WO2018058517A1 - 安全扫描方法、装置及电子设备 - Google Patents

安全扫描方法、装置及电子设备 Download PDF

Info

Publication number
WO2018058517A1
WO2018058517A1 PCT/CN2016/101061 CN2016101061W WO2018058517A1 WO 2018058517 A1 WO2018058517 A1 WO 2018058517A1 CN 2016101061 W CN2016101061 W CN 2016101061W WO 2018058517 A1 WO2018058517 A1 WO 2018058517A1
Authority
WO
WIPO (PCT)
Prior art keywords
security
scan
scanning
item
module
Prior art date
Application number
PCT/CN2016/101061
Other languages
English (en)
French (fr)
Inventor
刘鸣
王乐
王宇飞
Original Assignee
北京小米移动软件有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京小米移动软件有限公司 filed Critical 北京小米移动软件有限公司
Priority to CN201680001096.0A priority Critical patent/CN106663173A/zh
Priority to PCT/CN2016/101061 priority patent/WO2018058517A1/zh
Publication of WO2018058517A1 publication Critical patent/WO2018058517A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software

Definitions

  • the present disclosure relates to the field of security technologies, and in particular, to a security scanning method, apparatus, and electronic device.
  • Security scanning is the most basic and important function of many security software.
  • the content of security scanning usually includes wifi scanning, application (APP) scanning, system scanning and SMS scanning.
  • APP application
  • the embodiments of the present disclosure provide a security scanning method, device, and electronic device, which are used to reduce the content of security scanning by the security software, thereby shortening the scanning time of the security software.
  • a security scanning method including:
  • a pre-security scan is performed on the pre-scanning item in the system to obtain a first scan result
  • the security scan of the pre-scanning item in the system includes:
  • a preset pre-scanning program corresponding to the first preset pre-scanning item is triggered to perform a security scan.
  • the security scan of the pre-scanning item in the system includes:
  • the default pre-scan program When detecting an operation corresponding to the second preset pre-scanning item, calling an interface corresponding to the second pre-scanning item by the security software, triggering the security software to correspond to the second preset pre-scanning item
  • the default pre-scan program performs a security scan.
  • the determining the current security status according to the first scan result includes:
  • a security score for indicating the current security status is calculated.
  • the method further includes:
  • the instant scan item set by the security software is triggered to perform a security scan to obtain a second scan result
  • a current security status is determined based on the first scan result and the second scan result.
  • a security scanning apparatus including:
  • a first scanning module configured to perform a front security scan on the pre-scanning item in the system during the running of the system to obtain a first scanning result
  • An acquiring module configured to acquire the first scan result obtained by scanning by the first scanning module when the security software initiates a security scan
  • the first determining module is configured to determine a current security state according to the first scan result obtained by the acquiring module.
  • the first scanning module includes:
  • the first scanning submodule is configured to trigger a preset pre-scanning program corresponding to the first preset pre-scanning item to perform security when detecting an operation corresponding to the first preset pre-scanning item scanning.
  • the first scanning module includes:
  • a second scanning submodule configured to invoke an interface corresponding to the second pre-scanning item by the security software when the operation corresponding to the second preset pre-scanning item is detected, triggering the security software and the The preset pre-scanning program corresponding to the preset pre-scanning item performs a security scan.
  • the first determining module comprises:
  • Determining a sub-module configured to determine a score of each of the pre-scanning items in the first scan result
  • a calculation sub-module configured to calculate a security score for indicating a current security status based on respective scores of the pre-scan items determined by the determination sub-module.
  • the apparatus further includes:
  • the second scanning module is configured to: when the security software initiates the security scan, trigger an instant scan item set by the security software to perform a security scan to obtain a second scan result;
  • the second determining module is configured to determine a current security state based on the first scan result obtained by the first scan module scanning and the second scan result obtained by the second scan module scan.
  • an electronic device including:
  • a memory for storing processor executable instructions
  • processor is configured to:
  • a pre-security scan is performed on the pre-scanning item in the system to obtain a first scan result
  • the security software By pre-setting the security scan of the pre-scan item before the security software is started, when the security software starts the security scan, the current security status is determined by the first scan result, and the security software is prevented from repeatedly scanning the pre-scan item. Therefore, the content of the security software for security scanning is reduced, thereby shortening the scanning time of the security software.
  • FIG. 1 is a schematic flow chart of a security scanning method according to an exemplary embodiment.
  • FIG. 2 is a schematic flow chart of a security scanning method according to an exemplary embodiment.
  • FIG. 3 is a schematic flowchart diagram of a security scanning method according to an exemplary embodiment.
  • FIG. 4 is a schematic flow chart of a security scanning method according to an exemplary embodiment 3.
  • FIG. 5 is a schematic flow chart of a security scanning method according to an exemplary embodiment 4.
  • FIG. 6 is a schematic structural diagram of a security scanning apparatus according to an exemplary embodiment.
  • FIG. 7 is a schematic structural diagram of another security scanning apparatus according to an exemplary embodiment.
  • FIG. 8 is a schematic structural diagram of still another security scanning apparatus according to an exemplary embodiment.
  • FIG. 9 is a schematic diagram of a structure suitable for a security scanning device, according to an exemplary embodiment.
  • FIG. 1 is a schematic flowchart diagram of a security scanning method according to an exemplary embodiment; the information searching method may be applied to an electronic device (for example, a smart phone, a tablet computer, a personal computer, etc.), as shown in FIG.
  • the security scanning method includes the following steps 101-103:
  • step 101 during the operation of the system, the front-end security is set by the pre-scanning item set by the system. Scan to get the first scan result.
  • the front-end security scan of the set pre-scanning item may be performed by the operating system, for example, the current scanning item is wireless fidelity ( When wifi) is connected, the operation corresponding to the wifi connection is to connect a new wifi to the electronic device.
  • the operating system of the electronic device performs a security scan on the new wifi connection to obtain whether the new wifi connection is secure.
  • the first scan result for example, the pre-scan item is the authority of the operating system, and the operation corresponding to the authority of the operating system is to modify the authority of the operating system, and when the authority of the operating system is modified, the authority of the operating system is secured. Scan and use the result of the modified operating system as the first scan result.
  • the pre-scanning item may include at least one scan item, for example, the above-mentioned enumerated wifi connection and the authority to modify the operating system, and may also be any preset function module that requires front-end security scanning.
  • the module can be regarded as a pre-scanning item described in the present disclosure.
  • the pre-scanning item is a short message application, and the corresponding operation is that the operating system's short-message application is replaced with a third-party short-message application.
  • the first scan result can be recorded directly in the operating system.
  • step 102 when the security software initiates the security scan, the first scan result is obtained.
  • the security software is installed on the electronic device as an application for managing the security of the electronic device.
  • the security software may obtain the first scan result from the operating system through an interface between the security software and the operating system.
  • step 103 the current security status is determined based on the first scan result.
  • the security software may calculate the score of the pre-scan item according to the first scan result, obtain the current security score or security level according to the score, and determine the current security status by the security score or the security level.
  • the first scan result can be displayed on the user interface of the security software.
  • the security software by performing the security scan of the pre-scanning item before the security software is started, when the security software starts the security scan, the current security status is determined by the first scan result, and the security software is prevented from pre-scanning.
  • the item is repeatedly scanned, thus reducing the security software's content for security scanning, thereby reducing the scanning time of the security software.
  • the method further includes:
  • the security scan of the pre-scan items in the system includes:
  • a preset pre-scanning program corresponding to the first preset pre-scanning item is triggered to perform a security scan.
  • the security scan of the pre-scan items in the system includes:
  • the corresponding interface of the item triggers the security software to perform a security scan on the preset pre-scanning program corresponding to the second preset pre-scanning item.
  • determining a current security status according to the first scan result includes:
  • a security score indicating the current security status is calculated based on the respective scores of the pre-scan items.
  • the method further includes:
  • the instant scan item triggered by the security software is triggered to perform a security scan to obtain a second scan result
  • a current security status is determined based on the first scan result and the second scan result.
  • the above method provided by the embodiment of the present disclosure can prevent the security software from repeatedly scanning the pre-scanning items, reduce the content of the security software for performing security scanning, and thereby shorten the scanning time of the security software.
  • FIG. 2 is a schematic flowchart of a security scanning method according to an exemplary embodiment of the present invention.
  • This embodiment uses the foregoing method provided by the embodiment of the present disclosure to perform security scanning on a first preset pre-scanning item through an operating system. For an exemplary example, as shown in FIG. 2, the following steps are included:
  • step 201 during the operation of the system, when the operation corresponding to the first preset pre-scanning item is detected, the preset pre-scanning program corresponding to the first preset pre-scanning item is triggered to perform security. scanning.
  • the operation corresponding to the first preset pre-scanning item may be, for example, the authority of the operating system, and the operation corresponding to the permission of the operating system is to modify the authority of the operating system, that is, when the operating system is modified.
  • the permissions are granted, the security of the operating system is scanned and the result of the modified operating system is taken as the first scan result.
  • the operation corresponding to the operating system privilege is the privilege being modified, and the operation corresponding to the short message application is an operating system.
  • the SMS application is replaced with a third-party SMS application, so the operating system can perform a secure scan of the operating system's permissions and/or SMS application to get the first scan result.
  • the disclosure does not limit the number of the first preset pre-scanning items and the specific scanning items, and can customize the setting of the pre-scan according to the specific requirements of the user for the security scanning of the electronic device.
  • An application installed on an electronic device or some functional module on an electronic device.
  • step 202 the first scan result is recorded by the system.
  • step 203 when the security software initiates the security scan, the first scan result is sent to the security software through the interface of the security software.
  • the first scan result may be sent to the security software through an interface between the operating system and the security software.
  • the security software may take the initiative to avoid repeated scans.
  • the security software can not repeatedly scan the pre-scanning item when the security scan is initiated, thereby reducing the content of the security software for security scanning.
  • step 204 the current security status is determined based on the first scan result.
  • step 204 For a description of the step 204, refer to the related description of the embodiment shown in FIG. 1 above, and details are not described herein again.
  • the operating system after the permissions of the operating system are modified (also referred to as ROOT), the operating system is in an unsecured state, so the operating system can record the state in which the permissions of the operating system are modified in the first scan result. in.
  • the short message application is replaced by a third party short message application by the operating system's short message application, since the third party short message application can be regarded as unsafe for the electronic device, the operating system can The status of replacing the operating system's SMS application with the third-party SMS application is recorded in the first scan result.
  • FIG. 3 is a schematic flowchart of a security scanning method according to an exemplary embodiment of the present invention.
  • This embodiment uses the foregoing method provided by the embodiment of the present disclosure to perform security scanning on a second preset pre-scanning item by using security software. For an exemplary example, as shown in FIG. 3, the following steps are included:
  • step 301 during the operation of the system, when the operation corresponding to the second preset pre-scanning item is detected, the interface corresponding to the security software and the second pre-scanning item is invoked, and the security software and the second pre-trigger are triggered.
  • the second preset pre-scan program corresponding to the pre-scanning item is used for security scanning.
  • the operating system may first determine a second preset pre-scanning item for which security scanning is required.
  • step 302 the first scan result is recorded by the operating system.
  • the operating system may send the first scan result to the security software in an active manner after recording the first scan result.
  • the first scan result may also be sent to the security software in a passive manner.
  • the operating system may send the first scan result to the security through the call of the security software when the security software initiates the scan. software.
  • step 303 when the security software initiates the security scan, the first scan result is sent to the security software through the interface of the security software.
  • step 203 For the description of step 203, reference may be made to the description of the embodiment shown in FIG. 2 above, and details are not described herein again.
  • step 304 the current security status is determined based on the first scan result.
  • the second preset pre-scanning item is exemplified as a wifi connection.
  • the operating system when the operating system detects that the electronic device is connected to a new wifi, the operating system can invoke the security software.
  • the interface controls the security software to perform security scanning on the new wifi.
  • the security software can determine whether the wifi connection is secure according to the wifi identification and the security wifi identifier recorded by the security software, and the security scan of the wifi connection.
  • the disclosure may refer to the description in the related art, and the present disclosure does not limit the security scan of the wifi connection.
  • the second preset pre-scan item is an application and the second preset pre-scan item corresponds to an installation or upgrade of the application, and the installed or upgraded application is scanned for viruses.
  • application signature scanning can monitor the system application change broadcast, when detecting that a new application is installed on the electronic device, or overwriting the installed application (ie, an application upgrade), when the application is installed,
  • the security software can control the installed application to perform virus scanning and application signature scanning, determine the security status of the installed application, obtain the first scan result, and the security software can send the first scan result to the operating system, so that The operating system can directly know the current security status of the electronic device and promptly remind the security of the electronic device.
  • the front scan item is scanned by the security software. Since the security software can perform a more complicated security scan on the scanned object according to the scanning requirement, the operating system can avoid all the front before the front security scan. Set scan items for security scanning to reduce the complexity of operating system security scanning.
  • FIG. 4 is a schematic flowchart of a security scanning method according to an exemplary embodiment of the present invention. This embodiment uses the foregoing method provided by the embodiment of the present disclosure to secure a non-preset scan item on an electronic device through security software.
  • the sweep is taken as an example for illustration, as shown in FIG. 4, and includes the following steps:
  • step 401 during the system operation, a pre-safe scan is performed on the pre-scanning item in the system to obtain a first scan result.
  • step 402 when the security software initiates the security scan, the first scan result is obtained.
  • step 403 a score for each of the pre-scan items in the first scan result is determined.
  • a security score for indicating the current security status is calculated based on the respective ratings of the pre-scan items.
  • a pre-scanning item may be pre-set with a score.
  • the wifi connection corresponds to 10 points. If the wifi connection indicates a new wifi, the electronic device may be regarded as being in an unsafe state. Deduct 10 points from the total score of the preset settings; for example, if a newly installed application is detected by the pre-scan The program is a virus. If the newly installed application is a virus, it corresponds to 5 points, and the total score can be deducted by 5 points. A security score indicating the current security status is obtained.
  • the security state can be quantified, so that the security state is displayed to the user in a more intuitive manner.
  • FIG. 5 is a schematic flowchart of a security scanning method according to an exemplary embodiment of the present invention.
  • the present embodiment uses the foregoing method provided by an embodiment of the present disclosure to determine how to determine an electronic device based on a first scan result and a second scan result.
  • the security state is exemplified for example. As shown in FIG. 5, the following steps are included:
  • step 501 during the system operation, a pre-safe scan is performed on the pre-scanning item in the system to obtain a first scan result.
  • step 502 when the security software initiates the security scan, the first scan result is obtained.
  • step 503 the instant scan item set by the security software is triggered to perform a security scan to obtain a second scan result.
  • the instant scan item set by the security software may exclude the pre-scan item in the disclosure, that is, in order to prevent the security software from repeatedly scanning the scan item that the operating system has pre-scanned, the pre-scan item may be Exclude from instant scans.
  • step 504 a current security status is determined based on the first scan result and the second scan result.
  • a score may be preset for each of the instant scan items. For example, if a login abnormality is detected in the payment application, the score corresponding to the payment application is deducted from the total score corresponding to the security software. A value, for example 10 minutes, results in a security score indicating the current security status detected by the security software. Then, weighting is performed by the score corresponding to each of the first scan result and the second scan result to obtain a total score, and the current security state is determined by the total score.
  • the current security state of the electronic device is determined by the first scan result and the second scan result, and the scan result of the operating system and the instant scan result of the security software are integrated, thereby ensuring each of the electronic devices. Scan items can be scanned to ensure that the security status of the electronic device is fully detected.
  • FIG. 6 is a schematic structural diagram of a security scanning apparatus according to an exemplary embodiment; as shown in FIG. 6, the security scanning apparatus includes:
  • the first scanning module 61 is configured to perform a pre-security scan on the pre-scanning item in the system during the running of the system to obtain a first scan result;
  • the obtaining module 62 is configured to acquire the first scanning module 61 when the security software initiates the security scan The first scan result obtained;
  • the first determining module 63 is configured to determine a current security state according to the first scan result acquired by the obtaining module 62.
  • FIG. 7 is a schematic structural diagram of another security scanning apparatus according to an exemplary embodiment.
  • the first scanning module 61 include:
  • the first scanning sub-module 611 is configured to trigger a preset pre-scanning program corresponding to the first preset pre-scanning item to perform a security scan when detecting an operation corresponding to the first preset pre-scanning item .
  • the first scanning module 61 includes:
  • the second scanning sub-module 612 is configured to: when the operation corresponding to the second preset pre-scanning item is detected, invoke an interface corresponding to the security software and the second pre-scanning item, trigger the security software and the second preset
  • the preset pre-scan program corresponding to the pre-scanning item performs a security scan.
  • FIG. 8 is a schematic structural diagram of still another security scanning apparatus according to an exemplary embodiment. As shown in FIG. 8 , based on the embodiment shown in FIG. 6 or FIG. 7 , in an embodiment, the first The determining module 63 includes:
  • a determining sub-module 631 configured to determine a score of each of the pre-scanning items in the first scan result
  • the calculation sub-module 632 is configured to calculate a security score for indicating the current security status based on the respective scores of the pre-scan items determined by the determination sub-module.
  • the apparatus further includes:
  • the second scanning module 64 is configured to: when the security software initiates the security scan, trigger an instant scan item set by the security software to perform a security scan to obtain a second scan result;
  • the second determining module 65 is configured to determine a current security state based on the first scan result scanned by the first scan module 61 and the second scan result obtained by the second scan module scan 64 scan.
  • FIG. 9 is a block diagram of a suitable security scanning device, according to an exemplary embodiment.
  • the device 900 may be a mobile phone with a camera, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, a fitness device, a personal digital assistant, and the like.
  • device 900 can include one or more of the following components: processing component 902, memory 904, power component 906, multimedia component 908, audio component 910, input/output (I/O) interface 912, sensor component 914, And a communication component 916.
  • Processing component 902 typically controls the overall operation of device 900, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations.
  • Processing component 902 can include one or more processors 920 To execute instructions to complete all or part of the steps of the above method.
  • processing component 902 can include one or more modules to facilitate interaction between component 902 and other components.
  • processing component 902 can include a multimedia module to facilitate interaction between multimedia component 908 and processing component 902.
  • Memory 904 is configured to store various types of data to support operation at device 900. Examples of such data include instructions for any application or method operating on device 900, contact data, phone book data, messages, pictures, videos, and the like.
  • the memory 904 can be implemented by any type of volatile or non-volatile storage device, or a combination thereof, such as static random access memory (SRAM), electrically erasable programmable read only memory (EEPROM), erasable.
  • SRAM static random access memory
  • EEPROM electrically erasable programmable read only memory
  • EPROM Programmable Read Only Memory
  • PROM Programmable Read Only Memory
  • ROM Read Only Memory
  • Magnetic Memory Flash Memory
  • Disk Disk or Optical Disk.
  • Power component 906 provides power to various components of device 900.
  • Power component 906 can include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for device 900.
  • the multimedia component 908 includes a screen between the device 900 and the user that provides an output interface.
  • the screen can include a liquid crystal display (LCD) and a touch panel (TP). If the screen includes a touch panel, the screen can be implemented as a touch screen to receive input signals from the user.
  • the touch panel includes one or more touch sensors to sense touches, slides, and gestures on the touch panel. The touch sensor may sense not only the boundary of the touch or sliding action, but also the duration and pressure associated with the touch or slide operation.
  • the multimedia component 908 includes a front camera and/or a rear camera. When the device 900 is in an operation mode, such as a shooting mode or a video mode, the front camera and/or the rear camera can receive external multimedia data. Each front and rear camera can be a fixed optical lens system or have focal length and optical zoom capabilities.
  • the audio component 910 is configured to output and/or input an audio signal.
  • audio component 910 includes a microphone (MIC) that is configured to receive an external audio signal when device 900 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode.
  • the received audio signal may be further stored in memory 904 or transmitted via communication component 916.
  • the audio component 910 also includes a speaker for outputting an audio signal.
  • the I/O interface 912 provides an interface between the processing component 902 and the peripheral interface module, which may be a keyboard, a click wheel, a button, or the like. These buttons may include, but are not limited to, a home button, a volume button, a start button, and a lock button.
  • Sensor assembly 914 includes one or more sensors for providing device 900 with various aspects of status assessment.
  • sensor component 914 can detect an open/closed state of device 900, relative positioning of components, such as the display and keypad of device 900, and sensor component 914 can also detect device 900 or The position of one component of device 900 changes, the presence or absence of user contact with device 900, the orientation of device 900 or acceleration/deceleration, and the temperature of device 900.
  • Sensor assembly 914 can include a proximity sensor configured to detect the presence of nearby objects without any physical contact.
  • Sensor assembly 914 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications.
  • the sensor component 914 can also include an acceleration sensor, a gyro sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
  • Communication component 916 is configured to facilitate wired or wireless communication between device 900 and other devices.
  • the device 900 can access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof.
  • the communication component 916 receives a broadcast signal or broadcast associated information from an external broadcast management system via a broadcast channel.
  • the communication component 916 also includes a near field communication (NFC) module to facilitate short range communication.
  • the NFC module can be implemented based on radio frequency identification (RFID) technology, infrared data association (IrDA) technology, ultra-wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
  • RFID radio frequency identification
  • IrDA infrared data association
  • UWB ultra-wideband
  • Bluetooth Bluetooth
  • device 900 may be implemented by one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable A gate array (FPGA), controller, microcontroller, microprocessor or other electronic component implementation for performing the above security scanning method, the method comprising:
  • ASICs application specific integrated circuits
  • DSPs digital signal processors
  • DSPDs digital signal processing devices
  • PLDs programmable logic devices
  • FPGA field programmable A gate array
  • controller microcontroller, microprocessor or other electronic component implementation for performing the above security scanning method, the method comprising:
  • a pre-security scan is performed on the pre-scanning item in the system to obtain a first scan result
  • the current security status is determined based on the first scan result.
  • non-transitory computer readable storage medium comprising instructions, such as a memory 904 comprising instructions executable by processor 920 of apparatus 900 to perform the above method.
  • the non-transitory computer readable storage medium can be a ROM, a random access memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, and an optical data storage device.
  • Processor 920 is configured to:
  • a pre-security scan is performed on the pre-scanning item in the system to obtain a first scan result
  • the current security status is determined based on the first scan result.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Virology (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Telephone Function (AREA)
  • Stored Programmes (AREA)

Abstract

一种安全扫描方法、装置及电子设备。所述方法包括:在系统运行过程中,在所述系统中对前置扫描项进行前置安全扫描,得到第一扫描结果(101);当安全软件启动安全扫描时,获取所述第一扫描结果(102);根据所述第一扫描结果确定当前的安全状态(103)。该方法可减少安全软件进行安全扫描的内容,进而缩短安全软件的扫描时间。

Description

安全扫描方法、装置及电子设备 技术领域
本公开涉及安全技术领域,尤其涉及一种安全扫描方法、装置及电子设备。
背景技术
安全扫描是很多安全软件最基础也是最主要的功能,安全扫描的内容通常会包括wifi扫描、应用程序(APP)扫描、系统扫描以及短信扫描等。
发明内容
为克服相关技术中存在的问题,本公开实施例提供一种安全扫描方法、装置及电子设备,用以减少安全软件进行安全扫描的内容,进而缩短安全软件的扫描时间。
根据本公开实施例的第一方面,提供一种安全扫描方法,包括:
在系统运行过程中,在所述系统中对前置扫描项进行前置安全扫描,得到第一扫描结果;
当安全软件启动安全扫描时,获取所述第一扫描结果;
根据所述第一扫描结果确定当前的安全状态。
在一实施例中,所述在所述系统中对前置扫描项进行安全扫描,包括:
检测到与第一预设前置扫描项相对应的操作时,触发与所述第一预设前置扫描项相对应的预设前置扫描程序,进行安全扫描。
在一实施例中,所述在系统中对前置扫描项进行安全扫描,包括:
检测到与第二预设前置扫描项相对应的操作时,调用安全软件与所述第二前置扫描项相对应的接口,触发安全软件与所述第二预设前置扫描项相对应的预设前置扫描程序进行安全扫描。
在一实施例中,所述根据所述第一扫描结果确定当前的安全状态,包括:
确定所述第一扫描结果中对所述前置扫描项各自的评分;
基于所述前置扫描项各自的评分,计算用于表示当前安全状态的安全评分。
在一实施例中,所述方法还包括:
当安全软件启动安全扫描时,触发所述安全软件设置的即时扫描项进行安全扫描,得到第二扫描结果;
基于所述第一扫描结果和所述第二扫描结果确定当前的安全状态。
根据本公开实施例的第二方面,提供一种安全扫描装置,包括:
第一扫描模块,被配置为在系统运行过程中,在所述系统中对前置扫描项进行前置安全扫描,得到第一扫描结果;
获取模块,被配置为当安全软件启动安全扫描时,获取所述第一扫描模块扫描得到的所述第一扫描结果;
第一确定模块,被配置为根据所述获取模块获取到的所述第一扫描结果确定当前的安全状态。
在一实施例中,所述第一扫描模块包括:
第一扫描子模块,被配置为检测到与第一预设前置扫描项相对应的操作时,触发与所述第一预设前置扫描项相对应的预设前置扫描程序,进行安全扫描。
在一实施例中,所述第一扫描模块包括:
第二扫描子模块,被配置为检测到与第二预设前置扫描项相对应的操作时,调用安全软件与所述第二前置扫描项相对应的接口,触发安全软件与所述第二预设前置扫描项相对应的预设前置扫描程序进行安全扫描。
在一实施例中,所述第一确定模块包括:
确定子模块,被配置为确定所述第一扫描结果中对所述前置扫描项各自的评分;
计算子模块,被配置为基于所述确定子模块确定的所述前置扫描项各自的评分,计算用于表示当前安全状态的安全评分。
在一实施例中,所述装置还包括:
第二扫描模块,被配置为当安全软件启动安全扫描时,触发所述安全软件设置的即时扫描项进行安全扫描,得到第二扫描结果;
第二确定模块,被配置为基于所述第一扫描模块扫描得到的所述第一扫描结果和所述第二扫描模块扫描得到的所述第二扫描结果确定当前的安全状态。
根据本公开实施例的第三方面,提供一种电子设备,包括:
处理器;
用于存储处理器可执行指令的存储器;
其中,所述处理器被配置为:
在系统运行过程中,在所述系统中对前置扫描项进行前置安全扫描,得到第一扫描结果;
当安全软件启动安全扫描时,获取所述第一扫描结果;
根据所述第一扫描结果确定当前的安全状态。
本公开的实施例提供的技术方案可以包括以下有益效果:
通过将前置扫描项的安全扫描前置到安全软件被启动之前进行,当安全软件启动安全扫描时,通过第一扫描结果确定当前的安全状态,避免安全软件对前置扫描项进行重复扫描,因此减少了安全软件进行安全扫描的内容,进而能够缩短安全软件的扫描时间。
应当理解的是,以上的一般描述和后文的细节描述仅是示例性和解释性的,并不能限制本公开。
附图说明
此处的附图被并入说明书中并构成本说明书的一部分,示出了符合本发明的实施例,并与说明书一起用于解释本发明的原理。
图1是根据一示例性实施例示出的安全扫描方法的流程示意图。
图2是根据一示例性实施例一示出的安全扫描方法的流程示意图。
图3是根据一示例性实施例二示出的安全扫描方法的流程示意图。
图4是根据一示例性实施例三示出的安全扫描方法的流程示意图。
图5是根据一示例性实施例四示出的安全扫描方法的流程示意图。
图6是根据一示例性实施例示出的一种安全扫描装置的结构示意图。
图7是根据一示例性实施例示出的另一种安全扫描装置的结构示意图。
图8是根据一示例性实施例示出的又一种安全扫描装置的结构示意图。
图9是根据一示例性实施例示出的一种适用于安全扫描装置的结构示意图。
具体实施方式
这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本发明相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本发明的一些方面相一致的装置和方法的例子。
图1是根据一示例性实施例示出的安全扫描方法的流程示意图;该信息搜索方法可以应用在电子设备(例如:智能手机、平板电脑、个人计算机等设备)上,如图1所示,该安全扫描方法包括以下步骤101-103:
在步骤101中,在系统运行过程中,通过系统设置的前置扫描项进行前置安全 扫描,得到第一扫描结果。
在一实施例中,可以在电子设备检测到与前置扫描项相对应的操作时,通过操作系统对设置的前置扫描项进行前置安全扫描,例如,当前置扫描项为无线保真(wifi)连接时,与wifi连接相对应的操作为电子设备连接一个新的wifi,在此情形下,电子设备的操作系统对该新的wifi连接进行安全扫描,得到该新的wifi连接是否为安全的第一扫描结果,再例如,前置扫描项为操作系统的权限,与操作系统的权限相对应的操作为修改操作系统的权限,当修改操作系统的权限时,对操作系统的权限进行安全扫描,并将操作系统被修改的结果作为第一扫描结果。
在一实施例中,前置扫描项可以包括至少一个扫描项,例如,上述列举的wifi连接和修改操作系统的权限,也可以为预设的任意一个需要前置安全扫描的功能模块,该功能模块即可视为本公开中所述的前置扫描项,例如,前置扫描项为短信应用程序,相对应的操作为操作系统的短信应用程序被替换成第三方短信应用程序。在一实施例中,第一扫描结果可以直接记录在操作系统中。
在步骤102中,当安全软件启动安全扫描时,获取第一扫描结果。
在一实施例中,安全软件安装在电子设备上,为用于管理电子设备安全的应用程序。在一实施例中,在安全软件启动安全扫描时,安全软件可以通过安全软件与操作系统之间的接口,从操作系统处获取到第一扫描结果。
在步骤103中,根据第一扫描结果确定当前的安全状态。
在一实施例中,安全软件可以根据第一扫描结果计算前置扫描项的分值,根据分值得到当前的安全评分或者安全等级,通过安全评分或者安全等级来确定当前的安全状态。可选地,可以在安全软件的用户界面上显示第一扫描结果。
本实施例中,通过将前置扫描项的安全扫描前置到安全软件被启动之前进行,当安全软件启动安全扫描时,通过第一扫描结果确定当前的安全状态,避免安全软件对前置扫描项进行重复扫描,因此减少了安全软件进行安全扫描的内容,进而能够缩短安全软件的扫描时间。
在一实施例中,方法还包括:
在一实施例中,在系统中对前置扫描项进行安全扫描,包括:
检测到与第一预设前置扫描项相对应的操作时,触发与第一预设前置扫描项相对应的预设前置扫描程序,进行安全扫描。
在一实施例中,在系统中对前置扫描项进行安全扫描,包括:
检测到与第二预设前置扫描项相对应的操作时,调用安全软件与第二前置扫描 项相对应的接口,触发安全软件与第二预设前置扫描项相对应的预设前置扫描程序进行安全扫描。
在一实施例中,根据第一扫描结果确定当前的安全状态,包括:
确定第一扫描结果中对前置扫描项各自的评分;
基于前置扫描项各自的评分,计算用于表示当前安全状态的安全评分。
在一实施例中,方法还包括:
当安全软件启动安全扫描时,触发安全软件设置的即时扫描项进行安全扫描,得到第二扫描结果;
基于第一扫描结果和第二扫描结果确定当前的安全状态。
如何进行安全扫描的,请参考后续实施例。
至此,本公开实施例提供的上述方法,可以避免安全软件对前置扫描项进行重复扫描,减少安全软件进行安全扫描的内容,进而缩短安全软件的扫描时间。
下面以具体实施例来说明本公开实施例提供的技术方案。
图2是根据一示例性实施例一示出的安全扫描方法的流程示意图;本实施例利用本公开实施例提供的上述方法,以如何通过操作系统对第一预设前置扫描项进行安全扫描为例进行示例性说明,如图2所示,包括如下步骤:
在步骤201中,在系统运行过程中,检测到与第一预设前置扫描项相对应的操作时,触发与第一预设前置扫描项相对应的预设前置扫描程序,进行安全扫描。
在一实施例中,与第一预设前置扫描项相对应的操作例如可以为操作系统的权限,与操作系统的权限相对应的操作为修改操作系统的权限,也即,当修改操作系统的权限时,对操作系统的权限进行安全扫描,并将操作系统被修改的结果作为第一扫描结果。再例如,若第一预设前置扫描项为操作系统的权限和/或短信应用程序,与操作系统的权限相对应的操作为权限被修改,与短信应用程序相对应的操作为操作系统的短信应用程序被替换成第三方短信应用程序,因此操作系统可以对操作系统的权限和/或短信应用程序进行安全扫描,得到第一扫描结果。
通过上述描述可知,本公开对第一预设前置扫描项的数量以及具体的扫描项不做限制,可以根据用户对电子设备的安全扫描的具体需求,自定义设置其需要进行前置扫描的安装在电子设备上的应用程序或者电子设备上的一些功能模块。
在步骤202中,通过系统记录第一扫描结果。
在步骤203中,当安全软件启动安全扫描时,将第一扫描结果通过安全软件的接口发送给安全软件。
在一实施例中,可通过操作系统与安全软件之间的接口将第一扫描结果发送给安全软件,可替换地,也可以在安全软件启动安全扫描时,为了避免重复扫描,安全软件可主动从操作系统获取第一扫描结果。通过将第一扫描结果发送给安全软件,可以使安全软件在启动安全扫描时不会对前置扫描项进行重复扫描,减少安全软件进行安全扫描的内容。
在步骤204中,根据第一扫描结果确定当前的安全状态。
步骤204的描述可以参见上述图1所示实施例的相关描述,在此不再详述。
在一示例性场景中,当操作系统的权限被修改(也可称为被ROOT)后,操作系统处于不安全状态,因此操作系统可将操作系统的权限被修改的状态记录在第一扫描结果中。在另一示例性场景中,当短信应用程序由操作系统的短信应用程序替换成第三方短信应用程序时,由于第三方短信应用程序对于电子设备而言可视为不安全的,因此操作系统可将操作系统的短信应用程序替换成第三方短信应用程序的状态记录在第一扫描结果中。
本实施例中,通过将第一预设前置扫描项在操作系统中直接扫描,可以避免安全软件对第一预设前置扫描想进行重复扫描,提高电子设备的扫描效率。
图3是根据一示例性实施例二示出的安全扫描方法的流程示意图;本实施例利用本公开实施例提供的上述方法,以如何通过安全软件对第二预设前置扫描项进行安全扫描为例进行示例性说明,如图3所示,包括如下步骤:
在步骤301中,在系统运行过程中,检测到与第二预设前置扫描项相对应的操作时,调用安全软件与第二前置扫描项相对应的接口,触发安全软件与第二预设前置扫描项相对应的第二预设前置扫描程序进行安全扫描。
在一实施例中,操作系统可以先确定其需要进行安全扫描的第二预设前置扫描项。
在步骤302中,通过操作系统记录第一扫描结果。
在一实施例中,操作系统在记录第一扫描结果之后,可以以主动的方式将第一扫描结果发送给安全软件。在另一实施例中,也可以以被动的方式将第一扫描结果发送给安全软件,在此场景中,操作系统可以在安全软件启动扫描时通过安全软件的调用将第一扫描结果发送给安全软件。
在步骤303中,当安全软件启动安全扫描时,将第一扫描结果通过安全软件的接口发送给安全软件。
步骤203的描述可以参见上述图2所示实施例的描述,在此不再详述。
在步骤304中,根据第一扫描结果确定当前的安全状态。
在一实施例中,以第二预设前置扫描项为wifi连接为例进行示例性说明,例如,当操作系统检测到电子设备连接到一个新的wifi时,操作系统可通过调用安全软件的接口,控制安全软件对该新的wifi进行安全扫描,在一实施例中,安全软件可根据wifi的标识与安全软件已记录的安全wifi标识,确定wifi连接是否安全,关于wifi连接的安全扫描,可以参考相关技术中的描述,本公开对wifi连接的安全扫描不做限制。
在另一实施例中,以第二预设前置扫描项为应用程序并且第二预设前置扫描项相对应的操作为应用程序的安装或者升级,对安装或者升级的应用程序进行病毒扫描和应用签名扫描。在一实施例中,操作系统可以监听系统应用变化广播,当检测到电子设备上安装了新的应用程序,或覆盖已安装的应用程序(即,应用程序的升级),在应用程序安装时,可控制安全软件对该安装的应用程序进行病毒扫描和应用签名扫描,确定该安装的应用程序的安全状态,得到第一扫描结果,安全软件可将该第一扫描结果发送给操作系统,从而可以使操作系统能够直接获知电子设备当前的安全状态,并对电子设备的安全做出及时提醒。
本实施例中,通过安全软件对前置扫描项进行扫描,由于安全软件可以根据扫描需求对被扫描对象进行更为复杂的安全扫描,因此可以避免在前置安全扫描时操作系统对全部的前置扫描项进行安全扫描,降低操作系统安全扫描的复杂度。
图4是根据一示例性实施例三示出的安全扫描方法的流程示意图;本实施例利用本公开实施例提供的上述方法,以如何通过安全软件对电子设备上的非预设扫描项进行安全扫为例进行示例性说明,如图4所示,包括如下步骤:
在步骤401中,在系统运行过程中,在系统中对前置扫描项进行前置安全扫描,得到第一扫描结果。
在步骤402中,当安全软件启动安全扫描时,获取第一扫描结果。
步骤401和步骤402的描述可以参见上述图1-图3中的任一实施例中,在此不再详述。
在步骤403中,确定第一扫描结果中对前置扫描项各自的评分。
在步骤404中,基于前置扫描项各自的评分,计算用于表示当前安全状态的安全评分。
在一实施例中,可以对每一个前置扫描项预先设置一个分值,例如,wifi的连接对应10分,若wifi连接表示是一个新的wifi,可视为电子设备处于不安全状态,可从预设设置的总分值中扣除10分;再例如,若通过前置扫描检测到一个新安装的应用 程序为病毒,若新安装的应用程序为病毒时对应5分,则可从总分值总扣除5分。进而得到表示当前安全状态的安全评分。
本实施例中,通过对第一扫描结果进行评分,可以对安全状态进行量化,从而对安全状态更为直观的方式展示给用户。
图5是根据一示例性实施例四示出的安全扫描方法的流程示意图;本实施例利用本公开实施例提供的上述方法,以如何基于第一扫描结果和第二扫描结果确定电子设备当前的安全状态为例进行示例性说明,如图5所示,包括如下步骤:
在步骤501中,在系统运行过程中,在系统中对前置扫描项进行前置安全扫描,得到第一扫描结果。
在步骤502中,当安全软件启动安全扫描时,获取第一扫描结果。
步骤501和步骤502的描述可以参见上述图1所示实施例的描述,在此不再详述。
在步骤503中,触发安全软件设置的即时扫描项进行安全扫描,得到第二扫描结果。
在一实施例中,安全软件设置的即时扫描项可以排除本公开中的前置扫描项,即,为了避免安全软件对操作系统已经前置扫描的扫描项进行重复扫描,可以将前置扫描项从即时扫描项中排除。
在步骤504中,基于第一扫描结果和第二扫描结果确定当前的安全状态。
在一实施例中,可以对每一个即时扫描项预先设置一个分值,例如,检测到支付类应用程序出现登录异常,则从安全软件对应的总分值中扣除与支付类应用程序对应的分值,例如10分,进而得到表示安全软件检测到的当前的安全状态的安全评分。之后,通过第一扫描结果与第二扫描结果中各自对应的分值进行加权,得到一个总分值,通过该总分值来确定当前的安全状态。
本实施例中,通过第一扫描结果和第二扫描结果确定电子设备当前的安全状态,综合了操作系统前置的扫描结果和安全软件的即时扫描结果,由此可以确保电子设备上的各个被扫描项均能够被扫描到,确保电子设备的安全状态能够被全面检测到。
图6是根据一示例性实施例示出的一种安全扫描装置的结构示意图;如图6所示,安全扫描装置包括:
第一扫描模块61,被配置为在系统运行过程中,在系统中对前置扫描项进行前置安全扫描,得到第一扫描结果;
获取模块62,被配置为当安全软件启动安全扫描时,获取第一扫描模块61扫 描得到的第一扫描结果;
第一确定模块63,被配置为根据获取模块62获取到的第一扫描结果确定当前的安全状态。
图7是根据一示例性实施例示出的另一种安全扫描装置的结构示意图,如图7所示,在上述图6所示实施例的基础上,在一实施例中,第一扫描模块61包括:
第一扫描子模块611,被配置为检测到与第一预设前置扫描项相对应的操作时,触发与第一预设前置扫描项相对应的预设前置扫描程序,进行安全扫描。
在一适合隆重,第一扫描模块61包括:
第二扫描子模块612,被配置为检测到与第二预设前置扫描项相对应的操作时,调用安全软件与第二前置扫描项相对应的接口,触发安全软件与第二预设前置扫描项相对应的预设前置扫描程序进行安全扫描。
图8是根据一示例性实施例示出的又一种安全扫描装置的结构示意图,如图8所示,在上述图6或图7所示实施例的基础上,在一实施例中,第一确定模块63包括:
确定子模块631,被配置为确定第一扫描结果中对前置扫描项各自的评分;
计算子模块632,被配置为基于确定子模块确定的前置扫描项各自的评分,计算用于表示当前安全状态的安全评分。
在一实施例中,装置还包括:
第二扫描模块64,被配置为当安全软件启动安全扫描时,触发安全软件设置的即时扫描项进行安全扫描,得到第二扫描结果;
第二确定模块65,被配置为基于第一扫描模块61扫描得到的第一扫描结果和第二扫描模块扫64扫描得到的第二扫描结果确定当前的安全状态。
关于上述实施例中的装置,其中各个模块执行操作的具体方式已经在有关该方法的实施例中进行了详细描述,此处将不做详细阐述说明。
图9是根据一示例性实施例示出的一种适用于安全扫描装置的框图。例如,装置900可以是具有摄像头的移动电话,计算机,数字广播终端,消息收发设备,游戏控制台,平板设备,医疗设备,健身设备,个人数字助理等电子设备。
参照图9,装置900可以包括以下一个或多个组件:处理组件902,存储器904,电源组件906,多媒体组件908,音频组件910,输入/输出(I/O)的接口912,传感器组件914,以及通信组件916。
处理组件902通常控制装置900的整体操作,诸如与显示,电话呼叫,数据通信,相机操作和记录操作相关联的操作。处理元件902可以包括一个或多个处理器920 来执行指令,以完成上述的方法的全部或部分步骤。此外,处理组件902可以包括一个或多个模块,便于处理组件902和其他组件之间的交互。例如,处理部件902可以包括多媒体模块,以方便多媒体组件908和处理组件902之间的交互。
存储器904被配置为存储各种类型的数据以支持在设备900的操作。这些数据的示例包括用于在装置900上操作的任何应用程序或方法的指令,联系人数据,电话簿数据,消息,图片,视频等。存储器904可以由任何类型的易失性或非易失性存储设备或者它们的组合实现,如静态随机存取存储器(SRAM),电可擦除可编程只读存储器(EEPROM),可擦除可编程只读存储器(EPROM),可编程只读存储器(PROM),只读存储器(ROM),磁存储器,快闪存储器,磁盘或光盘。
电力组件906为装置900的各种组件提供电力。电力组件906可以包括电源管理系统,一个或多个电源,及其他与为装置900生成、管理和分配电力相关联的组件。
多媒体组件908包括在所述装置900和用户之间的提供一个输出接口的屏幕。在一些实施例中,屏幕可以包括液晶显示器(LCD)和触摸面板(TP)。如果屏幕包括触摸面板,屏幕可以被实现为触摸屏,以接收来自用户的输入信号。触摸面板包括一个或多个触摸传感器以感测触摸、滑动和触摸面板上的手势。所述触摸传感器可以不仅感测触摸或滑动动作的边界,而且还检测与所述触摸或滑动操作相关的持续时间和压力。在一些实施例中,多媒体组件908包括一个前置摄像头和/或后置摄像头。当设备900处于操作模式,如拍摄模式或视频模式时,前置摄像头和/或后置摄像头可以接收外部的多媒体数据。每个前置摄像头和后置摄像头可以是一个固定的光学透镜系统或具有焦距和光学变焦能力。
音频组件910被配置为输出和/或输入音频信号。例如,音频组件910包括一个麦克风(MIC),当装置900处于操作模式,如呼叫模式、记录模式和语音识别模式时,麦克风被配置为接收外部音频信号。所接收的音频信号可以被进一步存储在存储器904或经由通信组件916发送。在一些实施例中,音频组件910还包括一个扬声器,用于输出音频信号。
I/O接口912为处理组件902和外围接口模块之间提供接口,上述外围接口模块可以是键盘,点击轮,按钮等。这些按钮可包括但不限于:主页按钮、音量按钮、启动按钮和锁定按钮。
传感器组件914包括一个或多个传感器,用于为装置900提供各个方面的状态评估。例如,传感器组件914可以检测到设备900的打开/关闭状态,组件的相对定位,例如所述组件为装置900的显示器和小键盘,传感器组件914还可以检测装置900或 装置900一个组件的位置改变,用户与装置900接触的存在或不存在,装置900方位或加速/减速和装置900的温度变化。传感器组件914可以包括接近传感器,被配置用来在没有任何的物理接触时检测附近物体的存在。传感器组件914还可以包括光传感器,如CMOS或CCD图像传感器,用于在成像应用中使用。在一些实施例中,该传感器组件914还可以包括加速度传感器,陀螺仪传感器,磁传感器,压力传感器或温度传感器。
通信组件916被配置为便于装置900和其他设备之间有线或无线方式的通信。装置900可以接入基于通信标准的无线网络,如WiFi,2G或3G,或它们的组合。在一个示例性实施例中,通信部件916经由广播信道接收来自外部广播管理系统的广播信号或广播相关信息。在一个示例性实施例中,所述通信部件916还包括近场通信(NFC)模块,以促进短程通信。例如,在NFC模块可基于射频识别(RFID)技术,红外数据协会(IrDA)技术,超宽带(UWB)技术,蓝牙(BT)技术和其他技术来实现。
在示例性实施例中,装置900可以被一个或多个应用专用集成电路(ASIC)、数字信号处理器(DSP)、数字信号处理设备(DSPD)、可编程逻辑器件(PLD)、现场可编程门阵列(FPGA)、控制器、微控制器、微处理器或其他电子元件实现,用于执行上述安全扫描方法,方法包括:
在系统运行过程中,在系统中对前置扫描项进行前置安全扫描,得到第一扫描结果;
当安全软件启动安全扫描时,获取第一扫描结果;
根据第一扫描结果确定当前的安全状态。
在示例性实施例中,还提供了一种包括指令的非临时性计算机可读存储介质,例如包括指令的存储器904,上述指令可由装置900的处理器920执行以完成上述方法。例如,非临时性计算机可读存储介质可以是ROM、随机存取存储器(RAM)、CD-ROM、磁带、软盘和光数据存储设备等。处理器920被配置为:
在系统运行过程中,在系统中对前置扫描项进行前置安全扫描,得到第一扫描结果;
当安全软件启动安全扫描时,获取第一扫描结果;
根据第一扫描结果确定当前的安全状态。
本领域技术人员在考虑说明书及实践这里公开的公开后,将容易想到本公开的其它实施方案。本申请旨在涵盖本公开的任何变型、用途或者适应性变化,这些变型、 用途或者适应性变化遵循本公开的一般性原理并包括本公开未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示例性的,本公开的真正范围和精神由下面的权利要求指出。
应当理解的是,本公开并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围进行各种修改和改变。本公开的范围仅由所附的权利要求来限制。

Claims (11)

  1. 一种安全扫描方法,其特征在于,所述方法包括:
    在系统运行过程中,在所述系统中对前置扫描项进行前置安全扫描,得到第一扫描结果;
    当安全软件启动安全扫描时,获取所述第一扫描结果;
    根据所述第一扫描结果确定当前的安全状态。
  2. 根据权利要求1所述的方法,其特征在于,所述在所述系统中对前置扫描项进行安全扫描,包括:
    检测到与第一预设前置扫描项相对应的操作时,触发与所述第一预设前置扫描项相对应的预设前置扫描程序,进行安全扫描。
  3. 根据权利要求1所述的方法,其特征在于,所述在系统中对前置扫描项进行安全扫描,包括:
    检测到与第二预设前置扫描项相对应的操作时,调用安全软件与所述第二前置扫描项相对应的接口,触发安全软件与所述第二预设前置扫描项相对应的预设前置扫描程序进行安全扫描。
  4. 根据权利要求1所述的方法,其特征在于,所述根据所述第一扫描结果确定当前的安全状态,包括:
    确定所述第一扫描结果中对所述前置扫描项各自的评分;
    基于所述前置扫描项各自的评分,计算用于表示当前安全状态的安全评分。
  5. 根据权利要求1所述的方法,其特征在于,所述方法还包括:
    当安全软件启动安全扫描时,触发所述安全软件设置的即时扫描项进行安全扫描,得到第二扫描结果;
    基于所述第一扫描结果和所述第二扫描结果确定当前的安全状态。
  6. 一种安全扫描装置,其特征在于,所述装置包括:
    第一扫描模块,被配置为在系统运行过程中,在所述系统中对前置扫描项进行前置安全扫描,得到第一扫描结果;
    获取模块,被配置为当安全软件启动安全扫描时,获取所述第一扫描模块扫描得到的所述第一扫描结果;
    第一确定模块,被配置为根据所述获取模块获取到的所述第一扫描结果确定当前的安全状态。
  7. 根据权利要求6所述的装置,其特征在于,所述第一扫描模块包括:
    第一扫描子模块,被配置为检测到与第一预设前置扫描项相对应的操作时,触发与所述第一预设前置扫描项相对应的预设前置扫描程序,进行安全扫描。
  8. 根据权利要求6所述的装置,其特征在于,所述第一扫描模块包括:
    第二扫描子模块,被配置为检测到与第二预设前置扫描项相对应的操作时,调用安全软件与所述第二前置扫描项相对应的接口,触发安全软件与所述第二预设前置扫描项相对应的预设前置扫描程序进行安全扫描。
  9. 根据权利要求6所述的装置,其特征在于,所述第一确定模块包括:
    确定子模块,被配置为确定所述第一扫描结果中对所述前置扫描项各自的评分;
    计算子模块,被配置为基于所述确定子模块确定的所述前置扫描项各自的评分,计算用于表示当前安全状态的安全评分。
  10. 根据权利要求6所述的装置,其特征在于,所述装置还包括:
    第二扫描模块,被配置为当安全软件启动安全扫描时,触发所述安全软件设置的即时扫描项进行安全扫描,得到第二扫描结果;
    第二确定模块,被配置为基于所述第一扫描模块扫描得到的所述第一扫描结果和所述第二扫描模块扫描得到的所述第二扫描结果确定当前的安全状态。
  11. 一种电子设备,其特征在于,所述设备包括:
    处理器;
    用于存储处理器可执行指令的存储器;
    其中,所述处理器被配置为:
    在系统运行过程中,在所述系统中对前置扫描项进行前置安全扫描,得到第一扫描结果;
    当安全软件启动安全扫描时,获取所述第一扫描结果;
    根据所述第一扫描结果确定当前的安全状态。
PCT/CN2016/101061 2016-09-30 2016-09-30 安全扫描方法、装置及电子设备 WO2018058517A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201680001096.0A CN106663173A (zh) 2016-09-30 2016-09-30 安全扫描方法、装置及电子设备
PCT/CN2016/101061 WO2018058517A1 (zh) 2016-09-30 2016-09-30 安全扫描方法、装置及电子设备

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2016/101061 WO2018058517A1 (zh) 2016-09-30 2016-09-30 安全扫描方法、装置及电子设备

Publications (1)

Publication Number Publication Date
WO2018058517A1 true WO2018058517A1 (zh) 2018-04-05

Family

ID=58839112

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/101061 WO2018058517A1 (zh) 2016-09-30 2016-09-30 安全扫描方法、装置及电子设备

Country Status (2)

Country Link
CN (1) CN106663173A (zh)
WO (1) WO2018058517A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022231926A1 (en) * 2021-04-29 2022-11-03 Google Llc Determining the exposure level of vulnerabilities

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102609515A (zh) * 2012-02-07 2012-07-25 奇智软件(北京)有限公司 一种文件快速扫描方法和系统
US8375451B1 (en) * 2006-06-28 2013-02-12 Emc Corporation Security for scanning objects
CN103150503A (zh) * 2011-12-07 2013-06-12 腾讯科技(深圳)有限公司 一种木马扫描方法及木马扫描装置
CN103336925A (zh) * 2013-07-29 2013-10-02 腾讯科技(深圳)有限公司 一种扫描加速的方法和装置
CN105718800A (zh) * 2016-01-18 2016-06-29 北京金山安全管理系统技术有限公司 一种快速病毒扫描查杀方法和装置

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102222183B (zh) * 2011-04-28 2013-11-13 奇智软件(北京)有限公司 移动终端软件包安全检测方法及系统
US9830452B2 (en) * 2012-11-30 2017-11-28 Beijing Qihoo Technology Company Limited Scanning device, cloud management device, method and system for checking and killing malicious programs
CN103970766A (zh) * 2013-01-29 2014-08-06 腾讯科技(深圳)有限公司 一种数据文件处理的方法、装置及终端
CN103793649A (zh) * 2013-11-22 2014-05-14 北京奇虎科技有限公司 通过云安全扫描文件的方法和装置
CN103617392B (zh) * 2013-11-22 2017-02-01 北京奇虎科技有限公司 对智能终端的外接存储设备的安全扫描方法及其装置

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8375451B1 (en) * 2006-06-28 2013-02-12 Emc Corporation Security for scanning objects
CN103150503A (zh) * 2011-12-07 2013-06-12 腾讯科技(深圳)有限公司 一种木马扫描方法及木马扫描装置
CN102609515A (zh) * 2012-02-07 2012-07-25 奇智软件(北京)有限公司 一种文件快速扫描方法和系统
CN103336925A (zh) * 2013-07-29 2013-10-02 腾讯科技(深圳)有限公司 一种扫描加速的方法和装置
CN105718800A (zh) * 2016-01-18 2016-06-29 北京金山安全管理系统技术有限公司 一种快速病毒扫描查杀方法和装置

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022231926A1 (en) * 2021-04-29 2022-11-03 Google Llc Determining the exposure level of vulnerabilities
US11824886B2 (en) 2021-04-29 2023-11-21 Google Llc Determining the exposure level of vulnerabilities

Also Published As

Publication number Publication date
CN106663173A (zh) 2017-05-10

Similar Documents

Publication Publication Date Title
US10706173B2 (en) Method and device for displaying notification information
EP3113466B1 (en) Method and device for warning
EP3076716A1 (en) Method and apparatus for network access
EP3300407B1 (en) Method and device for processing verification code
US20170289181A1 (en) Payment method, apparatus and medium
US20170064182A1 (en) Method and device for acquiring image file
WO2017113660A1 (zh) 应用程序管理方法及装置
US10425403B2 (en) Method and device for accessing smart camera
US10610152B2 (en) Sleep state detection method, apparatus and system
WO2016173245A1 (zh) 权限管理方法和装置
WO2017035994A1 (zh) 外接设备的连接方法及装置
JP6149163B2 (ja) Wi−fiネットワーク接続方法、装置、プログラム、及び記録媒体
US10114735B2 (en) Method, device and medium for managing application program
EP3163834A1 (en) Method and device for equipment control
WO2016110146A1 (zh) 移动终端及虚拟按键的处理方法
EP3160112A1 (en) Reminding method and device
WO2017118046A1 (zh) 信息发送方法及装置
EP3145152A1 (en) Short message service reading method and device
CN106201738B (zh) 系统广播调用方法及装置
US10671827B2 (en) Method and device for fingerprint verification
WO2018058517A1 (zh) 安全扫描方法、装置及电子设备
CN107894909B (zh) 限制Activity启动的方法、装置及存储介质
WO2018058598A1 (zh) 异常信息提示方法及装置
CN108011882B (zh) 一种进行数据同步的方法、装置和系统
CN109756615B (zh) 一种信息提示方法、装置、终端及存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16917268

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16917268

Country of ref document: EP

Kind code of ref document: A1