Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

ROOT-free active defense configuration method and device

A configuration method and active defense technology, applied in computer security devices, instruments, computing, etc., can solve the problems of low monitoring precision and difficult fine-grained behavior

Active Publication Date: 2014-12-24
BEIJING QIHOO TECH CO LTD
View PDF7 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In addition, the degree of granularity of monitoring is not high
After secondary packaging, the monitoring object is often limited to the application itself, and it is difficult to specify fine behaviors, such as SMS operations, contact access or deletion operations, URL access operations, derivative operations, installation operations, child operations, etc. Detailed monitoring of specific behaviors such as process intrusion

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • ROOT-free active defense configuration method and device
  • ROOT-free active defense configuration method and device
  • ROOT-free active defense configuration method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0082] method one:

[0083] For the application programs that have been installed, the present invention can automatically or be controlled by user instructions to scan these installed application programs, obtain the installation information of these application programs, and display these application programs as a list of candidate target applications in the user interface (see Figure 9 ), providing a corresponding selection switch for each candidate target application in the list in the corresponding indication area of ​​the graphical user interface, and setting the state of these switches by the user, so as to obtain the determination of the specific target application by the user. Specifically, the user can switch the selection switch in the indication area corresponding to a certain target application from the unselected state to the selected state, such as Figure 9 The "monitored" and "click to monitor" two-state switch example in , in this case, it can be considered...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a ROOT-free active defense configuration method and a corresponding device. The method comprises the following steps that a target application is determined, and an installation package of the target application is stored to a specified catalogue; an outer shell application installation package is configured through the installation package of the target application, a stub module for calling a monitoring unit is injected into the outer shell application installation package, configuration parameters in the pier module are modified to load the target application, and the monitoring unit is used for carrying out hooking monitoring on event behaviors from the target application; the outer shell application is installed. According to the active defense scheme, an existing system is modified a little, system compatibility cannot be influenced, and method and the device are easy to implement and efficient.

Description

technical field [0001] The present invention relates to the field of computer security. Specifically, the present invention relates to a ROOT-free active defense configuration method, and correspondingly relates to a ROOT-free active defense configuration device. Background technique [0002] Unix-based operating systems, typically represented by Android, are widely used in various mobile communication terminals. Android has a relatively strict user rights management mechanism. By default, users have low rights. To break through the authority restriction, the authority of the system needs to be raised to the highest level, that is, ROOT authorization. After obtaining the highest authority, the user can intercept the malicious behavior of the third-party application and modify the setting items that consume system resources. Therefore, in most cases, the security software on the market needs to be installed on the Android mobile terminal that has obtained ROOT authorization....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55
CPCG06F21/552
Inventor 李常坤刘星石浩然杨威孙年忠王玺张海
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products