CN105740715A - A security assessment method and terminal equipment - Google Patents
A security assessment method and terminal equipment Download PDFInfo
- Publication number
- CN105740715A CN105740715A CN201610070987.3A CN201610070987A CN105740715A CN 105740715 A CN105740715 A CN 105740715A CN 201610070987 A CN201610070987 A CN 201610070987A CN 105740715 A CN105740715 A CN 105740715A
- Authority
- CN
- China
- Prior art keywords
- operation behavior
- application
- risk
- value
- target application
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
技术领域technical field
本发明涉及计算机技术领域,特别涉及一种安全评估方法及终端设备。The invention relates to the field of computer technology, in particular to a safety assessment method and terminal equipment.
背景技术Background technique
在终端设备中,用户会安装各种应用软件(通常简称为应用),例如:即时通讯工具、办公软件、游戏客户端、浏览器,等等。这些应用可能存在一定的风险,需要进行安全评估。In the terminal device, the user installs various application software (usually referred to as application for short), such as instant messaging tool, office software, game client, browser, and so on. These applications may have certain risks and require a security assessment.
以最为广泛使用的终端设备—手机,为例;手机已经成为人们生活必不可少的一种工具,生活、工作都随时需要用到手机,手机的使用也涉及到人们各种各样的信息和隐私,比如:可以通过手机确定用户的地理位置、手机中保存了我们的社交网络,社交工具、银行卡号以及交易信息等等各类信息。因此手机的使用安全已经成为我们必不可少的一项重要指标了。Take the most widely used terminal device——mobile phone, as an example; mobile phone has become an indispensable tool in people's life. Mobile phones are needed at any time in life and work. The use of mobile phones also involves people's various information and Privacy, for example: the user's geographic location can be determined through the mobile phone, and various information such as our social network, social tools, bank card number, transaction information, etc. are saved in the mobile phone. Therefore, the safety of mobile phone use has become an essential indicator for us.
通常情况下,手机出现安全事故,是因为下载的一些应用软件中包含了恶意代码,例如:木马程序、病毒等。Usually, security incidents occur on mobile phones because some downloaded application software contains malicious codes, such as Trojan horse programs and viruses.
为了评估应用的安全性,会使用安全软件,例如各种杀毒软件对应用程序进行扫描,确定应用所需要的权限,在安装过程中提示应用所需的权限进行风险告知。但是这种方式,需要用户有相应的专业知识来分辨应用是否安全,并且通常应用所需的权限会很多,用户难以分辨。因此需要一种能够自动完成风险提示的技术方案,目前的自动风险提示方案可以是:通过杀毒软件对应用程序进行病毒扫描,确定应用软件是否包含病毒,如果是,则进行风险提示。In order to evaluate the security of the application, security software, such as various antivirus software, will be used to scan the application, determine the permissions required by the application, and prompt the permission required by the application during the installation process for risk notification. However, this method requires the user to have corresponding professional knowledge to distinguish whether the application is safe, and usually the application requires many permissions, which is difficult for the user to distinguish. Therefore, there is a need for a technical solution that can automatically complete risk notification. The current automatic risk notification solution can be: scan the application program for viruses through anti-virus software to determine whether the application software contains viruses, and if so, perform a risk reminder.
采用杀毒软件进行病毒扫描的技术方案,虽然可以减少因病毒导致的信息和隐私泄露,但是对手机应用的扫描仍然存在较多的误判。The technical solution of using antivirus software for virus scanning can reduce information and privacy leakage caused by viruses, but there are still many misjudgments in the scanning of mobile phone applications.
发明内容Contents of the invention
本发明实施例提供了一种安全评估方法及终端设备,用于自动识别应用的安全性,减少误判。Embodiments of the present invention provide a security assessment method and terminal equipment, which are used to automatically identify the security of applications and reduce misjudgments.
本发明实施例一方面提供了一种安全评估方法,包括:On the one hand, an embodiment of the present invention provides a security assessment method, including:
确定目标应用,所述目标应用为需要进行安全评估的应用;Determining a target application, where the target application is an application that requires a security assessment;
统计所述目标应用的操作行为,并确定各操作行为对应的风险系数;操作行为风险性越大风险系数越大;Count the operation behavior of the target application, and determine the risk coefficient corresponding to each operation behavior; the riskier the operation behavior, the greater the risk coefficient;
计算所述各操作行为对应的风险系数的综合值,并确定所述综合值越高安全性越低。Calculating an integrated value of the risk coefficients corresponding to each operation behavior, and determining that the higher the integrated value, the lower the safety.
在一种可选的实现方式中,所述确定目标应用包括:In an optional implementation manner, the determining the target application includes:
在应用被初次安装或者更新后,将所述应用确定为目标应用;或者,determining the application as a target application after the application is initially installed or updated; or,
在获取到配置的时间后,在所述配置的时间确定目标应用;或者,After obtaining the configured time, determine the target application at the configured time; or,
在终端设备空闲时,确定目标应用;或者,determine the target application while the terminal device is idle; or,
在接收到安全评估指令后,确定目标应用。After receiving the security assessment instruction, determine the target application.
在一种可选的实现方式中,所述确定各操作行为对应的风险系数包括:In an optional implementation manner, the determining the risk coefficient corresponding to each operation behavior includes:
依据预置的操作行为与风险系数的对应关系,确定各操作行为对应的风险系数。The risk coefficient corresponding to each operation behavior is determined according to the preset corresponding relationship between the operation behavior and the risk coefficient.
在一种可选的实现方式中,所述计算所述各操作行为对应的风险系数的综合值之前,所述方法还包括:In an optional implementation manner, before calculating the comprehensive value of the risk coefficient corresponding to each operation behavior, the method further includes:
确定各风险系数的权重值,与当前时间越近权重值越高;Determine the weight value of each risk factor, the closer to the current time, the higher the weight value;
所述计算所述各操作行为对应的风险系数的综合值,并确定所述综合值越高安全性越低包括:The calculating the comprehensive value of the risk coefficient corresponding to each operation behavior, and determining that the higher the comprehensive value is, the lower the safety includes:
计算所述各操作行为对应的风险系数与权重值的乘积后的平均值,并确定所述平均值越高安全性越低。Calculate the average value of the product of the risk coefficient corresponding to each operation behavior and the weight value, and determine that the higher the average value, the lower the safety.
在一种可选的实现方式中,在所述统计所述目标应用的操作行为之后,所述方法还包括:In an optional implementation manner, after the statistics of the operation behavior of the target application, the method further includes:
确定目标操作行为,所述目标操作行为包含最近的N次操作行为;Determine the target operation behavior, the target operation behavior includes the latest N times of operation behavior;
所述确定各操作行为对应的风险系数,包括:The determination of the risk coefficient corresponding to each operation behavior includes:
确定所述目标操作行为对应的风险系数。A risk coefficient corresponding to the target operation behavior is determined.
在一种可选的实现方式中,所述计算所述各操作行为对应的风险系数的综合值,包括:In an optional implementation manner, the calculating the comprehensive value of the risk coefficient corresponding to each operation behavior includes:
计算所述各操作行为对应的风险系数的中位数,将所述中位数作为所述综合值;或者,计算所述各操作行为对应的风险系数的平均值,将所述平均值作为所述综合值;或者,计算所述各操作行为对应的风险系数与前M次风险等级的平均参考值,计算各操作行为对应的平均参考值的和作为所述综合值;或者,计算所述各操作行为对应的风险系数与前M次风险等级的平均参考值,计算各操作行为对应的平均参考值的和作为所述综合值。Calculate the median of the risk coefficients corresponding to each operation behavior, and use the median as the comprehensive value; or calculate the average value of the risk coefficients corresponding to each operation behavior, and use the average value as the comprehensive value. the above comprehensive value; or, calculate the risk coefficient corresponding to each operation behavior and the average reference value of the previous M risk levels, and calculate the sum of the average reference values corresponding to each operation behavior as the comprehensive value; or, calculate each operation behavior The risk coefficient corresponding to the operation behavior and the average reference value of the previous M risk levels, and the sum of the average reference values corresponding to each operation behavior is calculated as the comprehensive value.
在一种可选的实现方式中,所述确定目标应用包括:In an optional implementation manner, the determining the target application includes:
若终端设备中存在应用的来源属于未被确认为安全来源,则确定所述应用为目标应用;If the source of the application in the terminal device is not confirmed as a safe source, then determine that the application is the target application;
或者,若终端设备中存在应用的操作行为中存在未被授权的操作行为,则确定所述应用为目标应用。Alternatively, if there is an unauthorized operation behavior among the operation behaviors of the application in the terminal device, it is determined that the application is the target application.
本发明实施例二方面提供了一种终端设备,包括:The second aspect of the embodiment of the present invention provides a terminal device, including:
应用确定单元,用于确定目标应用,所述目标应用为需要进行安全评估的应用;an application determination unit, configured to determine a target application, where the target application is an application that requires security assessment;
统计单元,用于统计所述目标应用的操作行为;A statistical unit, configured to count the operation behavior of the target application;
系数确定单元,用于确定各操作行为对应的风险系数;操作行为风险性越大风险系数越大;The coefficient determination unit is used to determine the risk coefficient corresponding to each operation behavior; the greater the risk of the operation behavior, the greater the risk coefficient;
计算单元,用于计算所述各操作行为对应的风险系数的综合值;A calculation unit, configured to calculate the comprehensive value of the risk coefficients corresponding to the various operation behaviors;
安全性确定单元,用于确定所述综合值越高安全性越低。A security determination unit, configured to determine that the higher the integrated value, the lower the security.
在一种可选的实现方式中,所述应用确定单元,具体用于在应用被初次安装或者更新后,将所述应用确定为目标应用;或者,In an optional implementation manner, the application determining unit is specifically configured to determine the application as a target application after the application is installed or updated for the first time; or,
在获取到配置的时间后,在所述配置的时间确定目标应用;或者,After obtaining the configured time, determine the target application at the configured time; or,
在终端设备空闲时,确定目标应用;或者,determine the target application while the terminal device is idle; or,
在接收到安全评估指令后,确定目标应用。After receiving the security assessment instruction, determine the target application.
在一种可选的实现方式中,所述系数确定单元,具体用于依据预置的操作行为与风险系数的对应关系,确定各操作行为对应的风险系数。In an optional implementation manner, the coefficient determination unit is specifically configured to determine a risk coefficient corresponding to each operation behavior according to a preset correspondence between operation behaviors and risk coefficients.
在一种可选的实现方式中,所述终端设备还包括:In an optional implementation manner, the terminal device further includes:
权重确定单元,用于在所述计算单元计算所述各操作行为对应的风险系数的综合值之前,确定各风险系数的权重值,与当前时间越近权重值越高;A weight determination unit, configured to determine the weight value of each risk coefficient before the calculation unit calculates the comprehensive value of the risk coefficient corresponding to each operation behavior, and the closer to the current time, the higher the weight value;
所述计算单元,具体用于计算所述各操作行为对应的风险系数与权重值的乘积后的平均值;The calculation unit is specifically used to calculate the average value of the product of the risk coefficient corresponding to each operation behavior and the weight value;
所述安全性确定单元,用于确定所述平均值越高安全性越低。The security determination unit is configured to determine that the higher the average value, the lower the security.
在一种可选的实现方式中,所述统计单元,还用于在统计所述目标应用的操作行为之后,确定目标操作行为,所述目标操作行为包含最近的N次操作行为;In an optional implementation manner, the statistics unit is further configured to determine the target operation behavior after counting the operation behavior of the target application, and the target operation behavior includes the latest N times of operation behavior;
所述系数确定单元,具体用于确定所述目标操作行为对应的风险系数。The coefficient determination unit is specifically configured to determine the risk coefficient corresponding to the target operation behavior.
在一种可选的实现方式中,所述计算单元,具体用于计算所述各操作行为对应的风险系数的中位数,将所述中位数作为所述综合值,或者,计算所述各操作行为对应的风险系数的平均值,将所述平均值作为所述综合值;或者,计算所述各操作行为对应的风险系数与前M次风险等级的平均参考值,计算各操作行为对应的平均参考值的和作为所述综合值。In an optional implementation manner, the calculation unit is specifically configured to calculate the median of the risk coefficients corresponding to the various operation behaviors, and use the median as the comprehensive value, or calculate the The average value of the risk coefficient corresponding to each operation behavior, using the average value as the comprehensive value; or, calculate the risk coefficient corresponding to each operation behavior and the average reference value of the previous M risk levels, and calculate the corresponding value of each operation behavior The sum of the average reference values is taken as the comprehensive value.
在一种可选的实现方式中,所述应用确定单元,具体用于若终端设备中存在应用的来源属于未被确认为安全来源,则确定所述应用为目标应用;In an optional implementation manner, the application determining unit is specifically configured to determine that the application is a target application if the source of the application in the terminal device is not confirmed as a secure source;
或者,若终端设备中存在应用的操作行为中存在未被授权的操作行为,则确定所述应用为目标应用。Alternatively, if there is an unauthorized operation behavior among the operation behaviors of the application in the terminal device, it is determined that the application is the target application.
从以上技术方案可以看出,本发明实施例具有以下优点:通过统计目标应用的操作行为,并依据各操行行为的风险技术计算出目标应用的综合值,依综合值确定目标应用的安全性。可以自动识别出应用的安全性,可以避免杀毒操作仅限于针对病毒的局限性,可以在手机等应用场景下使用,减少误判。It can be seen from the above technical solutions that the embodiments of the present invention have the following advantages: the comprehensive value of the target application is calculated according to the risk technology of each operation behavior through statistical operation behavior of the target application, and the security of the target application is determined according to the comprehensive value. It can automatically identify the security of the application, and can avoid the limitation that the antivirus operation is limited to viruses. It can be used in application scenarios such as mobile phones, reducing misjudgment.
附图说明Description of drawings
为了更清楚地说明本发明实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简要介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域的普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings that need to be used in the description of the embodiments will be briefly introduced below. Obviously, the drawings in the following description are only some embodiments of the present invention. For Those of ordinary skill in the art can also obtain other drawings based on these drawings without any creative effort.
图1为本发明实施例方法流程示意图;Fig. 1 is a schematic flow chart of the method of the embodiment of the present invention;
图2为本发明实施例方法流程示意图;Fig. 2 is a schematic flow chart of the method of the embodiment of the present invention;
图3为本发明实施例终端设备结构示意图;FIG. 3 is a schematic structural diagram of a terminal device according to an embodiment of the present invention;
图4为本发明实施例终端设备结构示意图;FIG. 4 is a schematic structural diagram of a terminal device according to an embodiment of the present invention;
图5为本发明实施例终端设备结构示意图;FIG. 5 is a schematic structural diagram of a terminal device according to an embodiment of the present invention;
图6为本发明实施例终端设备结构示意图。FIG. 6 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.
具体实施方式detailed description
为了使本发明的目的、技术方案和优点更加清楚,下面将结合附图对本发明作进一步地详细描述,显然,所描述的实施例仅仅是本发明一部份实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其它实施例,都属于本发明保护的范围。In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings. Obviously, the described embodiments are only some embodiments of the present invention, rather than all embodiments . Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.
采用杀毒软件进行病毒扫描的技术方案,虽然可以减少因病毒导致的信息和隐私泄露,但是例如:即时通讯软件集成了定位、支付等各种功能,其本身会执行相应权限范围内的操作;这些涉及信息安全软件不会被判定为病毒,但是有可泄露用户信息和隐私。因此,病毒扫描对用户信息和隐私保护效果不佳,误判较多。The technical solution of using anti-virus software for virus scanning can reduce the information and privacy leakage caused by viruses, but for example: instant messaging software integrates various functions such as positioning and payment, and itself will perform operations within the corresponding scope of authority; these Software involving information security will not be judged as a virus, but it may leak user information and privacy. Therefore, the effect of virus scanning on user information and privacy protection is not good, and there are many misjudgments.
基于杀毒软件的局限性,本发明实施例提供了一种安全评估方法,如图1所示,包括:Based on the limitations of antivirus software, the embodiment of the present invention provides a security assessment method, as shown in Figure 1, including:
101:确定目标应用,上述目标应用为需要进行安全评估的应用;101: Determine the target application, where the above target application is an application that requires security assessment;
某一应用是否需要进行安全评估,可以按照预定的规则进行,例如:终端设备安装的全部应用都需要进行安全评估,或者,来源不能确定为安全的应用确定为目标应用,或者,出现了超权限操作行为的应用为目标应用,等等。具体的形式Whether an application needs to undergo security assessment can be carried out according to predetermined rules, for example: all applications installed on the terminal device need to undergo security assessment, or the application whose source cannot be determined to be safe is determined as the target application, or there is an over-authorization The application of the operational behavior is the target application, and so on. specific form
102:统计上述目标应用的操作行为,并确定各操作行为对应的风险系数;操作行为风险性越大风险系数越大;102: Count the operation behaviors of the above-mentioned target applications, and determine the risk coefficients corresponding to each operation behavior; the more risky the operation behavior is, the greater the risk coefficient;
在本实施例中,操作行为可以通过对应用软件执行的操作指令以及执行步骤进行捕获,从而确定目标应用执行了何种操作行为;操作行为可以包括:读取数据、写入数据、发送数据等;更具体地,例如:获取用户位置信息,读取用户联系人信息、上传用户联系人信息、对第三方应用写入数据,等等。不同的操作行为会有不同的风险,因此可以对应到不同的风险系数;例如:应用对自身范围内的数据进行写入操作风险性较低,若对第三方应用写入数据则风险性较高,读取用户位置信息风险性也是较高的、读取用户联系人信息风险性也较高、上传用户联系人信息则风险性更高。按照风险性的高低可以预置对应的风险系数,预置的方式可以是系统内置的,也可以是用户设定的,还可以是从服务器下载后存储在本地的,具体的预置形式本发明实施例不作唯一性限定。In this embodiment, the operation behavior can be determined by capturing the operation instructions and execution steps executed by the application software, so as to determine what operation behavior the target application has performed; the operation behavior can include: reading data, writing data, sending data, etc. ; More specifically, for example: obtaining user location information, reading user contact information, uploading user contact information, writing data to third-party applications, and so on. Different operational behaviors have different risks, so they can correspond to different risk factors; for example, the application writes data within its own scope with low risk, while writing data to a third-party application has a high risk , the risk of reading the user's location information is also high, the risk of reading the user's contact information is also high, and the risk of uploading the user's contact information is even higher. The corresponding risk coefficient can be preset according to the level of risk. The preset method can be built in the system, set by the user, or downloaded from the server and stored locally. The specific preset form of the present invention Examples are not uniquely limited.
另需说明的是,为了更加准确的确定目标应用的安全性,这里统计的操作行为可以是该目标应用所有的操作行为,如果故意漏掉一部分本应当统计的操作行为可以被认为是一种改劣。It should also be noted that, in order to more accurately determine the security of the target application, the operation behaviors counted here can be all the operation behaviors of the target application. If some operation behaviors that should be counted are intentionally omitted, it can be considered as an improvement. inferior.
103:计算上述各操作行为对应的风险系数的综合值,并确定上述综合值越高安全性越低。103: Calculate the comprehensive value of the risk coefficients corresponding to the above-mentioned operation behaviors, and determine that the higher the above-mentioned comprehensive value, the lower the safety.
在本实施例中,风险系数的综合值是使用多个风险系数进行计算得到的值,由于综合值是用于确定安全性的,而且综合值越高安全性越低,因此风险系数整体上越高那么安全性应当是越低的,基于此本领域技术人员可以设计认为合理的计算方式,这里的计算方式不应当理解为任意的计算方式都可以。具体的计算方式可以如:所有风险系数的平均值、风险系数的加权平均值、去掉突变风险系数后的剩余风险系数的平均值、近N个风险系数的平均值,等等;本发明实施例对具体的算法不作唯一性限定。In this embodiment, the integrated value of the risk coefficient is a value calculated by using multiple risk coefficients. Since the integrated value is used to determine safety, and the higher the integrated value, the lower the safety, so the overall risk coefficient is higher The lower the security should be, based on this, those skilled in the art can design a reasonable calculation method, and the calculation method here should not be understood as any calculation method. The specific calculation method can be such as: the average value of all risk coefficients, the weighted average value of risk coefficients, the average value of the remaining risk coefficients after removing the mutation risk coefficients, the average value of nearly N risk coefficients, etc.; the embodiment of the present invention There is no unique restriction on the specific algorithm.
在确定目标应用的安全性以后,可以进行提示;例如:以列表的形式显示所有应用的安全性,也可以在某一目标应用被确定为危险以后,单独发出提示信息。在确定目标应用的安全性以后,如果使用本发明实施例不作唯一性限定。After the security of the target application is determined, a prompt can be given; for example, the security of all applications can be displayed in a list, and a prompt message can be sent separately after a certain target application is determined to be dangerous. After the security of the target application is determined, there is no unique limitation if the embodiment of the present invention is used.
本发明实施例还提供了确定目标应用的启动方式,即安全评估的启动条件的举例,具体如下:上述确定目标应用包括:The embodiment of the present invention also provides an example of the starting method of determining the target application, that is, the starting condition of the security assessment, as follows: the above-mentioned determining the target application includes:
在应用被初次安装或者更新后,将上述应用确定为目标应用;或者,After the application is installed or updated for the first time, the above-mentioned application is determined as the target application; or,
在获取到配置的时间后,在上述配置的时间确定目标应用;或者,After obtaining the configured time, determine the target application at the above configured time; or,
在终端设备空闲时,确定目标应用;或者,determine the target application while the terminal device is idle; or,
在接收到安全评估指令后,确定目标应用。After receiving the security assessment instruction, determine the target application.
需要说明的是,以其他方式触发安全评估的流程,并不会影响到本发明实施例的实现,因此以上举例不应理解为对本发明实施例的唯一性限定。It should be noted that triggering the security assessment process in other ways will not affect the implementation of the embodiment of the present invention, so the above examples should not be construed as a unique limitation on the embodiment of the present invention.
本发明实施例还提供了风险系数如何确定的举例说明,具体如下:上述确定各操作行为对应的风险系数包括:The embodiment of the present invention also provides an example of how to determine the risk coefficient, which is as follows: the above determination of the risk coefficient corresponding to each operation behavior includes:
依据预置的操作行为与风险系数的对应关系,确定各操作行为对应的风险系数。The risk coefficient corresponding to each operation behavior is determined according to the preset corresponding relationship between the operation behavior and the risk coefficient.
需要说明的是,预置的方式可以是系统内置的,也可以是用户设定的,还可以是从服务器下载后存储在本地的,具体的预置形式本发明实施例不作唯一性限定。It should be noted that the preset method can be built in the system, set by the user, or downloaded from the server and stored locally, and the specific preset form is not uniquely limited in this embodiment of the present invention.
在本发明实施例中,可以预置操心行为的风险系数,还可以进一步结合本地的实际情况确定风险系数的权重,例如:按照时间为顺序,那些历史数据时间较远可以相对使用较小的权重,时间较近的使用较大的权重,具体如下:上述计算上述各操作行为对应的风险系数的综合值之前,上述方法还包括:In the embodiment of the present invention, the risk coefficient of worrying behavior can be preset, and the weight of the risk coefficient can be further combined with the local actual situation, for example: in order of time, those historical data with a longer time can use relatively smaller weights , with a relatively recent time using a larger weight, specifically as follows: Before calculating the comprehensive value of the risk coefficients corresponding to the above-mentioned operation behaviors, the above-mentioned method also includes:
确定各风险系数的权重值,与当前时间越近权重值越高;Determine the weight value of each risk factor, the closer to the current time, the higher the weight value;
上述计算上述各操作行为对应的风险系数的综合值,并确定上述综合值越高安全性越低包括:The above-mentioned calculation of the comprehensive value of the risk coefficient corresponding to each of the above-mentioned operational behaviors, and determining that the higher the above-mentioned comprehensive value is, the lower the safety includes:
计算上述各操作行为对应的风险系数与权重值的乘积后的平均值,并确定上述平均值越高安全性越低。Calculate the average value of the product of the risk coefficient and the weight value corresponding to each of the above operation behaviors, and determine that the higher the above average value, the lower the safety.
本实施例通过权重值的设定,可以使安全性计算更贴近当前的安全性,减少历史数据的影响,提高安全性与应用当前的安全性吻合程度。In this embodiment, by setting the weight value, the security calculation can be closer to the current security, the influence of historical data can be reduced, and the degree of consistency between the security and the current security of the application can be improved.
本实施例还提供了缩小统计范围的实现方案,具体如下:在上述统计上述目标应用的操作行为之后,上述方法还包括:This embodiment also provides an implementation solution for narrowing the statistical scope, which is specifically as follows: after the above-mentioned operation behavior of the above-mentioned target application is counted, the above-mentioned method further includes:
确定目标操作行为,上述目标操作行为包含最近的N次操作行为;Determine the target operation behavior, the above target operation behavior includes the latest N times of operation behavior;
上述确定各操作行为对应的风险系数,包括:The above-mentioned determination of the risk coefficient corresponding to each operation behavior includes:
确定上述目标操作行为对应的风险系数。Determine the risk factor corresponding to the above target operation behavior.
本实施例通过限制到最近的N次操作行为,可以减少统计量,并且可以使安全性计算更贴近当前的安全性,减少历史数据的影响,提高安全性与应用当前的安全性吻合程度。如果已经统计了超过N次操作行为,可以去掉超过的部分,也可以将超过部分的操作行为的风险系数对应的权值设定为0。上述N用来计量操作行为的个数,因此其必然是大于或等于1的自然数,另外为了提高统计的采样量实现精确风险评估,N可以设置得较大一些,具体采用何种具体值本发明实施例不作唯一性限定。In this embodiment, by restricting to the latest N operations, the statistics can be reduced, and the security calculation can be closer to the current security, reducing the impact of historical data, and improving the consistency between the security and the current security of the application. If more than N operations have been counted, the excess part can be removed, or the weight corresponding to the risk coefficient of the excess operation behavior can be set to 0. The above-mentioned N is used to measure the number of operational behaviors, so it must be a natural number greater than or equal to 1. In addition, in order to increase the statistical sampling amount and realize accurate risk assessment, N can be set to a larger value. What specific value is used in the present invention Examples are not uniquely limited.
本发明实施例还提供了计算综合值的具体实现方案,具体如下:上述计算上述各操作行为对应的风险系数的综合值,包括:The embodiment of the present invention also provides a specific implementation scheme for calculating the comprehensive value, which is as follows: the calculation of the comprehensive value of the risk coefficient corresponding to the above-mentioned operation behaviors includes:
计算上述各操作行为对应的风险系数的中位数,将上述中位数作为上述综合值,或者,计算上述各操作行为对应的风险系数的平均值,将上述平均值作为上述综合值;或者,计算上述各操作行为对应的风险系数与前M次风险等级的平均参考值,计算各操作行为对应的平均参考值的和作为上述综合值。Calculate the median of the risk coefficients corresponding to the above-mentioned various operational behaviors, and use the above-mentioned median as the above-mentioned comprehensive value, or calculate the average value of the risk coefficients corresponding to the above-mentioned various operational behaviors, and use the above-mentioned average value as the above-mentioned comprehensive value; or, Calculate the risk coefficient corresponding to each of the above operation behaviors and the average reference value of the previous M risk levels, and calculate the sum of the average reference values corresponding to each operation behavior as the above comprehensive value.
在本实施例中,风险系数的综合值是使用多个风险系数进行计算得到的值,由于综合值是用于确定安全性的,而且综合值越高安全性越低,因此风险系数整体上越高那么安全性应当是越低的,基于此本领域技术人员可以设计认为合理的计算方式,这里的计算方式不应当理解为任意的计算方式都可以。因此,以上计算方式作为本发明实施例的举例,不应理解为对本发明实施例的唯一性限定。In this embodiment, the integrated value of the risk coefficient is a value calculated by using multiple risk coefficients. Since the integrated value is used to determine safety, and the higher the integrated value, the lower the safety, so the overall risk coefficient is higher The lower the security should be, based on this, those skilled in the art can design a reasonable calculation method, and the calculation method here should not be understood as any calculation method. Therefore, the above calculation method is used as an example of the embodiment of the present invention, and should not be understood as a unique limitation on the embodiment of the present invention.
本实施例还提供了目标应用的确定方式,对于一些应用而言,其来源是安全的,并不是用户从不能确定安全性的地方下载而来,因此可以确定其安全性;这里的安全来源,包括安装文件的来源、更新内容的来源以及数据修改的来源等;还有一些应用,其操作行为是被授权的合理操作,例如:导航软件获取用户位置信息、即时通讯软件执行联系人备份上传用户联系人信息,等等,这些操作可以不认为是危险操作,在应用没有发生任何被认为是危险操作的情况下,可以不对这些应用进行统计,默认为是安全的,具体如下:上述确定目标应用包括:This embodiment also provides a method for determining the target application. For some applications, the source is safe, and the user does not download it from a place where the safety cannot be determined, so its safety can be determined; the safe source here, Including the source of the installation file, the source of the updated content, and the source of the data modification, etc.; there are also some applications whose operation behavior is authorized and reasonable operation, such as: navigation software obtains user location information, instant messaging software performs contact backup and uploads user Contact information, etc. These operations may not be considered as dangerous operations. In the case that the application does not have any operation that is considered to be dangerous, it is not necessary to count these applications. The default is safe. The details are as follows: The above-mentioned determination of the target application include:
若终端设备中存在应用的来源属于未被确认为安全来源,则确定上述应用为目标应用;If the source of the application in the terminal device is not confirmed as a safe source, then determine the above application as the target application;
或者,若终端设备中存在应用的操作行为中存在未被授权的操作行为,则确定上述应用为目标应用。Alternatively, if there is an unauthorized operation behavior among the operation behaviors of the applications in the terminal device, it is determined that the above application is the target application.
本实施例可以减少目标应用的数量,从而减少安全性评估占用的资源。This embodiment can reduce the number of target applications, thereby reducing the resources occupied by security evaluation.
基于以上说明,本发明实施例还提供了以手机为例对手机内的应用进行安全评估的具体实现方案,如图2所示,具体包括如下几个部分:Based on the above description, the embodiment of the present invention also provides a specific implementation scheme for security assessment of applications in the mobile phone by taking the mobile phone as an example, as shown in Figure 2, which specifically includes the following parts:
201:当用户需要对应用的安全等级进行评估时,启动安全评估机制。201: When the user needs to evaluate the security level of the application, start the security evaluation mechanism.
这里对应用进行安全评估时间可以是用户刚刚下载该应用时,也可以是在终端设备空闲时,或者用户自设的时间,或者是服务器发送的评估指令的时间,不具体进行限定。Here, the security assessment time for the application may be when the user has just downloaded the application, or when the terminal device is idle, or the time set by the user, or the time of the assessment instruction sent by the server, which is not specifically limited.
202:获取应用所有的操作行为,根据预设的规则对每个操作行为的安全等级进行评估,得到每个操作行为的风险等级或指数。202: Obtain all the operation behaviors of the application, evaluate the safety level of each operation behavior according to preset rules, and obtain the risk level or index of each operation behavior.
该预设的规则可以是服务器自动设置,也可以是用户自行设置的,比如根据内置的对应关系表来评估或者根据服务器统计的用户数据结论进行评估等;The preset rules can be set automatically by the server, or set by the user themselves, such as evaluating based on the built-in correspondence table or evaluating based on the conclusions of user data collected by the server;
例如,得到:访问用户定位地址的风险等级为5,访问用户通信录的风险等级为7,上传用户数据的风险等级为10,访问用户账号信息的风险等级为15等等;For example, it is obtained that the risk level of accessing user location address is 5, the risk level of accessing user address book is 7, the risk level of uploading user data is 10, the risk level of accessing user account information is 15, etc.;
203:得到上述每个操作行为的风险等级后,可将上述得到的风险等级和最近N次的风险等级进行取平均值得到最终风险等级。203: After obtaining the risk level of each operation behavior above, the risk level obtained above and the risk level of the latest N times may be averaged to obtain the final risk level.
步骤203中,取平均值只是其中一种方式,也可通过最近N次权重,例如时间越近权重越高,或者,还可去掉最近N次中的最低和最高值,然后取平均值等等方式,这样可关联近期数据,又可摈弃较远的历史数据对现有结果的影响。In step 203, taking the average value is only one of the ways, and the weight of the last N times can also be used, for example, the closer the time is, the higher the weight, or, the lowest and highest values in the last N times can also be removed, and then the average value is taken, etc. In this way, recent data can be associated, and the influence of distant historical data on existing results can be discarded.
204:将所有的操作行为的风险等级之和作为该应用的风险等级。204: The sum of the risk levels of all operational behaviors is used as the risk level of the application.
本实施例可以自动,并且准确的评估应用的安全等级,以便于用户进行参考。This embodiment can automatically and accurately evaluate the security level of the application, so as to facilitate the user's reference.
本发明实施例还提供了一种终端设备,如图3所示,包括:The embodiment of the present invention also provides a terminal device, as shown in FIG. 3 , including:
应用确定单元301,用于确定目标应用,上述目标应用为需要进行安全评估的应用;An application determining unit 301, configured to determine a target application, where the target application is an application that requires security assessment;
统计单元302,用于统计上述目标应用的操作行为;A statistics unit 302, configured to make statistics on the operation behavior of the above-mentioned target application;
系数确定单元303,用于确定各操作行为对应的风险系数;操作行为风险性越大风险系数越大;A coefficient determination unit 303, configured to determine the risk coefficient corresponding to each operation behavior; the greater the risk of the operation behavior, the greater the risk coefficient;
计算单元304,用于计算上述各操作行为对应的风险系数的综合值;A calculation unit 304, configured to calculate the comprehensive value of the risk coefficients corresponding to the above-mentioned operation behaviors;
安全性确定单元305,用于确定上述综合值越高安全性越低。A security determining unit 305, configured to determine that the higher the above integrated value, the lower the security.
某一应用是否需要进行安全评估,可以按照预定的规则进行,例如:终端设备安装的全部应用都需要进行安全评估,或者,来源不能确定为安全的应用确定为目标应用,或者,出现了超权限操作行为的应用为目标应用,等等。具体的形式Whether an application needs to undergo security assessment can be carried out according to predetermined rules, for example: all applications installed on the terminal device need to undergo security assessment, or the application whose source cannot be determined as safe is determined as the target application, or there is an over-authorization The application of the operation behavior is the target application, and so on. specific form
在本实施例中,操作行为可以通过对应用软件执行的操作指令以及执行步骤进行捕获,从而确定目标应用执行了何种操作行为;操作行为可以包括:读取数据、写入数据、发送数据等;更具体地,例如:获取用户位置信息,读取用户联系人信息、上传用户联系人信息、对第三方应用写入数据,等等。不同的操作行为会有不同的风险,因此可以对应到不同的风险系数;例如:应用对自身范围内的数据进行写入操作风险性较低,若对第三方应用写入数据则风险性较高,读取用户位置信息风险性也是较高的、读取用户联系人信息风险性也较高、上传用户联系人信息则风险性更高。按照风险性的高低可以预置对应的风险系数,预置的方式可以是系统内置的,也可以是用户设定的,还可以是从服务器下载后存储在本地的,具体的预置形式本发明实施例不作唯一性限定。In this embodiment, the operation behavior can be determined by capturing the operation instructions and execution steps executed by the application software, so as to determine what operation behavior the target application has performed; the operation behavior can include: reading data, writing data, sending data, etc. ; More specifically, for example: obtaining user location information, reading user contact information, uploading user contact information, writing data to third-party applications, and so on. Different operational behaviors have different risks, so they can correspond to different risk factors; for example, the application writes data within its own scope with low risk, while writing data to a third-party application has a high risk , the risk of reading the user's location information is also high, the risk of reading the user's contact information is also high, and the risk of uploading the user's contact information is even higher. The corresponding risk coefficient can be preset according to the level of risk. The preset method can be built in the system, set by the user, or downloaded from the server and stored locally. The specific preset form of the present invention Examples are not uniquely limited.
另需说明的是,为了更加准确的确定目标应用的安全性,这里统计的操作行为可以是该目标应用所有的操作行为,如果故意漏掉一部分本应当统计的操作行为可以被认为是一种改劣。It should also be noted that, in order to more accurately determine the security of the target application, the operation behaviors counted here can be all the operation behaviors of the target application. If some operation behaviors that should be counted are intentionally omitted, it can be considered as an improvement. inferior.
在本实施例中,风险系数的综合值是使用多个风险系数进行计算得到的值,由于综合值是用于确定安全性的,而且综合值越高安全性越低,因此风险系数整体上越高那么安全性应当是越低的,基于此本领域技术人员可以设计认为合理的计算方式,这里的计算方式不应当理解为任意的计算方式都可以。具体的计算方式可以如:所有风险系数的平均值、风险系数的加权平均值、去掉突变风险系数后的剩余风险系数的平均值、近N个风险系数的平均值,等等;本发明实施例对具体的算法不作唯一性限定。In this embodiment, the integrated value of the risk coefficient is a value calculated by using multiple risk coefficients. Since the integrated value is used to determine safety, and the higher the integrated value, the lower the safety, so the overall risk coefficient is higher The lower the security should be, based on this, those skilled in the art can design a reasonable calculation method, and the calculation method here should not be understood as any calculation method. The specific calculation method can be such as: the average value of all risk coefficients, the weighted average value of risk coefficients, the average value of the remaining risk coefficients after removing the mutation risk coefficients, the average value of nearly N risk coefficients, etc.; the embodiment of the present invention There is no unique restriction on the specific algorithm.
在确定目标应用的安全性以后,可以进行提示;例如:以列表的形式显示所有应用的安全性,也可以在某一目标应用被确定为危险以后,单独发出提示信息。在确定目标应用的安全性以后,如果使用本发明实施例不作唯一性限定。After the security of the target application is determined, a prompt can be given; for example, the security of all applications can be displayed in a list, and a prompt message can be sent separately after a certain target application is determined to be dangerous. After the security of the target application is determined, there is no unique limitation if the embodiment of the present invention is used.
本发明实施例还提供了确定目标应用的启动方式,即安全评估的启动条件的举例,具体如下:上述应用确定单元301,具体用于在应用被初次安装或者更新后,将上述应用确定为目标应用;或者,The embodiment of the present invention also provides an example of determining the starting method of the target application, that is, the starting condition of the security assessment, as follows: the above-mentioned application determining unit 301 is specifically used to determine the above-mentioned application as the target after the application is installed or updated for the first time application; or,
在获取到配置的时间后,在上述配置的时间确定目标应用;或者,After obtaining the configured time, determine the target application at the above configured time; or,
在终端设备空闲时,确定目标应用;或者,determine the target application while the terminal device is idle; or,
在接收到安全评估指令后,确定目标应用。After receiving the security assessment instruction, determine the target application.
需要说明的是,以其他方式触发安全评估的流程,并不会影响到本发明实施例的实现,因此以上举例不应理解为对本发明实施例的唯一性限定。It should be noted that triggering the security assessment process in other ways will not affect the implementation of the embodiment of the present invention, so the above examples should not be construed as a unique limitation on the embodiment of the present invention.
本发明实施例还提供了风险系数如何确定的举例说明,具体如下:上述系数确定单元303,具体用于依据预置的操作行为与风险系数的对应关系,确定各操作行为对应的风险系数。The embodiment of the present invention also provides an example of how to determine the risk coefficient, specifically as follows: the above-mentioned coefficient determination unit 303 is specifically configured to determine the risk coefficient corresponding to each operation behavior according to the preset correspondence between the operation behavior and the risk coefficient.
需要说明的是,预置的方式可以是系统内置的,也可以是用户设定的,还可以是从服务器下载后存储在本地的,具体的预置形式本发明实施例不作唯一性限定。It should be noted that the preset method can be built in the system, set by the user, or downloaded from the server and stored locally, and the specific preset form is not uniquely limited in this embodiment of the present invention.
在本发明实施例中,可以预置操心行为的风险系数,还可以进一步结合本地的实际情况确定风险系数的权重,例如:按照时间为顺序,那些历史数据时间较远可以相对使用较小的权重,时间较近的使用较大的权重,具体如下:进一步地,如图4所示,上述终端设备还包括:In the embodiment of the present invention, the risk coefficient of worrying behavior can be preset, and the weight of the risk coefficient can be further combined with the local actual situation, for example: in order of time, those historical data with a longer time can use relatively smaller weights , the ones with a relatively recent time use a larger weight, specifically as follows: Further, as shown in Figure 4, the above-mentioned terminal equipment also includes:
权重确定单元401,用于在上述计算单元304计算上述各操作行为对应的风险系数的综合值之前,确定各风险系数的权重值,与当前时间越近权重值越高;The weight determination unit 401 is configured to determine the weight value of each risk coefficient before the calculation unit 304 calculates the comprehensive value of the risk coefficients corresponding to the above operation behaviors, and the closer to the current time, the higher the weight value;
上述计算单元304,具体用于计算上述各操作行为对应的风险系数与权重值的乘积后的平均值;The calculation unit 304 is specifically used to calculate the average value of the product of the risk coefficient and the weight value corresponding to each of the above operation behaviors;
上述安全性确定单元305,用于确定上述平均值越高安全性越低。The security determination unit 305 is configured to determine that the higher the average value is, the lower the security is.
本实施例通过权重值的设定,可以使安全性计算更贴近当前的安全性,减少历史数据的影响,提高安全性与应用当前的安全性吻合程度。In this embodiment, by setting the weight value, the security calculation can be closer to the current security, the influence of historical data can be reduced, and the degree of consistency between the security and the current security of the application can be improved.
本实施例还提供了缩小统计范围的实现方案,具体如下:进一步地,上述统计单元302,还用于在统计上述目标应用的操作行为之后,确定目标操作行为,上述目标操作行为包含最近的N次操作行为;This embodiment also provides an implementation solution for narrowing the statistical range, which is specifically as follows: further, the statistical unit 302 is further configured to determine the target operation behavior after counting the operation behavior of the target application, and the target operation behavior includes the latest N operation behavior;
上述系数确定单元303,具体用于确定上述目标操作行为对应的风险系数。The above coefficient determination unit 303 is specifically configured to determine the risk coefficient corresponding to the above target operation behavior.
本实施例通过限制到最近的N次操作行为,可以减少统计量,并且可以使安全性计算更贴近当前的安全性,减少历史数据的影响,提高安全性与应用当前的安全性吻合程度。如果已经统计了超过N次操作行为,可以去掉超过的部分,也可以将超过部分的操作行为的风险系数对应的权值设定为0。上述N用来计量操作行为的个数,因此其必然是大于或等于1的自然数,另外为了提高统计的采样量实现精确风险评估,N可以设置得较大一些,具体采用何种具体值本发明实施例不作唯一性限定。In this embodiment, by restricting to the latest N operations, the statistics can be reduced, and the security calculation can be closer to the current security, reducing the impact of historical data, and improving the consistency between the security and the current security of the application. If more than N operations have been counted, the excess part can be removed, or the weight corresponding to the risk coefficient of the excess operation behavior can be set to 0. The above-mentioned N is used to measure the number of operational behaviors, so it must be a natural number greater than or equal to 1. In addition, in order to increase the statistical sampling amount and realize accurate risk assessment, N can be set to a larger value. What specific value is used in the present invention Examples are not uniquely limited.
本发明实施例还提供了计算综合值的具体实现方案,具体如下:上述计算单元304,具体用于计算上述各操作行为对应的风险系数的中位数,将上述中位数作为上述综合值,或者,计算上述各操作行为对应的风险系数的平均值,将上述平均值作为上述综合值;或者,计算上述各操作行为对应的风险系数与前M次风险等级的平均参考值,计算各操作行为对应的平均参考值的和作为上述综合值。The embodiment of the present invention also provides a specific implementation scheme for calculating the comprehensive value, which is as follows: the above-mentioned calculation unit 304 is specifically used to calculate the median of the risk coefficients corresponding to the above-mentioned operation behaviors, and the above-mentioned median is used as the above-mentioned comprehensive value, Or, calculate the average value of the risk coefficients corresponding to the above-mentioned operation behaviors, and use the above-mentioned average value as the above-mentioned comprehensive value; or, calculate the risk coefficients corresponding to the above-mentioned operation behaviors and the average reference value of the previous M risk levels, and calculate the average value of each operation behavior The sum of the corresponding average reference values is taken as the above comprehensive value.
在本实施例中,风险系数的综合值是使用多个风险系数进行计算得到的值,由于综合值是用于确定安全性的,而且综合值越高安全性越低,因此风险系数整体上越高那么安全性应当是越低的,基于此本领域技术人员可以设计认为合理的计算方式,这里的计算方式不应当理解为任意的计算方式都可以。因此,以上计算方式作为本发明实施例的举例,不应理解为对本发明实施例的唯一性限定。In this embodiment, the integrated value of the risk coefficient is a value calculated by using multiple risk coefficients. Since the integrated value is used to determine safety, and the higher the integrated value, the lower the safety, so the overall risk coefficient is higher The lower the security should be, based on this, those skilled in the art can design a reasonable calculation method, and the calculation method here should not be understood as any calculation method. Therefore, the above calculation method is used as an example of the embodiment of the present invention, and should not be understood as a unique limitation on the embodiment of the present invention.
本实施例还提供了目标应用的确定方式,对于一些应用而言,其来源是安全的,并不是用户从不能确定安全性的地方下载而来,因此可以确定其安全性;这里的安全来源,包括安装文件的来源、更新内容的来源以及数据修改的来源等;还有一些应用,其操作行为是被授权的合理操作,例如:导航软件获取用户位置信息、即时通讯软件执行联系人备份上传用户联系人信息,等等,这些操作可以不认为是危险操作,在应用没有发生任何被认为是危险操作的情况下,可以不对这些应用进行统计,默认为是安全的,具体如下:上述应用确定单元301,具体用于若终端设备中存在应用的来源属于未被确认为安全来源,则确定上述应用为目标应用;This embodiment also provides a method for determining the target application. For some applications, the source is safe, and the user does not download it from a place where the safety cannot be determined, so its safety can be determined; the safe source here, Including the source of the installation file, the source of the updated content, and the source of the data modification, etc.; there are also some applications whose operation behavior is authorized and reasonable operation, such as: navigation software obtains user location information, instant messaging software performs contact backup and uploads user Contact information, etc., these operations may not be considered as dangerous operations. In the case that no operation is considered to be dangerous in the application, these applications may not be counted. The default is safe. The details are as follows: The above-mentioned application determination unit 301. Specifically, if the source of the application in the terminal device is not confirmed as a safe source, determine the above application as the target application;
或者,若终端设备中存在应用的操作行为中存在未被授权的操作行为,则确定上述应用为目标应用。Alternatively, if there is an unauthorized operation behavior among the operation behaviors of the applications in the terminal device, it is determined that the above application is the target application.
本实施例可以减少目标应用的数量,从而减少安全性评估占用的资源。This embodiment can reduce the number of target applications, thereby reducing the resources occupied by security evaluation.
本发明实施例还提供了另一种终端设备,如图5所示,包括:接收器501、发射器502、处理器503以及存储器504;其中,存储器504可以用于为处理器503提供数据处理所需的缓存,或者其他数据存储功能;The embodiment of the present invention also provides another terminal device, as shown in FIG. 5 , including: a receiver 501, a transmitter 502, a processor 503, and a memory 504; wherein, the memory 504 can be used to provide data processing for the processor 503 required caching, or other data storage capabilities;
上述处理器503,用于确定目标应用,上述目标应用为需要进行安全评估的应用;统计上述目标应用的操作行为,并确定各操作行为对应的风险系数;操作行为风险性越大风险系数越大;计算上述各操作行为对应的风险系数的综合值,并确定上述综合值越高安全性越低。The above-mentioned processor 503 is configured to determine a target application, the above-mentioned target application is an application that requires a security assessment; count the operation behavior of the above-mentioned target application, and determine the risk coefficient corresponding to each operation behavior; the greater the risk of the operation behavior, the greater the risk coefficient ; Calculate the comprehensive value of the risk coefficients corresponding to the above-mentioned operation behaviors, and determine that the higher the above-mentioned comprehensive value, the lower the safety.
某一应用是否需要进行安全评估,可以按照预定的规则进行,例如:终端设备安装的全部应用都需要进行安全评估,或者,来源不能确定为安全的应用确定为目标应用,或者,出现了超权限操作行为的应用为目标应用,等等。具体的形式Whether an application needs to undergo security assessment can be carried out according to predetermined rules, for example: all applications installed on the terminal device need to undergo security assessment, or the application whose source cannot be determined as safe is determined as the target application, or there is an over-authorization The application of the operation behavior is the target application, and so on. specific form
在本实施例中,操作行为可以通过对应用软件执行的操作指令以及执行步骤进行捕获,从而确定目标应用执行了何种操作行为;操作行为可以包括:读取数据、写入数据、发送数据等;更具体地,例如:获取用户位置信息,读取用户联系人信息、上传用户联系人信息、对第三方应用写入数据,等等。不同的操作行为会有不同的风险,因此可以对应到不同的风险系数;例如:应用对自身范围内的数据进行写入操作风险性较低,若对第三方应用写入数据则风险性较高,读取用户位置信息风险性也是较高的、读取用户联系人信息风险性也较高、上传用户联系人信息则风险性更高。按照风险性的高低可以预置对应的风险系数,预置的方式可以是系统内置的,也可以是用户设定的,还可以是从服务器下载后存储在本地的,具体的预置形式本发明实施例不作唯一性限定。In this embodiment, the operation behavior can be determined by capturing the operation instructions and execution steps executed by the application software, so as to determine what operation behavior the target application has performed; the operation behavior can include: reading data, writing data, sending data, etc. ; More specifically, for example: obtaining user location information, reading user contact information, uploading user contact information, writing data to third-party applications, and so on. Different operational behaviors have different risks, so they can correspond to different risk factors; for example, the application writes data within its own scope with low risk, while writing data to a third-party application has a high risk , the risk of reading the user's location information is also high, the risk of reading the user's contact information is also high, and the risk of uploading the user's contact information is even higher. The corresponding risk coefficient can be preset according to the level of risk. The preset method can be built in the system, set by the user, or downloaded from the server and stored locally. The specific preset form of the present invention Examples are not uniquely limited.
另需说明的是,为了更加准确的确定目标应用的安全性,这里统计的操作行为可以是该目标应用所有的操作行为,如果故意漏掉一部分本应当统计的操作行为可以被认为是一种改劣。It should also be noted that, in order to more accurately determine the security of the target application, the operation behaviors counted here can be all the operation behaviors of the target application. If some operation behaviors that should be counted are intentionally omitted, it can be considered as an improvement. inferior.
在本实施例中,风险系数的综合值是使用多个风险系数进行计算得到的值,由于综合值是用于确定安全性的,而且综合值越高安全性越低,因此风险系数整体上越高那么安全性应当是越低的,基于此本领域技术人员可以设计认为合理的计算方式,这里的计算方式不应当理解为任意的计算方式都可以。具体的计算方式可以如:所有风险系数的平均值、风险系数的加权平均值、去掉突变风险系数后的剩余风险系数的平均值、近N个风险系数的平均值,等等;本发明实施例对具体的算法不作唯一性限定。In this embodiment, the integrated value of the risk coefficient is a value calculated by using multiple risk coefficients. Since the integrated value is used to determine safety, and the higher the integrated value, the lower the safety, so the overall risk coefficient is higher The lower the security should be, based on this, those skilled in the art can design a reasonable calculation method, and the calculation method here should not be understood as any calculation method. The specific calculation method can be such as: the average value of all risk coefficients, the weighted average value of risk coefficients, the average value of the remaining risk coefficients after removing the mutation risk coefficients, the average value of nearly N risk coefficients, etc.; the embodiment of the present invention There is no unique restriction on the specific algorithm.
在确定目标应用的安全性以后,可以进行提示;例如:以列表的形式显示所有应用的安全性,也可以在某一目标应用被确定为危险以后,单独发出提示信息。在确定目标应用的安全性以后,如果使用本发明实施例不作唯一性限定。After the security of the target application is determined, a prompt can be given; for example, the security of all applications can be displayed in a list, and a prompt message can be sent separately after a certain target application is determined to be dangerous. After the security of the target application is determined, there is no unique limitation if the embodiment of the present invention is used.
本发明实施例还提供了确定目标应用的启动方式,即安全评估的启动条件的举例,具体如下:上述处理器503,用于确定目标应用包括:The embodiment of the present invention also provides an example of determining the starting method of the target application, that is, the starting condition of the security assessment, as follows: the above-mentioned processor 503 is used to determine the target application including:
在应用被初次安装或者更新后,将上述应用确定为目标应用;或者,After the application is installed or updated for the first time, the above-mentioned application is determined as the target application; or,
在获取到配置的时间后,在上述配置的时间确定目标应用;或者,After obtaining the configured time, determine the target application at the above configured time; or,
在终端设备空闲时,确定目标应用;或者,determine the target application while the terminal device is idle; or,
在接收到安全评估指令后,确定目标应用。After receiving the security assessment instruction, determine the target application.
需要说明的是,以其他方式触发安全评估的流程,并不会影响到本发明实施例的实现,因此以上举例不应理解为对本发明实施例的唯一性限定。It should be noted that triggering the security assessment process in other ways will not affect the implementation of the embodiment of the present invention, so the above examples should not be construed as a unique limitation on the embodiment of the present invention.
本发明实施例还提供了风险系数如何确定的举例说明,具体如下:上述处理器503,用于确定各操作行为对应的风险系数包括:The embodiment of the present invention also provides an example of how to determine the risk coefficient, specifically as follows: the above-mentioned processor 503 is used to determine the risk coefficient corresponding to each operation behavior including:
依据预置的操作行为与风险系数的对应关系,确定各操作行为对应的风险系数。The risk coefficient corresponding to each operation behavior is determined according to the preset corresponding relationship between the operation behavior and the risk coefficient.
需要说明的是,预置的方式可以是系统内置的,也可以是用户设定的,还可以是从服务器下载后存储在本地的,具体的预置形式本发明实施例不作唯一性限定。It should be noted that the preset method can be built in the system, set by the user, or downloaded from the server and stored locally, and the specific preset form is not uniquely limited in this embodiment of the present invention.
在本发明实施例中,可以预置操心行为的风险系数,还可以进一步结合本地的实际情况确定风险系数的权重,例如:按照时间为顺序,那些历史数据时间较远可以相对使用较小的权重,时间较近的使用较大的权重,具体如下:进一步地,上述处理器503,还用于在计算上述各操作行为对应的风险系数的综合值之前,确定各风险系数的权重值,与当前时间越近权重值越高;In the embodiment of the present invention, the risk coefficient of worrying behavior can be preset, and the weight of the risk coefficient can be further combined with the local actual situation, for example: in order of time, those historical data with a longer time can use relatively smaller weights , and the ones with a relatively recent time use a larger weight, specifically as follows: further, the above-mentioned processor 503 is also used to determine the weight value of each risk coefficient before calculating the comprehensive value of the risk coefficient corresponding to each of the above-mentioned operation behaviors, which is different from the current The closer the time, the higher the weight value;
上述处理器503用于计算上述各操作行为对应的风险系数的综合值,并确定上述综合值越高安全性越低包括:The above-mentioned processor 503 is used to calculate the comprehensive value of the risk coefficient corresponding to each of the above-mentioned operation behaviors, and determining that the higher the above-mentioned comprehensive value is, the lower the security includes:
用于计算上述各操作行为对应的风险系数与权重值的乘积后的平均值,并确定上述平均值越高安全性越低。It is used to calculate the average value of the product of the risk coefficient corresponding to each of the above operation behaviors and the weight value, and determine that the higher the above average value, the lower the safety.
本实施例通过权重值的设定,可以使安全性计算更贴近当前的安全性,减少历史数据的影响,提高安全性与应用当前的安全性吻合程度。In this embodiment, by setting the weight value, the security calculation can be closer to the current security, the influence of historical data can be reduced, and the degree of consistency between the security and the current security of the application can be improved.
本实施例还提供了缩小统计范围的实现方案,具体如下:进一步地,上述处理器503,还用于在上述统计上述目标应用的操作行为之后,确定目标操作行为,上述目标操作行为包含最近的N次操作行为;This embodiment also provides an implementation solution for narrowing the statistical range, which is specifically as follows: further, the processor 503 is further configured to determine the target operation behavior after the above-mentioned statistics of the operation behavior of the target application, the target operation behavior includes the latest N times of operation behavior;
上述处理器503用于确定各操作行为对应的风险系数,包括:用于确定上述目标操作行为对应的风险系数。The processor 503 is configured to determine the risk coefficient corresponding to each operation behavior, including: determining the risk coefficient corresponding to the above target operation behavior.
本实施例通过限制到最近的N次操作行为,可以减少统计量,并且可以使安全性计算更贴近当前的安全性,减少历史数据的影响,提高安全性与应用当前的安全性吻合程度。如果已经统计了超过N次操作行为,可以去掉超过的部分,也可以将超过部分的操作行为的风险系数对应的权值设定为0。上述N用来计量操作行为的个数,因此其必然是大于或等于1的自然数,另外为了提高统计的采样量实现精确风险评估,N可以设置得较大一些,具体采用何种具体值本发明实施例不作唯一性限定。In this embodiment, by restricting to the latest N operations, the statistics can be reduced, and the security calculation can be closer to the current security, reducing the impact of historical data, and improving the consistency between the security and the current security of the application. If more than N operations have been counted, the excess part can be removed, or the weight corresponding to the risk coefficient of the excess operation behavior can be set to 0. The above-mentioned N is used to measure the number of operational behaviors, so it must be a natural number greater than or equal to 1. In addition, in order to increase the statistical sampling amount and realize accurate risk assessment, N can be set to a larger value. What specific value is used in the present invention Examples are not uniquely limited.
本发明实施例还提供了计算综合值的具体实现方案,具体如下:上述处理器503,用于计算上述各操作行为对应的风险系数的综合值,包括:用于计算上述各操作行为对应的风险系数的中位数,将上述中位数作为上述综合值;或者,计算上述各操作行为对应的风险系数的平均值,将上述平均值作为上述综合值;或者,计算上述各操作行为对应的风险系数与前M次风险等级的平均参考值,计算各操作行为对应的平均参考值的和作为上述综合值;或者,计算上述各操作行为对应的风险系数与前M次风险等级的平均参考值,计算各操作行为对应的平均参考值的和作为上述综合值。The embodiment of the present invention also provides a specific implementation scheme for calculating the comprehensive value, which is as follows: the above-mentioned processor 503 is used to calculate the comprehensive value of the risk coefficient corresponding to the above-mentioned various operation behaviors, including: used to calculate the risk corresponding to the above-mentioned various operation behaviors For the median of the coefficients, the above-mentioned median is used as the above-mentioned comprehensive value; or, the average value of the risk coefficients corresponding to the above-mentioned operation behaviors is calculated, and the above-mentioned average value is used as the above-mentioned comprehensive value; or, the risk corresponding to the above-mentioned operation behaviors is calculated coefficient and the average reference value of the previous M risk levels, and calculate the sum of the average reference values corresponding to each operation behavior as the above comprehensive value; or, calculate the risk coefficient corresponding to each of the above operation behaviors and the average reference value of the previous M risk levels, The sum of the average reference values corresponding to each operation behavior is calculated as the above comprehensive value.
在本实施例中,风险系数的综合值是使用多个风险系数进行计算得到的值,由于综合值是用于确定安全性的,而且综合值越高安全性越低,因此风险系数整体上越高那么安全性应当是越低的,基于此本领域技术人员可以设计认为合理的计算方式,这里的计算方式不应当理解为任意的计算方式都可以。因此,以上计算方式作为本发明实施例的举例,不应理解为对本发明实施例的唯一性限定。In this embodiment, the integrated value of the risk coefficient is a value calculated by using multiple risk coefficients. Since the integrated value is used to determine safety, and the higher the integrated value, the lower the safety, so the overall risk coefficient is higher The lower the security should be, based on this, those skilled in the art can design a reasonable calculation method, and the calculation method here should not be understood as any calculation method. Therefore, the above calculation method is used as an example of the embodiment of the present invention, and should not be understood as a unique limitation on the embodiment of the present invention.
本实施例还提供了目标应用的确定方式,对于一些应用而言,其来源是安全的,并不是用户从不能确定安全性的地方下载而来,因此可以确定其安全性;这里的安全来源,包括安装文件的来源、更新内容的来源以及数据修改的来源等;还有一些应用,其操作行为是被授权的合理操作,例如:导航软件获取用户位置信息、即时通讯软件执行联系人备份上传用户联系人信息,等等,这些操作可以不认为是危险操作,在应用没有发生任何被认为是危险操作的情况下,可以不对这些应用进行统计,默认为是安全的,具体如下:上述处理器503,用于确定目标应用包括:This embodiment also provides a method for determining the target application. For some applications, the source is safe, and the user does not download it from a place where the safety cannot be determined, so its safety can be determined; the safe source here, Including the source of the installation file, the source of the updated content, and the source of the data modification, etc.; there are also some applications whose operation behavior is authorized and reasonable operation, such as: navigation software obtains user location information, instant messaging software performs contact backup and uploads user Contact information, etc., these operations may not be considered as dangerous operations, and in the case that no dangerous operations occur in the application, these applications may not be counted, and the default is safe, as follows: the above-mentioned processor 503 , used to determine the target application includes:
若终端设备中存在应用的来源属于未被确认为安全来源,则确定上述应用为目标应用;If the source of the application in the terminal device is not confirmed as a safe source, then determine the above application as the target application;
或者,若终端设备中存在应用的操作行为中存在未被授权的操作行为,则确定上述应用为目标应用。Alternatively, if there is an unauthorized operation behavior among the operation behaviors of the applications in the terminal device, it is determined that the above application is the target application.
本实施例可以减少目标应用的数量,从而减少安全性评估占用的资源。This embodiment can reduce the number of target applications, thereby reducing the resources occupied by security evaluation.
本发明实施例还提供了本发明实施例还提供了另一种终端设备,如图6所示,为了便于说明,仅示出了与本发明实施例相关的部分,具体技术细节未揭示的,请参照本发明实施例方法部分。该终端可以为包括手机、平板电脑、PDA(PersonalDigitalAssistant,个人数字助理)、POS(PointofSales,销售终端)、车载电脑等任意终端设备,以终端为手机为例:The embodiment of the present invention also provides another terminal device, as shown in FIG. 6 , for the sake of illustration, only the parts related to the embodiment of the present invention are shown, and the specific technical details are not disclosed. Please refer to the Methods section for the examples of the present invention. The terminal can be any terminal device including mobile phone, tablet computer, PDA (Personal Digital Assistant, personal digital assistant), POS (Point of Sales, sales terminal), vehicle-mounted computer, etc. Taking the terminal as a mobile phone as an example:
图6示出的是与本发明实施例提供的终端相关的手机的部分结构的框图。参考图6,手机包括:射频(RadioFrequency,RF)电路610、存储器620、输入单元630、显示单元640、传感器650、音频电路660、无线保真(wirelessfidelity,WiFi)模块670、处理器680、以及电源690等部件。本领域技术人员可以理解,图6中示出的手机结构并不构成对手机的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。FIG. 6 shows a block diagram of a partial structure of a mobile phone related to the terminal provided by the embodiment of the present invention. Referring to FIG. 6, the mobile phone includes: a radio frequency (RadioFrequency, RF) circuit 610, a memory 620, an input unit 630, a display unit 640, a sensor 650, an audio circuit 660, a wireless fidelity (wirelessfidelity, WiFi) module 670, a processor 680, and Power supply 690 and other components. Those skilled in the art can understand that the structure of the mobile phone shown in FIG. 6 does not constitute a limitation to the mobile phone, and may include more or less components than shown in the figure, or combine some components, or arrange different components.
下面结合图6对手机的各个构成部件进行具体的介绍:The following is a specific introduction to each component of the mobile phone in conjunction with Figure 6:
RF电路610可用于收发信息或通话过程中,信号的接收和发送,特别地,将基站的下行信息接收后,给处理器680处理;另外,将设计上行的数据发送给基站。通常,RF电路610包括但不限于天线、至少一个放大器、收发信机、耦合器、低噪声放大器(LowNoiseAmplifier,LNA)、双工器等。此外,RF电路610还可以通过无线通信与网络和其他设备通信。上述无线通信可以使用任一通信标准或协议,包括但不限于全球移动通讯系统(GlobalSystemofMobilecommunication,GSM)、通用分组无线服务(GeneralPacketRadioService,GPRS)、码分多址(CodeDivisionMultipleAccess,CDMA)、宽带码分多址(WidebandCodeDivisionMultipleAccess,WCDMA)、长期演进(LongTermEvolution,LTE)、电子邮件、短消息服务(ShortMessagingService,SMS)等。The RF circuit 610 can be used for sending and receiving information or receiving and sending signals during a call. In particular, after receiving the downlink information from the base station, it is processed by the processor 680; in addition, the designed uplink data is sent to the base station. Generally, the RF circuit 610 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier (Low Noise Amplifier, LNA), a duplexer, and the like. In addition, RF circuitry 610 may also communicate with networks and other devices via wireless communications. The above-mentioned wireless communication can use any communication standard or protocol, including but not limited to Global System of Mobile Communication (Global System of Mobile Communication, GSM), General Packet Radio Service (General Packet Radio Service, GPRS), Code Division Multiple Access (Code Division Multiple Access, CDMA), broadband code division multiple Address (WidebandCodeDivisionMultipleAccess, WCDMA), Long Term Evolution (LongTermEvolution, LTE), email, Short Message Service (ShortMessagingService, SMS), etc.
存储器620可用于存储软件程序以及模块,处理器680通过运行存储在存储器620的软件程序以及模块,从而执行手机的各种功能应用以及数据处理。存储器620可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序(比如声音播放功能、图像播放功能等)等;存储数据区可存储根据手机的使用所创建的数据(比如音频数据、电话本等)等。此外,存储器620可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。The memory 620 can be used to store software programs and modules, and the processor 680 executes various functional applications and data processing of the mobile phone by running the software programs and modules stored in the memory 620 . The memory 620 can mainly include a program storage area and a data storage area, wherein the program storage area can store an operating system, at least one application program required by a function (such as a sound playback function, an image playback function, etc.); Data created by the use of mobile phones (such as audio data, phonebook, etc.), etc. In addition, the memory 620 may include a high-speed random access memory, and may also include a non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid-state storage devices.
输入单元630可用于接收输入的数字或字符信息,以及产生与手机的用户设置以及功能控制有关的键信号输入。具体地,输入单元630可包括触控面板631以及其他输入设备632。触控面板631,也称为触摸屏,可收集用户在其上或附近的触摸操作(比如用户使用手指、触笔等任何适合的物体或附件在触控面板631上或在触控面板631附近的操作),并根据预先设定的程式驱动相应的连接装置。可选的,触控面板631可包括触摸检测装置和触摸控制器两个部分。其中,触摸检测装置检测用户的触摸方位,并检测触摸操作带来的信号,将信号传送给触摸控制器;触摸控制器从触摸检测装置上接收触摸信息,并将它转换成触点坐标,再送给处理器680,并能接收处理器680发来的命令并加以执行。此外,可以采用电阻式、电容式、红外线以及表面声波等多种类型实现触控面板631。除了触控面板631,输入单元630还可以包括其他输入设备632。具体地,其他输入设备632可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆等中的一种或多种。The input unit 630 can be used to receive input numbers or character information, and generate key signal input related to user settings and function control of the mobile phone. Specifically, the input unit 630 may include a touch panel 631 and other input devices 632 . The touch panel 631, also referred to as a touch screen, can collect the user's touch operations on or near it (for example, the user uses any suitable object or accessory such as a finger or a stylus on the touch panel 631 or near the touch panel 631). operation), and drive the corresponding connection device according to the preset program. Optionally, the touch panel 631 may include two parts, a touch detection device and a touch controller. Among them, the touch detection device detects the user's touch orientation, and detects the signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts it into contact coordinates, and sends it to the to the processor 680, and can receive and execute commands sent by the processor 680. In addition, the touch panel 631 can be implemented in various types such as resistive, capacitive, infrared, and surface acoustic wave. In addition to the touch panel 631 , the input unit 630 may also include other input devices 632 . Specifically, other input devices 632 may include, but are not limited to, one or more of physical keyboards, function keys (such as volume control keys, switch keys, etc.), trackballs, mice, joysticks, and the like.
显示单元640可用于显示由用户输入的信息或提供给用户的信息以及手机的各种菜单。显示单元640可包括显示面板641,可选的,可以采用液晶显示器(LiquidCrystalDisplay,LCD)、有机发光二极管(OrganicLight-EmittingDiode,OLED)等形式来配置显示面板641。进一步的,触控面板631可覆盖显示面板641,当触控面板631检测到在其上或附近的触摸操作后,传送给处理器680以确定触摸事件的类型,随后处理器680根据触摸事件的类型在显示面板641上提供相应的视觉输出。虽然在图6中,触控面板631与显示面板641是作为两个独立的部件来实现手机的输入和输入功能,但是在某些实施例中,可以将触控面板631与显示面板641集成而实现手机的输入和输出功能。The display unit 640 may be used to display information input by or provided to the user and various menus of the mobile phone. The display unit 640 may include a display panel 641. Optionally, the display panel 641 may be configured in the form of a Liquid Crystal Display (Liquid Crystal Display, LCD), an Organic Light-Emitting Diode (Organic Light-Emitting Diode, OLED), or the like. Further, the touch panel 631 may cover the display panel 641, and when the touch panel 631 detects a touch operation on or near it, it transmits to the processor 680 to determine the type of the touch event, and then the processor 680 determines the type of the touch event according to the The type provides a corresponding visual output on the display panel 641 . Although in FIG. 6, the touch panel 631 and the display panel 641 are used as two independent components to realize the input and input functions of the mobile phone, in some embodiments, the touch panel 631 and the display panel 641 can be integrated to form a mobile phone. Realize the input and output functions of the mobile phone.
手机还可包括至少一种传感器650,比如光传感器、运动传感器以及其他传感器。具体地,光传感器可包括环境光传感器及接近传感器,其中,环境光传感器可根据环境光线的明暗来调节显示面板641的亮度,接近传感器可在手机移动到耳边时,关闭显示面板641和/或背光。作为运动传感器的一种,加速计传感器可检测各个方向上(一般为三轴)加速度的大小,静止时可检测出重力的大小及方向,可用于识别手机姿态的应用(比如横竖屏切换、相关游戏、磁力计姿态校准)、振动识别相关功能(比如计步器、敲击)等;至于手机还可配置的陀螺仪、气压计、湿度计、温度计、红外线传感器等其他传感器,在此不再赘述。The handset may also include at least one sensor 650, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor can include an ambient light sensor and a proximity sensor, wherein the ambient light sensor can adjust the brightness of the display panel 641 according to the brightness of the ambient light, and the proximity sensor can turn off the display panel 641 and/or when the mobile phone is moved to the ear. or backlight. As a kind of motion sensor, the accelerometer sensor can detect the magnitude of acceleration in various directions (generally three axes), and can detect the magnitude and direction of gravity when it is stationary, and can be used to identify the application of mobile phone posture (such as horizontal and vertical screen switching, related Games, magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tap), etc.; as for other sensors such as gyroscope, barometer, hygrometer, thermometer, infrared sensor, etc. repeat.
音频电路660、扬声器661,传声器662可提供用户与手机之间的音频接口。音频电路660可将接收到的音频数据转换后的电信号,传输到扬声器661,由扬声器661转换为声音信号输出;另一方面,传声器662将收集的声音信号转换为电信号,由音频电路660接收后转换为音频数据,再将音频数据输出处理器680处理后,经RF电路610以发送给比如另一手机,或者将音频数据输出至存储器620以便进一步处理。The audio circuit 660, the speaker 661 and the microphone 662 can provide an audio interface between the user and the mobile phone. The audio circuit 660 can transmit the electrical signal converted from the received audio data to the loudspeaker 661, and the loudspeaker 661 converts it into an audio signal output; After being received, it is converted into audio data, and then the audio data is processed by the output processor 680, and then sent to another mobile phone through the RF circuit 610, or the audio data is output to the memory 620 for further processing.
WiFi属于短距离无线传输技术,手机通过WiFi模块670可以帮助用户收发电子邮件、浏览网页和访问流式媒体等,它为用户提供了无线的宽带互联网访问。虽然图6示出了WiFi模块670,但是可以理解的是,其并不属于手机的必须构成,完全可以根据需要在不改变发明的本质的范围内而省略。WiFi is a short-distance wireless transmission technology. The mobile phone can help users send and receive emails, browse web pages, and access streaming media through the WiFi module 670, which provides users with wireless broadband Internet access. Although FIG. 6 shows a WiFi module 670, it can be understood that it is not an essential component of the mobile phone, and can be completely omitted as required without changing the essence of the invention.
处理器680是手机的控制中心,利用各种接口和线路连接整个手机的各个部分,通过运行或执行存储在存储器620内的软件程序和/或模块,以及调用存储在存储器620内的数据,执行手机的各种功能和处理数据,从而对手机进行整体监控。可选的,处理器680可包括一个或多个处理单元;优选的,处理器680可集成应用处理器和调制解调处理器,其中,应用处理器主要处理操作系统、用户界面和应用程序等,调制解调处理器主要处理无线通信。可以理解的是,上述调制解调处理器也可以不集成到处理器680中。The processor 680 is the control center of the mobile phone. It uses various interfaces and lines to connect various parts of the entire mobile phone. By running or executing software programs and/or modules stored in the memory 620, and calling data stored in the memory 620, execution Various functions and processing data of the mobile phone, so as to monitor the mobile phone as a whole. Optionally, the processor 680 may include one or more processing units; preferably, the processor 680 may integrate an application processor and a modem processor, wherein the application processor mainly processes operating systems, user interfaces, and application programs, etc. , the modem processor mainly handles wireless communications. It can be understood that the foregoing modem processor may not be integrated into the processor 680 .
手机还包括给各个部件供电的电源690(比如电池),优选的,电源可以通过电源管理系统与处理器680逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。The mobile phone also includes a power supply 690 (such as a battery) for supplying power to various components. Preferably, the power supply can be logically connected to the processor 680 through the power management system, so as to realize functions such as managing charging, discharging, and power consumption management through the power management system.
尽管未示出,手机还可以包括摄像头、蓝牙模块等,在此不再赘述。Although not shown, the mobile phone may also include a camera, a Bluetooth module, etc., which will not be repeated here.
在本发明实施例中,该终端所包括的处理器680还具有以下功能:In the embodiment of the present invention, the processor 680 included in the terminal also has the following functions:
终端设备,如图6所示,为了便于说明,仅示出了与本发明实施例相关的部分,具体技术细节未揭示的,请参照本发明实施例方法部分。该终端可以为包括手机、平板电脑、PDA(PersonalDigitalAssistant,个人数字助理)、POS(PointofSales,销售终端)、车载电脑等任意终端设备,以终端为手机为例:As shown in FIG. 6 , the terminal device only shows the parts related to the embodiment of the present invention for convenience of description. For specific technical details not disclosed, please refer to the method part of the embodiment of the present invention. The terminal can be any terminal device including mobile phone, tablet computer, PDA (Personal Digital Assistant, personal digital assistant), POS (Point of Sales, sales terminal), vehicle-mounted computer, etc. Taking the terminal as a mobile phone as an example:
图6示出的是与本发明实施例提供的终端相关的手机的部分结构的框图。参考图6,手机包括:射频(RadioFrequency,RF)电路610、存储器620、输入单元630、显示单元640、传感器650、音频电路660、无线保真(wirelessfidelity,WiFi)模块670、处理器680、以及电源690等部件。本领域技术人员可以理解,图6中示出的手机结构并不构成对手机的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。FIG. 6 shows a block diagram of a partial structure of a mobile phone related to the terminal provided by the embodiment of the present invention. Referring to FIG. 6, the mobile phone includes: a radio frequency (RadioFrequency, RF) circuit 610, a memory 620, an input unit 630, a display unit 640, a sensor 650, an audio circuit 660, a wireless fidelity (wirelessfidelity, WiFi) module 670, a processor 680, and Power supply 690 and other components. Those skilled in the art can understand that the structure of the mobile phone shown in FIG. 6 does not constitute a limitation to the mobile phone, and may include more or less components than shown in the figure, or combine some components, or arrange different components.
下面结合图6对手机的各个构成部件进行具体的介绍:The following is a specific introduction to each component of the mobile phone in conjunction with Figure 6:
RF电路610可用于收发信息或通话过程中,信号的接收和发送,特别地,将基站的下行信息接收后,给处理器680处理;另外,将设计上行的数据发送给基站。通常,RF电路610包括但不限于天线、至少一个放大器、收发信机、耦合器、低噪声放大器(LowNoiseAmplifier,LNA)、双工器等。此外,RF电路610还可以通过无线通信与网络和其他设备通信。上述无线通信可以使用任一通信标准或协议,包括但不限于全球移动通讯系统(GlobalSystemofMobilecommunication,GSM)、通用分组无线服务(GeneralPacketRadioService,GPRS)、码分多址(CodeDivisionMultipleAccess,CDMA)、宽带码分多址(WidebandCodeDivisionMultipleAccess,WCDMA)、长期演进(LongTermEvolution,LTE)、电子邮件、短消息服务(ShortMessagingService,SMS)等。The RF circuit 610 can be used for sending and receiving information or receiving and sending signals during a call. In particular, after receiving the downlink information from the base station, it is processed by the processor 680; in addition, the designed uplink data is sent to the base station. Generally, the RF circuit 610 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier (Low Noise Amplifier, LNA), a duplexer, and the like. In addition, RF circuitry 610 may also communicate with networks and other devices via wireless communications. The above-mentioned wireless communication can use any communication standard or protocol, including but not limited to Global System of Mobile Communication (Global System of Mobile Communication, GSM), General Packet Radio Service (General Packet Radio Service, GPRS), Code Division Multiple Access (Code Division Multiple Access, CDMA), broadband code division multiple Address (WidebandCodeDivisionMultipleAccess, WCDMA), Long Term Evolution (LongTermEvolution, LTE), email, Short Message Service (ShortMessagingService, SMS), etc.
存储器620可用于存储软件程序以及模块,处理器680通过运行存储在存储器620的软件程序以及模块,从而执行手机的各种功能应用以及数据处理。存储器620可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序(比如声音播放功能、图像播放功能等)等;存储数据区可存储根据手机的使用所创建的数据(比如音频数据、电话本等)等。此外,存储器620可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。The memory 620 can be used to store software programs and modules, and the processor 680 executes various functional applications and data processing of the mobile phone by running the software programs and modules stored in the memory 620 . The memory 620 can mainly include a program storage area and a data storage area, wherein the program storage area can store an operating system, at least one application program required by a function (such as a sound playback function, an image playback function, etc.); Data created by the use of mobile phones (such as audio data, phonebook, etc.), etc. In addition, the memory 620 may include a high-speed random access memory, and may also include a non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid-state storage devices.
输入单元630可用于接收输入的数字或字符信息,以及产生与手机的用户设置以及功能控制有关的键信号输入。具体地,输入单元630可包括触控面板631以及其他输入设备632。触控面板631,也称为触摸屏,可收集用户在其上或附近的触摸操作(比如用户使用手指、触笔等任何适合的物体或附件在触控面板631上或在触控面板631附近的操作),并根据预先设定的程式驱动相应的连接装置。可选的,触控面板631可包括触摸检测装置和触摸控制器两个部分。其中,触摸检测装置检测用户的触摸方位,并检测触摸操作带来的信号,将信号传送给触摸控制器;触摸控制器从触摸检测装置上接收触摸信息,并将它转换成触点坐标,再送给处理器680,并能接收处理器680发来的命令并加以执行。此外,可以采用电阻式、电容式、红外线以及表面声波等多种类型实现触控面板631。除了触控面板631,输入单元630还可以包括其他输入设备632。具体地,其他输入设备632可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆等中的一种或多种。The input unit 630 can be used to receive input numbers or character information, and generate key signal input related to user settings and function control of the mobile phone. Specifically, the input unit 630 may include a touch panel 631 and other input devices 632 . The touch panel 631, also referred to as a touch screen, can collect the user's touch operations on or near it (for example, the user uses any suitable object or accessory such as a finger or a stylus on the touch panel 631 or near the touch panel 631). operation), and drive the corresponding connection device according to the preset program. Optionally, the touch panel 631 may include two parts, a touch detection device and a touch controller. Among them, the touch detection device detects the user's touch orientation, and detects the signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts it into contact coordinates, and sends it to the to the processor 680, and can receive and execute commands sent by the processor 680. In addition, the touch panel 631 can be implemented in various types such as resistive, capacitive, infrared, and surface acoustic wave. In addition to the touch panel 631 , the input unit 630 may also include other input devices 632 . Specifically, other input devices 632 may include, but are not limited to, one or more of physical keyboards, function keys (such as volume control keys, switch keys, etc.), trackballs, mice, joysticks, and the like.
显示单元640可用于显示由用户输入的信息或提供给用户的信息以及手机的各种菜单。显示单元640可包括显示面板641,可选的,可以采用液晶显示器(LiquidCrystalDisplay,LCD)、有机发光二极管(OrganicLight-EmittingDiode,OLED)等形式来配置显示面板641。进一步的,触控面板631可覆盖显示面板641,当触控面板631检测到在其上或附近的触摸操作后,传送给处理器680以确定触摸事件的类型,随后处理器680根据触摸事件的类型在显示面板641上提供相应的视觉输出。虽然在图6中,触控面板631与显示面板641是作为两个独立的部件来实现手机的输入和输入功能,但是在某些实施例中,可以将触控面板631与显示面板641集成而实现手机的输入和输出功能。The display unit 640 may be used to display information input by or provided to the user and various menus of the mobile phone. The display unit 640 may include a display panel 641. Optionally, the display panel 641 may be configured in the form of a Liquid Crystal Display (Liquid Crystal Display, LCD), an Organic Light-Emitting Diode (Organic Light-Emitting Diode, OLED), or the like. Further, the touch panel 631 may cover the display panel 641, and when the touch panel 631 detects a touch operation on or near it, it transmits to the processor 680 to determine the type of the touch event, and then the processor 680 determines the type of the touch event according to the The type provides a corresponding visual output on the display panel 641 . Although in FIG. 6, the touch panel 631 and the display panel 641 are used as two independent components to realize the input and input functions of the mobile phone, in some embodiments, the touch panel 631 and the display panel 641 can be integrated to form a mobile phone. Realize the input and output functions of the mobile phone.
手机还可包括至少一种传感器650,比如光传感器、运动传感器以及其他传感器。具体地,光传感器可包括环境光传感器及接近传感器,其中,环境光传感器可根据环境光线的明暗来调节显示面板641的亮度,接近传感器可在手机移动到耳边时,关闭显示面板641和/或背光。作为运动传感器的一种,加速计传感器可检测各个方向上(一般为三轴)加速度的大小,静止时可检测出重力的大小及方向,可用于识别手机姿态的应用(比如横竖屏切换、相关游戏、磁力计姿态校准)、振动识别相关功能(比如计步器、敲击)等;至于手机还可配置的陀螺仪、气压计、湿度计、温度计、红外线传感器等其他传感器,在此不再赘述。The handset may also include at least one sensor 650, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor can include an ambient light sensor and a proximity sensor, wherein the ambient light sensor can adjust the brightness of the display panel 641 according to the brightness of the ambient light, and the proximity sensor can turn off the display panel 641 and/or when the mobile phone is moved to the ear. or backlight. As a kind of motion sensor, the accelerometer sensor can detect the magnitude of acceleration in various directions (generally three axes), and can detect the magnitude and direction of gravity when it is stationary, and can be used to identify the application of mobile phone posture (such as horizontal and vertical screen switching, related Games, magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tap), etc.; as for other sensors such as gyroscope, barometer, hygrometer, thermometer, infrared sensor, etc. repeat.
音频电路660、扬声器661,传声器662可提供用户与手机之间的音频接口。音频电路660可将接收到的音频数据转换后的电信号,传输到扬声器661,由扬声器661转换为声音信号输出;另一方面,传声器662将收集的声音信号转换为电信号,由音频电路660接收后转换为音频数据,再将音频数据输出处理器680处理后,经RF电路610以发送给比如另一手机,或者将音频数据输出至存储器620以便进一步处理。The audio circuit 660, the speaker 661 and the microphone 662 can provide an audio interface between the user and the mobile phone. The audio circuit 660 can transmit the electrical signal converted from the received audio data to the loudspeaker 661, and the loudspeaker 661 converts it into an audio signal output; After being received, it is converted into audio data, and then the audio data is processed by the output processor 680, and then sent to another mobile phone through the RF circuit 610, or the audio data is output to the memory 620 for further processing.
WiFi属于短距离无线传输技术,手机通过WiFi模块670可以帮助用户收发电子邮件、浏览网页和访问流式媒体等,它为用户提供了无线的宽带互联网访问。虽然图6示出了WiFi模块670,但是可以理解的是,其并不属于手机的必须构成,完全可以根据需要在不改变发明的本质的范围内而省略。WiFi is a short-distance wireless transmission technology. The mobile phone can help users send and receive emails, browse web pages, and access streaming media through the WiFi module 670, which provides users with wireless broadband Internet access. Although FIG. 6 shows a WiFi module 670, it can be understood that it is not an essential component of the mobile phone, and can be completely omitted as required without changing the essence of the invention.
处理器680是手机的控制中心,利用各种接口和线路连接整个手机的各个部分,通过运行或执行存储在存储器620内的软件程序和/或模块,以及调用存储在存储器620内的数据,执行手机的各种功能和处理数据,从而对手机进行整体监控。可选的,处理器680可包括一个或多个处理单元;优选的,处理器680可集成应用处理器和调制解调处理器,其中,应用处理器主要处理操作系统、用户界面和应用程序等,调制解调处理器主要处理无线通信。可以理解的是,上述调制解调处理器也可以不集成到处理器680中。The processor 680 is the control center of the mobile phone. It uses various interfaces and lines to connect various parts of the entire mobile phone. By running or executing software programs and/or modules stored in the memory 620, and calling data stored in the memory 620, execution Various functions and processing data of the mobile phone, so as to monitor the mobile phone as a whole. Optionally, the processor 680 may include one or more processing units; preferably, the processor 680 may integrate an application processor and a modem processor, wherein the application processor mainly processes operating systems, user interfaces, and application programs, etc. , the modem processor mainly handles wireless communications. It can be understood that the foregoing modem processor may not be integrated into the processor 680 .
手机还包括给各个部件供电的电源690(比如电池),优选的,电源可以通过电源管理系统与处理器680逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。The mobile phone also includes a power supply 690 (such as a battery) for supplying power to various components. Preferably, the power supply can be logically connected to the processor 680 through the power management system, so as to realize functions such as managing charging, discharging, and power consumption management through the power management system.
尽管未示出,手机还可以包括摄像头、蓝牙模块等,在此不再赘述。Although not shown, the mobile phone may also include a camera, a Bluetooth module, etc., which will not be repeated here.
在本发明实施例中,该终端所包括的处理器680的功能可以对应到前述实施例的处理器503的功能,存储器620可以对应到存储器504的功能。在此不再一一赘述。In the embodiment of the present invention, the function of the processor 680 included in the terminal may correspond to the function of the processor 503 in the foregoing embodiment, and the memory 620 may correspond to the function of the memory 504 . No more details here.
值得注意的是,上述终端设备实施例中,所包括的各个单元只是按照功能逻辑进行划分的,但并不局限于上述的划分,只要能够实现相应的功能即可;另外,各功能单元的具体名称也只是为了便于相互区分,并不用于限制本发明的保护范围。It is worth noting that in the above terminal device embodiments, the units included are only divided according to functional logic, but are not limited to the above division, as long as the corresponding functions can be realized; in addition, the specific functions of each functional unit The names are only for the convenience of distinguishing each other, and are not used to limit the protection scope of the present invention.
另外,本领域普通技术人员可以理解实现上述各方法实施例中的全部或部分步骤是可以通过程序来指令相关的硬件完成,相应的程序可以存储于一种计算机可读存储介质中,上述提到的存储介质可以是只读存储器,磁盘或光盘等。In addition, those of ordinary skill in the art can understand that all or part of the steps in the above-mentioned method embodiments can be completed by instructing related hardware through programs, and the corresponding programs can be stored in a computer-readable storage medium. The storage medium can be read-only memory, magnetic disk or optical disk and so on.
以上仅为本发明较佳的具体实施方式,但本发明的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本发明实施例揭露的技术范围内,可轻易想到的变化或替换,都应涵盖在本发明的保护范围之内。因此,本发明的保护范围应该以权利要求的保护范围为准。The above are only preferred specific implementation modes of the present invention, but the scope of protection of the present invention is not limited thereto. Any person skilled in the art can easily think of changes or substitutions within the technical scope disclosed in the embodiments of the present invention. , should be covered within the protection scope of the present invention. Therefore, the protection scope of the present invention should be determined by the protection scope of the claims.
Claims (14)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610070987.3A CN105740715A (en) | 2016-01-29 | 2016-01-29 | A security assessment method and terminal equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610070987.3A CN105740715A (en) | 2016-01-29 | 2016-01-29 | A security assessment method and terminal equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105740715A true CN105740715A (en) | 2016-07-06 |
Family
ID=56242057
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610070987.3A Pending CN105740715A (en) | 2016-01-29 | 2016-01-29 | A security assessment method and terminal equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105740715A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106529288A (en) * | 2016-11-16 | 2017-03-22 | 智者四海(北京)技术有限公司 | Account risk identification method and device |
CN106993083A (en) * | 2017-02-21 | 2017-07-28 | 北京奇虎科技有限公司 | A kind of method and apparatus of recommendation intelligent terminal operation prompt information |
CN107563188A (en) * | 2017-09-08 | 2018-01-09 | 深圳前海茂佳软件科技有限公司 | Safe evaluating method, device and the computer-readable storage medium of application |
CN109670314A (en) * | 2018-09-13 | 2019-04-23 | 平安普惠企业管理有限公司 | Risk server appraisal procedure, device, equipment and computer readable storage medium |
CN110096868A (en) * | 2019-04-28 | 2019-08-06 | 深圳前海微众银行股份有限公司 | Auditing method, device, equipment and the computer readable storage medium of operation code |
CN110309653A (en) * | 2019-04-25 | 2019-10-08 | 维沃移动通信有限公司 | A security protection processing method and terminal |
CN112307480A (en) * | 2019-07-24 | 2021-02-02 | 中移互联网有限公司 | Risk analysis method and device for equipment where application software is located |
CN115955354A (en) * | 2022-12-30 | 2023-04-11 | 出门问问信息科技有限公司 | Risk control method, device, electronic equipment and storage medium |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102164148A (en) * | 2010-05-18 | 2011-08-24 | 卡巴斯基实验室封闭式股份公司 | Group security for portable information device |
CN102521549A (en) * | 2011-11-28 | 2012-06-27 | 宇龙计算机通信科技(深圳)有限公司 | Security pre-judgment device and method for application program |
US20130152060A1 (en) * | 2006-03-17 | 2013-06-13 | Epic Games, Inc. | Dual mode evaluation for programs containing recursive computation |
CN103369520A (en) * | 2012-03-27 | 2013-10-23 | 百度在线网络技术(北京)有限公司 | Intention prejudging system and method for application program suspicious behavior of mobile terminal |
CN103428196A (en) * | 2012-12-27 | 2013-12-04 | 北京安天电子设备有限公司 | URL white list-based WEB application intrusion detecting method and apparatus |
CN103440456A (en) * | 2013-09-06 | 2013-12-11 | Tcl集团股份有限公司 | Method and device for evaluating safety of application program |
CN103617397A (en) * | 2013-12-13 | 2014-03-05 | 北京邮电大学 | Safety assessment method and system for applications in intelligent terminal |
CN103927485A (en) * | 2014-04-24 | 2014-07-16 | 东南大学 | Android application program risk assessment method based on dynamic monitoring |
CN104200155A (en) * | 2014-08-12 | 2014-12-10 | 中国科学院信息工程研究所 | Monitoring device and method for protecting user privacy based on iPhone operating system (iOS) |
CN104376266A (en) * | 2014-11-21 | 2015-02-25 | 工业和信息化部电信研究院 | Determination method and device for security level of application software |
-
2016
- 2016-01-29 CN CN201610070987.3A patent/CN105740715A/en active Pending
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130152060A1 (en) * | 2006-03-17 | 2013-06-13 | Epic Games, Inc. | Dual mode evaluation for programs containing recursive computation |
CN102164148A (en) * | 2010-05-18 | 2011-08-24 | 卡巴斯基实验室封闭式股份公司 | Group security for portable information device |
CN102521549A (en) * | 2011-11-28 | 2012-06-27 | 宇龙计算机通信科技(深圳)有限公司 | Security pre-judgment device and method for application program |
CN103369520A (en) * | 2012-03-27 | 2013-10-23 | 百度在线网络技术(北京)有限公司 | Intention prejudging system and method for application program suspicious behavior of mobile terminal |
CN103428196A (en) * | 2012-12-27 | 2013-12-04 | 北京安天电子设备有限公司 | URL white list-based WEB application intrusion detecting method and apparatus |
CN103440456A (en) * | 2013-09-06 | 2013-12-11 | Tcl集团股份有限公司 | Method and device for evaluating safety of application program |
CN103617397A (en) * | 2013-12-13 | 2014-03-05 | 北京邮电大学 | Safety assessment method and system for applications in intelligent terminal |
CN103927485A (en) * | 2014-04-24 | 2014-07-16 | 东南大学 | Android application program risk assessment method based on dynamic monitoring |
CN104200155A (en) * | 2014-08-12 | 2014-12-10 | 中国科学院信息工程研究所 | Monitoring device and method for protecting user privacy based on iPhone operating system (iOS) |
CN104376266A (en) * | 2014-11-21 | 2015-02-25 | 工业和信息化部电信研究院 | Determination method and device for security level of application software |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106529288A (en) * | 2016-11-16 | 2017-03-22 | 智者四海(北京)技术有限公司 | Account risk identification method and device |
CN106993083A (en) * | 2017-02-21 | 2017-07-28 | 北京奇虎科技有限公司 | A kind of method and apparatus of recommendation intelligent terminal operation prompt information |
CN107563188A (en) * | 2017-09-08 | 2018-01-09 | 深圳前海茂佳软件科技有限公司 | Safe evaluating method, device and the computer-readable storage medium of application |
CN107563188B (en) * | 2017-09-08 | 2022-01-25 | 深圳前海茂佳软件科技有限公司 | Application security evaluation method and device and computer storage medium |
CN109670314A (en) * | 2018-09-13 | 2019-04-23 | 平安普惠企业管理有限公司 | Risk server appraisal procedure, device, equipment and computer readable storage medium |
CN110309653A (en) * | 2019-04-25 | 2019-10-08 | 维沃移动通信有限公司 | A security protection processing method and terminal |
CN110096868A (en) * | 2019-04-28 | 2019-08-06 | 深圳前海微众银行股份有限公司 | Auditing method, device, equipment and the computer readable storage medium of operation code |
CN112307480A (en) * | 2019-07-24 | 2021-02-02 | 中移互联网有限公司 | Risk analysis method and device for equipment where application software is located |
CN112307480B (en) * | 2019-07-24 | 2023-09-05 | 中移互联网有限公司 | Risk analysis method and device for equipment where application software is located |
CN115955354A (en) * | 2022-12-30 | 2023-04-11 | 出门问问信息科技有限公司 | Risk control method, device, electronic equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105740715A (en) | A security assessment method and terminal equipment | |
CN106331370B (en) | A data transmission method and terminal device | |
CN109873794B (en) | Protection method for denial of service attack and server | |
CN108834132B (en) | Data transmission method and equipment and related medium product | |
WO2014000632A1 (en) | Method, device and apparatus for acquiring security state of mobile terminal | |
US9680921B2 (en) | Method, apparatus, and system for controlling voice data transmission | |
CN106911848B (en) | Method and terminal device for outputting prompt message | |
CN106445596B (en) | Method and device for managing setting items | |
CN106657165B (en) | Network attack defense method, server and terminal | |
CN106412311A (en) | A data transmission method and terminal equipment | |
WO2018161540A1 (en) | Fingerprint registration method and related product | |
CN107967427A (en) | Monitor the method, apparatus and terminal device of loophole attack | |
CN106302603A (en) | The method and apparatus remotely deleting information | |
CN107104930A (en) | It is a kind of that the methods, devices and systems for checking authority are set | |
CN104573437A (en) | Information authentication method, device and terminal | |
CN106407771A (en) | Message management method and device | |
CN106648460B (en) | Step-counting data filtering method and intelligent terminal | |
CN110908586A (en) | Keyboard display method and device and terminal equipment | |
WO2017215663A1 (en) | Sound effect processing method and terminal | |
CN107102913A (en) | Data backup method and device and computer equipment | |
CN112307392A (en) | A kind of page detection method, device and equipment | |
CN106506623B (en) | Data transmission method and equipment | |
CN106371948B (en) | A kind of data back up method and terminal device | |
CN104966024B (en) | A kind of method and device of protection database | |
CN104134044B (en) | A kind of detection method, device and system of Information Security |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160706 |