Behavior processing method and device based on application program

A technology of application programs and processing methods, applied in the field of application programs, can solve problems such as security loopholes and false positives of viruses

Inactive Publication Date: 2015-04-01
BEIJING QIHOO TECH CO LTD +1
View PDF6 Cites 43 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] If the text editing program is added to the whitelist, the above-mentioned abnormal behavior is also allowed, which will lead to security holes
If it is not added to the white list, the daily reading and writing of documents, printer printing and other behaviors are likely to be falsely reported as viruses

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Behavior processing method and device based on application program
  • Behavior processing method and device based on application program
  • Behavior processing method and device based on application program

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0102] Hereinafter, exemplary embodiments of the present disclosure will be described in more detail with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure can be implemented in various forms and should not be limited by the embodiments set forth herein. On the contrary, these embodiments are provided to enable a more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0103] Reference figure 1 , Shows a step flowchart of an embodiment of an application-based behavior processing method according to an embodiment of the present invention, which may specifically include the following steps:

[0104] Step 101: When a startup operation of an application program is detected, obtain behavior permission information corresponding to the application program;

[0105] In the embodiment ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a behavior processing method and device based on an application program. The method comprises the following steps that after the starting operation of the application program is detected, the behavior permission information corresponding to the application program is obtained; the behavior information of the application program is monitored; the behavior information is processed according to the behavior permission information. According to the embodiment of the invention, the behavior permission information is configured for the behavior, the single behavior is used as the permission unit, the application program is monitored, the monitoring vulnerability caused by configuring the unified permission for the application program by a blacklist and a whitelist is avoided, the fine granularity permission control is realized, the protection intensity is enhanced, the potential threat is reduced, and the false alarm rate can also be reduced.

Description

Technical field [0001] The present invention relates to the technical field of application programs, in particular to an application-based behavior processing method and an application-based behavior processing device. Background technique [0002] With the continuous development of Internet technology, people have developed various feature-rich applications, such as instant messaging tools, audio players, video players, calendar tools, etc., which bring many conveniences to people's lives. [0003] For various reasons, there are always certain vulnerabilities in applications. By using these vulnerabilities, viruses, Trojan horses or malicious code can manipulate these applications for illegal abuse, or the application itself performs certain illegal purposes for certain illegal purposes. Dangerous behavior. [0004] Furthermore, the behavior of these applications may jeopardize the integrity, confidentiality, availability, and controllability of the data, and ultimately manifests i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/52G06F21/55
CPCG06F21/52G06F21/552G06F21/55G06F21/566G06F21/44H04L63/1425H04L63/101H04L63/1416
Inventor 张皓秋
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products