Application security detecting method and system

A security detection and application technology, applied in the Internet field, can solve problems such as inability to detect and kill malware

Inactive Publication Date: 2016-06-01
BEIJING QIHOO TECH CO LTD +1
View PDF5 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the characteristics of malicious software can be ever-changing, the above-mentioned method for checking and killing features in the prior art cannot timely and effectively detect and kill the changed malicious software.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application security detecting method and system
  • Application security detecting method and system
  • Application security detecting method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] Various exemplary embodiments of the present invention will now be described in detail with reference to the accompanying drawings. It should be noted that the relative arrangements of components and steps, numerical expressions and numerical values ​​set forth in these embodiments do not limit the scope of the present invention unless specifically stated otherwise.

[0059] At the same time, it should be understood that, for the convenience of description, the sizes of the various parts shown in the drawings are not drawn according to the actual proportional relationship.

[0060] The following description of at least one exemplary embodiment is merely illustrative in nature and in no way taken as limiting the invention, its application or uses.

[0061] Techniques, methods and devices known to those of ordinary skill in the relevant art may not be discussed in detail, but where appropriate, such techniques, methods and devices should be considered part of the descript...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an application security detecting method and system. The method includes the steps of establishing a target process when detecting a to-be-executed application, monitoring the state of the target process in real time before a user logs into the target process, monitoring the state abnormity of the target process, obtaining characteristic information of the to-be-executed application, uploading the characteristic information to a server, matching the characteristic information of the to-be-executed application with characteristic matching conditions in a cloud database through the server to obtain a matching result, inquiring about whether hijacked application file information exits in the to-be-executed application or not according to the matching result, if yes, checking and killing viruses in a hijacked application file through the server to obtain a checking and killing result, and executing corresponding operation on the to-be-executed application according to the checking and killing result returned by the server. By means of the method and system, login information can be prevented from embezzlement.

Description

technical field [0001] The invention relates to Internet technology, in particular to an application security detection and processing method and system. Background technique [0002] Currently. Many Internet businesses need to log in by entering login information, and then connect to the Internet to perform related operations. However, if the user's login information is known by illegal personnel such as hackers, it is possible to publish or carry out some illegal activities in the name of the user. Therefore, how to prevent login information from being stolen has attracted more and more attention. [0003] Illegal personnel can steal the user's login information by implanting malicious software in the user terminal device, such as a Trojan horse that steals the login information. Among them, malicious software usually adopts a deceptive method to obtain user login information, and the means of stealing may be to replace the real information input window by forging a fals...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56G06F21/55G06F21/54
CPCG06F21/54G06F21/554G06F21/566G06F2221/031
Inventor 郑文彬
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products