of a file is changed to be disabled or released in time.
  • Step 603 Receive an acquisition request of the first feature terminal for multiple change files.
  • Step 604 Extract a plurality of change files according to the obtaining request, where the change file carries a corresponding file processing level.
  • Step 605 classify the extracted multiple change files according to different file processing levels, and send the change files to the first feature terminal according to the classification, so that the first feature terminal is targeted to different files.
  • the processing level change files are processed according to different processing methods.
  • the first feature server classifies the change file requested by the feature terminal according to the corresponding file processing level, and then sends the change file to the feature terminal according to the classification, and the change file of the feature terminal for different file processing levels is performed by the feature terminal.
  • the change file with high file processing level and the change file with low file processing level can be separately sent according to the file processing level, and different files are used for different file processing levels.
  • the processing mode is separately processed, so that when a large number of changed files are accumulated, the change file with a lower processing level can be prevented from affecting the sending of the change file with a higher processing level, and the change file with a higher processing level is prevented from being sent to the terminal in time.
  • the security risks to the terminal make the process of file security change effective, fast and reliable.
  • FIG. 7 a block diagram of a device for changing the security of an application according to an embodiment of the present invention is shown.
  • the security authentication module 701 is configured to identify, by the first feature server, the security of the application of the first feature terminal, and send the authenticated security to the first feature terminal for saving, the first feature service
  • the end is a server accessible by the first feature terminal through an intranet;
  • the change obtaining request 702 is configured to receive an acquisition request of the first feature terminal for the plurality of change files, where the change file is used to modify the security of an application saved by the first feature terminal;
  • the file extraction module 703 is configured to extract a plurality of change files according to the obtaining request, where the change file carries a corresponding file processing level;
  • a file classification module 704 configured to classify the extracted multiple change files according to different file processing levels
  • the file sending module 705 is configured to separately send the change file to the first feature terminal according to the classification, so that the first feature terminal processes the change files of different file processing levels according to different processing manners.
  • the file sending module is configured to send the change files having different file processing levels to the first feature terminal through different transmission paths.
  • the file sending module includes:
  • the first sending sub-module is configured to send the change files with different file processing levels to the first feature terminal through different preset ports or communication channels of the first feature server;
  • the second sending sub-module is configured to send the change files with different file processing levels to the first feature terminal through different preset interfaces of the first feature terminal;
  • the third sending submodule is configured to separately send the change files having different file processing levels to different preset folders of the first feature terminal.
  • the file sending module is configured to sort the extracted multiple change files according to a corresponding file processing level, and extract the change files one by one according to the sorting and send the change file to the first feature. terminal.
  • the file extraction module is configured to extract, according to the obtaining request, a change file that is generated after a generation time of a change file that has existed in the feature terminal.
  • the obtaining request carries time information, where the time information is used to mark a generation time of a recent change file, and the latest change file is a change file that the first feature terminal already exists. Generate a change file whose time is closest to the current time;
  • the file extraction module includes:
  • the first extraction submodule is configured to extract a change file after the generation time indicated by the time information carried by the acquisition request.
  • the acquiring request carries time information, where the time information is used to indicate that the first feature terminal does not exist and the generation time of a certain change file existing by the first feature server is The time information is obtained by comparing a change file list requested by the first server with a change file local to the first feature terminal;
  • the file extraction module includes:
  • the second extraction submodule is configured to extract a generation time that is generated by the time information carried by the acquisition request, and a change file that is generated after the generation time indicated by the time information carried by the acquisition request.
  • the acquiring request carries time information, where the time information is used to mark a generation time of the at least one change file that the first feature terminal does not exist and the first feature server exists.
  • the time information is obtained by comparing a change file list requested to the first feature server with a change file local to the first feature terminal;
  • the file extraction module includes:
  • the third extraction submodule is configured to extract a change file that generates a generation time indicated by the time information carried by the acquisition request.
  • the security of the application includes three levels: normal, disabled, and unknown.
  • the first feature server endifies the change file requested by the feature terminal according to the corresponding file.
  • the change file is sent to the feature terminal according to the classification, and the change file of the different file processing level is processed by the feature terminal according to different processing manners.
  • the file processing level can be high. Change files with low change level and file processing level are sent separately according to the file processing level, and are processed separately for different file processing level files, so that the processing level can be avoided in the case of a large number of changed files.
  • the change file affects the sending of change files with higher processing level, and avoids the security risks caused by the high-level change files being sent to the terminal in time, making the process of file security change effective, fast and reliable.
  • FIG. 8 a block diagram of a device for changing the security of an application according to an embodiment of the present invention is shown.
  • the security authentication module 801 is configured to identify, by the first feature server, the security of the application of the first feature terminal, and send the authenticated security to the first feature terminal for saving, the first feature service
  • the terminal is a server accessible by the first feature terminal through an intranet.
  • the change file generating module 802 is configured to generate, by the first feature server, the change file, where the file processing level includes a first file processing level and a second file processing level.
  • the change obtaining request 803 is configured to receive an acquisition request of the first feature terminal for the plurality of change files, where the change file is used to modify the security of an application saved by the first feature terminal;
  • the file extraction module 804 is configured to extract a plurality of change files according to the obtaining request, where the change file carries a corresponding file processing level;
  • a file classification module 805, configured to classify the extracted multiple change files according to different file processing levels
  • the file sending module 806 is configured to separately send the change file to the first feature terminal according to the classification, so that the first feature terminal processes the change files of different file processing levels according to different processing manners.
  • the first file processing level is higher than the second file processing level, and when the change file carries the first processing level, the change file generating module may include:
  • a security receiving module configured to receive security submitted by the first feature server for the application modification
  • a first file generating submodule configured to generate, according to the modified security, a change file that corrects security of the first feature server authentication saved by the first feature terminal, where the change file carries a first file processing level .
  • the first file processing level is higher than the second file processing level, and when the change file carries the second processing level, the change file generating module may include:
  • a first authentication request sub-module configured by the first feature server to request the second feature server to authenticate the security of the application, where the second feature server is accessible through the Internet in the Internet. Server;
  • a second file generating submodule configured to generate, according to the security of the second feature server authentication, a change file that corrects the security of the first feature server authentication saved by the first feature terminal, the change File Carry the second file processing level.
  • the change file generating module may include:
  • a second authentication requesting sub-module configured to identify, by the first feature server, the security of the application by connecting the second feature server to the first feature terminal, where the second feature server is Set up a server accessible on the Internet via the Internet;
  • a third file generating submodule configured to generate, according to the security of the second feature server authentication, a change file that corrects the security of the first feature server authentication saved by the first feature terminal, the change The file carries a second file processing level.
  • the file sending module may be specifically configured to send the change file to the first feature terminal according to a classification, so that the first feature terminal is processed for different file processing levels.
  • the change files are created separately or processed by different threads.
  • the processing speed of the thread corresponding to the file with a higher file processing level is higher than the file processing level.
  • the thread corresponding to the low change file is higher than the file processing level.
  • the first feature server classifies the change file requested by the feature terminal according to the corresponding file processing level, and then sends the change file to the feature terminal according to the classification, and the change file of the feature terminal for different file processing levels is performed by the feature terminal.
  • the change file with high file processing level and the change file with low file processing level can be separately sent according to the file processing level, and different files are used for different file processing levels.
  • the processing mode is separately processed, so that when a large number of changed files are accumulated, the change file with a lower processing level can be prevented from affecting the sending of the change file with a higher processing level, and the change file with a higher processing level is prevented from being sent to the terminal in time.
  • the security risks to the terminal make the process of file security change effective, fast and reliable.
  • modules in the devices of the embodiments can be adaptively changed and placed in one or more devices different from the embodiment.
  • the modules or units or components of the embodiments may be combined into one module or unit or component, and further they may be divided into a plurality of sub-modules or sub-units or sub-components.
  • any combination of the features disclosed in the specification, including the accompanying claims, the abstract and the drawings, and any methods so disclosed, or All processes or units of the device are combined.
  • Each feature disclosed in this specification (including the accompanying claims, the abstract and the drawings) may be replaced by alternative features that provide the same, equivalent or similar purpose.
  • the various component embodiments of the present invention may be implemented in hardware, or in a software module running on one or more processors, or in a combination thereof.
  • Those skilled in the art will appreciate that some or all of the functionality of some or all of the components of the authentication device for application security in accordance with embodiments of the present invention may be implemented in practice using a microprocessor or digital signal processor (DSP).
  • DSP digital signal processor
  • the invention can also be implemented as a device or device program (e.g., a computer program and a computer program product) for performing some or all of the methods described herein.
  • Such a program implementing the invention may be stored on a computer readable medium or may be in the form of one or more signals. Such signals may be downloaded from an Internet website, provided on a carrier signal, or provided in any other form.
  • FIG. 9 shows a terminal device that can implement an authentication method of application security according to the present invention.
  • the terminal device conventionally includes a processor 910 and a program product or readable medium in the form of a memory 920.
  • Memory 920 can be an electronic memory such as a flash memory, EEPROM (Electrically Erasable Programmable Read Only Memory), EPROM, or ROM.
  • Memory 920 has a memory space 930 of program code 931 configured to perform any of the method steps described above.
  • storage space 930 configured as program code can include various program code 931 that are each configured to implement various steps in the above methods.
  • These program codes can be read from or written to one or more program products.
  • These program products include program code carriers such as memory cards.
  • Such a program product is typically a portable or fixed storage unit as described with reference to FIG.
  • the storage unit may have a storage section, a storage space, and the like arranged similarly to the storage 920 in the terminal device of FIG.
  • the program code can be compressed, for example, in an appropriate form.
  • the storage unit includes a readable code 931', ie Code read by a processor, such as 910, that when executed by a terminal device causes the terminal device to perform various steps in the methods described above.

Abstract

A method and device for identifying security of an application process. The method comprises: a feature server end receives an identification request of a first feature terminal with respect to the security of an application process (101); an acquisition request for an executable file corresponding to the application process is transmitted to at least one second feature terminal, where the acquisition request carries unique identification information of the application process, the executable file records operational behaviors of the application process when running, and the feature server end is a service end for intranet-based security management for the first feature terminal and for the second feature terminal (102); and, finding the executable file corresponding to the application process on the basis of the unique identification information, and identifying the security of the application process according to the executable file (103). Obviated is the need for a terminal to upload all executable files of application processes of unknown security, and uploading is done only when needed, thus conserving network bandwidth and server disk space.

Description

一种应用程序安全性的鉴定方法和装置Method and device for identifying application security 技术领域Technical field
本发明涉及互联网技术,具体涉及一种应用程序安全性的鉴定方法,以及和一种应用程序安全性的鉴定装置。The present invention relates to Internet technologies, and in particular, to an authentication method for application security, and an authentication device for application security.
背景技术Background technique
云是互联网、网络的一种比喻说法,表示互联网和底层基础设施的抽象,大致可以分为公有云安全系统和私有云安全系统。Cloud is a metaphor for the Internet and the network. It represents the abstraction of the Internet and the underlying infrastructure. It can be roughly divided into public cloud security systems and private cloud security systems.
公有云安全系统通常指第三方供应商通过自己的基础设施,直接向外部用户提供服务能够使用的云安全系统。私有云安全系统是放在私有环境中的,比如企业、政府等组织自己在机房中建立的,或者是运营商建设好,但是整体租给某一组织的。组织之外的用户无法访问或无法使用。私有云安全系统是一个组织单独使用构建的,因而可以提供对数据、安全性和服务质量的最有效控制。A public cloud security system usually refers to a cloud security system that third-party vendors can use directly to external users through their own infrastructure. The private cloud security system is placed in a private environment. For example, enterprises, governments, and other organizations establish themselves in the equipment room, or the operators are well-built, but the whole is leased to an organization. Users outside the organization cannot access or use it. Private cloud security systems are built by an organization to provide the most effective control over data, security, and quality of service.
私有云安全系统适用于全封闭式的企业内网环境,由多个终端和对终端进行管理的服务器构成,终端可以将待鉴定的应用程序的标识上传到服务端,服务器端根据本地安全鉴定数据库保存的程序标识与其安全性的对应关系,对应用程序进行安全鉴定,并返回鉴定结果给终端,从而实现了对终端的安全管理。The private cloud security system is applicable to a fully enclosed enterprise intranet environment, and is composed of multiple terminals and servers for managing the terminal. The terminal can upload the identifier of the application to be authenticated to the server, and the server according to the local security authentication database. The corresponding relationship between the saved program identifier and its security, the application is authenticated securely, and the authentication result is returned to the terminal, thereby realizing the security management of the terminal.
以上现有技术中存在的问题是:The problems in the above prior art are:
私有云安全系统的安全鉴定数据库是从公有云安全系统更新的,可能无法对企业内网专用的某些程序进行安全性鉴定,此时服务端需要从终端进一步获取程序的其它文件作为安全性鉴定的依据,如果由于某种原因在原来的终端上该程序的相关文件丢失,例如,某些病毒文件可能会在运行后自行删除所有的相关文件,在这种情况下就无法对程序进行安全鉴定。The security authentication database of the private cloud security system is updated from the public cloud security system, and some programs specific to the intranet may not be authenticated. In this case, the server needs to further obtain other files of the program from the terminal for security authentication. According to some reasons, if the related files of the program are lost on the original terminal for some reason, for example, some virus files may delete all related files after running, in which case the program cannot be authenticated securely. .
发明内容Summary of the invention
鉴于上述问题,提出了本发明以便提供一种克服上述问题或者至少部分地解决上述问题的应用程序安全性的鉴定方法和应用程序安全性的鉴定装置。In view of the above problems, the present invention has been made in order to provide an authentication method for application security and an authentication device for application security that overcome the above problems or at least partially solve the above problems.
依据本发明的一个方面,提供了一种应用程序安全性的鉴定方法,包括:According to an aspect of the present invention, an authentication method for application security is provided, including:
特征服务端接收第一特征终端对应用程序的安全性的鉴定请求;The feature server receives an authentication request of the first feature terminal for security of the application;
向至少一个第二特征终端发送对所述应用程序对应的可执行文件的获取请求,所述获取请求携带所述应用程序的唯一标识信息,其中,所述可执行文件记录所述应用程序运行时的操作行为,所述特征服务端为基于内网对所述第一特征终端和第二特征终端进行安全管理的服务端;Sending, to the at least one second feature terminal, an acquisition request for an executable file corresponding to the application, where the acquisition request carries unique identification information of the application, wherein the executable file records the application runtime The service server is a server that performs security management on the first feature terminal and the second feature terminal based on an intranet;
依据所述唯一标识信息查找所述应用程序对应的可执行文件,并按照所述可执行文件对所述应用程序的安全性进行鉴定。Searching for an executable file corresponding to the application according to the unique identification information, and authenticating the security of the application according to the executable file.
本发明提供了一种应用程序安全性的变更方法,包括: The present invention provides a method for changing the security of an application, including:
第一特征服务端对特征终端的应用程序的安全性进行鉴定,并将鉴定的安全性下发给所述特征终端进行保存,所述第一特征服务端为所述特征终端通过内网可访问的服务端;The first feature server authenticates the security of the application of the feature terminal, and sends the authenticated security to the feature terminal for saving. The first feature server is accessible to the feature terminal through the intranet. Server side;
接收所述特征终端对多个变更文件的获取请求,所述变更文件用于对所述特征终端保存的某个应用程序的安全性进行修正;Receiving, by the feature terminal, an acquisition request for a plurality of change files, where the change file is used to correct security of an application saved by the feature terminal;
按照所述获取请求提取多个变更文件,所述变更文件携带对应的文件处理级别;Extracting, according to the obtaining request, a plurality of change files, where the change file carries a corresponding file processing level;
将提取的多个变更文件按照对应的文件处理级别的不同进行分类,并按照分类将所述变更文件分别发送给所述特征终端,以供所述特征终端针对不同文件处理级别的变更文件分别按照不同的处理方式进行处理。And extracting the plurality of changed files according to different file processing levels, and respectively transmitting the change files to the feature terminals according to the classification, so that the feature terminals respectively follow the change files of different file processing levels. Different processing methods are used for processing.
根据本发明的另一个方面,提供了一种应用程序安全性的鉴定方法,包括:According to another aspect of the present invention, an authentication method for application security is provided, including:
第二特征终端接收特征服务端发送的对应用程序对应的可执行文件的获取请求,所述获取请求在所述特征服务端接收第一特征终端对所述应用程序的安全性的鉴定请求之后发送,所述获取请求携带所述应用程序的唯一标识信息,其中,所述可执行文件记录所述应用程序运行时的操作行为,所述特征服务端为基于内网对所述第一特征终端和第二特征终端进行安全管理的服务端;The second feature terminal receives the acquisition request of the executable file corresponding to the application sent by the feature server, and the acquisition request is sent after the feature server receives the authentication request of the first feature terminal for the security of the application. The obtaining request carries the unique identification information of the application, wherein the executable file records an operation behavior of the application when the application is running, and the feature server is based on the intranet to the first feature terminal and a server that performs security management on the second feature terminal;
依据所述唯一标识信息在本地查找所述应用程序对应的可执行文件,并将所述可执行文件发送到所述特征服务端,以按照所述可执行文件对所述应用程序的安全性进行鉴定。Searching for an executable file corresponding to the application locally according to the unique identification information, and sending the executable file to the feature server to perform security on the application according to the executable file. Identification.
根据本发明的另一个方面,提供了一种应用程序安全性的鉴定装置,包括:According to another aspect of the present invention, an apparatus for authenticating application security is provided, including:
程序鉴定请求模块,用于特征服务端接收第一特征终端对应用程序的安全性的鉴定请求;a program authentication request module, configured to receive, by the feature server, an authentication request of the security of the first feature terminal to the application;
第一可执行文件请求模块,用于向至少一个第二特征终端发送对所述应用程序对应的可执行文件的获取请求,所述获取请求携带所述应用程序的唯一标识信息,其中,所述可执行文件记录所述应用程序运行时的操作行为,所述特征服务端为基于内网对所述第一特征终端和第二特征终端进行安全管理的服务端;a first executable file requesting module, configured to send, to the at least one second feature terminal, an acquisition request for an executable file corresponding to the application, where the acquisition request carries unique identification information of the application, where The executable file records an operation behavior of the application when the application is running, and the feature server is a server that performs security management on the first feature terminal and the second feature terminal based on an intranet;
可执行文件接收模块,用于依据所述唯一标识信息查找所述应用程序对应的可执行文件;An executable file receiving module, configured to search for an executable file corresponding to the application according to the unique identifier information;
第一安全鉴定模块,用于按照所述可执行文件对所述应用程序的安全性进行鉴定。The first security authentication module is configured to authenticate the security of the application according to the executable file.
本发明提供了一种应用程序安全性的变更装置,包括:The present invention provides an apparatus for changing the security of an application, comprising:
安全鉴定模块,用于第一特征服务端对特征终端的应用程序的安全性进行鉴定,并将鉴定的安全性下发给所述特征终端进行保存,所述第一特征服务端为所述特征终端通过内网可访问的服务端;a security authentication module, configured to identify, by the first feature server, the security of the application of the feature terminal, and send the authenticated security to the feature terminal for saving, where the first feature server is the feature The server that the terminal can access through the intranet;
变更获取请求,用于接收所述特征终端对多个变更文件的获取请求,所述变更文件用于对所述特征终端保存的某个应用程序的安全性进行修正;And a change obtaining request, configured to receive an acquisition request of the feature terminal for multiple change files, where the change file is used to correct security of an application saved by the feature terminal;
文件提取模块,用于按照所述获取请求提取多个变更文件,所述变更文件携带对应的文件处理级别;a file extraction module, configured to extract a plurality of change files according to the obtaining request, where the change file carries a corresponding file processing level;
文件分类模块,用于将提取的多个变更文件按照对应的文件处理级别的不同进行 分类;a file classification module, configured to perform multiple extracted change files according to different file processing levels classification;
文件发送模块,用于按照分类将所述变更文件分别发送给所述特征终端,以供所述特征终端针对不同文件处理级别的变更文件分别按照不同的处理方式进行处理。The file sending module is configured to separately send the change file to the feature terminal according to the classification, so that the feature terminal processes the change files of different file processing levels according to different processing manners.
根据本发明的另一个方面,提供了一种应用程序安全性的鉴定装置,包括:According to another aspect of the present invention, an apparatus for authenticating application security is provided, including:
获取请求接收模块,用于第二特征终端接收特征服务端发送的对应用程序对应的可执行文件的获取请求,所述获取请求在所述特征服务端接收第一特征终端对所述应用程序的安全性的鉴定请求之后发送,所述获取请求携带所述应用程序的唯一标识信息,其中,所述可执行文件记录所述应用程序运行时的操作行为,所述特征服务端为基于内网对所述第一特征终端和第二特征终端进行安全管理的服务端;Obtaining a request receiving module, configured to receive, by the second feature terminal, an acquisition request for an executable file corresponding to the application sent by the feature server, where the obtaining request receives, by the feature server, the first feature terminal to the application After the authentication request is sent, the obtaining request carries unique identification information of the application, wherein the executable file records an operation behavior of the application when the application is running, and the feature server is based on an intranet pair The first feature terminal and the second feature terminal perform a security management server;
可执行文件查找模块,用于依据所述唯一标识信息在本地查找所述应用程序对应的可执行文件,并将所述可执行文件发送到所述特征服务端,以按照所述可执行文件对所述应用程序的安全性进行鉴定。An executable file searching module, configured to locally search for an executable file corresponding to the application according to the unique identifier information, and send the executable file to the feature server to follow the executable file pair The security of the application is authenticated.
本发明提供了一种程序,包括可读代码,当所述可读代码在终端设备上运行时,导致所述终端设备执行所述的应用程序安全性的鉴定方法。The present invention provides a program comprising readable code that, when executed on a terminal device, causes the terminal device to perform the method of authenticating the application security.
本发明提供了一种可读介质,其中存储了所述的程序。The present invention provides a readable medium in which the program is stored.
依据本发明实施例,在接收到第一特征终端对应用程序安全性的鉴定请求后,向第二特征终端请求获取应用程序的可执行文件,以按照可执行文件对应用程序的安全性进行鉴定,从而在第一特征终端的可执行文件丢失的情况下,还可以在不同于第一特征终端的第二特征终端上查找该可执行文件。According to the embodiment of the present invention, after receiving the authentication request of the first feature terminal for the application security, the second feature terminal is requested to acquire the executable file of the application program to identify the security of the application according to the executable file. Thus, in the case where the executable file of the first feature terminal is lost, the executable file can also be searched for on the second feature terminal different from the first feature terminal.
依据本发明实施例,并非终端主动上传可执行文件,而是在需要进一步由服务端主动向终端请求可执行文件,因此,终端无需上传所有未知安全性的应用程序的可执行文件,仅仅在需要时上传,节省了网络带宽资源和服务器的磁盘空间。According to the embodiment of the present invention, the terminal does not actively upload the executable file, but needs to further request the executable file from the server to the terminal. Therefore, the terminal does not need to upload the executable file of all the unknown security applications, only when needed. When uploading, it saves network bandwidth resources and server disk space.
上述说明仅是本发明技术方案的概述,为了能够更清楚了解本发明的技术手段,而可依照说明书的内容予以实施,并且为了让本发明的上述和其它目的、特征和优点能够更明显易懂,以下特举本发明的具体实施方式。The above description is only an overview of the technical solutions of the present invention, and the above-described and other objects, features and advantages of the present invention can be more clearly understood. Specific embodiments of the invention are set forth below.
附图说明DRAWINGS
通过阅读下文优选实施方式的详细描述,各种其它的优点和益处对于本领域普通技术人员将变得清楚明了。附图仅用于示出优选实施方式的目的,而并不认为是对本发明的限制。而且在整个附图中,用相同的参考符号表示相同的部件。在附图中:Various other advantages and benefits will become apparent to those skilled in the art from a The drawings are only for the purpose of illustrating the preferred embodiments and are not to be construed as limiting. Throughout the drawings, the same reference numerals are used to refer to the same parts. In the drawing:
图1示出了根据本发明一个实施例的应用程序安全性的鉴定方法流程图;1 shows a flow chart of an authentication method for application security according to an embodiment of the present invention;
图2示出了根据本发明另一个实施例的应用程序安全性的鉴定方法流程图;2 is a flow chart showing an authentication method of application security according to another embodiment of the present invention;
图3示出了根据本发明一个实施例的应用程序安全性的鉴定装置结构框图;3 is a block diagram showing the structure of an authentication device for application security according to an embodiment of the present invention;
图4示出了根据本发明另一个实施例的应用程序安全性的鉴定装置结构框图;4 is a block diagram showing the structure of an authentication device for application security according to another embodiment of the present invention;
图5示出了根据本发明一个实施例的应用程序安全性的变更方法流程图;FIG. 5 is a flow chart showing a method for changing the security of an application according to an embodiment of the present invention; FIG.
图6示出了根据本发明另一个实施例的应用程序安全性的变更方法流程图;6 is a flow chart showing a method for changing the security of an application according to another embodiment of the present invention;
图7示出了根据本发明一个实施例的应用程序安全性的变更装置结构框图;FIG. 7 is a block diagram showing the structure of a device for changing the security of an application according to an embodiment of the present invention; FIG.
图8示出了根据本发明另一个实施例的应用程序安全性的变更装置结构框图; FIG. 8 is a block diagram showing the structure of a device for changing the security of an application according to another embodiment of the present invention; FIG.
图9示出了配置为执行根据本发明的方法的服务器的框图;以及Figure 9 shows a block diagram of a server configured to perform the method according to the present invention;
图10示出了配置为保持或者携带实现根据本发明的方法的程序代码的存储单元。Figure 10 illustrates a memory unit configured to hold or carry program code that implements the method in accordance with the present invention.
具体实施方式detailed description
下面将参照附图更详细地描述本公开的示例性实施例。虽然附图中显示了本公开的示例性实施例,然而应当理解,可以以各种形式实现本公开而不应被这里阐述的实施例所限制。相反,提供这些实施例是为了能够更透彻地理解本公开,并且能够将本公开的范围完整的传达给本领域的技术人员。Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While the embodiments of the present invention have been shown in the drawings, the embodiments Rather, these embodiments are provided so that this disclosure will be more fully understood and the scope of the disclosure will be fully disclosed.
本发明实施例可以应用于计算机系统/服务器,其可与众多其它通用或专用计算系统环境或配置一起操作。适于与计算机系统/服务器一起使用的众所周知的计算系统、环境和/或配置的例子包括但不限于:个人计算机系统、服务器计算机系统、瘦客户机、厚客户机、手持或膝上设备、基于微处理器的系统、机顶盒、可编程消费电子产品、网络个人电脑、小型计算机系统、大型计算机系统和包括上述任何系统的分布式云计算技术环境,等等。Embodiments of the invention may be applied to computer systems/servers that operate with numerous other general purpose or special purpose computing system environments or configurations. Examples of well-known computing systems, environments, and/or configurations suitable for use with computer systems/servers include, but are not limited to, personal computer systems, server computer systems, thin clients, thick clients, handheld or laptop devices, based on Microprocessor systems, set-top boxes, programmable consumer electronics, networked personal computers, small computer systems, mainframe computer systems, and distributed cloud computing technology environments including any of the above, and the like.
计算机系统/服务器可以在由计算机系统执行的计算机系统可执行指令(诸如程序模块)的一般语境下描述。通常,程序模块可以包括例程、程序、目标程序、组件、逻辑、数据结构等等,它们执行特定的任务或者实现特定的抽象数据类型。计算机系统/服务器可以在分布式云计算环境中实施,分布式云计算环境中,任务是由通过通信网络链接的远程处理设备执行的。在分布式云计算环境中,程序模块可以位于包括存储设备的本地或远程计算系统存储介质上。The computer system/server can be described in the general context of computer system executable instructions (such as program modules) being executed by a computer system. Generally, program modules may include routines, programs, target programs, components, logic, data structures, and the like that perform particular tasks or implement particular abstract data types. The computer system/server can be implemented in a distributed cloud computing environment where tasks are performed by remote processing devices that are linked through a communication network. In a distributed cloud computing environment, program modules may be located on a local or remote computing system storage medium including storage devices.
参考图1,示出了根据本发明一个实施例的应用程序安全性的鉴定方法流程图,具体可以包括:Referring to FIG. 1 , a flowchart of an authentication method for application security according to an embodiment of the present invention is shown, which may specifically include:
步骤101、第一特征服务端接收第一特征终端对应用程序的安全性的鉴定请求。Step 101: The first feature server receives an authentication request of the first feature terminal for security of the application.
第一特征服务端为特定终端可访问的服务端,即私有云安全系统,私有云安全系统大多架设在企业内网中,可以对企业内网的各个终端进行管理。可访问私有云安全系统的特定终端和第一特征服务端处于同一个内网,本发明实施例中,采用第一特征终端和第二特征终端对两个不同的特定终端进行区分,即第二特征终端与第一特征终端为同处于内网中的两个不同的终端,均可以通过内网访问第一特征服务端。The first feature server is a server accessible by a specific terminal, that is, a private cloud security system. The private cloud security system is mostly installed in the intranet of the enterprise, and can manage each terminal of the intranet. The specific terminal that can access the private cloud security system and the first feature server are in the same intranet. In the embodiment of the present invention, the first feature terminal and the second feature terminal are used to distinguish two different specific terminals, that is, the second The feature terminal and the first feature terminal are two different terminals in the same network, and the first feature server can be accessed through the intranet.
第一特征终端可以向第一特征服务端发送对应用程序的鉴定请求,请求第一特征服务端对该应用程序的安全性进行鉴定。本发明实施例中,应用程序可以是第一特征终端正在下载、安装、启动或保存的应用程序。The first feature terminal may send an authentication request to the application to the first feature server, requesting the first feature server to authenticate the security of the application. In the embodiment of the present invention, the application may be an application that the first feature terminal is downloading, installing, starting, or saving.
具体而言,第一特征终端在多种应用场景下均可以请求第一特征服务端对应用程序的安全性进行鉴定,第一特征终端下载应用程序时,可以请求第一特征服务端对应用程序的安全性进行鉴定;需要在安装应用程序时,也可以请求第一特征服务端对应用程序的安全性进行鉴定;在通过点击应用程序的快捷方式或是程序文件等方式来启动应用程序时,也可以请求第一特征服务端对应用程序的安全性进行鉴定;又或者,第一特征终端本地保存有多个应用程序,可以按照一定的频率请求第一特征服务端对 保存的应用程序的安全性进行鉴定。Specifically, the first feature terminal may request the first feature server to authenticate the security of the application in multiple application scenarios, and the first feature terminal may request the first feature server to the application when downloading the application. The security is authenticated; when installing the application, the first feature server can also be requested to authenticate the security of the application; when the application is launched by clicking an application shortcut or a program file, The first feature server may also be requested to authenticate the security of the application; or the first feature terminal may locally store multiple applications, and may request the first feature server pair according to a certain frequency. The security of the saved application is authenticated.
步骤102、向至少一个第二特征终端发送对所述应用程序对应的可执行文件的获取请求,所述获取请求携带所述应用程序的唯一标识信息,其中,所述可执行文件记录所述应用程序运行时的操作行为,所述第一特征服务端为基于内网对所述第一特征终端和第二特征终端进行安全管理的服务端。Step 102: Send, to the at least one second feature terminal, an acquisition request for an executable file corresponding to the application, where the acquisition request carries unique identification information of the application, where the executable file records the application. The operating behavior of the program during operation, the first feature server is a server that performs security management on the first feature terminal and the second feature terminal based on the intranet.
本发明实施例中,在接收到第一特征终端发送的鉴定请求后,进一步请求获取该应用程序对应的可执行文件,以按照可执行文件进行安全性的鉴定。由于各种原因经常会出现在原来的终端上该应用程序的可执行文件丢失的情况,针对这个问题,本发明实施例中,提出局域网内全网通缉原始文件的方法,即可以向其它不同于第一特征终端的第二特征终端请求所述可执行文件。In the embodiment of the present invention, after receiving the authentication request sent by the first feature terminal, the system further requests the executable file corresponding to the application to perform security identification according to the executable file. For various reasons, the executable file of the application is often lost on the original terminal. In this embodiment of the present invention, the method for the entire network in the local area network to pass the original file is proposed, that is, different from other methods. The second feature terminal of the first feature terminal requests the executable file.
可执行文件是记录应用程序运行时的操作行为的文件,具体可以为应用程序文件或是应用程序文件的部分信息,也可以是其它表征应用程序运行时的操作行为的文件。其中,应用程序文件即可执行文件(portable executable,PE文件),PE文件是微软Windows操作系统上的程序文件,常见的EXE、DLL、OCX、SYS、COM都是PE文件,每个应用程序都有对应的PE文件。An executable file is a file that records the operational behavior of an application when it runs, and can be part of the application file or part of the application file, or other file that characterizes the operational behavior of the application at runtime. Among them, the application file can be a executable file (PE file), the PE file is a program file on the Microsoft Windows operating system, common EXE, DLL, OCX, SYS, COM are PE files, each application is There is a corresponding PE file.
本发明实施例中,可以向一个或多个第二特征终端发送对该应用程序可执行文件的获取请求,向一个第二特征终端发送对可执行文件的获取请求时,可能该第二特征终端也并不存在可执行文件,需要再次发送请求,因此,优选地方式为向多个第二特征终端发送对可执行文件的获取请求。In the embodiment of the present invention, the acquiring request for the executable file of the application may be sent to one or more second feature terminals, and when the obtaining request for the executable file is sent to a second feature terminal, the second feature terminal may be There is also no executable file, and the request needs to be sent again. Therefore, it is preferable to send an acquisition request for the executable file to the plurality of second feature terminals.
本发明实施例中,所述唯一标识信息为所述应用程序的可执行文件的哈希值,或唯一标识所述应用程序的发布者的数字证书信息。In the embodiment of the present invention, the unique identification information is a hash value of the executable file of the application, or digital certificate information that uniquely identifies the publisher of the application.
具体的,PE文件由MS-DOS可执行体、文件头、可选头、数据目录、节头以及节等结构组成,本发明中可以通过PE文件的文件头中各个结构的关键词作为预设关键词,来判断应用程序对应的各个文件是否为应用程序文件。然后可以通过MD5算法(Message Digest Algorithm MD5,信息摘要算法第五版)计算出可执行文件的唯一HASH(哈希)值。MD5算法的典型应用是对一段信息(Message)产生信息摘要(Message-Digest),让大容量信息在用数字签名软件签署私人密钥前被″压缩″成一种保密的格式,就是把一个任意长度的字节串变换成一定长的十六进制数字串,可以确保信息传输完整一致。以防止被篡改。Specifically, the PE file is composed of an MS-DOS executable body, a file header, an optional header, a data directory, a section header, and a section. In the present invention, keywords of each structure in the file header of the PE file may be used as a preset. Keywords, to determine whether each file corresponding to the application is an application file. The unique HASH value of the executable file can then be calculated by the MD5 algorithm (Message Digest Algorithm MD5, Information Digest Algorithm Fifth Edition). A typical application of the MD5 algorithm is to generate a message-digest for a piece of information, so that the large-capacity information is "compressed" into a secret format before signing the private key with the digital signature software, that is, an arbitrary length. The byte string is transformed into a string of hexadecimal digits of a certain length to ensure complete and consistent information transmission. To prevent being tampered with.
例如,通过MD5算法,计算可执行文件WINWORD.EXE的唯一的32位HASH值为54525786F76E6CD2BA29E2B7B1B28939。For example, through the MD5 algorithm, the unique 32-bit HASH value of the executable file WINWORD.EXE is calculated to be 54525786F76E6CD2BA29E2B7B1B28939.
当然,本领域技术人员根据实际情况采用其它算法计算可执行文件的哈希值均是可行的,例如,采用sha-1、RIPEMD以及Haval等算法,本申请对此无需加以限制。Certainly, it is feasible for a person skilled in the art to use other algorithms to calculate the hash value of the executable file according to actual conditions. For example, algorithms such as sha-1, RIPEMD, and Haval are used, and the present application does not need to be limited thereto.
本发明实施例中,所述唯一标识信息也可以为唯一标识所述应用程序的发布者的数字证书信息。数字证书信息是数字签名的一部分,数字签名(Digital Signature)是使用数字证书信息来识别软件的发布者和使用Windows受信任的根证书颁发机构颁发的代码签名证书,对软件代码进行数字签名,从而保证了软件代码来自真实的发行者和保证软件代码没有被非法篡改。不同应用程序发布者的数据证书信息是不同的,因此,数字 证书信息可以唯一标识应用程序的发布者。In the embodiment of the present invention, the unique identification information may also be digital certificate information that uniquely identifies the publisher of the application. Digital certificate information is part of a digital signature, which is a digital signature that uses digital certificate information to identify the publisher of the software and a code signing certificate issued by a Windows trusted root certification authority. The software code is guaranteed to come from the real issuer and the software code is not illegally tampered with. The data certificate information of different application publishers is different, therefore, the number The certificate information uniquely identifies the publisher of the application.
换而言之,数字签名由经过加密处理的所述应用程序的可执行文件的哈希值和所述发布者的数字证书信息组成。例如,可执行文件的WINDOW.EXE的数字签名中包含的发布者的数字证书信息为Microsoft Code Signing PCA。In other words, the digital signature consists of the hash value of the executable file of the application that is encrypted and the digital certificate information of the publisher. For example, the publisher's digital certificate information contained in the digital signature of the executable WINDOW.EXE is Microsoft Code Signing PCA.
步骤103、依据所述唯一标识信息查找所述应用程序对应的可执行文件,并按照所述可执行文件对所述应用程序的安全性进行鉴定。Step 103: Search for an executable file corresponding to the application according to the unique identifier information, and identify the security of the application according to the executable file.
唯一标识信息为应用程序的可执行文件的哈希值时可以唯一标识所述应用程序,根据唯一标识信息即可唯一确定对应的应用程序,唯一标识信息为唯一标识所述应用程序的发布者的数字证书信息时,当私有云安全系统中仅存在该发布者的一个应用程序时,根据唯一标识信息也可以唯一确定对应的应用程序,当第二特征终端上存在该应用程序时,可以根据唯一标识信息确定对应的应用程序,并进一步查找到对应的可执行文件,将该可执行文件返回给特征服务端进行安全性鉴定。When the unique identification information is a hash value of the executable file of the application, the application may be uniquely identified, and the corresponding application may be uniquely determined according to the unique identification information, and the unique identification information is a publisher that uniquely identifies the application. When the digital certificate information is present, when only one application of the publisher exists in the private cloud security system, the corresponding application may be uniquely determined according to the unique identification information, and when the application exists on the second feature terminal, the unique application may be The identification information determines the corresponding application, and further finds the corresponding executable file, and returns the executable file to the feature server for security authentication.
在具体的实现中,可以通过分析可执行文件来确定应用程序的安全性,也可以通过将可执行文件上传到公有云安全系统的服务器端进一步进行分析,具体的分析方法可以采用现有技术的任何方式,本发明对此并不做限定。In a specific implementation, the security of the application may be determined by analyzing the executable file, or may be further analyzed by uploading the executable file to the server side of the public cloud security system, and the specific analysis method may adopt the prior art. In any way, the invention is not limited thereto.
依据本发明实施例,在接收到第一特征终端对应用程序安全性的鉴定请求后,向第二特征终端请求获取应用程序的可执行文件,以按照可执行文件对应用程序的安全性进行鉴定,从而在第一特征终端的可执行文件丢失的情况下,还可以通过在不同于第一特征终端的第二特征终端在内网中最大限度地查找该可执行文件,尽可能的避免文件丢失的情况,并且,由于并非终端主动上传可执行文件,而是在需要进一步由服务端主动向终端请求可执行文件,因此,终端无需上传所有未知安全性的应用程序的可执行文件,仅仅在需要时上传,节省了网络带宽资源和服务器的磁盘空间。According to the embodiment of the present invention, after receiving the authentication request of the first feature terminal for the application security, the second feature terminal is requested to acquire the executable file of the application program to identify the security of the application according to the executable file. Therefore, in the case that the executable file of the first feature terminal is lost, the executable file can also be searched for maximum in the internal network by using the second feature terminal different from the first feature terminal, thereby avoiding file loss as much as possible. In the case, and because the terminal does not actively upload the executable file, but needs to further request the executable file from the server to the terminal, the terminal does not need to upload the executable file of all the unknown security applications, only in need When uploading, it saves network bandwidth resources and server disk space.
本发明实施例中,进一步优选地,所述按照可执行文件对应用程序的安全性进行鉴定的步骤具体可以包括:In the embodiment of the present invention, the step of authenticating the security of the application according to the executable file may further include:
子步骤S11、通过分析所述可执行文件所记录的所述应用程序运行时的操作行为是否具备目标行为特征,以对所述应用程序的安全性进行鉴定,所述目标行为特征为病毒文件运行时的行为特征。Sub-step S11, determining whether the operational behavior of the application running by the executable file has a target behavior characteristic to identify the security of the application, and the target behavior characteristic is a virus file running. Behavioral characteristics.
病毒文件在运行时具有一些共同的破坏性操作行为,例如,重复复制代码,改写系统文件和通过网络向外界发送数据等。Virus files have some common destructive behaviors at runtime, such as duplicate code replication, rewriting system files, and sending data to the outside world over the network.
在病毒活动中,所做的最基本动作就是复制自身,将病毒代码附着到其他没有感染病毒的程序文件或其他与计算机执行有关的文件上,或复制到计算机系统的关键部位,以便能够经常得到执行的机会,甚至能在计算机启动时首先取得控制;或复制到可移动存储介质上,以便能传播到其他的计算机。恶性病毒在执行时除了设法复制自身外,还会完成各种破坏性操作,例如改写系统文件,病毒恶意地删除、破坏计算机系统中的各种有用文件,这些恶意操作会导致系统中某些关键性信息的丢失,或者造成重要程序的破坏,最终导致计算机系统整个垮台。某些病毒还会自动连接外网,向外网的固定IP一直发送数据,影响计算机的安全。In virus activity, the most basic action is to copy itself, attach the virus code to other program files that are not infected with the virus or other files related to computer execution, or copy it to key parts of the computer system so that it can be obtained frequently. Opportunities to perform can even be controlled first when the computer is booted; or copied to removable storage media so that it can be propagated to other computers. In addition to trying to replicate itself, a vicious virus performs various destructive operations, such as rewriting system files, maliciously deleting viruses, and destroying various useful files on a computer system. These malicious operations can cause some key problems in the system. The loss of sexual information or the destruction of important programs eventually leads to the collapse of the computer system. Some viruses also automatically connect to the external network, and the fixed IP of the external network always sends data, which affects the security of the computer.
应用程序的可执行文件记录了应用程序运行时的操作行为,可以通过分析可执行 文件记录的操作行为是否具有病毒的操作行为特征,以此来判断该应用程序是否安全,破坏性的操作行为一般包括对计算机系统的非常规操作或造成恶性结果的操作,如连接外网发送数据、执行多次复制代码的操作或访问并改写系统文件等,还可以包括其他种类的病毒行为特征。The application's executable records the operational behavior of the application at run time and can be analyzed by the executable Whether the operation behavior of the file record has the characteristics of the operational behavior of the virus, so as to judge whether the application is safe or not, and the destructive operation behavior generally includes unconventional operations on the computer system or operations that cause malicious results, such as connecting the external network to send data. , performing multiple copies of code operations or accessing and rewriting system files, etc., can also include other kinds of virus behavior characteristics.
本发明实施例中,进一步优选地,所述子步骤S11具体可以包括:In the embodiment of the present invention, the sub-step S11 may specifically include:
子步骤S11-1、对所述应用程序的可执行文件进行反汇编处理,得到所述应用程序对应的汇编源码;Sub-step S11-1, disassembling the executable file of the application to obtain an assembly source corresponding to the application;
子步骤S11-2、分析所述汇编源码在运行时的操作行为是否具备目标行为特征,所述目标行为特征为病毒文件运行时的行为特征,若所述汇编源码在运行时的操作行为具备至少一种目标行为特征,则所述应用程序的安全性为危险文件,若所述汇编源码在运行时的操作行为不具备任何一种目标行为特征,则所述应用程序的安全性为安全文件。Sub-step S11-2, analyzing whether the operation behavior of the assembly source at runtime is a target behavior characteristic, and the target behavior characteristic is a behavior characteristic of a virus file runtime, if the operation behavior of the assembly source at runtime is at least A target behavior feature, wherein the security of the application is a dangerous file, and if the operational behavior of the assembly source at runtime does not have any one of the target behavior characteristics, the security of the application is a security file.
反汇编是将目标代码转为汇编代码的过程。通常,编写程序是利用高级语言如C、Pascal等语言进行编程后再经过编译程序生成可以被计算机系统直接执行的可执行文件,反汇编即是指将这些可执行文件的机器语言反编译还原成汇编语言或其他高级语言。Disassembly is the process of turning object code into assembly code. Usually, the program is written in a high-level language such as C, Pascal, etc., and then compiled to generate executable files that can be directly executed by the computer system. Disassembly means that the machine language of these executable files is decompiled into Assembly language or other high-level language.
通过对可执行文件进行反汇编后得到应用程序对应的汇源编码,可执行文件记录了应用程序运行时的行为特征,通过分析汇源编码可以得到所记录的操作行为,若该应用程序的操作行为具备病毒所具备的至少一种目标行为特征,则确定应用程序的安全性为危险文件,若不具备任何一种目标行为特征,则应用程序的安全性为安全文件。The executable file corresponds to the source code of the application by disassembling the executable file. The executable file records the behavior characteristics of the application runtime, and the recorded operation behavior can be obtained by analyzing the source code, if the operation behavior of the application is At least one target behavior characteristic of the virus determines that the security of the application is a dangerous file. If there is no target behavior characteristic, the security of the application is a security file.
在本发明的一种优选示例中,在判断应用程序的操作行为是否具备目标行为特征时,可以在真实的操作系统中通过软件实现的方法虚拟一个运行环境,这个环境的数据以及运行结果与真实的操作系统完全隔离,在此环境下,运行该汇源编码,并记录应用程序的操作行为,分析操作行为的行为特征并进一步与目标行为特征进行比对。In a preferred example of the present invention, when determining whether the operation behavior of the application has the target behavior feature, the virtual operating environment may be virtualized in a real operating system by using a software-implemented method, the data of the environment, and the running result and the real The operating system is completely isolated. In this environment, the source code is run, and the operational behavior of the application is recorded, and the behavioral characteristics of the operational behavior are analyzed and further compared with the target behavior characteristics.
在本发明的另一种优选示例中,判断应用程序的操作行为是否具备目标行为特征之前,可以预置病毒破坏性行为对应的指令或指令集,在判断时,将该应用程序的汇源编码中所包含的指令或指令集提取出来,由于病毒的一个破坏行为由一系列的执行破坏性操作的指令或指令集构成,每一个所述的指令或指令集的至少产生一个独立的破坏性的操作行为,因此,若该应用程序的指令或指令集中包含至少一个病毒对应的指令代码,则可以得知该应用程序存在类似病毒的操作行为,若不包含任何一个病毒对应的指令代码,可以确定该应用程序的安全性为危险文件。In another preferred example of the present invention, before determining whether the operation behavior of the application has the target behavior feature, the instruction or instruction set corresponding to the virus destructive behavior may be preset, and in the judgment, the application source code is encoded. The contained instruction or set of instructions is extracted, and since a corrupted behavior of the virus consists of a series of instructions or sets of instructions that perform destructive operations, each of said instructions or sets of instructions produces at least one independent destructive operation. Behavior, therefore, if the application's instruction or instruction set contains at least one virus corresponding instruction code, it can be known that the application has a virus-like operation behavior, and if it does not contain any virus corresponding instruction code, it can be determined The security of the application is a dangerous file.
本发明实施例中,进一步优选地,所述鉴定请求可以携带该应用程序的唯一标识信息,唯一标识信息为所述应用程序的可执行文件的哈希值,或唯一标识所述应用程序的发布者的数字证书信息,以供所述第一特征服务端按照唯一标识信息对该应用程序进行鉴定。In an embodiment of the present invention, further preferably, the authentication request may carry unique identification information of the application, where the unique identification information is a hash value of the executable file of the application, or a certificate that uniquely identifies the application. Digital certificate information for the first feature server to authenticate the application according to the unique identification information.
具体而言,所述第一特征服务端预置有包括所述应用程序的唯一标识信息与安全性对应关系的安全性鉴定数据库,在步骤102之前,所述方法还可以包括:Specifically, the first feature server is configured with a security identification database that includes the unique identification information of the application and the security correspondence. Before the step 102, the method may further include:
所述第一特征服务端确定所述安全性鉴定数据库中不存在所述唯一标识信息,或根据所述唯一标识信息在所述安全性鉴定数据库中查找到所述应用程序对应的安全性并 非安全文件。The first feature server determines that the unique identifier information does not exist in the security authentication database, or finds the security corresponding to the application in the security identification database according to the unique identifier information. Non-secure documents.
在本发明实施例的一种应用场景中,私有云安全系统部署在封闭式的内网环境中,可能会使用一些内网专用而外网没有使用的应用程序,由于私有云安全系统的安全鉴定数据库从公有云安全系统更新,因此,采用该安全鉴定数据库可能并无法对请求鉴定的应用程序进行鉴定,这种情况下,第一特征服务端在所述安全鉴定数据库中搜索应用程序的唯一标识信息,并可以确定所述安全性鉴定数据库中不存在所述唯一标识信息,因此,可以进一步请求获取应用程序的可执行文件来进行安全鉴定。In an application scenario of the embodiment of the present invention, the private cloud security system is deployed in a closed intranet environment, and may use some applications that are dedicated to the intranet but not used by the external network, because the security of the private cloud security system is authenticated. The database is updated from the public cloud security system. Therefore, using the security authentication database may not be able to authenticate the application requesting authentication. In this case, the first feature server searches for the unique identifier of the application in the security authentication database. Information, and may determine that the unique identification information does not exist in the security authentication database, and therefore, the executable file of the application may be further requested to perform security authentication.
在本发明实施例的另一种应用场景中,也可以在私有云安全系统中初步确定该应用程序并非安全文件时,进一步请求应用程序对应的可执行文件。例如,应用程序的安全性分为安全文件、未知文件和禁用文件,当鉴定其安全性为未知文件或禁用文件,进一步请求可执行文件。在具体的实现中,安全性分类的种类和个数也可以根据需要设定,本发明对此并不做限制。In another application scenario of the embodiment of the present invention, when the application is not a security file in the private cloud security system, the executable file corresponding to the application may be further requested. For example, the security of an application is divided into security files, unknown files, and disabled files. When the security is identified as an unknown file or the file is disabled, the executable file is further requested. In a specific implementation, the types and the number of security classifications may also be set as needed, and the present invention does not limit this.
本发明实施例中,进一步优选地,在向至少一个第二特征终端发送对所述应用程序对应的可执行文件的获取请求的步骤之前,所述方法还可以包括:In the embodiment of the present invention, the method may further include: before the step of sending an acquisition request for the executable file corresponding to the application to the at least one second feature terminal, the method may further include:
向所述第一特征终端发送对所述应用程序对应的可执行文件的获取请求,并接收到所述第一特征终端反馈的不存在所述可执行文件的消息。Sending an acquisition request for the executable file corresponding to the application to the first feature terminal, and receiving a message that the first feature terminal feeds back that the executable file does not exist.
在具体的实现中,向第二特征终端请求可执行文件之前,还可以先向第一特征终端请求所述可执行文件,当第一特征终端不存在可执行文件时,向第一特征服务器返回不存在的消息,然后再进一步向第二特征终端请求该可执行文件。In a specific implementation, before the executable file is requested by the second feature terminal, the executable file may be requested from the first feature terminal, and returned to the first feature server when the first feature terminal does not have the executable file. The message that does not exist, and then further requests the executable file to the second feature terminal.
本发明实施例中,进一步优选地,所述第二特征终端保存有所述应用程序的唯一标识信息与所述可执行文件在所述第二特征终端的保存路径的对应关系,所述接收第二特征终端依据唯一标识信息查找的应用程序对应的可执行文件的步骤包括:In an embodiment of the present invention, further preferably, the second feature terminal stores a correspondence between the unique identification information of the application and the save path of the executable file in the second feature terminal, where the receiving The step of the second executable terminal corresponding to the executable file corresponding to the application searched by the unique identifier information includes:
子步骤S21、接收所述第二特征终端按照所述唯一标识信息以及所述对应关系确定保存路径后并按照所述保存路径提取的可执行文件。Sub-step S21: Receive an executable file that is extracted by the second feature terminal according to the unique identification information and the corresponding relationship, and is extracted according to the save path.
第二特征终端可以记录应用程序的可执行文件的保存路径,并记录保存路径与标识该应用程序的唯一标识信息的对应关系,如此,可以依据应用程序的唯一标识信息在对应关系中查找到应用程序的可执行文件在第二特征终端的保存路径,根据保存路径提取可执行文件。The second feature terminal may record a save path of the executable file of the application, and record a correspondence between the save path and the unique identifier information of the application, so that the application may be found in the corresponding relationship according to the unique identifier information of the application. The executable file of the program is in the save path of the second feature terminal, and the executable file is extracted according to the save path.
参考图2,示出了根据本发明另一个实施例的应用程序安全性的鉴定方法流程图,具体可以包括:Referring to FIG. 2, a flowchart of an authentication method for application security according to another embodiment of the present invention is shown, which may specifically include:
步骤201、第二特征终端接收第一特征服务端发送的对应用程序对应的可执行文件的获取请求,所述获取请求在所述第一特征服务端接收第一特征终端对所述应用程序的安全性的鉴定请求之后发送,所述获取请求携带所述应用程序的唯一标识信息,其中,所述可执行文件记录所述应用程序运行时的操作行为,所述第一特征服务端为基于内网对所述第一特征终端和第二特征终端进行安全管理的服务端。Step 201: The second feature terminal receives a request for acquiring an executable file corresponding to the application sent by the first feature server, where the acquiring request receives, by the first feature server, the first feature terminal for the application. After the authentication request is sent, the obtaining request carries unique identification information of the application, wherein the executable file records an operation behavior of the application when the application is running, and the first feature server is based on the internal The server that performs security management on the first feature terminal and the second feature terminal by the network.
步骤202、依据所述唯一标识信息在本地查找所述应用程序对应的可执行文件,并将所述可执行文件发送到所述第一特征服务端,以按照所述可执行文件对所述应用程序 的安全性进行鉴定。Step 202: Search for an executable file corresponding to the application locally according to the unique identifier information, and send the executable file to the first feature server to use the executable file according to the executable file. Program The safety is identified.
本发明实施例中,优选地,所述唯一标识信息为所述应用程序的可执行文件的哈希值,或唯一标识所述应用程序的发布者的数字证书信息。In an embodiment of the present invention, preferably, the unique identification information is a hash value of an executable file of the application, or digital certificate information that uniquely identifies a publisher of the application.
本发明实施例中,优选地,所述第二特征终端保存有所述应用程序的唯一标识信息与所述可执行文件在所述第二特征终端的保存路径的对应关系,所述依据唯一标识信息在本地查找应用程序对应的可执行文件的步骤包括:In the embodiment of the present invention, preferably, the second feature terminal stores a correspondence between the unique identification information of the application and the save path of the executable file in the second feature terminal, where the unique identifier is The steps to find the executable file corresponding to the application locally include:
子步骤S31、按照所述唯一标识信息以及所述对应关系确定所述可执行文件在所述第二特征终端的保存路径;Sub-step S31, determining, according to the unique identifier information and the correspondence, a save path of the executable file in the second feature terminal;
子步骤S32、按照所述保存路径提取的所述应用程序对应的可执行文件。Sub-step S32, the executable file corresponding to the application extracted according to the save path.
本发明实施例中,优选地,在将所述可执行文件发送到所述第一特征服务端的步骤之前,所述方法还包括:In the embodiment of the present invention, preferably, before the step of sending the executable file to the first feature server, the method further includes:
向所述第一特征服务器发送对所述可执行文件的查询请求;Sending a query request for the executable file to the first feature server;
接收所述第一特征服务器反馈的未接收到其它第二特征终端发送的可执行文件的消息。Receiving, by the first feature server, a message that does not receive an executable file sent by another second feature terminal.
本发明实施例中,第一特征服务端接收到对应用程序安全性的鉴定请求后,可以向一个或多个第二特征终端请求可执行文件,在具体的实现中,若向多个第二特征终端请求可执行文件,而可能不止一个第二特征终端存在该可执行文件,则只需要其中一个第二特征终端上传可执行文件即可,因此,在第二特征终端查找到可执行文件后,还可以先向第一特征服务器发送对可执行文件的查询请求,若第一特征服务器未接收到其它第二特征终端发送的可执行文件,则将该消息通知给发送查询请求的第二特征终端,然后由该第二特征终端上传可执行文件,已经收到其它第二特征终端上传的可执行文件,则通知已经收到,则无需发送查询请求的第二特征终端再次上传该可执行文件,如此可以避免多个终端重复上传文件时造成带宽资源的浪费。In the embodiment of the present invention, after receiving the authentication request for the application security, the first feature server may request the executable file from the one or more second feature terminals. The feature terminal requests the executable file, and more than one second feature terminal may exist the executable file, and only one of the second feature terminals needs to upload the executable file, so after the second feature terminal finds the executable file, And sending a query request for the executable file to the first feature server, and if the first feature server does not receive the executable file sent by the other second feature terminal, notifying the message to the second feature of sending the query request The terminal then uploads the executable file by the second feature terminal, and has received the executable file uploaded by the other second feature terminal, and the notification has been received, and the second feature terminal that does not need to send the query request uploads the executable file again. This can avoid the waste of bandwidth resources when multiple terminals repeatedly upload files.
依据本发明实施例,在接收到第一特征终端对应用程序安全性的鉴定请求后,向第二特征终端请求获取应用程序的可执行文件,以按照可执行文件对应用程序的安全性进行鉴定,从而在第一特征终端的可执行文件丢失的情况下,还可以在不同于第一特征终端的第二特征终端上查找该可执行文件。According to the embodiment of the present invention, after receiving the authentication request of the first feature terminal for the application security, the second feature terminal is requested to acquire the executable file of the application program to identify the security of the application according to the executable file. Thus, in the case where the executable file of the first feature terminal is lost, the executable file can also be searched for on the second feature terminal different from the first feature terminal.
依据本发明实施例,并非终端主动上传可执行文件,而是在需要进一步由服务端主动向终端请求可执行文件,因此,终端无需上传所有未知安全性的应用程序的可执行文件,仅仅在需要时上传,节省了网络带宽资源和服务器的磁盘空间。According to the embodiment of the present invention, the terminal does not actively upload the executable file, but needs to further request the executable file from the server to the terminal. Therefore, the terminal does not need to upload the executable file of all the unknown security applications, only when needed. When uploading, it saves network bandwidth resources and server disk space.
需要说明的是,对于前述的方法实施例,为了简单描述,故将其都表述为一系列的动作组合,但是本领域技术人员应该知悉,本发明并不受所描述的动作顺序的限制,因为依据本发明,某些步骤可以采用其它顺序或者同时进行。其次,本领域技术人员也应该知悉,说明书中所描述的实施例均属于优选实施例,所涉及的动作并不一定是本发明所必需的。It should be noted that, for the foregoing method embodiments, for the sake of simple description, they are all expressed as a series of action combinations, but those skilled in the art should understand that the present invention is not limited by the described action sequence, because In accordance with the present invention, certain steps may be performed in other sequences or concurrently. In addition, those skilled in the art should also understand that the embodiments described in the specification are all preferred embodiments, and the actions involved are not necessarily required by the present invention.
参考图3,示出了根据本发明一个实施例的应用程序安全性的鉴定装置结构框图,具体可以包括: Referring to FIG. 3, a block diagram of an apparatus for authenticating an application security according to an embodiment of the present invention is shown.
程序鉴定请求模块301,用于第一特征服务端接收第一特征终端对应用程序的安全性的鉴定请求;The program identification requesting module 301 is configured to receive, by the first feature server, an authentication request of the first feature terminal for security of the application;
第一可执行文件请求模块302,用于向至少一个第二特征终端发送对所述应用程序对应的可执行文件的获取请求,所述获取请求携带所述应用程序的唯一标识信息,其中,所述可执行文件记录所述应用程序运行时的操作行为,所述第一特征服务端为基于内网对所述第一特征终端和第二特征终端进行安全管理的服务端;The first executable file requesting module 302 is configured to send, to the at least one second feature terminal, an acquisition request for the executable file corresponding to the application, where the acquisition request carries the unique identification information of the application, where The executable file records an operation behavior of the application when the application is running, and the first feature server is a server that performs security management on the first feature terminal and the second feature terminal based on an intranet;
可执行文件接收模块,用于依据所述唯一标识信息查找所述应用程序对应的可执行文件;An executable file receiving module, configured to search for an executable file corresponding to the application according to the unique identifier information;
第一安全鉴定模块,用于按照所述可执行文件对所述应用程序的安全性进行鉴定。The first security authentication module is configured to authenticate the security of the application according to the executable file.
本发明实施例中,优选地,所述唯一标识信息为所述应用程序的可执行文件的哈希值,或唯一标识所述应用程序的发布者的数字证书信息。In an embodiment of the present invention, preferably, the unique identification information is a hash value of an executable file of the application, or digital certificate information that uniquely identifies a publisher of the application.
本发明实施例中,优选地,所述鉴定请求携带所述应用程序的唯一标识信息,所述第一特征服务端预置有包括所述应用程序的唯一标识信息与安全性对应关系的安全性鉴定数据库;In the embodiment of the present invention, preferably, the authentication request carries unique identification information of the application, and the first feature server is preset with security including a unique identifier information of the application and a security correspondence relationship. Identification database;
所述装置还包括:The device also includes:
第二安全鉴定模块,用于所述第一特征服务端确定所述安全性鉴定数据库中不存在所述唯一标识信息,或根据所述唯一标识信息在所述安全性鉴定数据库中查找到所述应用程序对应的安全性并非安全文件。a second security authentication module, configured to determine, by the first feature server, that the unique identifier information does not exist in the security authentication database, or find the foregoing in the security identification database according to the unique identifier information The security corresponding to the application is not a secure file.
本发明实施例中,优选地,所述装置还包括:In the embodiment of the present invention, preferably, the device further includes:
第二可执行文件请求模块,用于向所述第一特征终端发送对所述应用程序对应的可执行文件的获取请求,并接收到所述第一特征终端反馈的不存在所述可执行文件的消息。a second executable file requesting module, configured to send, to the first feature terminal, an acquisition request for an executable file corresponding to the application, and receive the executable file that is not fed back by the first feature terminal Message.
本发明实施例中,优选地,所述第一安全鉴定模块,具体用于通过分析所述可执行文件所记录的所述应用程序运行时的操作行为是否具备目标行为特征,以对所述应用程序的安全性进行鉴定,所述目标行为特征为病毒文件运行时的行为特征。In the embodiment of the present invention, preferably, the first security authentication module is specifically configured to analyze whether the operation behavior of the application program recorded by the executable file has a target behavior feature to the application The security of the program is characterized, and the target behavior is characterized by behavioral characteristics of the virus file at runtime.
本发明实施例中,优选地,所述第一安全鉴定模块包括:In the embodiment of the present invention, preferably, the first security authentication module includes:
对所述应用程序的可执行文件进行反汇编处理,得到所述应用程序对应的汇编源码;Disassembling the executable file of the application to obtain an assembly source corresponding to the application;
分析所述汇编源码在运行时的操作行为是否具备目标行为特征,所述目标行为特征为病毒文件运行时的行为特征;Analyzing whether the operational behavior of the assembly source at runtime has a target behavior characteristic, and the target behavior characteristic is a behavior characteristic of a virus file during runtime;
若所述汇编源码在运行时的操作行为具备至少一种目标行为特征,则所述应用程序的安全性为危险文件;If the operational behavior of the assembly source at runtime has at least one target behavior characteristic, the security of the application is a dangerous file;
若所述汇编源码在运行时的操作行为不具备任何一种目标行为特征,则所述应用程序的安全性为安全文件。If the operational behavior of the assembly source at runtime does not have any of the target behavior characteristics, the security of the application is a secure file.
本发明实施例中,优选地,所述目标行为特征包括连接外网发送数据、执行多次复制代码的操作或访问并改写系统文件。In the embodiment of the present invention, preferably, the target behavior feature includes connecting an external network to send data, performing an operation of copying the code multiple times, or accessing and rewriting the system file.
本发明实施例中,优选地,所述第二特征终端保存有所述应用程序的唯一标识信 息与所述可执行文件在所述第二特征终端的保存路径的对应关系;In the embodiment of the present invention, preferably, the second feature terminal stores a unique identification letter of the application. Corresponding relationship between the information and the executable file in the save path of the second feature terminal;
所述可执行文件接收模块,具体用于接收所述第二特征终端按照所述唯一标识信息以及所述对应关系确定保存路径后并按照所述保存路径提取的可执行文件。The executable file receiving module is configured to receive an executable file that is determined by the second feature terminal to determine a save path according to the unique identifier information and the corresponding relationship, and is extracted according to the save path.
依据本发明实施例,在接收到第一特征终端对应用程序安全性的鉴定请求后,向第二特征终端请求获取应用程序的可执行文件,以按照可执行文件对应用程序的安全性进行鉴定,从而在第一特征终端的可执行文件丢失的情况下,还可以在不同于第一特征终端的第二特征终端上查找该可执行文件。According to the embodiment of the present invention, after receiving the authentication request of the first feature terminal for the application security, the second feature terminal is requested to acquire the executable file of the application program to identify the security of the application according to the executable file. Thus, in the case where the executable file of the first feature terminal is lost, the executable file can also be searched for on the second feature terminal different from the first feature terminal.
依据本发明实施例,并非终端主动上传可执行文件,而是在需要进一步由服务端主动向终端请求可执行文件,因此,终端无需上传所有未知安全性的应用程序的可执行文件,仅仅在需要时上传,节省了网络带宽资源和服务器的磁盘空间。According to the embodiment of the present invention, the terminal does not actively upload the executable file, but needs to further request the executable file from the server to the terminal. Therefore, the terminal does not need to upload the executable file of all the unknown security applications, only when needed. When uploading, it saves network bandwidth resources and server disk space.
参考图4,示出了根据本发明一个实施例的应用程序安全性的鉴定装置结构框图,具体可以包括:Referring to FIG. 4, a block diagram of an apparatus for identifying an application security according to an embodiment of the present invention is shown.
获取请求接收模块401,用于第二特征终端接收第一特征服务端发送的对应用程序对应的可执行文件的获取请求,所述获取请求在所述第一特征服务端接收第一特征终端对所述应用程序的安全性的鉴定请求之后发送,所述获取请求携带所述应用程序的唯一标识信息,其中,所述可执行文件记录所述应用程序运行时的操作行为,所述第一特征服务端为基于内网对所述第一特征终端和第二特征终端进行安全管理的服务端;The obtaining request receiving module 401 is configured to receive, by the first feature terminal, an acquisition request for the executable file corresponding to the application sent by the first feature server, where the obtaining request receives the first feature terminal pair at the first feature server After the authentication request of the security of the application is sent, the obtaining request carries unique identification information of the application, wherein the executable file records an operation behavior of the application when the application is running, the first feature The server is a server that performs security management on the first feature terminal and the second feature terminal based on the intranet;
可执行文件查找模块402,用于依据所述唯一标识信息在本地查找所述应用程序对应的可执行文件,并将所述可执行文件发送到所述第一特征服务端,以按照所述可执行文件对所述应用程序的安全性进行鉴定。The executable file searching module 402 is configured to locally search for an executable file corresponding to the application according to the unique identifier information, and send the executable file to the first feature server to follow the The execution file authenticates the security of the application.
本发明实施例中,优选地,所述唯一标识信息为所述应用程序的可执行文件的哈希值,或唯一标识所述应用程序的发布者的数字证书信息。In an embodiment of the present invention, preferably, the unique identification information is a hash value of an executable file of the application, or digital certificate information that uniquely identifies a publisher of the application.
本发明实施例中,优选地,所述第二特征终端保存有所述应用程序的唯一标识信息与所述可执行文件在所述第二特征终端的保存路径的对应关系,所述可执行文件查找模块包括:In the embodiment of the present invention, preferably, the second feature terminal stores a correspondence between the unique identification information of the application and the save path of the executable file in the second feature terminal, and the executable file The lookup module includes:
路径确定子模块,用于按照所述唯一标识信息以及所述对应关系确定所述可执行文件在所述第二特征终端的保存路径;a path determining submodule, configured to determine, according to the unique identifier information and the correspondence, a save path of the executable file in the second feature terminal;
可执行文件提取子模块,用于按照所述保存路径提取的所述应用程序对应的可执行文件。An executable file extraction submodule, configured to execute the executable file corresponding to the application according to the save path.
本发明实施例中,优选地,所述装置还包括:In the embodiment of the present invention, preferably, the device further includes:
查询请求发送模块,用于向所述第一特征服务器发送对所述可执行文件的查询请求;a query request sending module, configured to send a query request for the executable file to the first feature server;
消息接收模块,用于接收所述第一特征服务器反馈的未接收到其它第二特征终端发送的可执行文件的消息。The message receiving module is configured to receive, by the first feature server, a message that is not received by the other second feature terminal and is sent by the executable file.
依据本发明实施例,在接收到第一特征终端对应用程序安全性的鉴定请求后,向第二特征终端请求获取应用程序的可执行文件,以按照可执行文件对应用程序的安全性进行鉴定,从而在第一特征终端的可执行文件丢失的情况下,还可以在不同于第一特征 终端的第二特征终端上查找该可执行文件。According to the embodiment of the present invention, after receiving the authentication request of the first feature terminal for the application security, the second feature terminal is requested to acquire the executable file of the application program to identify the security of the application according to the executable file. So that in the case where the executable file of the first feature terminal is lost, it may also be different from the first feature The executable file is searched for on the second feature terminal of the terminal.
依据本发明实施例,并非终端主动上传可执行文件,而是在需要进一步由服务端主动向终端请求可执行文件,因此,终端无需上传所有未知安全性的应用程序的可执行文件,仅仅在需要时上传,节省了网络带宽资源和服务器的磁盘空间。According to the embodiment of the present invention, the terminal does not actively upload the executable file, but needs to further request the executable file from the server to the terminal. Therefore, the terminal does not need to upload the executable file of all the unknown security applications, only when needed. When uploading, it saves network bandwidth resources and server disk space.
参考图5,示出了根据本发明一个实施例的应用程序安全性的变更方法流程图,具体可以包括:Referring to FIG. 5, a flowchart of a method for changing the security of an application according to an embodiment of the present invention is shown.
步骤501、第一特征服务端对第一特征终端的应用程序的安全性进行鉴定,并将鉴定的安全性下发给所述第一特征终端进行保存,所述第一特征服务端为所述第一特征终端通过内网可访问的服务端。Step 501: The first feature server authenticates the security of the application of the first feature terminal, and sends the authenticated security to the first feature terminal for saving. The first feature server is the The first feature terminal is a server accessible through an intranet.
本发明实施例中,第一特征服务端为特定终端可访问的服务端,即私有云安全系统,可访问私有云安全系统的特征终端和私有云安全系统服务器处于同一个内网,在具体的实现中,私有云安全系统大多架设在企业内网中,可以对企业内网的各个终端进行管理。In the embodiment of the present invention, the first feature server is a server accessible by a specific terminal, that is, a private cloud security system, and the feature terminal that can access the private cloud security system and the private cloud security system server are in the same intranet, in a specific In the implementation, the private cloud security system is mostly installed in the intranet of the enterprise, and can manage each terminal of the intranet of the enterprise.
第一特征终端可以在下载、安装、启动或保存应用程序时向第一特征服务端请求对应用程序的安全性进行鉴定。具体的实现中,在请求鉴定时,可以将应用程序的特征标识发送给第一特征服务端,第一特征服务端保存有应用程序的特征标识与安全性的对应关系,根据特征标识确定应用程序的安全性后,可以将安全性下发给第一特征终端。特征标识可以为所述应用程序的可执行文件的哈希值,也可以为唯一标识所述应用程序的发布者的数字证书信息。The first feature terminal may request the first feature server to authenticate the security of the application when downloading, installing, starting, or saving the application. In a specific implementation, when the authentication is requested, the feature identifier of the application may be sent to the first feature server, where the first feature server saves the correspondence between the feature identifier and the security of the application, and determines the application according to the feature identifier. After the security, the security can be sent to the first feature terminal. The feature identifier may be a hash value of the executable file of the application, or may be digital certificate information that uniquely identifies the publisher of the application.
在具体的实现中,所述应用程序的安全性包括正常、禁用和未知三种级别,也可以按照具体的需求进行设置,本发明对此并不做限制。In a specific implementation, the security of the application includes three levels of normal, disabled, and unknown, and may also be set according to specific requirements, which is not limited by the present invention.
步骤502、接收所述第一特征终端对多个变更文件的获取请求,所述变更文件用于对所述第一特征终端保存的某个应用程序的安全性进行修正。Step 502: Receive an acquisition request of the first feature terminal for multiple change files, where the change file is used to modify security of an application saved by the first feature terminal.
私有云安全系统中经常会存在文件安全性变更的情况,可以将对某个应用程序安全性的变更记录在变更文件中,根据变更文件对应用程序的安全性,变更文件保存在特征服务端,第一特征终端可以向第一特征服务端请求变更文件,以获得应用程序安全性发生的变化,让终端使用新的文件安全性来实现终端安全的管理。In a private cloud security system, file security changes often occur. Changes to an application's security can be recorded in the change file. The change file is stored on the feature server according to the security of the application. The first feature terminal may request the change file from the first feature server to obtain a change in the security of the application, and let the terminal use the new file security to implement terminal security management.
步骤503、按照所述获取请求提取多个变更文件,所述变更文件携带对应的文件处理级别。Step 503: Extract a plurality of change files according to the obtaining request, where the change file carries a corresponding file processing level.
根据终端对变更文件的获取请求可以进一步提取请求的变更文件,例如,可以请求某个应用程序对应的变更文件或是请求某个时间段生成的变更文件。本发明实施例中,针对应用程序的变更文件分别设置了文件处理级别,在具体的实现中,可以按照具体的应用需求设置文件处理级别,例如,根据变更文件的来源的不同进行文件处理级别的设置,也可以根据变更文件对应的程序类型的不同进行文件处理级别的设置。The requested change file may be further extracted according to the terminal's request for obtaining the change file. For example, the change file corresponding to an application may be requested or the change file generated by a certain time period may be requested. In the embodiment of the present invention, the file processing level is set separately for the change file of the application program. In a specific implementation, the file processing level may be set according to specific application requirements, for example, the file processing level is performed according to the source of the change file. Setting, you can also set the file processing level according to the program type corresponding to the change file.
根据变更文件的来源的不同进行文件处理级别的设置时,针对管理员主动修改的变更和其他来源的变更分别设置不同的文件处理级别,可以分为第一文件处理级别和第二文件处理级别,或分为高级文件处理级别和低级文件处理级别等。 When the file processing level is set according to the source of the change file, different file processing levels are set for the change that the administrator actively modifies and the changes of other sources, and can be divided into the first file processing level and the second file processing level. Or divided into advanced file processing level and low-level file processing level.
步骤504、将提取的多个变更文件按照对应的文件处理级别的不同进行分类,并按照分类将所述变更文件分别发送给所述第一特征终端,以供所述第一特征终端针对不同文件处理级别的变更文件分别按照不同的处理方式进行处理。Step 504: classify the extracted multiple change files according to different file processing levels, and send the change files to the first feature terminal according to the classification, so that the first feature terminal is targeted to different files. The processing level change files are processed according to different processing methods.
根据变更文件可以按照文件处理级别的不同进行分类,将具备相同文件处理级别的变更文件归于一类,并按照分类分别发送给第一特征终端,第一特征终端接收到按分类分别发送的变更文件后,针对不同类也即是不同文件处理级别的变更文件按照不同的处理方式进行处理。因此,依据本发明实施例,可以将文件处理级别高的变更文件与文件处理级别低的变更文件分开发送、分别处理,从而可以在积压大量变更文件的情况下,将处理级别较高的变更文件与处理级别较高的变更文件分开发送,避免处理级别较高的变更文件未能及时发送到终端给终端造成的安全风险,并且可以使文件安全性变更的过程变得有效、快速、可靠。According to the change file, the change file according to the file processing level can be classified, and the change files having the same file processing level are classified into one class, and are respectively sent to the first feature terminal according to the classification, and the first feature terminal receives the change file respectively sent by the classification. After that, the change files for different classes, that is, different file processing levels, are processed according to different processing methods. Therefore, according to the embodiment of the present invention, a change file having a high file processing level and a change file having a low file processing level can be separately sent and processed separately, so that a change file having a higher processing level can be processed in the case of a large number of changed files. It is sent separately from the change file with higher processing level, which avoids the security risk caused by the high-level change file being sent to the terminal in time, and can make the process of file security change effective, fast and reliable.
在本发明的一种优选实施例中,所述按照分类将变更文件分别发送给第一特征终端的步骤可以包括:In a preferred embodiment of the present invention, the step of separately transmitting the change file to the first feature terminal according to the classification may include:
子步骤S41、将具备不同文件处理级别的变更文件分别通过不同的传输路径发送给所述第一特征终端。Sub-step S41: Sending the change files having different file processing levels to the first feature terminal through different transmission paths.
将具备不同文件处理级别的变更文件发送给第一特征终端时,可以分别通过不同的传输路径发送,第一特征终端可以通过不同的传输路径接收到具备不同文件处理级别的变更文件,从而使文件处理级别不同的变更文件在传输到终端的过程中不会互相干扰,避免处理级别较高的变更文件未能及时发送到终端给终端造成的安全风险,使文件安全性变更的过程变得有效、快速、可靠。When the change file with different file processing levels is sent to the first feature terminal, the change can be sent through different transmission paths, and the first feature terminal can receive the change file with different file processing levels through different transmission paths, thereby making the file The change files with different processing levels will not interfere with each other in the process of transmission to the terminal, and avoid the security risks caused by the high-level change files being sent to the terminal in time, so that the process of file security change becomes effective. Fast and reliable.
进一步,所述子步骤S41可以包括:Further, the sub-step S41 may include:
子步骤S41-1、将具备不同文件处理级别的变更文件分别通过第一特征服务端不同的预设端口或通信信道发送给所述第一特征终端;Sub-step S41-1, sending the change files with different file processing levels to the first feature terminal through different preset ports or communication channels of the first feature server;
或,子步骤S41-2、将具备不同文件处理级别的变更文件分别通过所述第一特征终端不同的预设接口发送给所述第一特征终端;Or, in step S41-2, the change files having different file processing levels are respectively sent to the first feature terminal through different preset interfaces of the first feature terminal;
或,子步骤S41-3、将具备不同文件处理级别的变更文件分别发送到所述第一特征终端的不同的预置文件夹中。Or, in sub-step S41-3, the change files having different file processing levels are respectively sent to different preset folders of the first feature terminal.
本发明实施例中,通过不同的传输路径对具备不同文件处理级别的变更文件进行传输,可以是通过服务端不同的预设端口发送给第一特征终端,服务器不同的预设端口与第一特征终端之间形成不同的数据传输路径。在这种情况下,终端与服务端按照原本的协议(例如HTTP-Hypertext Transfer Protoco,HTTP超文本转移协议)下发其中一种文件处理级别的变更文件,并增加新的变更文件通知协议分别用于下发其他文件处理级别的变更文件,协议格式可以与原格式一致。例如,文件处理级别包括高文件处理级别和低文件处理级别,高文件处理级别的变更通知会通过新的通知协议下发,低文件处理级别的变更通知会通过原来的通知协议下发。In the embodiment of the present invention, the change file with different file processing levels is transmitted through different transmission paths, which may be sent to the first feature terminal through different preset ports of the server, and different preset ports and first features of the server Different data transmission paths are formed between the terminals. In this case, the terminal and the server issue one of the file processing level change files according to the original protocol (for example, HTTP-Hypertext Transfer Protoco, HTTP hypertext transfer protocol), and add a new change file notification protocol respectively. The other file processing level change files are issued, and the protocol format can be consistent with the original format. For example, the file processing level includes a high file processing level and a low file processing level. A high file processing level change notification is sent through a new notification protocol, and a low file processing level change notification is delivered through the original notification protocol.
本发明实施例中,也可以通过不同的通信信道发送给第一特征终端,服务器链路层与第一特征终端链路层之间构建多个通信信道,分别用于传输具备不同文件处理级别的变更文件;也可以是服务端通过第一特征终端不同的预设接口发送给第一特征终端, 第一特征终端具备多个不同的预设接口,不同的预设接口与服务端形成不同的数据传输路径;也可以在特征终端预置不同的文件夹,分别用于存储具备不同文件处理级别的变更文件,每个文件夹与服务器之间形成不同的数据传输路径。In the embodiment of the present invention, the first feature terminal may be sent to the first feature terminal through a different communication channel, and multiple communication channels are constructed between the server link layer and the first feature terminal link layer for respectively transmitting different file processing levels. The change file may be sent by the server to the first feature terminal through a different preset interface of the first feature terminal. The first feature terminal has a plurality of different preset interfaces, and different preset interfaces form different data transmission paths with the server; or different folders may be preset in the feature terminal for storing different file processing levels. Change files, each folder and server form a different data transmission path.
在本发明的另一种优选实施例中,所述按照分类将变更文件分别发送给第一特征终端的步骤可以包括:In another preferred embodiment of the present invention, the step of separately transmitting the change file to the first feature terminal according to the classification may include:
子步骤S51、将提取的多个变更文件按照对应的文件处理级别进行排序,并按照排序逐个提取所述变更文件发送给所述第一特征终端。Sub-step S51, sorting the extracted plurality of change files according to corresponding file processing levels, and extracting the change files one by one according to the sorting and transmitting the change files to the first feature terminal.
在另一种优选的实施例中,按照分类发送变更文件时,为将处理级别较高的变更文件及时发送到终端,可以将文件处理级别高的变更文件优先发送给第一特征终端,具体而言,将变更文件按照对应的文件处理级别的高低进行排序,可以将排序靠前的也即是文件处理级别较高的变更文件优先发送给第一特征终端,可以避免处理级别较高的变更文件未能及时发送到终端给终端造成的安全风险,使文件安全性变更的过程变得有效、快速、可靠。In another preferred embodiment, when the change file is sent according to the classification, in order to send the change file with a higher processing level to the terminal in time, the change file with a high file processing level may be preferentially sent to the first feature terminal, specifically In other words, the change file is sorted according to the level of the corresponding file processing level, and the change file with the higher file processing level is preferentially sent to the first feature terminal, and the change file with higher processing level can be avoided. Failure to send the terminal to the terminal poses a security risk, making the process of file security change effective, fast, and reliable.
本发明实施例中,所述第一特征终端针对不同文件处理级别的变更文件分别按照不同的处理方式进行处理的步骤包括:In the embodiment of the present invention, the step of processing, by the first feature terminal, the change files of different file processing levels according to different processing manners includes:
子步骤S61、所述第一特征终端针对不同文件处理级别的变更文件分别创建相应的进程或分别采用不同的线程进行处理。Sub-step S61, the first feature terminal respectively creates a corresponding process for the change files of different file processing levels or respectively processes with different threads.
本发明实施例中,第一特征终端可以建立多条线程分别处理不同文件处理级别的变更文件,也可以针对不同文件处理级别的变更文件采用不同的线程进行处理,从而使不同文件处理级别的变更文件的处理互相不干扰。In the embodiment of the present invention, the first feature terminal may establish multiple threads to process different file processing level change files, or may use different threads for different file processing level change files to process different file processing levels. The processing of the files does not interfere with each other.
优选地,当所述第一特征终端创建不同的线程分别处理具备不同文件处理级别的变更文件时,文件处理级别高的变更文件对应的线程的处理速度高于文件处理级别低的变更文件对应的线程,从而可以更快地处理高文件处理级别的变更文件。Preferably, when the first feature terminal creates different threads to respectively process the change files having different file processing levels, the processing speed of the thread corresponding to the file with a higher file processing level is higher than the file with the lower file processing level. Threads, which allow for faster processing of change files at high file processing levels.
本发明实施例中,所述获取请求是根据所述第一特征终端已存在的变更文件生成的,所述步骤503可以进一步包括:In the embodiment of the present invention, the obtaining request is generated according to the change file that the first feature terminal already exists, and the step 503 may further include:
子步骤S71、按照所述获取请求提取生成时间在所述第一特征终端已存在的变更文件的生成时间之后的变更文件。Sub-step S71, extracting a change file after the generation time of the change file existing in the first feature terminal is generated according to the acquisition request.
第一特征服务端接收到获取请求后,按照获取请求返回变更文件,在具体的实现中,终端可能已经存在部分变更文件,根据获取请求返回的变更文件为生成时间是在所述终端已存在的变更文件的生成时间之后的变更文件,即生成时间更新的变更文件,换而言之,终端接收到的是本地不存在的变更文件,这种以增量的方式返回变更文件,可以避免终端会多次请求同一个变更文件,不会导致数据的重复下载,避免造成升级服务器带宽的浪费。After receiving the acquisition request, the first feature server returns the change file according to the acquisition request. In a specific implementation, the terminal may already have a partial change file, and the change file returned according to the acquisition request is generated at the terminal. The change file after the generation time of the change file, that is, the change file for generating the time update, in other words, the terminal receives the change file that does not exist locally, and returns the change file in an incremental manner, thereby avoiding the terminal meeting. Requesting the same change file multiple times will not result in repeated downloading of data, avoiding wasting the bandwidth of the upgraded server.
在本发明的一种优选示例中,所述获取请求携带时间信息,所述时间信息用于标志最近的变更文件的生成时间,所述最近的变更文件为所述第一特征终端已存在的变更文件中生成时间距离当前时间最近的变更文件;In a preferred example of the present invention, the acquisition request carries time information, the time information is used to mark a generation time of a recent change file, and the latest change file is a change existing in the first feature terminal. A change file whose time is closest to the current time is generated in the file;
所述子步骤S71包括:The sub-step S71 includes:
子步骤S71-1、提取生成时间在所述获取请求携带的时间信息所标志的生成时间之 后的变更文件。Sub-step S71-1, extracting the generation time at which the generation time is marked by the time information carried in the acquisition request After the change file.
本实施例中,根据第一特征终端已经存在的变更文件生成获取请求的过程中,对所述获取请求添加时间信息,时间信息用于标志最近的变更文件的生成时间,本发明实施例所述的最近的变更文件是所述终端已存在的变更文件中,生成时间距离当前时间最近的变更文件,例如,终端已有95个变更文件,可以根据变更文件所携带的信息标识,查找生成时间为最近的变更文件,根据该变更文件的生成时间得到一个时间信息发送给第一特征服务端。In this embodiment, in the process of generating an acquisition request according to the change file that the first feature terminal already exists, the time information is added to the acquisition request, and the time information is used to mark the generation time of the latest change file, which is described in the embodiment of the present invention. The latest change file is a change file that is generated by the terminal and has the closest time to the current time. For example, the terminal has 95 change files, and the search time can be found according to the information identifier carried in the change file. The latest change file is sent to the first feature server according to the generation time of the change file.
本实施例中,所述时间信息可以为所述第一特征服务端按照各变更文件的生成时间先后顺序确定的所述变更文件的编号,也可以为所述变更文件在所述第一特征服务端的生成时间,或依据所述最近的变更文件的生成时间生成的其他信息。In this embodiment, the time information may be the number of the change file determined by the first feature server according to the sequence of generation time of each change file, or the change file may be served by the first feature. The generation time of the end, or other information generated according to the generation time of the latest change file.
本实施例中,优选地,第一特征服务端的变更文件携带信息标识,信息标识可以为第一特征服务端按照各变更文件的生成时间先后顺序确定的所述变更文件的编号,也可以为所述变更文件在第一特征服务端的生成时间。In this embodiment, preferably, the change file of the first feature server carries the information identifier, and the information identifier may be the number of the change file determined by the first feature server according to the generation time sequence of each change file, or may be The generation time of the change file on the first feature server.
当信息标识为第一特征服务端按照各变更文件的生成时间先后顺序确定的所述变更文件的编号时,可以将信息标识直接作为时间信息;当所述信息标识为所述变更文件在第一特征服务端的生成时间,可以将信息标识直接作为时间信息,或将依据所述最近的变更文件的生成时间生成的其他信息作为时间信息。When the information identifier is the number of the change file determined by the first feature server according to the generation time sequence of each change file, the information identifier may be directly used as time information; when the information identifier is the change file, the first The generation time of the feature server may directly use the information identifier as time information or other information generated according to the generation time of the latest change file as time information.
例如,信息标识为按照各变更文件的生成时间先后顺序确定的所述变更文件的编号时,如1、2、3…95,则最近的变更文件为信息标识为95的变更文件,可以将信息标识95作为时间信息发送到第一特征服务端,以供第一特征服务端按照最近的信息标识返回变更文件;当信息标识为第一特征服务端生成所述变更文件的时间时,可以提取时间距现在最近的变更文件的信息标识2013-11-12-11:14作为时间信息,也可以将依据所述最近的变更文件的生成时间生成的其他信息作为时间信息,例如提取生成时间12位的数字组合201311121114,发送到第一特征服务端。For example, when the information identifier is the number of the change file determined in the order of generation of each change file, such as 1, 2, 3, ... 95, the most recent change file is a change file with the information identifier of 95, and the information can be The identifier 95 is sent to the first feature server as the time information, so that the first feature server returns the change file according to the latest information identifier; when the information identifier is the time when the first feature server generates the change file, the time can be extracted. The information identifier of the change file closest to the present is 2013-11-12-11:14 as time information, and other information generated according to the generation time of the latest change file may be used as time information, for example, the generation time is 12 bits. The digital combination 201311121114 is sent to the first feature server.
在本发明的另一种优选示例中,所述获取请求携带时间信息,所述时间信息用于标志所述第一特征终端不存在且所述第一特征服务端存在的某个变更文件的生成时间,所述时间信息通过向第一特征服务端请求的变更文件清单与所述第一特征终端本地的变更文件进行对比得到;In another preferred example of the present invention, the acquisition request carries time information, and the time information is used to indicate that the first feature terminal does not exist and the generation of a certain change file exists in the first feature server Time, the time information is obtained by comparing a change file list requested by the first feature server with a change file local to the first feature terminal;
所述子步骤S71包括:The sub-step S71 includes:
子步骤S71-2、提取生成时间为所述获取请求携带的时间信息所标志的生成时间,以及生成时间在所述获取请求携带的时间信息所标志的生成时间之后的变更文件。Sub-step S71-2, the generation time is the generation time marked by the time information carried in the acquisition request, and the change file after the generation time indicated by the time information carried by the acquisition request is generated.
不同于上个示例,本示例中,第一特征终端在请求变更文件之前,还可以先向第一特征服务端请求其所存在且第一特征服务端存在的变更文件清单,变更文件清单中可以包括第一特征服务端存在的全部变更文件或指定时间以后的全部变更文件的生成时间。根据变更文件清单上存在的各个变更文件生成时间与终端存在的各个变更文件的生成时间进行对比,可以获知终端所不存在的变更文件有哪些。根据对比的结果,根据终端不存在的变更文件的生成时间信息。其中,指定时间可以是终端上次获取变更文件的时间,可以按照具体的应用需求设定。 Different from the previous example, in the example, before the request for the change file, the first feature terminal may first request, from the first feature server, a list of change files that exists in the first feature server, and the change file list may be It includes all the change files existing on the first feature server or the generation time of all the change files after the specified time. According to the generation time of each change file existing on the change file list and the generation time of each change file existing in the terminal, it is possible to know which change files exist in the terminal. According to the result of the comparison, the generation time information of the change file does not exist according to the terminal. The specified time may be the time when the terminal last acquired the change file, and may be set according to specific application requirements.
例如,信息标识为编号时,终端存在95个变更文件,第一特征服务端存在100个变更文件,变更文件清单上包括100个变更文件的生成时间或终端上次获取变更文件的时间之后的全部变更文件的生成时间,则终端将变更文件清单与终端存在的变更文件的生成时间进行对比后,不存在的变更文件为信息标识为96~100这五个变更文件,时间信息可以标识这五个变更文件中某个变更文件的生成时间。For example, when the information is identified as a number, the terminal has 95 change files, and the first feature server has 100 change files. The change file list includes the generation time of 100 change files or the time after the terminal last acquired the change file. When the change time of the file is generated, the terminal compares the change file list with the generation time of the change file existing in the terminal, and the change file that does not exist is the five change files with the information identifiers 96 to 100, and the time information can identify the five change files. Change the generation time of a change file in the file.
第一特征服务端接收到标志终端不存在的某个变更文件的生成时间的时间信息后,可以将生成时间为获取请求携带的时间信息所标志的生成时间,以及生成时间在获取请求携带的时间信息所标志的生成时间之后的变更文件,返回给所述终端,换而言之,即将该终端不存在的变更文件,以及生成时间在该变更文件之后的其他变更文件返回给终端,返回的个数可以提前设置,本发明对此并不做限制。After receiving the time information indicating the generation time of a certain change file that does not exist in the terminal, the first feature server may generate the time indicated by the time information carried in the acquisition request, and the time when the generation time is carried in the acquisition request. The change file after the generation time indicated by the information is returned to the terminal, in other words, the change file that does not exist in the terminal, and the other change file whose generation time is after the change file are returned to the terminal, and the returned ones are returned. The number can be set in advance, and the present invention does not limit this.
在本发明的另一种优选示例中,所述获取请求携带时间信息,所述时间信息用于标志所述第一特征终端不存在且所述第一特征服务端存在的至少一个变更文件的生成时间,所述时间信息通过对比向所述第一特征服务端请求的变更文件清单与所述第一特征终端本地的变更文件得到;In another preferred example of the present invention, the acquisition request carries time information, and the time information is used to indicate that the first feature terminal does not exist and the at least one change file of the first feature server exists. Time, the time information is obtained by comparing a change file list requested to the first feature server with a change file local to the first feature terminal;
所述子步骤S71包括:The sub-step S71 includes:
子步骤S71-3、提取生成时间为所述获取请求携带的时间信息所标志的生成时间的变更文件。Sub-step S71-3, extracting a change file in which the generation time is the generation time indicated by the time information carried in the acquisition request.
不同于上个示例,本示例中,时间信息标志所述终端不存在的至少一个变更文件的生成时间。例如,信息标识为编号时,终端存在95个变更文件,第一特征服务端存在100个变更文件,则终端不存在的变更文件为信息标识为96~100这五个变更文件,时间信息可以标识这五个变更文件中一个或多个变更文件的生成时间。Unlike the previous example, in this example, the time information indicates the generation time of at least one change file that the terminal does not exist. For example, when the information identifier is a number, the terminal has 95 change files, and the first feature server has 100 change files, and the change file that the terminal does not exist is the five change files whose information identifiers are 96 to 100, and the time information can be identified. The generation time of one or more change files in these five change files.
第一特征服务端接收到标志终端不存在的至少一个变更文件的生成时间的时间信息后,可以将生成时间为获取请求携带的时间信息所标志的生成时间的变更文件,返回给所述终端,换而言之,即将时间信息中所标志的终端不存在的变更文件返回给终端。After receiving the time information of the generation time of the at least one change file that does not exist, the first feature server may return the change file whose generation time is the generation time indicated by the time information carried in the acquisition request to the terminal. In other words, a change file that does not exist in the terminal indicated by the time information is returned to the terminal.
在具体的实现中,所述获取请求还可以携带请求获取的变更文件的个数,第一特征服务端在查找到的变更文件中,提取个数小于或等于请求获取的变更文件的个数的至少一个变更文件,返回给所述终端。In a specific implementation, the acquiring request may further carry the number of the changed file that is requested to be acquired, and the first feature server extracts the number of the changed files that are less than or equal to the requested change file in the found change file. At least one change file is returned to the terminal.
当获取请求携带请求获取的变更文件的个数时,可以按照请求的个数返回变更文件,由于每次下载的文件仅仅包含需要的文件且没有重复下载,避免下载数据量较大的问题,对升级服务器的带宽造成很大的压力的问题。When the acquisition request carries the number of the change files requested to be obtained, the change file may be returned according to the number of requests, since each downloaded file only contains the required files and there is no repeated download, thereby avoiding the problem of large amount of downloaded data, Upgrading the bandwidth of the server creates a lot of stress.
依据本发明实施例,第一特征服务端将特征终端请求的变更文件按照对应的文件处理级别进行分类后,按分类分别将变更文件发送给第一特征终端,由第一特征终端针对不同文件处理级别的变更文件分别按照不同的处理方式进行处理,依据本发明实施例,可以将文件处理级别高的变更文件与文件处理级别低的变更文件按照文件处理级别分别发送,并针对不同文件处理级别的文件采用不同的处理方式分别处理,从而可以在积压大量变更文件的情况下,可以避免处理级别较低的变更文件影响处理级别较高的变更文件的发送,避免处理级别较高的变更文件未能及时发送到终端给终端造成的安全风险,使文件安全性变更的过程变得有效、快速、可靠。 According to the embodiment of the present invention, after the first feature server classifies the change file requested by the feature terminal according to the corresponding file processing level, the change file is respectively sent to the first feature terminal according to the classification, and the first feature terminal processes the file for different files. The change files of the level are processed according to different processing manners. According to the embodiment of the present invention, the change file with a high file processing level and the change file with a low file processing level can be separately sent according to the file processing level, and are processed for different file processing levels. The files are processed separately by different processing methods, so that in the case of a large number of changed files, it is possible to avoid the change of the processing file with a lower processing level affecting the transmission of the change file with a higher processing level, and avoid the failure of the processing file with a higher processing level. The security risks caused by timely sending to the terminal to the terminal make the process of file security change effective, fast and reliable.
参考图6,示出了根据本发明另一个实施例的应用程序安全性的变更方法流程图,具体可以包括:Referring to FIG. 6, a flowchart of a method for changing the security of an application according to another embodiment of the present invention is shown.
步骤601、第一特征服务端对第一特征终端的应用程序的安全性进行鉴定,并将鉴定的安全性下发给所述特征终端进行保存,所述第一特征服务端为所述第一特征终端通过内网可访问的服务端。Step 601: The first feature server authenticates the security of the application of the first feature terminal, and sends the authenticated security to the feature terminal for saving, where the first feature server is the first The server that the feature terminal can access through the intranet.
步骤602、所述第一特征服务端生成所述变更文件,并根据变更来源对所述变更文件添加文件处理级别,所述变更文件用于对所述第一特征终端保存的某个应用程序的安全性进行修正,所述文件处理级别包括第一文件处理级别和第二文件处理级别。Step 602: The first feature server generates the change file, and adds a file processing level to the change file according to the change source, where the change file is used for an application saved by the first feature terminal. Security is corrected, the file processing level including a first file processing level and a second file processing level.
依据背景技术,由于文件安全性的变更主要有两个来源,一是由私有云安全系统的管理员直接把某应用程序的安全性进行修改而导致的文件安全性变更,二是通过离线查询工具导入或者文件代理查询引起的文件安全性变更。本发明实施例中,根据变更的来源将文件处理级别分为两种,分别为第一文件处理级别和第二文件处理级别,第一文件处理级别对应的文件来源可以是管理员在服务器端主动做出的变更,第二文件处理级别对应的文件来源可以是通过离线或在线方式在公有云安全系统查询安全性后作出的变更,并且所述第一文件处理级别高于所述第二文件处理级别。According to the background art, there are two main reasons for the change of file security. One is the file security change caused by the administrator of the private cloud security system directly modifying the security of an application, and the second is through the offline query tool. File security changes caused by import or file proxy queries. In the embodiment of the present invention, the file processing level is divided into two according to the source of the change, which are the first file processing level and the second file processing level respectively, and the file source corresponding to the first file processing level may be the administrator actively acting on the server. The change made, the file source corresponding to the second file processing level may be a change made after the public cloud security system queries security by offline or online, and the first file processing level is higher than the second file processing level.
具体而言,所述变更文件携带第一处理级别时,所述步骤602可以包括:Specifically, when the change file carries the first processing level, the step 602 may include:
子步骤S81、接收在第一特征服务端提交的针对所述应用程序修正的安全性,并按照修正的安全性生成对所述特征终端保存的、第一特征服务端鉴定的安全性进行修正的变更文件,所述变更文件携带第一文件处理级别。Sub-step S81, receiving security for the application modification submitted by the first feature server, and correcting the security of the first feature server authentication saved by the feature terminal according to the modified security. A change file that carries the first file processing level.
本发明实施例中,可以在第一特征服务端对应用程序的安全性进行修正,服务端接收到修正的安全性后,根据修正后的安全性生成变更文件以对该应用程序的安全性进行变更,并且,由于该变更来源是服务器端提交的变更,因此,针对生成的变更文件可以添加第一文件处理级别。In the embodiment of the present invention, the security of the application may be modified on the first feature server, and after receiving the modified security, the server generates a change file according to the modified security to perform security on the application. The change, and since the source of the change is a change submitted by the server, the first file processing level can be added for the generated change file.
所述第一文件处理级别高于所述第二文件处理级别,所述变更文件携带第二处理级别时,所述步骤602包括:When the first file processing level is higher than the second file processing level, and the change file carries the second processing level, the step 602 includes:
子步骤S82、所述第一特征服务端请求第二特征服务端对所述应用程序的安全性进行鉴定,所述第二特征服务端为设置在互联网中通过互联网可访问的服务端;Sub-step S82, the first feature server requests the second feature server to authenticate the security of the application, and the second feature server is a server that is accessible through the Internet in the Internet;
子步骤S83、按照所述第二特征服务端鉴定的安全性生成对所述特征终端保存的、第一特征服务端鉴定的安全性进行修正的变更文件,所述变更文件携带第二文件处理级别。Sub-step S83, generating, according to the security of the second feature server, a change file that corrects the security of the first feature server authentication saved by the feature terminal, where the change file carries the second file processing level. .
第一特征终端向第一特征服务端请求对应用程序的安全性进行鉴定后,当鉴定结果为未知安全性时,第一特征服务端可以进一步请求第二特征服务端对所述应用程序的安全性进行鉴定,所述第二特征服务端为设置在互联网中通过互联网可访问的服务端,即公有云安全系统。例如,刚进入私有云安全系统部署初期的情况下,第一特征终端大量的上报文件到第一特征服务端,第一特征服务端会积累了大量的文件级别为未知的文件,当可以连接第二特征服务端时,可以进一步请求第二特征服务端对该应用程序进行安全性鉴定。由于第一特征服务端的鉴定结果为未知安全性,根据第二特征服务端鉴定 的安全性可以生成对应用程序安全性进行修正的变更文件,由于该变更来源为文件代理查询引起的文件安全性变更,因此,可以针对该变更文件添加第二文件处理级别。After the first feature terminal requests the first feature server to authenticate the security of the application, when the authentication result is unknown security, the first feature server may further request the second feature server to secure the application. The second feature server is a server that is accessible through the Internet in the Internet, that is, a public cloud security system. For example, in the initial stage of the deployment of the private cloud security system, the first feature terminal reports a large number of files to the first feature server, and the first feature server accumulates a large number of files whose file level is unknown. When the second feature server is used, the second feature server may be further requested to perform security authentication on the application. Since the identification result of the first feature server is unknown security, the server is authenticated according to the second feature. Security can generate a change file that corrects application security. Since the source of the change is a file security change caused by a file agent query, a second file processing level can be added to the change file.
所述第一文件处理级别高于所述第二文件处理级别,所述变更文件携带第二处理级别时,所述步骤602包括:When the first file processing level is higher than the second file processing level, and the change file carries the second processing level, the step 602 includes:
子步骤S84、所述第一特征服务端通过所述第一特征终端连接所述第二特征服务端对所述应用程序的安全性进行鉴定,所述第二特征服务端为设置在互联网中通过互联网可访问的服务端;Sub-step S84, the first feature server connects the second feature server to identify the security of the application by using the first feature terminal, and the second feature server is configured to pass through the Internet. Internet accessible server;
子步骤S85、按照所述第二特征服务端鉴定的安全性生成对所述第一特征终端保存的、第一特征服务端鉴定的安全性进行修正的变更文件,所述变更文件携带第二文件处理级别。Sub-step S85, generating, according to the security of the second feature server, a change file that corrects the security of the first feature server authentication saved by the first feature terminal, where the change file carries the second file. Processing level.
第一特征服务端无法连接互联网时,可以通过离线的方式在第二特征服务端查询应用程序的安全性,例如,在隔离网环境下,刚进入私有云安全系统部署初期的情况下,第一特征终端大量的上报文件到服务端,第一特征服务端会积累了大量的文件级别为未知的文件,可以通过离线查询工具把未知安全性的应用程序列表导出,然后到能连入互联网的特征终端上,由第一特征终端做文件云安全系统查询,即由第一特征终端通过连接互联网请求第二特征服务端对该应用程序的安全性进行鉴定,然后把查询结果通过离线查询工具导入到私有云安全系统的第一特征服务端。由于该变更来源为离线查询工具导入引起的文件安全性变更,因此,可以针对该变更文件添加第二文件处理级别。When the first feature server cannot connect to the Internet, the second feature server can be used to query the security of the application in an off-line manner. For example, in the isolated network environment, just entering the initial stage of the private cloud security system deployment, the first The feature terminal reports a large number of files to the server. The first feature server accumulates a large number of files with unknown file levels. You can export the list of unknown security applications through offline query tools, and then connect to the Internet. On the terminal, the first feature terminal performs a file cloud security system query, that is, the first feature terminal requests the second feature server to authenticate the security of the application by connecting to the Internet, and then the query result is imported into the offline query tool. The first feature server of a private cloud security system. Since the source of the change is a file security change caused by the offline query tool import, a second file processing level can be added to the change file.
私有云安全系统管理员对应用程序进行管理时,若发现某个文件的安全性被错误标志,例如安全性错误标志成正常或者禁用了,就会通过私有云安全系统的文件管理界面修改该文件的安全性,管理员直接把某文件的安全性进行修改而导致的文件安全性变更,在很多情况下是因为原本设定的文件安全性是不正确的,安全问题已经出现,因此,该变更是管理员已经碰到安全问题而实施的管理措施,换而言之,管理员调整的安全策略是优先级相比较离线查询工具导入或者文件代理查询引起的文件安全性变更的重要程序或紧急程序更高,这些文件安全性变更,需要快速、可靠地通知到终端,才能帮助企业用户降低安全风险。When a private cloud security system administrator manages an application, if the security of a file is found to be incorrectly flagged, for example, the security error flag is normal or disabled, the file is modified by the file management interface of the private cloud security system. Security, the administrator directly changes the security of a file to change the security of the file, in many cases because the original file security is not correct, security issues have emerged, therefore, the change It is a management measure implemented by an administrator who has encountered a security problem. In other words, an administrator-adjusted security policy is an important program or an emergency program that compares priority to file security changes caused by offline query tool import or file agent query. Higher, these file security changes require fast and reliable notification to the terminal to help enterprise users reduce security risks.
而按照背景技术的方式,按变更发生时间先后顺序依次向终端发送变更通知的话,无法对更为重要的变更进行及时处理,在积压了大量文件级别变更通知未下发给终端的情况下,终端也不能马上执行管理员调整的文件安全性变更,因此存在安全风险。According to the background art, if the change notification is sent to the terminal in the order of the change occurrence time, the more important change cannot be processed in time, and if a large number of file level change notifications are not sent to the terminal, the terminal There is also no security risk associated with administrator-adjusted file security changes.
依据本发明实施例,可以针对不同来源的变更设置相应的文件处理级别,如上所述,通过管理员在第一服务端直接对应用程序的安全性进行修改而导致的文件安全性变更对应设置第一文件处理级别,通过离线查询工具导入或者文件代理查询引起的文件安全性变更对应第二文件处理级别,从而将不同来源的变更文件分别发送给终端,避免第二文件处理级别的变更文件影响第一文件处理级别的变更文件的发送。According to the embodiment of the present invention, the corresponding file processing level can be set for the change of different sources. As described above, the file security change corresponding setting caused by the administrator directly modifying the security of the application on the first server end A file processing level, the file security change caused by the offline query tool import or the file proxy query corresponds to the second file processing level, so that the change files of different sources are respectively sent to the terminal, thereby avoiding the influence of the second file processing level change file. A file processing level change file is sent.
当采用将提取的多个变更文件按照对应的文件处理级别进行排序,并按照排序逐个提取变更文件发送给特征终端的方式时,由于第一文件处理级别高于第二文件处理级别,因此,可以优先将第一文件处理级别的变更文件发送到终端,优先处理管理员对应用程序的变更。 When the extracted multiple modified files are sorted according to the corresponding file processing level, and the modified file is sent to the feature terminal one by one according to the sorting, since the first file processing level is higher than the second file processing level, The change file of the first file processing level is preferentially sent to the terminal, and the administrator's change to the application is prioritized.
在具体的实现中,可以创建两个不同的进程或分别采用两个不同的线程处理两种级别的变更文件,当采用两个线程进行处理时,第一文件处理级别对应的线程的处理速度可以高于所述第二文件处理级别对应的线程,从而可以更快地下发管理员在第一服务端作出的变更,及时地把某文件的安全性改为禁用或者放行。In a specific implementation, two different processes may be created or two different threads are used to process two levels of change files. When two threads are used for processing, the processing speed of the thread corresponding to the first file processing level may be The thread corresponding to the second file processing level is higher, so that the change made by the administrator on the first server can be quickly issued, and the security of a file is changed to be disabled or released in time.
步骤603、接收所述第一特征终端对多个变更文件的获取请求。Step 603: Receive an acquisition request of the first feature terminal for multiple change files.
步骤604、按照所述获取请求提取多个变更文件,所述变更文件携带对应的文件处理级别。Step 604: Extract a plurality of change files according to the obtaining request, where the change file carries a corresponding file processing level.
步骤605、将提取的多个变更文件按照对应的文件处理级别的不同进行分类,并按照分类将所述变更文件分别发送给所述第一特征终端,以供所述第一特征终端针对不同文件处理级别的变更文件分别按照不同的处理方式进行处理。Step 605: classify the extracted multiple change files according to different file processing levels, and send the change files to the first feature terminal according to the classification, so that the first feature terminal is targeted to different files. The processing level change files are processed according to different processing methods.
依据本发明实施例,第一特征服务端将特征终端请求的变更文件按照对应的文件处理级别进行分类后,按分类分别将变更文件发送给特征终端,由特征终端针对不同文件处理级别的变更文件分别按照不同的处理方式进行处理,依据本发明实施例,可以将文件处理级别高的变更文件与文件处理级别低的变更文件按照文件处理级别分别发送,并针对不同文件处理级别的文件采用不同的处理方式分别处理,从而可以在积压大量变更文件的情况下,可以避免处理级别较低的变更文件影响处理级别较高的变更文件的发送,避免处理级别较高的变更文件未能及时发送到终端给终端造成的安全风险,使文件安全性变更的过程变得有效、快速、可靠。According to the embodiment of the present invention, the first feature server classifies the change file requested by the feature terminal according to the corresponding file processing level, and then sends the change file to the feature terminal according to the classification, and the change file of the feature terminal for different file processing levels is performed by the feature terminal. According to the embodiment of the present invention, the change file with high file processing level and the change file with low file processing level can be separately sent according to the file processing level, and different files are used for different file processing levels. The processing mode is separately processed, so that when a large number of changed files are accumulated, the change file with a lower processing level can be prevented from affecting the sending of the change file with a higher processing level, and the change file with a higher processing level is prevented from being sent to the terminal in time. The security risks to the terminal make the process of file security change effective, fast and reliable.
需要说明的是,对于前述的方法实施例,为了简单描述,故将其都表述为一系列的动作组合,但是本领域技术人员应该知悉,本发明并不受所描述的动作顺序的限制,因为依据本发明,某些步骤可以采用其他顺序或者同时进行。其次,本领域技术人员也应该知悉,说明书中所描述的实施例均属于优选实施例,所涉及的动作并不一定是本发明所必需的。It should be noted that, for the foregoing method embodiments, for the sake of simple description, they are all expressed as a series of action combinations, but those skilled in the art should understand that the present invention is not limited by the described action sequence, because In accordance with the present invention, certain steps may be performed in other sequences or concurrently. In addition, those skilled in the art should also understand that the embodiments described in the specification are all preferred embodiments, and the actions involved are not necessarily required by the present invention.
参考图7,示出了根据本发明一个实施例的应用程序安全性的变更装置结构框图,具体可以包括:Referring to FIG. 7, a block diagram of a device for changing the security of an application according to an embodiment of the present invention is shown.
安全鉴定模块701,用于第一特征服务端对第一特征终端的应用程序的安全性进行鉴定,并将鉴定的安全性下发给所述第一特征终端进行保存,所述第一特征服务端为所述第一特征终端通过内网可访问的服务端;The security authentication module 701 is configured to identify, by the first feature server, the security of the application of the first feature terminal, and send the authenticated security to the first feature terminal for saving, the first feature service The end is a server accessible by the first feature terminal through an intranet;
变更获取请求702,用于接收所述第一特征终端对多个变更文件的获取请求,所述变更文件用于对所述第一特征终端保存的某个应用程序的安全性进行修正;The change obtaining request 702 is configured to receive an acquisition request of the first feature terminal for the plurality of change files, where the change file is used to modify the security of an application saved by the first feature terminal;
文件提取模块703,用于按照所述获取请求提取多个变更文件,所述变更文件携带对应的文件处理级别;The file extraction module 703 is configured to extract a plurality of change files according to the obtaining request, where the change file carries a corresponding file processing level;
文件分类模块704,用于将提取的多个变更文件按照对应的文件处理级别的不同进行分类;a file classification module 704, configured to classify the extracted multiple change files according to different file processing levels;
文件发送模块705,用于按照分类将所述变更文件分别发送给所述第一特征终端,以供所述第一特征终端针对不同文件处理级别的变更文件分别按照不同的处理方式进行处理。 The file sending module 705 is configured to separately send the change file to the first feature terminal according to the classification, so that the first feature terminal processes the change files of different file processing levels according to different processing manners.
本发明实施例中,优选地,所述文件发送模块,具体用于将具备不同文件处理级别的变更文件分别通过不同的传输路径发送给所述第一特征终端。In the embodiment of the present invention, the file sending module is configured to send the change files having different file processing levels to the first feature terminal through different transmission paths.
本发明实施例中,优选地,所述文件发送模块包括:In the embodiment of the present invention, preferably, the file sending module includes:
第一发送子模块,用于将具备不同文件处理级别的变更文件分别通过第一特征服务端不同的预设端口或通信信道发送给所述第一特征终端;The first sending sub-module is configured to send the change files with different file processing levels to the first feature terminal through different preset ports or communication channels of the first feature server;
或,第二发送子模块,用于将具备不同文件处理级别的变更文件分别通过所述第一特征终端不同的预设接口发送给所述第一特征终端;Or the second sending sub-module is configured to send the change files with different file processing levels to the first feature terminal through different preset interfaces of the first feature terminal;
或,第三发送子模块,用于将具备不同文件处理级别的变更文件分别发送到所述第一特征终端的不同的预置文件夹中。Or the third sending submodule is configured to separately send the change files having different file processing levels to different preset folders of the first feature terminal.
本发明实施例中,优选地,所述文件发送模块,具体用于将提取的多个变更文件按照对应的文件处理级别进行排序,并按照排序逐个提取所述变更文件发送给所述第一特征终端。In the embodiment of the present invention, preferably, the file sending module is configured to sort the extracted multiple change files according to a corresponding file processing level, and extract the change files one by one according to the sorting and send the change file to the first feature. terminal.
本发明实施例中,优选地,所述文件提取模块,具体用于按照所述获取请求提取生成时间在所述特征终端已存在的变更文件的生成时间之后的变更文件。In the embodiment of the present invention, preferably, the file extraction module is configured to extract, according to the obtaining request, a change file that is generated after a generation time of a change file that has existed in the feature terminal.
本发明实施例中,优选地,所述获取请求携带时间信息,所述时间信息用于标志最近的变更文件的生成时间,所述最近的变更文件为所述第一特征终端已存在的变更文件中生成时间距离当前时间最近的变更文件;In the embodiment of the present invention, preferably, the obtaining request carries time information, where the time information is used to mark a generation time of a recent change file, and the latest change file is a change file that the first feature terminal already exists. Generate a change file whose time is closest to the current time;
所述文件提取模块包括:The file extraction module includes:
第一提取子模块,用于提取生成时间在所述获取请求携带的时间信息所标志的生成时间之后的变更文件。The first extraction submodule is configured to extract a change file after the generation time indicated by the time information carried by the acquisition request.
本发明实施例中,优选地,所述获取请求携带时间信息,所述时间信息用于标志所述第一特征终端不存在且所述第一特征服务端存在的某个变更文件的生成时间,所述时间信息通过向所述第一服务端请求的变更文件清单与所述第一特征终端本地的变更文件进行对比得到;In the embodiment of the present invention, preferably, the acquiring request carries time information, where the time information is used to indicate that the first feature terminal does not exist and the generation time of a certain change file existing by the first feature server is The time information is obtained by comparing a change file list requested by the first server with a change file local to the first feature terminal;
所述文件提取模块包括:The file extraction module includes:
第二提取子模块,用于提取生成时间为所述获取请求携带的时间信息所标志的生成时间,以及生成时间在所述获取请求携带的时间信息所标志的生成时间之后的变更文件。The second extraction submodule is configured to extract a generation time that is generated by the time information carried by the acquisition request, and a change file that is generated after the generation time indicated by the time information carried by the acquisition request.
本发明实施例中,优选地,所述获取请求携带时间信息,所述时间信息用于标志所述第一特征终端不存在且所述第一特征服务端存在的至少一个变更文件的生成时间,所述时间信息通过对比向所述第一特征服务端请求的变更文件清单与所述第一特征终端本地的变更文件得到;In the embodiment of the present invention, preferably, the acquiring request carries time information, where the time information is used to mark a generation time of the at least one change file that the first feature terminal does not exist and the first feature server exists. The time information is obtained by comparing a change file list requested to the first feature server with a change file local to the first feature terminal;
所述文件提取模块包括:The file extraction module includes:
第三提取子模块,用于提取生成时间为所述获取请求携带的时间信息所标志的生成时间的变更文件。The third extraction submodule is configured to extract a change file that generates a generation time indicated by the time information carried by the acquisition request.
本发明实施例中,优选地,所述应用程序的安全性包括正常、禁用和未知三种级别。In the embodiment of the present invention, preferably, the security of the application includes three levels: normal, disabled, and unknown.
依据本发明实施例,第一特征服务端将特征终端请求的变更文件按照对应的文件 处理级别进行分类后,按分类分别将变更文件发送给特征终端,由特征终端针对不同文件处理级别的变更文件分别按照不同的处理方式进行处理,依据本发明实施例,可以将文件处理级别高的变更文件与文件处理级别低的变更文件按照文件处理级别分别发送,并针对不同文件处理级别的文件采用不同的处理方式分别处理,从而可以在积压大量变更文件的情况下,可以避免处理级别较低的变更文件影响处理级别较高的变更文件的发送,避免处理级别较高的变更文件未能及时发送到终端给终端造成的安全风险,使文件安全性变更的过程变得有效、快速、可靠。According to the embodiment of the present invention, the first feature server endifies the change file requested by the feature terminal according to the corresponding file. After the processing level is classified, the change file is sent to the feature terminal according to the classification, and the change file of the different file processing level is processed by the feature terminal according to different processing manners. According to the embodiment of the present invention, the file processing level can be high. Change files with low change level and file processing level are sent separately according to the file processing level, and are processed separately for different file processing level files, so that the processing level can be avoided in the case of a large number of changed files. The change file affects the sending of change files with higher processing level, and avoids the security risks caused by the high-level change files being sent to the terminal in time, making the process of file security change effective, fast and reliable.
参考图8,示出了根据本发明一个实施例的应用程序安全性的变更装置结构框图,具体可以包括:Referring to FIG. 8, a block diagram of a device for changing the security of an application according to an embodiment of the present invention is shown.
安全鉴定模块801,用于第一特征服务端对第一特征终端的应用程序的安全性进行鉴定,并将鉴定的安全性下发给所述第一特征终端进行保存,所述第一特征服务端为所述第一特征终端通过内网可访问的服务端。The security authentication module 801 is configured to identify, by the first feature server, the security of the application of the first feature terminal, and send the authenticated security to the first feature terminal for saving, the first feature service The terminal is a server accessible by the first feature terminal through an intranet.
变更文件生成模块802,用于所述第一特征服务端生成所述变更文件,所述文件处理级别包括第一文件处理级别和第二文件处理级别。The change file generating module 802 is configured to generate, by the first feature server, the change file, where the file processing level includes a first file processing level and a second file processing level.
变更获取请求803,用于接收所述第一特征终端对多个变更文件的获取请求,所述变更文件用于对所述第一特征终端保存的某个应用程序的安全性进行修正;The change obtaining request 803 is configured to receive an acquisition request of the first feature terminal for the plurality of change files, where the change file is used to modify the security of an application saved by the first feature terminal;
文件提取模块804,用于按照所述获取请求提取多个变更文件,所述变更文件携带对应的文件处理级别;The file extraction module 804 is configured to extract a plurality of change files according to the obtaining request, where the change file carries a corresponding file processing level;
文件分类模块805,用于将提取的多个变更文件按照对应的文件处理级别的不同进行分类;a file classification module 805, configured to classify the extracted multiple change files according to different file processing levels;
文件发送模块806,用于按照分类将所述变更文件分别发送给所述第一特征终端,以供所述第一特征终端针对不同文件处理级别的变更文件分别按照不同的处理方式进行处理。The file sending module 806 is configured to separately send the change file to the first feature terminal according to the classification, so that the first feature terminal processes the change files of different file processing levels according to different processing manners.
本发明实施例中,优选地,所述第一文件处理级别高于所述第二文件处理级别,所述变更文件携带第一处理级别时,所述变更文件生成模块可以包括:In the embodiment of the present invention, preferably, the first file processing level is higher than the second file processing level, and when the change file carries the first processing level, the change file generating module may include:
安全性接收模块,用于接收在第一特征服务端提交的针对所述应用程序修正的安全性;a security receiving module, configured to receive security submitted by the first feature server for the application modification;
第一文件生成子模块,用于按照修正的安全性生成对所述第一特征终端保存的、第一特征服务端鉴定的安全性进行修正的变更文件,所述变更文件携带第一文件处理级别。a first file generating submodule, configured to generate, according to the modified security, a change file that corrects security of the first feature server authentication saved by the first feature terminal, where the change file carries a first file processing level .
本发明实施例中,优选地,所述第一文件处理级别高于所述第二文件处理级别,所述变更文件携带第二处理级别时,所述变更文件生成模块可以包括:In the embodiment of the present invention, preferably, the first file processing level is higher than the second file processing level, and when the change file carries the second processing level, the change file generating module may include:
第一鉴定请求子模块,用于所述第一特征服务端请求第二特征服务端对所述应用程序的安全性进行鉴定,所述第二特征服务端为设置在互联网中通过互联网可访问的服务端;a first authentication request sub-module, configured by the first feature server to request the second feature server to authenticate the security of the application, where the second feature server is accessible through the Internet in the Internet. Server;
第二文件生成子模块,用于按照所述第二特征服务端鉴定的安全性生成对所述第一特征终端保存的、第一特征服务端鉴定的安全性进行修正的变更文件,所述变更文件 携带第二文件处理级别。a second file generating submodule, configured to generate, according to the security of the second feature server authentication, a change file that corrects the security of the first feature server authentication saved by the first feature terminal, the change File Carry the second file processing level.
本发明实施例中,优选地,所述变更文件携带第二处理级别时,所述变更文件生成模块可以包括:In the embodiment of the present invention, when the change file carries the second processing level, the change file generating module may include:
第二鉴定请求子模块,用于所述第一特征服务端通过所述第一特征终端连接所述第二特征服务端对所述应用程序的安全性进行鉴定,所述第二特征服务端为设置在互联网中通过互联网可访问的服务端;a second authentication requesting sub-module, configured to identify, by the first feature server, the security of the application by connecting the second feature server to the first feature terminal, where the second feature server is Set up a server accessible on the Internet via the Internet;
第三文件生成子模块,用于按照所述第二特征服务端鉴定的安全性生成对所述第一特征终端保存的、第一特征服务端鉴定的安全性进行修正的变更文件,所述变更文件携带第二文件处理级别。a third file generating submodule, configured to generate, according to the security of the second feature server authentication, a change file that corrects the security of the first feature server authentication saved by the first feature terminal, the change The file carries a second file processing level.
本发明实施例中,优选地,所述文件发送模块,可以具体用于按照分类将所述变更文件分别发送给所述第一特征终端,以供所述第一特征终端针对不同文件处理级别的变更文件分别创建相应的进程或分别采用不同的线程进行处理。In the embodiment of the present invention, preferably, the file sending module may be specifically configured to send the change file to the first feature terminal according to a classification, so that the first feature terminal is processed for different file processing levels. The change files are created separately or processed by different threads.
本发明实施例中,优选地,当所述第一特征终端创建不同的线程分别处理具备不同文件处理级别的变更文件时,文件处理级别高的变更文件对应的线程的处理速度高于文件处理级别低的变更文件对应的线程。In the embodiment of the present invention, preferably, when the first feature terminal creates different threads to separately process the change files having different file processing levels, the processing speed of the thread corresponding to the file with a higher file processing level is higher than the file processing level. The thread corresponding to the low change file.
依据本发明实施例,第一特征服务端将特征终端请求的变更文件按照对应的文件处理级别进行分类后,按分类分别将变更文件发送给特征终端,由特征终端针对不同文件处理级别的变更文件分别按照不同的处理方式进行处理,依据本发明实施例,可以将文件处理级别高的变更文件与文件处理级别低的变更文件按照文件处理级别分别发送,并针对不同文件处理级别的文件采用不同的处理方式分别处理,从而可以在积压大量变更文件的情况下,可以避免处理级别较低的变更文件影响处理级别较高的变更文件的发送,避免处理级别较高的变更文件未能及时发送到终端给终端造成的安全风险,使文件安全性变更的过程变得有效、快速、可靠。According to the embodiment of the present invention, the first feature server classifies the change file requested by the feature terminal according to the corresponding file processing level, and then sends the change file to the feature terminal according to the classification, and the change file of the feature terminal for different file processing levels is performed by the feature terminal. According to the embodiment of the present invention, the change file with high file processing level and the change file with low file processing level can be separately sent according to the file processing level, and different files are used for different file processing levels. The processing mode is separately processed, so that when a large number of changed files are accumulated, the change file with a lower processing level can be prevented from affecting the sending of the change file with a higher processing level, and the change file with a higher processing level is prevented from being sent to the terminal in time. The security risks to the terminal make the process of file security change effective, fast and reliable.
对于上述应用程序安全性的鉴定装置实施例而言,由于其与方法实施例基本相似,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。For the above-mentioned application security device identification device embodiment, since it is basically similar to the method embodiment, the description is relatively simple, and the relevant parts can be referred to the description of the method embodiment.
本说明书中的各个实施例均采用递进的方式描述,每个实施例重点说明的都是与其它实施例的不同之处,各个实施例之间相同相似的部分互相参见即可。The various embodiments in the present specification are described in a progressive manner, and each embodiment focuses on differences from other embodiments, and the same similar parts between the various embodiments can be referred to each other.
本领域技术人员易于想到的是:上述各个实施例的任意组合应用都是可行的,故上述各个实施例之间的任意组合都是本发明的实施方案,但是由于篇幅限制,本说明书在此就不一一详述了。It will be readily apparent to those skilled in the art that any combination of the above embodiments is possible, and any combination between the above embodiments is an embodiment of the present invention, but due to space limitations, the present specification is hereby Not detailed one by one.
在此提供的算法和显示不与任何特定计算机、虚拟系统或者其它设备固有相关。各种通用系统也可以与基于在此的示教一起使用。根据上面的描述,构造这类系统所要求的结构是显而易见的。此外,本发明也不针对任何特定编程语言。应当明白,可以利用各种编程语言实现在此描述的本发明的内容,并且上面对特定语言所做的描述是为了披露本发明的最佳实施方式。The algorithms and displays provided herein are not inherently related to any particular computer, virtual system, or other device. Various general purpose systems can also be used with the teaching based on the teachings herein. The structure required to construct such a system is apparent from the above description. Moreover, the invention is not directed to any particular programming language. It is to be understood that the invention may be embodied in a variety of programming language, and the description of the specific language has been described above in order to disclose the preferred embodiments of the invention.
在此处所提供的说明书中,说明了大量具体细节。然而,能够理解,本发明的实施例可以在没有这些具体细节的情况下实践。在一些实例中,并未详细示出公知的方法、 结构和技术,以便不模糊对本说明书的理解。In the description provided herein, numerous specific details are set forth. However, it is understood that the embodiments of the invention may be practiced without these specific details. In some instances, well-known methods have not been shown in detail, Structure and technology so as not to obscure the understanding of this specification.
类似地,应当理解,为了精简本公开并帮助理解各个发明方面中的一个或多个,在上面对本发明的示例性实施例的描述中,本发明的各个特征有时被一起分组到单个实施例、图、或者对其的描述中。然而,并不应将该公开的方法解释成反映如下意图:即所要求保护的本发明要求比在每个权利要求中所明确记载的特征更多的特征。更确切地说,如下面的权利要求书所反映的那样,发明方面在于少于前面公开的单个实施例的所有特征。因此,遵循具体实施方式的权利要求书由此明确地并入该具体实施方式,其中每个权利要求本身都作为本发明的单独实施例。Similarly, the various features of the invention are sometimes grouped together into a single embodiment, in the above description of the exemplary embodiments of the invention, Figure, or a description of it. However, the method disclosed is not to be interpreted as reflecting the intention that the claimed invention requires more features than those recited in the claims. Rather, as the following claims reflect, inventive aspects reside in less than all features of the single embodiments disclosed herein. Therefore, the claims following the specific embodiments are hereby explicitly incorporated into the embodiments, and each of the claims as a separate embodiment of the invention.
本领域那些技术人员可以理解,可以对实施例中的设备中的模块进行自适应性地改变并且把它们设置在与该实施例不同的一个或多个设备中。可以把实施例中的模块或单元或组件组合成一个模块或单元或组件,以及此外可以把它们分成多个子模块或子单元或子组件。除了这样的特征和/或过程或者单元中的至少一些是相互排斥之外,可以采用任何组合对本说明书(包括伴随的权利要求、摘要和附图)中公开的所有特征以及如此公开的任何方法或者设备的所有过程或单元进行组合。除非另外明确陈述,本说明书(包括伴随的权利要求、摘要和附图)中公开的每个特征可以由提供相同、等同或相似目的的替代特征来代替。Those skilled in the art will appreciate that the modules in the devices of the embodiments can be adaptively changed and placed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and further they may be divided into a plurality of sub-modules or sub-units or sub-components. In addition to such features and/or at least some of the processes or units being mutually exclusive, any combination of the features disclosed in the specification, including the accompanying claims, the abstract and the drawings, and any methods so disclosed, or All processes or units of the device are combined. Each feature disclosed in this specification (including the accompanying claims, the abstract and the drawings) may be replaced by alternative features that provide the same, equivalent or similar purpose.
此外,本领域的技术人员能够理解,尽管在此所述的一些实施例包括其它实施例中所包括的某些特征而不是其它特征,但是不同实施例的特征的组合意味着处于本发明的范围之内并且形成不同的实施例。例如,在下面的权利要求书中,所要求保护的实施例的任意之一都可以以任意的组合方式来使用。In addition, those skilled in the art will appreciate that, although some embodiments described herein include certain features that are included in other embodiments and not in other features, combinations of features of different embodiments are intended to be within the scope of the present invention. Different embodiments are formed and formed. For example, in the following claims, any one of the claimed embodiments can be used in any combination.
本发明的各个部件实施例可以以硬件实现,或者以在一个或者多个处理器上运行的软件模块实现,或者以它们的组合实现。本领域的技术人员应当理解,可以在实践中使用微处理器或者数字信号处理器(DSP)来实现根据本发明实施例的应用程序安全性的鉴定设备中的一些或者全部部件的一些或者全部功能。本发明还可以实现为用于执行这里所描述的方法的一部分或者全部的设备或者装置程序(例如,计算机程序和计算机程序产品)。这样的实现本发明的程序可以存储在计算机可读介质上,或者可以具有一个或者多个信号的形式。这样的信号可以从因特网网站上下载得到,或者在载体信号上提供,或者以任何其它形式提供。The various component embodiments of the present invention may be implemented in hardware, or in a software module running on one or more processors, or in a combination thereof. Those skilled in the art will appreciate that some or all of the functionality of some or all of the components of the authentication device for application security in accordance with embodiments of the present invention may be implemented in practice using a microprocessor or digital signal processor (DSP). . The invention can also be implemented as a device or device program (e.g., a computer program and a computer program product) for performing some or all of the methods described herein. Such a program implementing the invention may be stored on a computer readable medium or may be in the form of one or more signals. Such signals may be downloaded from an Internet website, provided on a carrier signal, or provided in any other form.
例如,图9示出了可以实现根据本发明的应用程序安全性的鉴定方法的终端设备。该终端设备传统上包括处理器910和以存储器920形式的程序产品或者可读介质。存储器920可以是诸如闪存、EEPROM(电可擦除可编程只读存储器)、EPROM或者ROM之类的电子存储器。存储器920具有配置为执行上述方法中的任何方法步骤的程序代码931的存储空间930。例如,配置为程序代码的存储空间930可以包括分别配置为实现上面的方法中的各种步骤的各个程序代码931。这些程序代码可以从一个或者多个程序产品中读出或者写入到这一个或者多个程序产品中。这些程序产品包括诸如存储卡之类的程序代码载体。这样的程序产品通常为如参考图10所述的便携式或者固定存储单元。该存储单元可以具有与图9的终端设备中的存储器920类似布置的存储段、存储空间等。程序代码可以例如以适当形式进行压缩。通常,存储单元包括可读代码931’,即可以 由例如诸如910之类的处理器读取的代码,这些代码当由终端设备运行时,导致该终端设备执行上面所描述的方法中的各个步骤。For example, FIG. 9 shows a terminal device that can implement an authentication method of application security according to the present invention. The terminal device conventionally includes a processor 910 and a program product or readable medium in the form of a memory 920. Memory 920 can be an electronic memory such as a flash memory, EEPROM (Electrically Erasable Programmable Read Only Memory), EPROM, or ROM. Memory 920 has a memory space 930 of program code 931 configured to perform any of the method steps described above. For example, storage space 930 configured as program code can include various program code 931 that are each configured to implement various steps in the above methods. These program codes can be read from or written to one or more program products. These program products include program code carriers such as memory cards. Such a program product is typically a portable or fixed storage unit as described with reference to FIG. The storage unit may have a storage section, a storage space, and the like arranged similarly to the storage 920 in the terminal device of FIG. The program code can be compressed, for example, in an appropriate form. Typically, the storage unit includes a readable code 931', ie Code read by a processor, such as 910, that when executed by a terminal device causes the terminal device to perform various steps in the methods described above.
本文中所称的“一个实施例”、“实施例”或者“一个或者多个实施例”意味着,结合实施例描述的特定特征、结构或者特性包括在本发明的至少一个实施例中。此外,请注意,这里“在一个实施例中”的词语例子不一定全指同一个实施例。"an embodiment," or "an embodiment," or "an embodiment," In addition, it is noted that the phrase "in one embodiment" is not necessarily referring to the same embodiment.
应该注意的是上述实施例对本发明进行说明而不是对本发明进行限制,并且本领域技术人员在不脱离所附权利要求的范围的情况下可设计出替换实施例。在权利要求中,不应将位于括号之间的任何参考符号构造成对权利要求的限制。单词“包含”不排除存在未列在权利要求中的元件或步骤。位于元件之前的单词“一”或“一个”不排除存在多个这样的元件。本发明可以借助于包括有若干不同元件的硬件以及借助于适当编程的计算机来实现。在列举了若干装置的单元权利要求中,这些装置中的若干个可以是通过同一个硬件项来具体体现。单词第一、第二、以及第三等的使用不表示任何顺序。可将这些单词解释为名称。 It is to be noted that the above-described embodiments are illustrative of the invention and are not intended to be limiting, and that the invention may be devised without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as a limitation. The word "comprising" does not exclude the presence of the elements or steps that are not recited in the claims. The word "a" or "an" The invention can be implemented by means of hardware comprising several distinct elements and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means can be embodied by the same hardware item. The use of the words first, second, and third does not indicate any order. These words can be interpreted as names.

Claims (56)

  1. 一种应用程序安全性的鉴定方法,包括:An authentication method for application security, including:
    第一特征服务端接收第一特征终端对应用程序的安全性的鉴定请求;The first feature server receives an authentication request of the first feature terminal for security of the application;
    向至少一个第二特征终端发送对所述应用程序对应的可执行文件的获取请求,所述获取请求携带所述应用程序的唯一标识信息,其中,所述可执行文件记录所述应用程序运行时的操作行为,所述第一特征服务端为基于内网对所述第一特征终端和第二特征终端进行安全管理的服务端;Sending, to the at least one second feature terminal, an acquisition request for an executable file corresponding to the application, where the acquisition request carries unique identification information of the application, wherein the executable file records the application runtime The operation of the first feature server is a server that performs security management on the first feature terminal and the second feature terminal based on the intranet;
    依据所述唯一标识信息查找所述应用程序对应的可执行文件,并按照所述可执行文件对所述应用程序的安全性进行鉴定。Searching for an executable file corresponding to the application according to the unique identification information, and authenticating the security of the application according to the executable file.
  2. 如权利要求1所述的方法,所述唯一标识信息为所述应用程序的可执行文件的哈希值,或唯一标识所述应用程序的发布者的数字证书信息。The method of claim 1, the unique identification information being a hash value of an executable file of the application, or digital certificate information uniquely identifying a publisher of the application.
  3. 如权利要求1所述的方法,所述鉴定请求携带所述应用程序的唯一标识信息,所述第一特征服务端预置有包括所述应用程序的唯一标识信息与安全性对应关系的安全性鉴定数据库;The method of claim 1, wherein the authentication request carries unique identification information of the application, and the first feature server is preset with security including a unique identification information of the application and a security correspondence relationship. Identification database;
    在向至少一个第二特征终端发送对所述应用程序对应的可执行文件的获取请求的步骤之前,所述方法还包括:Before the step of sending an acquisition request for the executable file corresponding to the application to the at least one second feature terminal, the method further includes:
    所述第一特征服务端确定所述安全性鉴定数据库中不存在所述唯一标识信息,或根据所述唯一标识信息在所述安全性鉴定数据库中查找到所述应用程序对应的安全性并非安全文件。The first feature server determines that the unique identifier information does not exist in the security authentication database, or finds that the security corresponding to the application is not secure in the security authentication database according to the unique identifier information. file.
  4. 如权利要求1所述的方法,在向至少一个第二特征终端发送对所述应用程序对应的可执行文件的获取请求的步骤之前,所述方法还包括:The method of claim 1, before the step of transmitting an acquisition request for the executable file corresponding to the application to the at least one second feature terminal, the method further comprising:
    向所述第一特征终端发送对所述应用程序对应的可执行文件的获取请求,并接收到所述第一特征终端反馈的不存在所述可执行文件的消息。Sending an acquisition request for the executable file corresponding to the application to the first feature terminal, and receiving a message that the first feature terminal feeds back that the executable file does not exist.
  5. 如权利要求1所述的方法,所述按照可执行文件对应用程序的安全性进行鉴定的步骤包括:The method of claim 1, wherein the step of authenticating the security of the application in accordance with the executable file comprises:
    通过分析所述可执行文件所记录的所述应用程序运行时的操作行为是否具备目标行为特征,以对所述应用程序的安全性进行鉴定,所述目标行为特征为病毒文件运行时的行为特征。The security of the application is identified by analyzing whether the operation behavior of the application runtime recorded by the executable file has a target behavior characteristic, and the target behavior characteristic is a behavior characteristic of a virus file during runtime .
  6. 如权利要求5所述的方法,所述通过分析可执行文件所记录的应用程序运行时的操作行为是否具备目标行为特征,以对应用程序的安全性进行鉴定的步骤包括:The method according to claim 5, wherein the step of authenticating the security of the application by analyzing whether the operational behavior of the application runtime recorded by the executable file has a target behavior characteristic comprises:
    对所述应用程序的可执行文件进行反汇编处理,得到所述应用程序对应的汇编源码;Disassembling the executable file of the application to obtain an assembly source corresponding to the application;
    分析所述汇编源码在运行时的操作行为是否具备目标行为特征,所述目标行为特征为病毒文件运行时的行为特征;Analyzing whether the operational behavior of the assembly source at runtime has a target behavior characteristic, and the target behavior characteristic is a behavior characteristic of a virus file during runtime;
    若所述汇编源码在运行时的操作行为具备至少一种目标行为特征,则所述应用程序的安全性为危险文件;If the operational behavior of the assembly source at runtime has at least one target behavior characteristic, the security of the application is a dangerous file;
    若所述汇编源码在运行时的操作行为不具备任何一种目标行为特征,则所述应用程序的安全性为安全文件。 If the operational behavior of the assembly source at runtime does not have any of the target behavior characteristics, the security of the application is a secure file.
  7. 如权利要求5所述的方法,所述目标行为特征包括连接外网发送数据、执行多次复制代码的操作或访问并改写系统文件。The method of claim 5, the target behavior characteristic comprising connecting an external network to transmit data, performing an operation of copying the code multiple times, or accessing and overwriting the system file.
  8. 如权利要求1所述的方法,所述第二特征终端保存有所述应用程序的唯一标识信息与所述可执行文件在所述第二特征终端的保存路径的对应关系,所述接收第二特征终端依据唯一标识信息查找的应用程序对应的可执行文件的步骤包括:The method of claim 1, wherein the second feature terminal stores a correspondence between the unique identification information of the application and a save path of the executable file in the second feature terminal, and the receiving second The steps of the executable file corresponding to the application that the feature terminal searches according to the unique identification information include:
    接收所述第二特征终端按照所述唯一标识信息以及所述对应关系确定保存路径后并按照所述保存路径提取的可执行文件。Receiving, by the second feature terminal, an executable file that is determined according to the unique identification information and the corresponding relationship and is extracted according to the save path.
  9. 如权利要求1所述的方法,还包括:The method of claim 1 further comprising:
    第一特征服务端对第一特征终端的应用程序的安全性进行鉴定,并将鉴定的安全性下发给所述第一特征终端进行保存,所述第一特征服务端为所述第一特征终端通过内网可访问的服务端;The first feature server authenticates the security of the application of the first feature terminal, and sends the authenticated security to the first feature terminal for saving. The first feature server is the first feature. The server that the terminal can access through the intranet;
    接收所述第一特征终端对多个变更文件的获取请求,所述变更文件用于对所述第一特征终端保存的某个应用程序的安全性进行修正;Receiving, by the first feature terminal, an acquisition request for a plurality of change files, where the change file is used to modify security of an application saved by the first feature terminal;
    按照所述获取请求提取多个变更文件,所述变更文件携带对应的文件处理级别;Extracting, according to the obtaining request, a plurality of change files, where the change file carries a corresponding file processing level;
    将提取的多个变更文件按照对应的文件处理级别的不同进行分类,并按照分类将所述变更文件分别发送给所述第一特征终端,以供所述第一特征终端针对不同文件处理级别的变更文件分别按照不同的处理方式进行处理。Sorting the extracted multiple change files according to different file processing levels, and respectively transmitting the change files to the first feature terminal according to the classification, so that the first feature terminal is for different file processing levels. The change files are processed according to different processing methods.
  10. 如权利要求9所述的方法,所述按照分类将变更文件分别发送给第一特征终端的步骤包括:The method of claim 9, wherein the step of separately transmitting the change file to the first feature terminal according to the classification comprises:
    将具备不同文件处理级别的变更文件分别通过不同的传输路径发送给所述第一特征终端。The change files having different file processing levels are respectively sent to the first feature terminal through different transmission paths.
  11. 如权利要求10所述的方法,所述将具备不同文件处理级别的变更文件分别通过不同的传输路径发送给第一特征终端的步骤包括:The method of claim 10, wherein the step of transmitting the change files having different file processing levels to the first feature terminal through different transmission paths respectively includes:
    将具备不同文件处理级别的变更文件分别通过第一特征服务端不同的预设端口或通信信道发送给所述第一特征终端;Transmitting the change files with different file processing levels to the first feature terminal through different preset ports or communication channels of the first feature server;
    或,将具备不同文件处理级别的变更文件分别通过所述第一特征终端不同的预设接口发送给所述第一特征终端;Or, the change files having different file processing levels are respectively sent to the first feature terminal through different preset interfaces of the first feature terminal;
    或,将具备不同文件处理级别的变更文件分别发送到所述第一特征终端的不同的预置文件夹中。Or, the change files having different file processing levels are respectively sent to different preset folders of the first feature terminal.
  12. 如权利要求9所述的方法,所述按照分类将变更文件分别发送给第一特征终端的步骤包括:The method of claim 9, wherein the step of separately transmitting the change file to the first feature terminal according to the classification comprises:
    将提取的多个变更文件按照对应的文件处理级别进行排序,并按照排序逐个提取所述变更文件发送给所述第一特征终端。The extracted plurality of change files are sorted according to corresponding file processing levels, and the change files are extracted one by one according to the sort and sent to the first feature terminal.
  13. 如权利要求9所述的方法,还包括:The method of claim 9 further comprising:
    所述第一特征服务端生成所述变更文件,所述文件处理级别包括第一文件处理级别和第二文件处理级别。The first feature server generates the change file, and the file processing level includes a first file processing level and a second file processing level.
  14. 如权利要求13所述的方法,所述第一文件处理级别高于所述第二文件处理级别,所述变更文件携带第一处理级别时,所述第一特征服务端生成变更文件的步骤包 括:The method according to claim 13, wherein the first file processing level is higher than the second file processing level, and when the change file carries the first processing level, the first feature server generates a step file of the change file. include:
    接收在第一特征服务端提交的针对所述应用程序修正的安全性,并按照修正的安全性生成对所述第一特征终端保存的、第一特征服务端鉴定的安全性进行修正的变更文件,所述变更文件携带第一文件处理级别。Receiving the security corrected for the application submitted by the first feature server, and generating a change file for correcting the security of the first feature server authentication saved by the first feature terminal according to the modified security The change file carries a first file processing level.
  15. 如权利要求13所述的方法,所述第一文件处理级别高于所述第二文件处理级别,所述变更文件携带第二处理级别时,所述第一特征服务端生成变更文件的步骤包括:The method of claim 13, wherein the first file processing level is higher than the second file processing level, and when the change file carries the second processing level, the step of the first feature server generating the change file includes :
    所述第一特征服务端请求第二特征服务端对所述应用程序的安全性进行鉴定,所述第二特征服务端为设置在互联网中通过互联网可访问的服务端;The first feature server requests the second feature server to authenticate the security of the application, and the second feature server is a server that is accessible through the Internet in the Internet;
    按照所述第二特征服务端鉴定的安全性生成对所述第一特征终端保存的、第一特征服务端鉴定的安全性进行修正的变更文件,所述变更文件携带第二文件处理级别。And generating, according to the security of the second feature server authentication, a change file that corrects the security of the first feature server authentication saved by the first feature terminal, where the change file carries a second file processing level.
  16. 如权利要求13所述的方法,所述变更文件携带第二处理级别时,所述第一特征服务端生成变更文件的步骤包括:The method of claim 13, wherein when the change file carries the second processing level, the step of the first feature server generating the change file comprises:
    所述第一特征服务端通过所述第一特征终端连接所述第二特征服务端对所述应用程序的安全性进行鉴定,所述第二特征服务端为设置在互联网中通过互联网可访问的服务端;The first feature server connects the second feature server to the security of the application by using the first feature terminal, and the second feature server is accessible through the Internet in the Internet. Server;
    按照所述第二特征服务端鉴定的安全性生成对所述第一特征终端保存的、第一特征服务端鉴定的安全性进行修正的变更文件,所述变更文件携带第二文件处理级别。And generating, according to the security of the second feature server authentication, a change file that corrects the security of the first feature server authentication saved by the first feature terminal, where the change file carries a second file processing level.
  17. 如权利要求9或13所述的方法,所述第一特征终端针对不同文件处理级别的变更文件分别按照不同的处理方式进行处理的步骤包括:The method according to claim 9 or 13, wherein the step of processing, by the first feature terminal, the change files of different file processing levels according to different processing modes respectively comprises:
    所述第一特征终端针对不同文件处理级别的变更文件分别创建相应的进程或分别采用不同的线程进行处理。The first feature terminal respectively creates a corresponding process for different file processing level change files or processes different threads respectively.
  18. 如权利要求17所述的方法,当所述第一特征终端创建不同的线程分别处理具备不同文件处理级别的变更文件时,文件处理级别高的变更文件对应的线程的处理速度高于文件处理级别低的变更文件对应的线程。The method according to claim 17, when the first feature terminal creates different threads to respectively process change files having different file processing levels, the processing speed of the thread corresponding to the file with a higher file processing level is higher than the file processing level. The thread corresponding to the low change file.
  19. 如权利要求9所述的方法,所述获取请求是根据所述第一特征终端已存在的变更文件生成的,所述按照获取请求提取多个变更文件的步骤包括:The method of claim 9, wherein the obtaining request is generated according to the change file that the first feature terminal already exists, and the step of extracting the plurality of change files according to the obtaining request comprises:
    按照所述获取请求提取生成时间在所述第一特征终端已存在的变更文件的生成时间之后的变更文件。A change file after the generation time of the change file existing in the first feature terminal is generated according to the acquisition request.
  20. 如权利要求19所述的方法,所述获取请求携带时间信息,所述时间信息用于标志最近的变更文件的生成时间,所述最近的变更文件为所述第一特征终端已存在的变更文件中生成时间距离当前时间最近的变更文件;The method of claim 19, wherein the acquisition request carries time information, the time information is used to mark a generation time of a recent change file, and the latest change file is a change file that the first feature terminal already exists. Generate a change file whose time is closest to the current time;
    所述按照获取请求提取生成时间在第一特征终端已存在的变更文件的生成时间之后的变更文件的步骤包括:The step of extracting the change file after the generation time of the change file that has existed at the first feature terminal according to the acquisition request includes:
    提取生成时间在所述获取请求携带的时间信息所标志的生成时间之后的变更文件。The change file whose generation time is after the generation time indicated by the time information carried by the acquisition request is extracted.
  21. 如权利要求19所述的方法,所述获取请求携带时间信息,所述时间信息用于标志所述第一特征终端不存在且所述第一特征服务端存在的某个变更文件的生成时间, 所述时间信息通过向所述第一服务端请求的变更文件清单与所述第一特征终端本地的变更文件进行对比得到;The method of claim 19, wherein the obtaining request carries time information, and the time information is used to indicate that the first feature terminal does not exist and the generation time of a certain change file existing by the first feature server is The time information is obtained by comparing a change file list requested by the first server with a change file local to the first feature terminal;
    所述按照获取请求提取生成时间在第一特征终端已存在的变更文件的生成时间之后的变更文件的步骤包括:The step of extracting the change file after the generation time of the change file that has existed at the first feature terminal according to the acquisition request includes:
    提取生成时间为所述获取请求携带的时间信息所标志的生成时间,以及生成时间在所述获取请求携带的时间信息所标志的生成时间之后的变更文件。Extracting the generation time indicated by the time information carried by the acquisition request, and generating a change file after the generation time indicated by the time information carried by the acquisition request.
  22. 如权利要求19所述的方法,所述获取请求携带时间信息,所述时间信息用于标志所述第一特征终端不存在且所述第一特征服务端存在的至少一个变更文件的生成时间,所述时间信息通过对比向所述第一特征服务端请求的变更文件清单与所述第一特征终端本地的变更文件得到;The method of claim 19, the obtaining request carrying time information, the time information is used to mark a generation time of the at least one change file that the first feature terminal does not exist and the first feature server exists, The time information is obtained by comparing a change file list requested to the first feature server with a change file local to the first feature terminal;
    所述按照获取请求提取生成时间在第一特征终端已存在的变更文件的生成时间之后的变更文件的步骤包括:The step of extracting the change file after the generation time of the change file that has existed at the first feature terminal according to the acquisition request includes:
    提取生成时间为所述获取请求携带的时间信息所标志的生成时间的变更文件。The change file whose generation time is the generation time indicated by the time information carried in the acquisition request is extracted.
  23. 如权利要求9所述的方法,所述应用程序的安全性包括正常、禁用和未知三种级别。The method of claim 9 wherein the security of the application comprises three levels of normal, disabled, and unknown.
  24. 一种应用程序安全性的鉴定方法,包括:An authentication method for application security, including:
    第二特征终端接收第一特征服务端发送的对应用程序对应的可执行文件的获取请求,所述获取请求在所述第一特征服务端接收第一特征终端对所述应用程序的安全性的鉴定请求之后发送,所述获取请求携带所述应用程序的唯一标识信息,其中,所述可执行文件记录所述应用程序运行时的操作行为,所述第一特征服务端为基于内网对所述第一特征终端和第二特征终端进行安全管理的服务端;The second feature terminal receives the acquisition request of the executable file corresponding to the application sent by the first feature server, where the acquisition request receives the security of the first feature terminal to the application at the first feature server After the authentication request is sent, the obtaining request carries unique identification information of the application, wherein the executable file records an operation behavior of the application when the application is running, and the first feature server is based on an intranet a server that performs security management on the first feature terminal and the second feature terminal;
    依据所述唯一标识信息在本地查找所述应用程序对应的可执行文件,并将所述可执行文件发送到所述第一特征服务端,以按照所述可执行文件对所述应用程序的安全性进行鉴定。Searching for an executable file corresponding to the application locally according to the unique identification information, and sending the executable file to the first feature server to secure the application according to the executable file. Sexual identification.
  25. 如24所述的方法,所述唯一标识信息为所述应用程序的可执行文件的哈希值,或唯一标识所述应用程序的发布者的数字证书信息。The method of 24, the unique identification information is a hash value of an executable file of the application, or digital certificate information uniquely identifying a publisher of the application.
  26. 如24所述的方法,所述第二特征终端保存有所述应用程序的唯一标识信息与所述可执行文件在所述第二特征终端的保存路径的对应关系,所述依据唯一标识信息在本地查找应用程序对应的可执行文件的步骤包括:The method of claim 24, wherein the second feature terminal stores a correspondence between the unique identification information of the application and a save path of the executable file in the second feature terminal, where the unique identifier information is The steps to find the executable file corresponding to the application locally include:
    按照所述唯一标识信息以及所述对应关系确定所述可执行文件在所述第二特征终端的保存路径;Determining, according to the unique identifier information and the corresponding relationship, a save path of the executable file in the second feature terminal;
    按照所述保存路径提取的所述应用程序对应的可执行文件。An executable file corresponding to the application extracted according to the save path.
  27. 如24所述的方法,在将所述可执行文件发送到所述特征服务端的步骤之前,所述方法还包括:The method of claim 24, before the step of transmitting the executable file to the feature server, the method further comprising:
    向所述特征服务器发送对所述可执行文件的查询请求;Sending a query request for the executable file to the feature server;
    接收所述特征服务器反馈的未接收到其它第二特征终端发送的可执行文件的消息。 Receiving a message fed back by the feature server that does not receive an executable file sent by another second feature terminal.
  28. 一种应用程序安全性的鉴定装置,包括:An authentication device for application security, comprising:
    程序鉴定请求模块,用于第一特征服务端接收第一特征终端对应用程序的安全性的鉴定请求;a program authentication request module, configured to receive, by the first feature server, an authentication request of the security of the first feature terminal to the application;
    第一可执行文件请求模块,用于向至少一个第二特征终端发送对所述应用程序对应的可执行文件的获取请求,所述获取请求携带所述应用程序的唯一标识信息,其中,所述可执行文件记录所述应用程序运行时的操作行为,所述第一特征服务端为基于内网对所述第一特征终端和第二特征终端进行安全管理的服务端;a first executable file requesting module, configured to send, to the at least one second feature terminal, an acquisition request for an executable file corresponding to the application, where the acquisition request carries unique identification information of the application, where The executable file records an operation behavior of the application when the application is running, and the first feature server is a server that performs security management on the first feature terminal and the second feature terminal based on an intranet;
    可执行文件接收模块,用于依据所述唯一标识信息查找所述应用程序对应的可执行文件;An executable file receiving module, configured to search for an executable file corresponding to the application according to the unique identifier information;
    第一安全鉴定模块,用于按照所述可执行文件对所述应用程序的安全性进行鉴定。The first security authentication module is configured to authenticate the security of the application according to the executable file.
  29. 如权利要求28所述的装置,所述唯一标识信息为所述应用程序的可执行文件的哈希值,或唯一标识所述应用程序的发布者的数字证书信息。The apparatus of claim 28, the unique identification information being a hash value of an executable file of the application, or digital certificate information uniquely identifying a publisher of the application.
  30. 如权利要求28所述的装置,所述鉴定请求携带所述应用程序的唯一标识信息,所述第一特征服务端预置有包括所述应用程序的唯一标识信息与安全性对应关系的安全性鉴定数据库;The apparatus according to claim 28, wherein the authentication request carries unique identification information of the application, and the first feature server is preset with security including a unique identification information of the application and a security correspondence relationship. Identification database;
    所述装置还包括:The device also includes:
    第二安全鉴定模块,用于所述第一特征服务端确定所述安全性鉴定数据库中不存在所述唯一标识信息,或根据所述唯一标识信息在所述安全性鉴定数据库中查找到所述应用程序对应的安全性并非安全文件。a second security authentication module, configured to determine, by the first feature server, that the unique identifier information does not exist in the security authentication database, or find the foregoing in the security identification database according to the unique identifier information The security corresponding to the application is not a secure file.
  31. 如权利要求28所述的装置,还包括:The apparatus of claim 28, further comprising:
    第二可执行文件请求模块,用于向所述第一特征终端发送对所述应用程序对应的可执行文件的获取请求,并接收到所述第一特征终端反馈的不存在所述可执行文件的消息。a second executable file requesting module, configured to send, to the first feature terminal, an acquisition request for an executable file corresponding to the application, and receive the executable file that is not fed back by the first feature terminal Message.
  32. 如权利要求29所述的装置,所述第一安全鉴定模块,具体用于通过分析所述可执行文件所记录的所述应用程序运行时的操作行为是否具备目标行为特征,以对所述应用程序的安全性进行鉴定,所述目标行为特征为病毒文件运行时的行为特征。The apparatus of claim 29, wherein the first security authentication module is configured to analyze whether the operational behavior of the application running by the executable file has a target behavior characteristic to analyze the application The security of the program is characterized, and the target behavior is characterized by behavioral characteristics of the virus file at runtime.
  33. 如权利要求32所述的装置,所述第一安全鉴定模块用于:The apparatus of claim 32, the first security authentication module is configured to:
    对所述应用程序的可执行文件进行反汇编处理,得到所述应用程序对应的汇编源码;Disassembling the executable file of the application to obtain an assembly source corresponding to the application;
    分析所述汇编源码在运行时的操作行为是否具备目标行为特征,所述目标行为特征为病毒文件运行时的行为特征;Analyzing whether the operational behavior of the assembly source at runtime has a target behavior characteristic, and the target behavior characteristic is a behavior characteristic of a virus file during runtime;
    若所述汇编源码在运行时的操作行为具备至少一种目标行为特征,则所述应用程序的安全性为危险文件;If the operational behavior of the assembly source at runtime has at least one target behavior characteristic, the security of the application is a dangerous file;
    若所述汇编源码在运行时的操作行为不具备任何一种目标行为特征,则所述应用程序的安全性为安全文件。If the operational behavior of the assembly source at runtime does not have any of the target behavior characteristics, the security of the application is a secure file.
  34. 如权利要求32所述的装置,所述目标行为特征包括连接外网发送数据、执行多次复制代码的操作或访问并改写系统文件。 30. The apparatus of claim 32, the target behavior characteristic comprising connecting an external network to transmit data, performing an operation of copying the code multiple times, or accessing and overwriting the system file.
  35. 如权利要求28所述的装置,所述第二特征终端保存有所述应用程序的唯一标识信息与所述可执行文件在所述第二特征终端的保存路径的对应关系;The apparatus according to claim 28, wherein the second feature terminal stores a correspondence between unique identification information of the application and a save path of the executable file in the second feature terminal;
    所述可执行文件接收模块,具体用于接收所述第二特征终端按照所述唯一标识信息以及所述对应关系确定保存路径后并按照所述保存路径提取的可执行文件。The executable file receiving module is configured to receive an executable file that is determined by the second feature terminal to determine a save path according to the unique identifier information and the corresponding relationship, and is extracted according to the save path.
  36. 如权利要求28所述的装置,还包括:The apparatus of claim 28, further comprising:
    安全鉴定模块,用于第一特征服务端对第一特征终端的应用程序的安全性进行鉴定,并将鉴定的安全性下发给所述第一特征终端进行保存,所述第一特征服务端为所述第一特征终端通过内网可访问的服务端;a security authentication module, configured to identify, by the first feature server, the security of the application of the first feature terminal, and send the authenticated security to the first feature terminal for saving, the first feature server a server accessible by the intranet for the first feature terminal;
    变更获取请求,用于接收所述第一特征终端对多个变更文件的获取请求,所述变更文件用于对所述第一特征终端保存的某个应用程序的安全性进行修正;a change obtaining request, configured to receive an acquisition request of the first feature terminal for a plurality of change files, where the change file is used to modify a security of an application saved by the first feature terminal;
    文件提取模块,用于按照所述获取请求提取多个变更文件,所述变更文件携带对应的文件处理级别;a file extraction module, configured to extract a plurality of change files according to the obtaining request, where the change file carries a corresponding file processing level;
    文件分类模块,用于将提取的多个变更文件按照对应的文件处理级别的不同进行分类;a file classification module, configured to classify the extracted multiple change files according to different file processing levels;
    文件发送模块,用于按照分类将所述变更文件分别发送给所述第一特征终端,以供所述第一特征终端针对不同文件处理级别的变更文件分别按照不同的处理方式进行处理。And a file sending module, configured to separately send the change file to the first feature terminal according to the classification, so that the first feature terminal processes the change files of different file processing levels according to different processing manners.
  37. 如权利要求36所述的装置,所述文件发送模块,具体用于将具备不同文件处理级别的变更文件分别通过不同的传输路径发送给所述第一特征终端。The device according to claim 36, wherein the file sending module is configured to send the change files having different file processing levels to the first feature terminal through different transmission paths.
  38. 如权利要求37所述的装置,所述文件发送模块包括:The apparatus of claim 37, the file sending module comprising:
    第一发送子模块,用于将具备不同文件处理级别的变更文件分别通过第一特征服务端不同的预设端口或通信信道发送给所述第一特征终端;The first sending sub-module is configured to send the change files with different file processing levels to the first feature terminal through different preset ports or communication channels of the first feature server;
    或,第二发送子模块,用于将具备不同文件处理级别的变更文件分别通过所述第一特征终端不同的预设接口发送给所述第一特征终端;Or the second sending sub-module is configured to send the change files with different file processing levels to the first feature terminal through different preset interfaces of the first feature terminal;
    或,第三发送子模块,用于将具备不同文件处理级别的变更文件分别发送到所述第一特征终端的不同的预置文件夹中。Or the third sending submodule is configured to separately send the change files having different file processing levels to different preset folders of the first feature terminal.
  39. 如权利要求36所述的装置,所述文件发送模块,具体用于将提取的多个变更文件按照对应的文件处理级别进行排序,并按照排序逐个提取所述变更文件发送给所述第一特征终端。The device according to claim 36, wherein the file sending module is configured to sort the extracted plurality of change files according to a corresponding file processing level, and extract the change files one by one according to the sorting and send the change file to the first feature. terminal.
  40. 如权利要求36所述的装置,还包括:The apparatus of claim 36, further comprising:
    变更文件生成模块,用于所述第一特征服务端生成所述变更文件,所述文件处理级别包括第一文件处理级别和第二文件处理级别。And a change file generating module, configured to generate, by the first feature server, the change file, where the file processing level includes a first file processing level and a second file processing level.
  41. 如权利要求40所述的装置,所述第一文件处理级别高于所述第二文件处理级别,所述变更文件携带第一处理级别时,所述变更文件生成模块包括:The apparatus of claim 40, wherein the first file processing level is higher than the second file processing level, and when the change file carries the first processing level, the change file generating module comprises:
    安全性接收模块,用于接收在第一特征服务端提交的针对所述应用程序修正的安全性;a security receiving module, configured to receive security submitted by the first feature server for the application modification;
    第一文件生成子模块,用于按照修正的安全性生成对所述第一特征终端保存的、第一特征服务端鉴定的安全性进行修正的变更文件,所述变更文件携带第一文件处理级 别。a first file generating submodule, configured to generate, according to the modified security, a change file that corrects security of the first feature server authentication saved by the first feature terminal, where the change file carries the first file processing level do not.
  42. 如权利要求40所述的装置,所述第一文件处理级别高于所述第二文件处理级别,所述变更文件携带第二处理级别时,所述变更文件生成模块包括:The apparatus of claim 40, wherein the first file processing level is higher than the second file processing level, and when the change file carries a second processing level, the change file generating module comprises:
    第一鉴定请求子模块,用于所述第一特征服务端请求第二特征服务端对所述应用程序的安全性进行鉴定,所述第二特征服务端为设置在互联网中通过互联网可访问的服务端;a first authentication request sub-module, configured by the first feature server to request the second feature server to authenticate the security of the application, where the second feature server is accessible through the Internet in the Internet. Server;
    第二文件生成子模块,用于按照所述第二特征服务端鉴定的安全性生成对所述第一特征终端保存的、第一特征服务端鉴定的安全性进行修正的变更文件,所述变更文件携带第二文件处理级别。a second file generating submodule, configured to generate, according to the security of the second feature server authentication, a change file that corrects the security of the first feature server authentication saved by the first feature terminal, the change The file carries a second file processing level.
  43. 如权利要求40所述的装置,所述变更文件携带第二处理级别时,所述变更文件生成模块包括:The apparatus of claim 40, when the change file carries a second processing level, the change file generating module comprises:
    第二鉴定请求子模块,用于所述第一特征服务端通过所述第一特征终端连接所述第二特征服务端对所述应用程序的安全性进行鉴定,所述第二特征服务端为设置在互联网中通过互联网可访问的服务端;a second authentication requesting sub-module, configured to identify, by the first feature server, the security of the application by connecting the second feature server to the first feature terminal, where the second feature server is Set up a server accessible on the Internet via the Internet;
    第三文件生成子模块,用于按照所述第二特征服务端鉴定的安全性生成对所述第一特征终端保存的、第一特征服务端鉴定的安全性进行修正的变更文件,所述变更文件携带第二文件处理级别。a third file generating submodule, configured to generate, according to the security of the second feature server authentication, a change file that corrects the security of the first feature server authentication saved by the first feature terminal, the change The file carries a second file processing level.
  44. 如权利要求36或40所述的装置,所述文件发送模块,具体用于按照分类将所述变更文件分别发送给所述第一特征终端,以供所述第一特征终端针对不同文件处理级别的变更文件分别创建相应的进程或分别采用不同的线程进行处理。The device according to claim 36 or 40, wherein the file sending module is configured to separately send the change file to the first feature terminal according to a classification, so that the first feature terminal is for different file processing levels The change files are created separately or processed by different threads.
  45. 如权利要求44所述的装置,当所述第一特征终端创建不同的线程分别处理具备不同文件处理级别的变更文件时,文件处理级别高的变更文件对应的线程的处理速度高于文件处理级别低的变更文件对应的线程。The apparatus according to claim 44, when the first feature terminal creates different threads to respectively process change files having different file processing levels, the processing speed of the thread corresponding to the file with a higher file processing level is higher than the file processing level. The thread corresponding to the low change file.
  46. 如权利要求46所述的装置,所述文件提取模块,具体用于按照所述获取请求提取生成时间在所述第一特征终端已存在的变更文件的生成时间之后的变更文件。The device according to claim 46, wherein the file extraction module is configured to extract, according to the acquisition request, a change file after the generation time of the change file that the time exists in the first feature terminal.
  47. 如权利要求46所述的装置,所述获取请求携带时间信息,所述时间信息用于标志最近的变更文件的生成时间,所述最近的变更文件为所述第一特征终端已存在的变更文件中生成时间距离当前时间最近的变更文件;The apparatus according to claim 46, wherein the acquisition request carries time information, the time information is used to mark a generation time of a recent change file, and the latest change file is a change file existing in the first feature terminal. Generate a change file whose time is closest to the current time;
    所述文件提取模块包括:The file extraction module includes:
    第一提取子模块,用于提取生成时间在所述获取请求携带的时间信息所标志的生成时间之后的变更文件。The first extraction submodule is configured to extract a change file after the generation time indicated by the time information carried by the acquisition request.
  48. 如权利要求46所述的装置,所述获取请求携带时间信息,所述时间信息用于标志所述第一特征终端不存在且所述第一特征服务端存在的某个变更文件的生成时间,所述时间信息通过向所述第一服务端请求的变更文件清单与所述第一特征终端本地的变更文件进行对比得到;The device of claim 46, wherein the acquisition request carries time information, and the time information is used to indicate that the first feature terminal does not exist and the generation time of a certain change file existing by the first feature server is The time information is obtained by comparing a change file list requested by the first server with a change file local to the first feature terminal;
    所述文件提取模块包括:The file extraction module includes:
    第二提取子模块,用于提取生成时间为所述获取请求携带的时间信息所标志的生成时间,以及生成时间在所述获取请求携带的时间信息所标志的生成时间之后的变更文 件。a second extraction submodule, configured to extract a generation time that is generated by the time information carried by the acquisition request, and a change time after the generation time indicated by the time information carried by the acquisition request Pieces.
  49. 如权利要求46所述的装置,所述获取请求携带时间信息,所述时间信息用于标志所述第一特征终端不存在且所述第一特征服务端存在的至少一个变更文件的生成时间,所述时间信息通过对比向所述第一特征服务端请求的变更文件清单与所述第一特征终端本地的变更文件得到;The device of claim 46, wherein the acquisition request carries time information, the time information is used to indicate a generation time of the at least one change file that the first feature terminal does not exist and the first feature server exists, The time information is obtained by comparing a change file list requested to the first feature server with a change file local to the first feature terminal;
    所述文件提取模块包括:The file extraction module includes:
    第三提取子模块,用于提取生成时间为所述获取请求携带的时间信息所标志的生成时间的变更文件。The third extraction submodule is configured to extract a change file that generates a generation time indicated by the time information carried by the acquisition request.
  50. 如权利要求36所述的装置,所述应用程序的安全性包括正常、禁用和未知三种级别。The apparatus of claim 36, wherein the security of the application comprises three levels of normal, disabled, and unknown.
  51. 一种应用程序安全性的鉴定装置,包括:An authentication device for application security, comprising:
    获取请求接收模块,用于第二特征终端接收第一特征服务端发送的对应用程序对应的可执行文件的获取请求,所述获取请求在所述特征服务端接收第一特征终端对所述应用程序的安全性的鉴定请求之后发送,所述获取请求携带所述应用程序的唯一标识信息,其中,所述可执行文件记录所述应用程序运行时的操作行为,所述第一特征服务端为基于内网对所述第一特征终端和第二特征终端进行安全管理的服务端;Obtaining a request receiving module, configured to receive, by the second feature terminal, an acquisition request for an executable file corresponding to the application sent by the first feature server, where the obtaining request receives the first feature terminal to the application at the feature server After the authentication request of the security of the program is sent, the obtaining request carries the unique identification information of the application, wherein the executable file records an operation behavior of the application when the application is running, and the first feature server is a server for performing security management on the first feature terminal and the second feature terminal based on an intranet;
    可执行文件查找模块,用于依据所述唯一标识信息在本地查找所述应用程序对应的可执行文件,并将所述可执行文件发送到所述第一特征服务端,以按照所述可执行文件对所述应用程序的安全性进行鉴定。An executable file searching module, configured to locally search for an executable file corresponding to the application according to the unique identification information, and send the executable file to the first feature server to follow the executable The file authenticates the security of the application.
  52. 如权利要求51所述的装置,所述唯一标识信息为所述应用程序的可执行文件的哈希值,或唯一标识所述应用程序的发布者的数字证书信息。The apparatus of claim 51, the unique identification information being a hash value of an executable file of the application, or digital certificate information uniquely identifying a publisher of the application.
  53. 如权利要求51所述的装置,所述第二特征终端保存有所述应用程序的唯一标识信息与所述可执行文件在所述第二特征终端的保存路径的对应关系,所述可执行文件查找模块包括:The apparatus according to claim 51, wherein the second feature terminal stores a correspondence between unique identification information of the application and a save path of the executable file in the second feature terminal, the executable file The lookup module includes:
    路径确定子模块,用于按照所述唯一标识信息以及所述对应关系确定所述可执行文件在所述第二特征终端的保存路径;a path determining submodule, configured to determine, according to the unique identifier information and the correspondence, a save path of the executable file in the second feature terminal;
    可执行文件提取子模块,用于按照所述保存路径提取的所述应用程序对应的可执行文件。An executable file extraction submodule, configured to execute the executable file corresponding to the application according to the save path.
  54. 如权利要求51所述的装置,还包括:The apparatus of claim 51, further comprising:
    查询请求发送模块,用于向所述第一特征服务端发送对所述可执行文件的查询请求;a query request sending module, configured to send a query request for the executable file to the first feature server;
    消息接收模块,用于接收所述第一特征服务端反馈的未接收到其它第二特征终端发送的可执行文件的消息。And a message receiving module, configured to receive, by the first feature server, a message that does not receive an executable file sent by another second feature terminal.
  55. 一种程序,包括可读代码,当所述可读代码在终端设备上运行时,导致所述终端设备执行根据权利要求1-27中的任一个所述的应用程序安全性的鉴定方法。A program comprising readable code, when the readable code is run on a terminal device, causing the terminal device to perform an authentication method of the application security according to any one of claims 1-27.
  56. 一种可读介质,其中存储了如权利要求55所述的程序。 A readable medium storing the program of claim 55.
PCT/CN2015/070361 2014-02-14 2015-01-08 Method and device for identifying security of application process WO2015120756A1 (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN201410051841.5 2014-02-14
CN201410051841.5A CN104850775B (en) 2014-02-14 2014-02-14 A kind of identification method and device of applications security
CN201410076768.7A CN104899515B (en) 2014-03-04 2014-03-04 A kind of variation and device of applications security
CN201410076768.7 2014-03-04

Publications (1)

Publication Number Publication Date
WO2015120756A1 true WO2015120756A1 (en) 2015-08-20

Family

ID=53799579

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/070361 WO2015120756A1 (en) 2014-02-14 2015-01-08 Method and device for identifying security of application process

Country Status (1)

Country Link
WO (1) WO2015120756A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106096452A (en) * 2016-06-24 2016-11-09 贵州万臻时代通讯技术有限公司 The theft preventing method of a kind of terminal mirror image backup and device
CN113726845A (en) * 2021-07-14 2021-11-30 深圳市有为信息技术发展有限公司 Data transmission method and device of vehicle-mounted terminal, vehicle-mounted terminal and commercial vehicle
CN114844662A (en) * 2022-03-01 2022-08-02 天翼安全科技有限公司 Network security policy management method, device and equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1900941A (en) * 2006-04-28 2007-01-24 傅玉生 Computer safety protective method based on software identity identifying technology
CN102082802A (en) * 2011-03-01 2011-06-01 陈彪 Behavior-based mobile terminal security protection system and method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1900941A (en) * 2006-04-28 2007-01-24 傅玉生 Computer safety protective method based on software identity identifying technology
CN102082802A (en) * 2011-03-01 2011-06-01 陈彪 Behavior-based mobile terminal security protection system and method

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106096452A (en) * 2016-06-24 2016-11-09 贵州万臻时代通讯技术有限公司 The theft preventing method of a kind of terminal mirror image backup and device
CN113726845A (en) * 2021-07-14 2021-11-30 深圳市有为信息技术发展有限公司 Data transmission method and device of vehicle-mounted terminal, vehicle-mounted terminal and commercial vehicle
CN114844662A (en) * 2022-03-01 2022-08-02 天翼安全科技有限公司 Network security policy management method, device and equipment
CN114844662B (en) * 2022-03-01 2024-03-12 天翼安全科技有限公司 Network security policy management method, device and equipment

Similar Documents

Publication Publication Date Title
US9639697B2 (en) Method and apparatus for retroactively detecting malicious or otherwise undesirable software
US8353041B2 (en) Secure application streaming
US9767280B2 (en) Information processing apparatus, method of controlling the same, information processing system, and information processing method
US8612398B2 (en) Clean store for operating system and software recovery
JP5933797B1 (en) Log information generating apparatus and program, and log information extracting apparatus and program
JP5802848B2 (en) Computer-implemented method, non-temporary computer-readable medium and computer system for identifying Trojanized applications (apps) for mobile environments
EP3552098B1 (en) Operating system update management for enrolled devices
US10911479B2 (en) Real-time mitigations for unfamiliar threat scenarios
GB2609828A (en) Network security
US8561180B1 (en) Systems and methods for aiding in the elimination of false-positive malware detections within enterprises
US8078909B1 (en) Detecting file system layout discrepancies
CN104850775B (en) A kind of identification method and device of applications security
US20160301715A1 (en) Automating the creation and maintenance of policy compliant environments
US8990559B2 (en) Automating the creation and maintenance of policy compliant environments
US20170286095A1 (en) Software discovery using exclusion
WO2015120756A1 (en) Method and device for identifying security of application process
US9860230B1 (en) Systems and methods for digitally signing executables with reputation information
CN103632069B (en) Terminal safety managing method and device in internal network
US20220207142A1 (en) Zero Dwell Time Process Library and Script Monitoring
US11188644B2 (en) Application behaviour control
US11811896B1 (en) Pre-fetch engine with security access controls for mesh data network
JP7281998B2 (en) Information processing device, information processing method, information processing system and program
US20220052909A1 (en) Blockchain-based network device management methods and devices
US20230283639A1 (en) Stream processing of telemetry for a network topology
CN117278288A (en) Network attack protection method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15748548

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15748548

Country of ref document: EP

Kind code of ref document: A1