Active defense method and device

A technology of active defense and shortcut, applied in computer security devices, instruments, computing and other directions, can solve the problems of low level of monitoring and difficult to fine-tune behavior, etc., and achieve the effect of active defense mechanism being safe and effective

Active Publication Date: 2017-07-07
BEIJING QIHOO TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In addition, the degree of granularity of monitoring is not high
After secondary packaging, the monitoring object is often limited to the application itself, and it is difficult to specify fine behaviors, such as SMS operations, contact access or deletion operations, URL access operations, derivative operations, installation operations, child operations, etc. Detailed monitoring of specific behaviors such as process intrusion

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Active defense method and device
  • Active defense method and device
  • Active defense method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0082] method one:

[0083] For the application programs that have been installed, the present invention can automatically or be controlled by user instructions to scan these installed application programs, obtain the installation information of these application programs, and display these application programs as a list of candidate target applications in the user interface (see Figure 9 ), providing a corresponding selection switch for each candidate target application in the list in the corresponding indication area of ​​the graphical user interface, and setting the state of these switches by the user, so as to obtain the determination of the specific target application by the user. Specifically, the user can switch the selection switch in the indication area corresponding to a certain target application from the unselected state to the selected state, such as Figure 9 The "monitored" and "click to monitor" two-state switch example in , in this case, it can be considered...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an active defense method and device. The method includes the following steps of responding to an instruction used for running a target application and running a corresponding shell application; sequentially loading a monitoring unit and the target application by means of the shell application, monitoring and capturing event behaviors of the target application through the monitoring unit; obtaining an event behavior processing strategy after specific event behaviors are captured, and processing the specific event behaviors according to the processing strategy. According to the active defense scheme, an existing system is modified a little, compatibility of the system is not influenced, and the method is easy and efficient to implement.

Description

technical field [0001] The present invention relates to the field of computer security, specifically, the present invention relates to an active defense method, and correspondingly also relates to an active defense device. Background technique [0002] Unix-based operating systems, typically represented by Android, are widely used in various mobile communication terminals. Android has a relatively strict user rights management mechanism. By default, users have low rights. To break through the authority restriction, the authority of the system needs to be raised to the highest level, that is, ROOT authorization. After obtaining the highest authority, the user can intercept the malicious behavior of the third-party application and modify the setting items that consume system resources. Therefore, in most cases, the security software on the market needs to be installed on the Android mobile terminal that has obtained ROOT authorization. work to achieve its optimum effect. Ho...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56
CPCG06F21/566
Inventor 李常坤刘星石浩然杨威孙年忠王玺张海
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products