Plug-in security detection method and device and electronic device

A detection method and security technology, applied in computer security devices, electrical digital data processing, platform integrity maintenance, etc., can solve problems such as plug-in security problems are difficult to solve, plug-in security has no basis for detection, etc.

Inactive Publication Date: 2019-11-12
北京阿尔山区块链联盟科技有限公司
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of this application is to provide a plug-in security detection method, device and electronic equipment to solve the technic

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Plug-in security detection method and device and electronic device
  • Plug-in security detection method and device and electronic device
  • Plug-in security detection method and device and electronic device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The technical solutions of the present invention will be clearly and completely described below in conjunction with embodiments. Obviously, the described embodiments are part of the embodiments of the present invention, not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.

[0034] The features and exemplary embodiments of various aspects of the present invention will be described in detail below. In the following detailed description, many specific details are proposed in order to provide a comprehensive understanding of the present invention. However, it is obvious to those skilled in the art that the present invention can be implemented without some of these specific details. The following description of the embodiments is only to provide a better understanding of the present invention by sh...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a plug-in security detection method and device, and an electronic device, relates to the technical field of software plug-ins, and can solve the technical problem that the security problem of a plug-in is difficult to solve due to the fact that there is no detectable basis for the security of the plug-in. According to the specific scheme, the method comprises the steps of obtaining a hash value recorded in a block chain, wherein the hash value is generated by behavior information executed by a to-be-detected plug-in through a hash algorithm; verifying the behavior information corresponding to the hash value by utilizing the hash value, and judging whether the behavior information corresponding to the hash value is changed or not; and if not, detecting the security ofthe to-be-detected plug-in according to the behavior information corresponding to the hash value.

Description

Technical field [0001] This application relates to the technical field of software plug-ins, and in particular to a method, device and electronic equipment for detecting plug-in security. Background technique [0002] Plug-in is a program written in accordance with a certain standard application program interface, which needs to call the function library or data provided by the original pure system, so the plug-in can only run under the system platform specified by the program, and cannot be separated It runs separately on the specified platform. [0003] The role of the plug-in is to develop programs that realize some functions, which are not available in the original pure system platform and application software platform. For example, in a browser, after a related plug-in is installed, a World Wide Web (WEB) browser can directly call the plug-in program for processing specific types of files. Therefore, plug-ins are widely used, and plug-ins are installed on many browsers and a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56
CPCG06F21/566
Inventor 徐磊袁力邸烁胡坤歌
Owner 北京阿尔山区块链联盟科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products