Information processing method, terminal and server

An information processing method and server technology, applied in the fields of information processing methods, terminals and servers, can solve the problems of user property loss, inaccurate scanning results, easy to be attacked by remote control tools, Trojan horse tools, virus tools, etc. The effect of scanning efficiency, saving labor and time cost

Active Publication Date: 2017-05-24
TENCENT TECH (SHENZHEN) CO LTD
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The APP needs to be updated. On the one hand, it is to improve the existing functions or add new functions. On the other hand, it is to patch the software vulnerabilities in the APP. If the software vulnerabilities cannot be repaired, it is easy to be controlled by the remote control tool. , Trojan horse tools, virus tools, etc., taking mobile phones as an example, with the widespread use of online payment for various services in the O2O mode through smart phones, if there are software vulnerabilities that may not be fixed, it is easy to be remotely controlled by tools, Trojan horse tools, virus tools, etc. attack, resulting in the loss of the user's property. That is to say, if the software vulnerabilities in the A

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information processing method, terminal and server
  • Information processing method, terminal and server
  • Information processing method, terminal and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0070] An information processing method according to an embodiment of the present invention, the method is applied to a terminal, and the terminal is installed with multiple applications, such as figure 1 As shown, the method includes:

[0071] Step 101, run the multiple applications according to a first preset rule;

[0072] Step 102, when it is detected that the multiple applications are running, load the monitoring plug-in generated based on the first security framework;

[0073] Step 103, controlling the monitoring plug-in to scan the behavior information of the multiple applications in the running state to obtain a dynamic scanning result;

[0074] Step 104: Analyzing the application software security vulnerability information from the dynamic scanning result according to the second preset rule, and reporting the application software security vulnerability information to the server.

[0075] Using the embodiment of the present invention, through the automatic dynamic sc...

Embodiment 2

[0079] An information processing method according to an embodiment of the present invention, the method is applied to a terminal, and the terminal is installed with multiple applications, such as figure 2 As shown, the method includes:

[0080] Step 201, enabling the automated test mode, running predefined test cases on the multiple applications, and obtaining test results;

[0081] Step 202, using the test result as behavior information in the running state;

[0082] Step 203, when it is detected that the multiple applications are running, load the monitoring plug-in generated based on the first security framework;

[0083] Step 204, controlling the monitoring plug-in to scan the behavior information of the multiple applications in the running state to obtain a dynamic scanning result;

[0084] Step 205: Analyzing the application software security vulnerability information from the dynamic scanning result according to the second preset rule, and reporting the application s...

Embodiment 3

[0100] An information processing method according to an embodiment of the present invention, the method is applied to a terminal, and the terminal is installed with multiple applications, such as image 3 As shown, the method includes:

[0101] Step 301, enabling the automated test mode, running predefined test cases on the multiple applications, and obtaining test results;

[0102] Step 302, using the test result as behavior information in the running state;

[0103] Step 303, when it is detected that the multiple applications are running, load the monitoring plug-in generated based on the first security framework;

[0104] Step 304, controlling the monitoring plug-in to scan the behavior information of the multiple applications in the running state to obtain a dynamic scanning result;

[0105] Step 305, extracting the second preset rule, the second preset rule is a vulnerability rule used in the matching process to determine whether it conforms to the predefined configurat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an information processing method, a terminal and a server. The method comprises: a plurality of applications are operated according to a first preset rule; when the plurality of applications are detected to be in an operation state, a monitoring plug-in unit generated based on a first security framework is loaded; the monitoring plug-in unit is controlled to scan behavior information of the plurality of applications in the operation state to obtain dynamic scanning results; and according to a second preset rule, the dynamic scanning results are analyzed to obtain software security vulnerability information of the applications, and then the software security vulnerability information of the applications is reported to a server.

Description

technical field [0001] The present invention relates to communication technology, in particular to an information processing method, a terminal and a server. Background technique [0002] In the process of implementing the technical solutions of the embodiments of the present application, the inventors of the present application at least found the following technical problems in the related art: [0003] With the popularity of smart terminals, installing a large number of applications (APPs) on the smart terminals in order to provide users with corresponding services through the functions provided by these APPs has become a normal state in work and life. The APP needs to be updated. On the one hand, it is to improve the existing functions or add new functions. On the other hand, it is to patch the software vulnerabilities in the APP. If the software vulnerabilities cannot be repaired, it is easy to be controlled by the remote control tool. , Trojan horse tools, virus tools,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06F21/57
Inventor 彭成锋吴昊
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products