Method and device for registering detecting

A process and process information technology, applied in the security field, can solve problems such as account binding virtual property being stolen, security risks, etc.

Inactive Publication Date: 2015-05-06
BEIJING QIHOO TECH CO LTD +1
View PDF6 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The applications running under the Windows operating system have brought many security risks. Fo

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for registering detecting
  • Method and device for registering detecting

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0081] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0082] refer to figure 1 , which shows a flow chart of steps of a method embodiment for login detection according to an embodiment of the present invention, which may specifically include the following steps:

[0083] Step 101, detecting the start of a specified application program;

[0084] Application of the embodiment of the present invention can automatically identify the application program of the specified type in the curren...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a method and device for registering detecting. The method comprises the steps that starting of an appointed application program is detected; registering window judging information corresponding to the application program is obtained; the fact that a currently-loaded window in the application program accords with the judging information of the registering window is detected; the safety attribute of a loaded component in the course where the currently-loaded window is placed is scanned; and according to scanned safety result information, whether registering information recording is carried out in the currently-loaded window is determined. After the application program operates and before registering operation is carried out, the loaded component of the application program is scanned, the fact that a trojan horse cannot be started with the application program is guaranteed, the safety of operation such as paying, registering and network communication is guaranteed, the problem that the trojan horse is started with the application program is effectively solved, malicious acts such as stealing of an account number, a password and key data are avoided, and the safety of the application program in operation such paying, registering and network communication is greatly improved.

Description

technical field [0001] The invention relates to the field of security technology, in particular to a method and a device for login detection. Background technique [0002] At present, with the rapid development of the Internet, network applications tend to be diversified, such as instant messaging tools, e-mail, online banking and other application programs, which are widely used in various aspects of users' life and work. [0003] If the user wants to obtain more personalized services in the application of various application programs, he usually needs to register an account corresponding to the server. In order to ensure the security of the account, the user needs to edit a password corresponding to the account. [0004] Applications usually bind special attributes such as virtual properties and virtual identities through accounts, making their security attributes particularly important. [0005] However, the Windows operating system solves complex problems with the help ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/50
Inventor 葛山谢京辉张晓明董晶阳
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products