Unlock instant, AI-driven research and patent intelligence for your innovation.

Rogue software interception method, device and terminal

A rogue software and software technology, applied in the computer field, can solve problems such as hidden dangers, terminal safety, and affecting user terminal security, so as to achieve the effect of ensuring security

Active Publication Date: 2014-10-29
ZHUHAI BAOQU TECH CO LTD
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the development of information technology, terminals such as notebooks, computers, mobile phones, and netbooks can be installed with various application software, and when users install a large number of application software, it may also cause the terminal to fall into security risks
Because these installed applications may be bound with rogue software. The so-called rogue software refers to software between viruses and legitimate software. This rogue software is usually for a certain purpose, such as promoting personal products. Advertising, monitoring users' surfing habits, stealing user account passwords, or automatically connecting to the Internet, etc., this kind of rogue software is generally installed without the user's knowledge, seriously affecting the security of the user terminal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Rogue software interception method, device and terminal
  • Rogue software interception method, device and terminal
  • Rogue software interception method, device and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0067] The embodiment of the present invention provides a method for intercepting rogue software, which can intercept the installation of rogue software in time and ensure the security of the terminal. The corresponding embodiments are described below.

[0068] See figure 1 , figure 1 It is a schematic flowchart of a method for intercepting rogue software disclosed in an embodiment of the present invention. Such as figure 1 As shown, the method specifically incl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a rogue software interception method, device and terminal. The rogue software interception method comprises the steps that whether a child-procedure used for installing binding software is generated in the parent-procedure for installing application software is detected, if the child-procedure used for installing the binding software is generated, the software information of the binding software corresponding to the child-procedure is obtained, whether the binding software is rogue software is recognized according to the software information of the binding software, and if yes, installation of the binding software is intercepted. The rogue software interception method, device and terminal can detect the rogue software maliciously bound or unrelated to the application software in the installation process of the application software, thereby guaranteeing safety of the terminal.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a method, device and terminal for intercepting rogue software. Background technique [0002] With the development of information technology, terminals such as notebooks, computers, mobile phones, and netbooks can be installed with various application software, and when users install a large number of application software, the terminal may also fall into security risks. Because these installed application software may be bound with rogue software. The so-called rogue software refers to software between viruses and legitimate software. This rogue software is usually for a certain purpose, such as promoting personal products Advertising, monitoring users' surfing habits, stealing user account passwords, or automatically connecting to the Internet, etc., this kind of rogue software is generally installed without the user's knowledge, which seriously affects the security of the user...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/566
Inventor 崔健朱和勋刘肖刘桂峰姚辉
Owner ZHUHAI BAOQU TECH CO LTD