[go: up one dir, main page]

CN110071924B - Terminal-based big data analysis method and system - Google Patents

Terminal-based big data analysis method and system Download PDF

Info

Publication number
CN110071924B
CN110071924B CN201910336086.8A CN201910336086A CN110071924B CN 110071924 B CN110071924 B CN 110071924B CN 201910336086 A CN201910336086 A CN 201910336086A CN 110071924 B CN110071924 B CN 110071924B
Authority
CN
China
Prior art keywords
terminal
application
information
file
application program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910336086.8A
Other languages
Chinese (zh)
Other versions
CN110071924A (en
Inventor
不公告发明人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Shouyi New Energy Technology Co.,Ltd.
Original Assignee
Wuhan Wufang Information Service Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Wufang Information Service Co Ltd filed Critical Wuhan Wufang Information Service Co Ltd
Priority to CN201910336086.8A priority Critical patent/CN110071924B/en
Publication of CN110071924A publication Critical patent/CN110071924A/en
Application granted granted Critical
Publication of CN110071924B publication Critical patent/CN110071924B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/128Anti-malware arrangements, e.g. protection against SMS fraud or mobile malware
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • H04W8/24Transfer of terminal data
    • H04W8/245Transfer of terminal data from a network towards a terminal

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

一种基于终端的大数据分析方法及系统,搜索应用程序,进行恶意与否的确认;确定重新尝试或是否下载;下载安装应用程序,进行安全性认证;确定保留还是卸载应用程序;运行、访问敏感或隐私数据时管理权限。该方法及系统能够利用大数据和信息安全技术,在安装阶段对应用程序进行安全性检测,并且对终端有危害的应用程序进行拦截,对其源头确认和阻断;针对应用程序对用户隐私信息的合法或非法访问问题,对终端的隐私信息进行加密处理,对于合法访问,通过合理管理进行隐私信息读取且确保读取不超越预设权限,对于非法访问,通过时间设置或权限阻断设置而避免应用程序对隐私程序的不合理访问,保证应用程序在终端上的下载、运行和数据访问的安全性。

Figure 201910336086

A terminal-based big data analysis method and system, search for an application, confirm whether it is malicious or not; determine whether to retry or download; download and install an application, perform security authentication; determine whether to retain or uninstall the application; run, access Manage permissions when sensitive or private data. The method and system can use big data and information security technology to perform security detection on application programs in the installation stage, and intercept applications that are harmful to the terminal, confirm and block their sources; For legal or illegal access, the private information of the terminal is encrypted. For legal access, private information is read through reasonable management and ensure that the reading does not exceed the preset permissions. For illegal access, time settings or permission blocking settings are used. And avoid unreasonable access to privacy programs by applications, and ensure the security of downloading, running and data access of applications on the terminal.

Figure 201910336086

Description

基于终端的大数据分析方法及系统Terminal-based big data analysis method and system

技术领域technical field

本发明涉及电数据处理领域,并且更具体而言,涉及一种基于终端的大数据分析方法及系统。The present invention relates to the field of electrical data processing, and more particularly, to a terminal-based big data analysis method and system.

背景技术Background technique

随着信息技术的高速发展,智能移动终端和高速移动网络为用户提供了丰富多彩的信息和资源,而用户在利用这些信息技术进行工作、生活、娱乐、沟通的同时,需要经由网络下载大量的应用程序(APP),借此可以经由网络将自己所需的资源或信息呈现、下载、存储到智能移动终端中,从而便利了用户的工作和生活。现今智能移动终端应用市场上有大量的特色鲜明、用户体验友好的应用,它们极大地提高了用户体验。With the rapid development of information technology, intelligent mobile terminals and high-speed mobile networks provide users with a variety of information and resources. While using these information technologies for work, life, entertainment, and communication, users need to download a large number of An application program (APP), whereby the resources or information required by the user can be presented, downloaded and stored in the intelligent mobile terminal via the network, thereby facilitating the user's work and life. There are a large number of applications with distinctive features and friendly user experience in the smart mobile terminal application market today, which greatly improve the user experience.

然而,技术也是一把双刃剑,在带来好处的同时,也引起一系列安全问题。例如,网络逐步成为恶意程序传播的途径。从中下载的程序存储或安装到本地终端运行后,有些会恶意修改本地终端中的文件,有些会造成系统瘫痪或者运行变慢。再例如,应用程序的下载、安装和运行带来个人隐私泄露的风险,所述个人隐私包括用户的个人身份、用户金融账户和财务信息、行为偏好、健康情况,社会地位、社交记录等私人信息。苹果公司的用户隐私泄露事件反映了该公司曾私自记录用户每次使用位置APP时的位置信息并上传到后台数据库之中,造成大量的用户隐私泄露。而且在对单个用户的特定数据挖掘中,大量而多样化的信息交集最终能够准确地描绘出该用户的轮廓,如个人年龄、经济状况、消费行为和等级、社会地位、社交圈等,进而催生出一些新的亟待解决的隐私风险及伦理安全问题。因此需要对安装的应用程序进行检测和查杀,然而现有技术中的检测和查杀存在以下问题。However, technology is also a double-edged sword, bringing benefits, but also causing a series of security problems. For example, the Internet has gradually become a way for malicious programs to spread. After the downloaded programs are stored or installed on the local terminal, some of them will maliciously modify the files in the local terminal, and some will cause system paralysis or slow operation. For another example, the download, installation and operation of the application bring the risk of personal privacy leakage, and the personal privacy includes the user's personal identity, the user's financial account and financial information, behavioral preferences, health status, social status, social records and other private information . Apple's user privacy leak incident reflects that the company has privately recorded the location information of users every time they use the location APP and uploaded it to the background database, resulting in a large number of user privacy leaks. Moreover, in the specific data mining of a single user, the intersection of a large number of and diverse information can finally accurately describe the user's profile, such as personal age, economic status, consumption behavior and level, social status, social circle, etc., and then give birth to Some new privacy risks and ethical security issues need to be addressed. Therefore, the installed applications need to be detected and killed. However, the detection and killing in the prior art have the following problems.

针对恶意应用程序的查杀,一般是检测出恶意程序后,删除恶意程序,以避免恶意程序执行恶意行为,但是无法追溯恶意程序的源头,因而无法对恶意程序的源头进行彻底查杀,断绝其源头。而且,对于恶意应用程序的分析包括静态分析和动态分析两种。静态分析简单快速,但是扫描前需要知道已知恶意应用程序的信息,如签名、行为模式、权限申请等。动态分析将应用程序运行在封闭环境中并监视,分析应用程序的行为特征,如文件权限改变、进程和线程运行情况、系统调用情况、网络访问情况等。但是无论是静态分析还是动态分析,其分析过程都需要有预先存储和记录的应用程序信息,其分析效率不够理想,并且更新和对比以及准确率取决于预先存储和记录的应用程序信息;客观地说,该分析技术缺少大数据的分析。另外,恶意的新安装的应用往往会试图访问用户的隐私信息;尽管有的应用程序会有合法权限对用户的诸如传入的短信SMS之类的隐私信息的合法访问,但是现有技术缺少对其机载已有用户隐私进行有效的文件保护,也缺乏对于隐私信息的访问的合理管理。The detection and killing of malicious applications is generally to delete malicious programs after detecting malicious programs to avoid malicious programs from executing malicious behaviors. source. Moreover, the analysis of malicious applications includes static analysis and dynamic analysis. Static analysis is simple and fast, but before scanning, you need to know information about known malicious applications, such as signatures, behavior patterns, and permission applications. Dynamic analysis runs the application in a closed environment and monitors it, and analyzes the behavioral characteristics of the application, such as file permission changes, process and thread operation, system calls, and network access. However, whether it is static analysis or dynamic analysis, the analysis process requires pre-stored and recorded application information, and its analysis efficiency is not ideal, and the update and comparison and accuracy depend on the pre-stored and recorded application information; objectively Said that the analysis technology lacks the analysis of big data. In addition, malicious newly installed applications often try to access the user's private information; although some applications have the legal authority to legally access the user's private information such as incoming text messages and SMS, the existing technology lacks the Its onboard has effective file protection for user privacy, and it also lacks reasonable management of access to private information.

发明内容SUMMARY OF THE INVENTION

本发明的目的之一是提供一种基于终端的大数据分析方法及系统,其能够利用大数据和信息安全技术,在安装阶段对应用程序进行安全性检测,并且对终端有危害的应用程序进行拦截,并对其源头进行确认和阻断;并且针对应用程序对于终端中用户隐私信息的合法或非法访问问题,本发明对于终端的隐私信息进行加密处理,对于合法访问,通过合理管理而进行隐私信息读取并且确保读取不超越预设权限,而对于非法访问,通过时间设置或者权限阻断设置而避免应用程序对隐私程序的不合理访问。通过本发明的方法及系统,可以基于大数据和权限管理实现系统的安全,并且最终保证应用程序在终端上的下载、运行和数据访问的安全性。One of the objectives of the present invention is to provide a terminal-based big data analysis method and system, which can use big data and information security technology to perform security detection on application programs in the installation stage, and perform security detection on applications that have harmful terminals. Intercept, and confirm and block its source; and for the legal or illegal access of the user's private information in the terminal by the application program, the present invention encrypts the private information of the terminal, and conducts privacy through reasonable management for legal access. Information read and ensure that the read does not exceed the preset permissions, and for illegal access, the unreasonable access of the application to the privacy program is avoided by the time setting or the permission blocking setting. With the method and system of the present invention, the security of the system can be realized based on big data and rights management, and finally the security of downloading, running and data access of the application program on the terminal is guaranteed.

本发明为解决上述技术问题而采取的技术方案为:一种基于终端的大数据分析方法,包括:终端搜索所需的应用程序并将其发送到判定服务器进行恶意与否的确认;终端基于判定服务器根据大数据获得的恶意与否的结果,确定重新尝试其它资源下载或用户选择是否下载或直接下载该应用程序:终端下载安装该应用程序并提取信息,发送到判定服务器进行安全性认证;终端基于判定服务器的安全性认证,确定在终端中保留该应用程序还是卸载该应用程序;以及终端确定保留该应用程序之后,后续应用程序运行、访问终端上的敏感或隐私数据时进行权限管理以将其使能或禁止。The technical solution adopted by the present invention to solve the above-mentioned technical problems is: a terminal-based big data analysis method, comprising: the terminal searches for the required application program and sends it to the determination server to confirm whether it is malicious or not; The server determines whether to retry the download of other resources or the user chooses whether to download or directly download the application according to the malicious or not obtained results of the big data: the terminal downloads and installs the application, extracts the information, and sends it to the judgment server for security authentication; the terminal Based on the security authentication of the determination server, it is determined whether to keep the application program in the terminal or uninstall the application program; and after the terminal determines to retain the application program, the subsequent application program runs and accesses sensitive or private data on the terminal. its enabled or disabled.

在一个实施例中,该方法进一步包括以下步骤:步骤S1,终端经由无线网络搜索所需的应用程序,并获取含有应用程序的资源服务器的名称和/或IP信息;步骤S2,终端将该资源服务器的名称和/或IP信息发送到判定服务器进行恶意与否的确认;步骤S3,终端根据判定服务器基于大数据确认的恶意与否的结果执行对应操作:如果恶意则阻断与该资源服务器的通信链路并继续尝试步骤S1中获取的其它资源服务器且顺次执行步骤S2和S3,直到判定服务器确认非恶意或者尝试次数达到用户预设次数;如果非恶意则由用户选择是否下载或直接下载该应用程序;步骤S4,下载后终端安装该应用程序并提取其信息,对该应用程序进行签名处理,并将提取的信息发送到判定服务器进行安全性认证;步骤S5,终端根据判定服务器基于大数据的安全性认证结果,确定在终端中保留该应用程序还是卸载该应用程序;当保留该应用程序时,对该应用程序赋予特有的权限,而当卸载时将该应用程序的信息发送到判定服务器以更新用于大数据分析、判定和确认的数据库;步骤S6,当该应用程序在终端上执行时,获取其运行参数并进行分析;步骤S7,基于分析的结果进一步确定在终端中保留该应用程序还是卸载该应用程序,并将该应用程序的信息发送到判定服务器以更新用于大数据分析、判定和确认的数据库;步骤S8,当该应用程序请求访问终端上的用户隐私数据时,终端根据权限配置表确认其访问权限,并执行对应操作;步骤S9,当终端有新的即时通讯消息传入并且该应用程序请求访问时,终端基于访问设置而对该应用程序的访问使能或禁止。In one embodiment, the method further includes the following steps: step S1, the terminal searches for the required application program via the wireless network, and obtains the name and/or IP information of the resource server containing the application program; step S2, the terminal uses the resource The name and/or IP information of the server are sent to the determination server to confirm whether it is malicious or not; step S3, the terminal performs a corresponding operation according to the result of whether the determination server is malicious or not based on the big data confirmation: if it is malicious, block the connection with the resource server. Communication link and continue to try other resource servers obtained in step S1 and perform steps S2 and S3 in sequence, until the determination server confirms that it is not malicious or the number of attempts reaches the number of times preset by the user; if it is not malicious, the user chooses whether to download or download directly the application; step S4, after downloading, the terminal installs the application and extracts its information, performs signature processing on the application, and sends the extracted information to the determination server for security authentication; step S5, the terminal determines the server based on the large The security authentication result of the data determines whether to keep the application program in the terminal or uninstall the application program; when the application program is retained, the application program is given special permissions, and when the application program is uninstalled, the information of the application program is sent to the judgment The server updates the database used for big data analysis, determination and confirmation; Step S6, when the application is executed on the terminal, obtain its operating parameters and analyze it; Step S7, based on the analysis result, it is further determined to keep the application in the terminal. The application program still uninstalls the application program, and sends the information of the application program to the determination server to update the database used for big data analysis, determination and confirmation; step S8, when the application program requests to access the user privacy data on the terminal, The terminal confirms its access authority according to the authority configuration table, and performs corresponding operations; step S9, when a new instant messaging message is incoming to the terminal and the application requests access, the terminal enables or disables access to the application based on the access settings. prohibit.

在一个实施例中,步骤S1进一步包括:直接经由终端安装的浏览器,通过输入期望的应用程序的名称,通过搜索引擎进行搜索;或者在当前的非浏览器应用中,通过用户手指长按屏幕,在屏幕上出现选择文字的选项,用户通过选择和高亮应用程序的全部或部分名称,并在选定后点击屏幕上出现的搜索按钮,通过点击该搜索按钮而出现一个或多个浏览器的选择图标以供选择,在选择对应的浏览器图标后进行搜索;或者在当前的非浏览器应用中,通过选择该非浏览器应用中的搜索图标,在屏幕上出现输入框,通过输入期望的应用程序名称后,该非浏览器应用要么直接调用默认的第三方浏览器进行搜索,要么出现一个或多个浏览器的选择图标以供选择并且在选择对应的浏览器图标后进行搜索;或者在内嵌有浏览器的即时通讯应用中,要么通过用户手指长按屏幕并在屏幕上出现选择文字的选项,通过选择和高亮应用程序的全部或部分名称并在选定后点击屏幕上出现的搜索按钮而调用嵌入的浏览器进行搜索,要么通过选择该非浏览器应用中的搜索图标而在屏幕上出现输入框,通过输入期望的应用程序名称而调用嵌入的浏览器进行搜索。在经由无线网络搜索所需的应用程序之后,根据结果获取用于标识含有应用程序的资源服务器的名称和/或IP地址。In one embodiment, step S1 further includes: directly via the browser installed on the terminal, by inputting the name of the desired application, to search through a search engine; or in the current non-browser application, long press the screen with the user's finger , the option to select text appears on the screen, the user selects and highlights all or part of the name of the application, and clicks the search button that appears on the screen after selection, and one or more browsers appear by clicking the search button , select the corresponding browser icon to search; or in the current non-browser application, by selecting the search icon in the non-browser application, an input box appears on the screen, and by entering the desired After selecting the application name, the non-browser application either directly invokes the default third-party browser to search, or one or more browser selection icons appear for selection and search after selecting the corresponding browser icon; or In instant messaging apps with embedded browsers, either by long-pressing the screen with the user's finger and an option to select text appears on the screen, by selecting and highlighting all or part of the app's name and clicking on the screen when selected The embedded browser is invoked for searching by pressing the search button of the non-browser application, or an input box appears on the screen by selecting the search icon in the non-browser application, and the embedded browser is invoked for searching by entering the desired application name. After searching for the desired application program via the wireless network, the name and/or IP address for identifying the resource server containing the application program is obtained according to the result.

在一个实施例中,步骤S2进一步包括:终端选择该资源服务器的名称和/或IP信息中的任一者或两者,并将其以固定的包传输格式打包在待传输的包中,并将包的报头设置为请求属性,在待传输的包中的名称和/或IP信息中的任一者或两者之后通过固定的结束符终止,以便于判定服务器识别,之后将该包通过无线链路发送到判定服务器,以供进行恶意与否的确认。In one embodiment, step S2 further includes: the terminal selects any one or both of the resource server's name and/or IP information, and packages it in a to-be-transmitted packet in a fixed packet transmission format, and Set the header of the packet as a request attribute, terminate with a fixed terminator after either or both of the name and/or IP information in the packet to be transmitted, to facilitate identification by the decision server, and then pass the packet over the wireless The link is sent to the decision server for malicious or malicious confirmation.

在一个实施例中,步骤S3进一步包括:判定服务器内部设置有用于大数据分析、确认和判定的数据库,该数据库存储有用于终端的应用程序的安全属性信息,包括恶意、安全和待定,该安全属性信息随着时间的流逝而进行更新,其更新方式通过用户上传、信息中心通知等方式中的任一种而进行;判定服务器接收终端传输的包,并基于预设的拆分包规则,提取包中的资源服务器的名称和/或IP信息中的任一者或两者,并将其输入到内部设置的数据库,以进行信息匹配,当有符合安全或恶意的匹配项以及无匹配而被确认为待定时,将该明确和待定的安全属性信息的结果进行打包,经由无线链路发送到终端;终端接收该包并拆分包,提取其中的安全属性信息,如果为恶意则阻断与该资源服务器的通信链路,并继续尝试步骤S1中获取的其它资源服务器且顺次执行步骤S2和S3,直到判定服务器确认非恶意或者尝试次数达到用户预设次数;如果是安全则由用户选择是否下载该应用程序:如果是安全则由用户选择是否下载或直接下载该应用程序,其中如果是安全则直接下载该应用程序,而如果是待定则由用户选择是否下载该应用程序,若下载则进行后续步骤,若不下载则确定直接退出该方法还是继续尝试步骤S1中获取的其它资源服务器且顺次执行步骤S2和S3直到判定服务器确认符合用户期望的安全属性或尝试次数达到用户预设次数。In one embodiment, step S3 further includes: determining that the server is internally provided with a database for big data analysis, confirmation and determination, and the database stores the security attribute information of the application program for the terminal, including malicious, safe and pending, the security The attribute information is updated with the passage of time, and its update method is carried out by any one of user uploading, information center notification, etc.; it is determined that the server receives the packet transmitted by the terminal, and based on the preset packet splitting rule, extracts Either or both of the name and/or IP information of the resource server in the package and entered into a database set up internally for information matching, when there is a safe or malicious match and no match is rejected. It is confirmed that it is pending, and the result of the clear and pending security attribute information is packaged and sent to the terminal via the wireless link; the terminal receives the packet and splits the packet, extracts the security attribute information in it, and if it is malicious, blocks the connection with the terminal. The communication link of the resource server, and continue to try other resource servers obtained in step S1 and execute steps S2 and S3 in sequence, until it is determined that the server is not malicious or the number of attempts reaches the user's preset number; if it is safe, it is selected by the user Whether to download the application: if it is safe, the user chooses whether to download or directly download the application, wherein if it is safe, the application is downloaded directly, and if it is pending, the user chooses whether to download the application. Carry out the subsequent steps, if not, then determine whether to exit the method directly or continue to try other resource servers obtained in step S1 and execute steps S2 and S3 in sequence until it is determined that the server confirms that the security attributes meet the user’s expectations or the number of attempts reaches the user’s preset number of times. .

在一个实施例中,步骤S4进一步包括:在下载后终端安装该应用程序并提取其信息,对该应用程序进行签名处理,并将提取的信息发送到判定服务器进行安全性认证的步骤中,其中的终端在安装该应用程序的过程中,更改应用程序的文件后缀名以进行解压而得到其中包括的经过编译和工具打包形成的第一文件,获得变换工具以将包括类别名称的类别文件拷贝到第一目录位置,在第一目录位置处通过类别转换命令而生成应用程序中的分组数据;通过遍历分组数据的库函数而获取调取的函数,通过调取的函数的行为信息确定其行为属性,其中该行为信息包括访问行为信息、创建进程行为信息、操作进程行为信息、操作注册表行为信息、申请调取其它应用程序的标识符和权限的行为信息、安装行为信息、压缩打包行为信息和移动数据传输行为信息,而行为属性包括恶意与否;根据行为属性确定调取的函数的行为执行路径,将该执行路径进行记录,作为提取的信息的一部分,以在后续步骤中上传到判定服务器,通过将该执行路径的部分或全部与判定服务器中的基于字节码的路径大数据进行分析,进而进行安全性认证。其中终端对该应用程序进行签名处理的过程中,基于解压后的应用程序,获取应用程序中所有文件;将第一类型的文件用安全哈希算法计算摘要信息,并对该摘要信息进行编码,之后将编码值存入不同于第一类型的第二类型的第一文件中,以及将先前保存在第二类型的第一文件中的摘要信息和私钥信息生成一组签名信息并保存在第二类型的与第一文件不同的第二文件中的第一位置,将签名信息和公钥存入第二文件中的第二位置中,其中第一类型和第二类型涉及不同目录类型的文件。In one embodiment, step S4 further includes: after downloading, the terminal installs the application and extracts its information, performs signature processing on the application, and sends the extracted information to the determination server for security authentication, wherein In the process of installing the application program, the terminal changes the file suffix name of the application program for decompression to obtain the first file included in it after compilation and tool packaging, and obtains a transformation tool to copy the category file including the category name to The first directory location, where the category conversion command is used to generate grouped data in the application; the called function is obtained by traversing the library function of the grouped data, and its behavior attribute is determined by the behavior information of the called function , where the behavior information includes access behavior information, process creation behavior information, operation process behavior information, registry operation behavior information, behavior information for applying for calling identifiers and permissions of other applications, installation behavior information, compression and packaging behavior information, and The mobile data transmits behavior information, and the behavior attributes include malicious or not; determine the behavior execution path of the called function according to the behavior attributes, record the execution path as part of the extracted information, and upload it to the judgment server in the subsequent steps , by analyzing part or all of the execution path with the bytecode-based path big data in the judgment server, and then performing security authentication. In the process of signing the application, the terminal obtains all the files in the application based on the decompressed application; the first type of file is used to calculate the digest information with the secure hash algorithm, and the digest information is encoded, Then store the encoded value in a first file of a second type different from the first type, and generate a set of signature information from the digest information and private key information previously saved in the first file of the second type and save it in the first file. The first position in the second file of the two types is different from the first file, and the signature information and the public key are stored in the second position in the second file, wherein the first type and the second type relate to files of different directory types .

在一个实施例中,在上述步骤S4中,提取信息进一步包括提取信息的其它部分,即:将应用程序的文件重命名为后缀名为压缩包形式的文件并进行解压,进而得到第一配置文件,使用第一开源软件将第一配置文件转换成可操作的文本格式;将使用第二开源软件反编译解压的结果中的二进制的源码文件;使用第三开源软件还原二进制的源码文件以获得该应用程序的文件的源码;基于应用程序的文件的源码,使用匹配算法将源码进行扫描,并对指定关键词进行统计,获取指定的各个关键词在类文件中的数量和对应位置并使用矩阵存储,基于距离算法计算每两个关键词之间的相似距离;基于相似距离对关键词分类,并将矩阵中的每个关键词作为根节点,把与各个节点之间相似度高的关键词聚合在一起,与存储的所在的位置的矩阵比对,去除不同类别的关键词,进而归类存储;将终端中的特征数据库中存储的安全应用程序的特征与归类存储的特征进行对比,去除该应用程序的特征中包含的安全特征以避免增加信息处理量并增加信息处理时间和功耗以及浪费终端有限的处理资源;将归类存储并去除特征的数据作为提取的信息的其它部分,与其它信息一起被发送到判定服务器进行安全性认证。In one embodiment, in the above step S4, extracting the information further includes extracting other parts of the information, that is: renaming the file of the application program to a file with a suffix in the form of a compressed package and decompressing it, thereby obtaining the first configuration file , use the first open source software to convert the first configuration file into an operable text format; use the second open source software to decompile and decompress the binary source code file in the result; use the third open source software to restore the binary source code file to obtain the The source code of the file of the application program; based on the source code of the file of the application program, use the matching algorithm to scan the source code, count the specified keywords, obtain the number and corresponding position of each specified keyword in the class file, and use the matrix to store , calculate the similarity distance between each two keywords based on the distance algorithm; classify the keywords based on the similarity distance, use each keyword in the matrix as the root node, and aggregate the keywords with high similarity with each node Together, compare with the matrix of the stored location, remove keywords of different categories, and then classify and store them; The security features included in the features of the application program avoid increasing the amount of information processing and increasing the information processing time and power consumption and wasting the limited processing resources of the terminal; classify the stored and de-featured data as other parts of the extracted information, and Along with other information, it is sent to the decision server for security authentication.

在一个实施例中,步骤S5进一步包括:终端接收判定服务器基于大数据的安全性认证结果,并基于该结果进一步确定是否为恶意,当为恶意时卸载该应用程序,当为安全时在终端中保留该应用程序,而当待定时将风险提示信息在显示屏上展示给用户以供用户了解安全属性并选择卸载还是保留;当保留该应用程序时,对该应用程序赋予权限,该权限包括存储权限、拍照权限,麦克风使用的权限、录音权限、调用终端传感器的权限、读取和发送短消息权限、拨打电话权限、识别终端安装的SIM卡号码的权限、读取通信录的权限、读取用户运动数据的权限、开启移动运营商通信网络连接权限、开启无线保真连接权限、读取其它应用程序的权限、读取即时通讯软件的通信记录的权限,赋予权限包括赋予启用权限或者赋予禁用权限;当确定卸载时,将该应用程序的信息发送到判定服务器以更新判定服务器中用于大数据分析、判定和确认的数据库。In one embodiment, step S5 further includes: the terminal receives the big data-based security authentication result of the determination server, and further determines whether it is malicious based on the result, uninstalls the application when it is malicious, and in the terminal when it is safe Retain the application, and display the risk prompt information on the display screen to the user when it is to be scheduled so that the user can understand the security attributes and choose to uninstall or retain; when the application is retained, grant the application permission, including storage Permissions, permission to take pictures, permission to use the microphone, permission to record, permission to call terminal sensors, permission to read and send short messages, permission to make calls, permission to identify the SIM card number installed on the terminal, permission to read the address book, permission to read Permissions for user exercise data, permission to enable mobile operator communication network connection, permission to enable Wi-Fi connection, permission to read other applications, permission to read communication records of instant messaging software, granting permission includes granting enable permission or granting disable Permission; when it is determined to uninstall, the information of the application is sent to the decision server to update the database in the decision server for big data analysis, decision and confirmation.

在一个实施例中,步骤S6中,当该应用程序在终端上执行时,获取其运行参数并进行分析,其中包括:执行应用程序,获取其运行过程中的行为参数,该行为参数包括系统API、文件权限的变化、进程和线程运行数据、调用数据、网络访问请求数据、发送的网络数据,将该行为参数记录在日志文件中;监控应用程序中可移植的执行文件的创建操作,确定其创建主体,在终端存储器中建立可移植的执行文件与其创建主体间的对应关系;使用模拟工具自行运行和模拟终端用户的运行操作,以获得日志文件记录和网络数据分组文件记录;在模拟工具运行结束,并且在网络链路开启接通和随着时间的流逝而数据通信结束之后,将日志文件记录和网络数据分组文件记录存储在第一存储位置中;对日志文件记录和网络数据分组文件记录进行分析,其中使用特征提取对日志文件记录和网络数据分组文件记录的特征量化,将权限、API、URL和字符串转换成数值特征,使用采用基于均值和方差的特征选择算法选择特征的子集,结合分类和聚类以及标签构建规则对数值特征进行预测,基于该数值特征与预设配置文件中的参数的数值匹配而确定其运行行为属性,即安装的该应用程序对于终端来说是否安全,并将其作为分析的结果的第一部分;当结果为安全或相反时,将应用程序中可移植的执行文件与其创建主体的对应关系作为分析的结果的第二部分,当为不安全即恶意时,另外将创建主体的相关信息进行标记以作为标识该应用程序会对终端造成影响的恶意标识信息并作为第二部分的补充部分,以供发送到判定服务器更新大数据分析判定和确认的数据库,并且在终端进行记录并存储到安全信息数据库中以作为恶意的来源,在后续安装时可将该来源的应用程序作为来自恶意来源的应用程序而提供和显示给用户,供用户可选地对该源头进行彻底查杀并掐断该源头和来自其的所有应用程序的安装以及该源头对终端的任何访问请求;聚合分析的结果的第一部分和分析的结果的第二部分以作为该应用程序的信息。In one embodiment, in step S6, when the application program is executed on the terminal, obtain and analyze its running parameters, which includes: executing the application program, and obtaining behavior parameters during its running process, where the behavior parameters include system APIs , changes in file permissions, process and thread running data, call data, network access request data, and sent network data, record the behavior parameters in the log file; monitor the creation of portable executable files in the application, determine its Create the main body, establish the corresponding relationship between the portable execution file and the creation main body in the terminal memory; use the simulation tool to run and simulate the operation of the terminal user to obtain log file records and network data grouping file records; run the simulation tool end, and after the network link is turned on and the data communication ends over time, the log file record and the network data packet file record are stored in the first storage location; the log file record and the network data packet file record are stored in the first storage location; Perform analysis, where feature extraction is used to quantify features of log file records and network data grouped file records, permissions, APIs, URLs, and strings are converted into numerical features, and a subset of features is selected using a feature selection algorithm based on mean and variance , predict the numerical feature based on the classification and clustering and label construction rules, and determine its running behavior attribute based on the numerical feature matching the value of the parameter in the preset configuration file, that is, whether the installed application is safe for the terminal. , and take it as the first part of the analysis result; when the result is safe or vice versa, take the correspondence between the portable executable file in the application and its creation body as the second part of the analysis result, when it is unsafe or malicious In addition, the relevant information of the created subject will be marked as the malicious identification information that the application will affect the terminal and as a supplementary part of the second part for sending to the judgment server to update the database for big data analysis judgment and confirmation , and recorded at the terminal and stored in the security information database as a malicious source, and the application program of this source can be provided and displayed to the user as an application program from a malicious source during subsequent installation, so that the user can optionally The source is thoroughly checked and killed, and the installation of the source and all applications from it, as well as any access requests from the source to the terminal; the first part of the results of the analysis and the second part of the results of the analysis are aggregated as the application. Information.

在一个实施例中,步骤S7中,基于分析的结果进一步确定在终端中保留该应用程序还是卸载该应用程序,并将该应用程序的信息发送到判定服务器以更新用于大数据分析、判定和确认的数据库进一步包括:终端基于分析的结果的第一部分,当为安全的应用程序时保留该应用程序,而当为恶意时卸载该应用程序,并将包括分析的结果的第一部分和分析的结果的第二部分的应用程序的信息发送到判定服务器以更新用于大数据分析、判定和确认的数据库,其中为恶意时,分析的结果的第二部分还包括有将创建主体的相关信息进行标记以作为标识该应用程序会对终端造成影响的恶意标识信息的补充部分。In one embodiment, in step S7, based on the analysis result, it is further determined whether to keep the application program in the terminal or uninstall the application program, and send the information of the application program to the determination server to be updated for big data analysis, determination and evaluation. The confirmed database further includes: the terminal based on the first part of the results of the analysis, retains the application when it is a safe application, and uninstalls the application when it is malicious, and will include the first part of the results of the analysis and the results of the analysis The information of the second part of the application program is sent to the judgment server to update the database for big data analysis, judgment and confirmation. When it is malicious, the second part of the analysis result also includes the relevant information to mark the created subject. as a supplementary part of the malicious identification information that identifies the application that will affect the terminal.

在一个实施例中,在步骤S7中,在执行完上述步骤之后,进一步执行以下操作:在卸载应用程序之后,当终端启动网络通信时激活监控程序,进而使得该监控程序实时截取通过网络收发的数据,并将发送的数据宿和/或接收的数据源与之前确定的恶意的来源进行特征匹配,当符合匹配标准时将该结果显示给用户并分析待发送的数据所在的位置以及对该数据进行调用的实体的名称和位置,并将该调用的实体的名称和位置进行定点移除,之后显示移除成功与否的结果,如果不成功则重复上述移除操作并展示给用户移除进程,直到符合预设要求为止。In one embodiment, in step S7, after the above steps are performed, the following operations are further performed: after the application program is uninstalled, the monitoring program is activated when the terminal starts network communication, so that the monitoring program intercepts in real time the data sent and received through the network. data, and feature matching between the sent data sink and/or the received data source and the previously determined malicious source, and when the matching criteria are met, the result is displayed to the user, and the location of the data to be sent is analyzed and the data is analyzed. Name and location of the called entity, and remove the name and location of the called entity at a fixed point, and then display the result of whether the removal is successful or not. until the preset requirements are met.

在一个实施例中,分析待发送的数据所在的位置的同时还分析待发送的数据,以确定是否含有用户的账号、联系人、验证码、联系方式的信息,如果存在则将风险提示给用户。In one embodiment, the location of the data to be sent is analyzed and the data to be sent is also analyzed to determine whether it contains information about the user's account, contact person, verification code, and contact information, and if so, the risk is prompted to the user .

在一个实施例中,步骤S8中,当该应用程序请求访问终端上的用户隐私数据时,终端根据权限配置表确认其访问权限,并执行对应操作进一步包括:当该应用程序请求访问终端上的用户隐私数据时,应用程序将访问请求发送给终端的处理器,处理器将应用程序标识发送至权限管理模块,以根据权限管理模块中的权限配置表确定该应用程序的访问权限,当应用程序具有复数种隐私数据中的一种或多种的访问权限时,处理器确定该应用程序请求访问的终端上的用户隐私数据的访问权限是否符合权限配置表确定的访问权限,如果符合则给应用程序分配一个对应的解释引擎,处理器发布跳转指令,并经过执行跳转指令后将应用程序引导至解释引擎的入口,以用于由该解释引擎对请求访问的终端上的用户隐私数据进行解释,并将解释的用户隐私数据发送给该应用程序。In one embodiment, in step S8, when the application program requests access to user privacy data on the terminal, the terminal confirms its access authority according to the authority configuration table, and performs corresponding operations. When the user privacy data, the application sends the access request to the processor of the terminal, and the processor sends the application identifier to the rights management module to determine the access rights of the application according to the rights configuration table in the rights management module. When having one or more access rights of a plurality of types of private data, the processor determines whether the access rights of the user's private data on the terminal that the application requests to access conform to the access rights determined by the rights configuration table, and if so, give the application to the access rights. The program allocates a corresponding interpretation engine, the processor issues a jump instruction, and after executing the jump instruction, the application program is guided to the entrance of the interpretation engine, so that the interpretation engine can perform user privacy data on the terminal requesting access by the interpretation engine. explain, and send the explained user privacy data to the app.

在一个实施例中,该用户隐私数据是为了保障用户信息安全而被转换的数据,其在终端中存储时不会明码存储而被恶意代码或文件或软件攻击获取进而给用户造成不可挽回的损失,其中该用户隐私数据首先由原始函数的代码形式转换成仅仅可以由终端的解释引擎解释、对于第三方软件来说无法有效分割破解并且看上去没有明显含义的字节码,该字节码以片段形式由解释引擎进行解释,并且该片段长度由该解释引擎限定,同时在各个片段之间、在前一个片段的末尾以解释引擎可识别的、表示间隔的、以有限数据长度的字节码形式的分隔符;为字节码设定跳转指令,并存储在寄存器中,同时擦除由原始函数的代码形式表示的用户隐私数据;当应用程序请求访问终端上的用户隐私数据时,如果处理器确定该应用程序请求访问的终端上的用户隐私数据的访问权限是否符合权限配置表确定的访问权限,则处理器调取并发布跳转指令,并经过执行跳转指令后将应用程序引导至解释引擎的入口,以用于由该解释引擎对请求访问的终端上的用户隐私数据进行解释,并将解释的用户隐私数据发送给该应用程序。In one embodiment, the user privacy data is data that is converted to ensure the security of user information. When stored in the terminal, it will not be stored in plaintext, but will be acquired by malicious code, files or software attacks, thereby causing irreparable losses to the user. , where the user privacy data is first converted from the code form of the original function into a bytecode that can only be interpreted by the interpretation engine of the terminal, cannot be effectively split and cracked for third-party software, and does not seem to have obvious meaning. The fragment form is interpreted by the interpretation engine, and the fragment length is limited by the interpretation engine, while between each fragment, at the end of the previous fragment, in bytecodes recognizable by the interpretation engine, representing the interval, at a limited data length delimiter in the form; set the jump instruction for the bytecode and store it in the register, while erasing the user's private data represented by the code form of the original function; when the application requests to access the user's private data on the terminal, if The processor determines whether the access authority of the user's private data on the terminal that the application requests to access conforms to the access authority determined by the authority configuration table, then the processor calls and issues the jump instruction, and guides the application after executing the jump instruction. The entry to the interpretation engine is used for the interpretation engine to interpret the user privacy data on the terminal requesting access, and send the interpreted user privacy data to the application.

在一个实施例中,步骤S9中,当终端有新的即时通讯消息传入并且该应用程序请求访问时,终端基于访问设置而对该应用程序的访问使能或禁止进一步包括:当终端有新的即时通讯消息传入时,终端对该新传入的即时通讯消息进行接收,并由终端的消息分析模块分析其中包含的涉密信息,终端的消息分析模块判断传入的即时通讯消息中是否包含用户密码、账号、验证码中的任一个或多个与有效时间的组合的信息,当包含其中的任一个或多个与有效时间的组合的信息时,将该新传入的即时通讯消息存储到终端的私密存储库中,否则将新传入的即时通讯消息存储到终端的常规存储库中;当包含其中的任一个或多个与有效时间的组合的信息,且当安装的应用程序试图访问该传入的即时通讯消息时,权限管理模块验证该应用程序是否具有对传入的即时通讯消息的访问权限,(i)如果不具有访问权限,则权限管理模块通知终端的私密存储库不将新传入的即时通讯消息发送给该应用程序,以及(ii)如果具有访问权限,则权限管理模块向私密存储库发送应用程序对私密存储库中消息的读取请求,并且权限管理模块通知终端的消息分析模块判断当前时段是否在存储的新传入的即时通讯消息的有效读取时段中,当处于新传入的即时通讯消息的有效读取时段中时,则由私密存储库将其中存储的新传入的即时通讯消息发送给应用程序,否则当不处于新传入的即时通讯消息的有效读取时段中,即处于新传入的即时通讯消息的禁止读取时段中时,私密存储库拒绝将其中存储的新传入的即时通讯消息发送给应用程序,直到其禁止读取时段解除,此时即使应用程序尝试读取私密信息成功,由于已经随着时间的过去而超出新传入的即时通讯消息的可以访问的有效读取时段,所以即使应用程序读取到私密信息,也因为过了有效时段而无法对终端构成攻击,极大地降低了恶意应用程序对终端的私密信息的窃取和泄露;以及当将新传入的即时通讯消息存储到终端的常规存储库中,且当安装的应用程序试图访问该传入的即时通讯消息时,权限管理模块验证该应用程序是否具有对传入的即时通讯消息的访问权限,(i)如果不具有访问权限,则权限管理模块通知终端的常规存储库不将新传入的即时通讯消息发送给该应用程序,以及(ii)如果具有访问权限,则限管理模块向常规存储库发送应用程序对常规存储库中消息的读取请求,并且由常规存储库将其中存储的新传入的即时通讯消息发送给应用程序。In one embodiment, in step S9, when a new instant messaging message is incoming to the terminal and the application program requests access, enabling or disabling the access of the application program by the terminal based on the access setting further includes: when the terminal has a new instant message When the incoming instant messaging message is received, the terminal receives the newly incoming instant messaging message, and the message analysis module of the terminal analyzes the confidential information contained therein, and the message analysis module of the terminal determines whether the incoming instant messaging message contains The information containing any one or more of the user password, account number, and verification code in combination with the valid time, when any one or more of them and the combination of the valid time are included, the newly incoming instant messaging message Stored in the private repository of the terminal, otherwise newly incoming instant messaging messages are stored in the regular repository of the terminal; when any one or more of the information in combination with the valid time is included, and when the installed application When attempting to access the incoming instant messaging message, the rights management module verifies whether the application has access rights to the incoming instant messaging message, (i) if not, the rights management module notifies the terminal's private repository do not send new incoming instant messaging messages to the application, and (ii) if there is access rights, the rights management module sends the application's read request for messages in the private repository to the private repository, and the rights management module Notify the message analysis module of the terminal to determine whether the current period is in the valid reading period of the newly incoming instant messaging message stored, and when it is in the valid reading period of the newly incoming instant messaging message, the private storage repository will The newly incoming instant messaging message stored therein is sent to the application, otherwise, when it is not in the valid reading period of the newly incoming instant messaging message, that is, in the prohibiting reading period of the newly incoming instant messaging message, The private repository refuses to send new incoming instant messenger messages stored in it to the application until its no-read period is lifted, at which point even if the application attempts to read the private message successfully, it has exceeded the new value over time. The valid reading period of incoming instant messaging messages, so even if the application reads the private information, it cannot attack the terminal because the valid period has passed, which greatly reduces the private information of malicious applications to the terminal. theft and disclosure; and when a new incoming instant messaging message is stored in the terminal's regular repository, and when an installed application attempts to access the incoming instant messaging message, the rights management module verifies whether the application has access rights to incoming instant messaging messages, (i) if no access rights are available, the rights management module informs the terminal's general repository not to send new incoming instant messaging messages to the application, and (ii) if With access rights, the management module sends an application's read request for messages in the conventional repository to the conventional repository, and the conventional repository sends newly incoming instant messaging messages stored therein to the application.

在一个实施例中,公开了一种基于终端的大数据分析系统,包括终端和判定服务器,其中终端包括:处理器,权限管理模块,解释引擎,消息分析模块,私密存储库,常规存储库;判定服务器内部设置有用于大数据分析、确认和判定的数据库;所述基于终端的大数据分析系统用于执行前述的基于终端的大数据分析方法。In one embodiment, a terminal-based big data analysis system is disclosed, including a terminal and a determination server, wherein the terminal includes: a processor, a rights management module, an interpretation engine, a message analysis module, a private repository, and a conventional repository; The determination server is internally provided with a database for big data analysis, confirmation and determination; the terminal-based big data analysis system is used to execute the aforementioned terminal-based big data analysis method.

附图说明Description of drawings

在附图中通过实例的方式而不是通过限制的方式来示出本发明的实施例,其中相同的附图标记表示相同的元件,其中:Embodiments of the invention are illustrated by way of example and not by way of limitation in the accompanying drawings, wherein like reference numerals refer to like elements, wherein:

根据本发明的示范性实施例,图1图示一种基于终端的大数据分析方法的简要流程图。According to an exemplary embodiment of the present invention, FIG. 1 illustrates a brief flow chart of a terminal-based big data analysis method.

根据本发明的示范性实施例,图2图示图1的一种基于终端的大数据分析方法的具体实现的流程图。According to an exemplary embodiment of the present invention, FIG. 2 illustrates a flowchart of a specific implementation of a terminal-based big data analysis method of FIG. 1 .

根据本发明的示范性实施例,图3图示一种基于终端的大数据分析系统。According to an exemplary embodiment of the present invention, FIG. 3 illustrates a terminal-based big data analysis system.

具体实施方式Detailed ways

在进行以下具体实施方式之前,阐述贯穿本专利文档所使用的某些词语和短语的定义可能是有利的:术语“包括”和“包含”及其派生词意味着包括而没有限制;术语“或”是包含的,意味着和/或;短语“与...相关联”、“与其相关联”及其派生词可能意味着包括,被包括在...内,与...互连,包含,被包含在...内,连接到...或与...连接,耦合到...或与...耦合,可与...通信,与...合作,交织,并列,接近...,被绑定到...或与...绑定,具有,具有...的属性,等等;而术语“控制器”意味着控制至少一个操作的任何设备、系统或其部件,这样的设备可能以硬件、固件或软件或者其中至少两个的一些组合来实现。应当注意的是:与任何特定的控制器相关联的功能性可能是集中式或分布式的,无论是本地还是远程。贯穿本专利文档提供用于某些词语和短语的定义,本领域技术人员应当理解:如果不是大多数情况下,在许多情况下,这样的定义适用于现有的以及这样定义的词语和短语的未来使用。Before proceeding to the following detailed description, it may be beneficial to set forth definitions of certain words and phrases used throughout this patent document: the terms "including" and "comprising" and their derivatives mean including without limitation; the terms "or " is inclusive of, means and/or; the phrases "associated with", "associated with" and derivatives thereof may mean including, being included in, interconnecting with, contains, is contained within, is connected to or is connected to, is coupled to or is coupled to, communicates with, cooperates with, interweaves, juxtaposes , is close to, is bound to or is bound to, has, has properties of, etc.; while the term "controller" means any device, system that controls at least one operation or components thereof, such a device may be implemented in hardware, firmware or software, or some combination of at least two of these. It should be noted that the functionality associated with any particular controller may be centralized or distributed, whether locally or remotely. Definitions for certain words and phrases are provided throughout this patent document, those of ordinary skill in the art should understand that in many, if not most instances, such definitions apply to existing as well as those of such defined words and phrases future use.

在下面的描述中,参考附图并以图示的方式示出几个具体的实施例。将理解的是:可设想并且可做出其他实施例而不脱离本公开的范围或精神。因此,以下详细描述不应被认为具有限制意义。In the following description, reference is made to the accompanying drawings and several specific embodiments are shown by way of illustration. It is to be understood that other embodiments can be envisaged and made without departing from the scope or spirit of the present disclosure. Accordingly, the following detailed description should not be considered in a limiting sense.

根据本发明的示范性实施例,图1图示一种基于终端的大数据分析方法的简要流程图。该方法包括以下步骤:According to an exemplary embodiment of the present invention, FIG. 1 illustrates a brief flow chart of a terminal-based big data analysis method. The method includes the following steps:

(A)终端搜索所需的应用程序并将其发送到判定服务器进行恶意与否的确认;(A) The terminal searches for the required application and sends it to the determination server for malicious or malicious confirmation;

(B)终端基于判定服务器根据大数据获得的恶意与否的结果,确定重新尝试其它资源下载或用户选择是否下载或直接下载该应用程序:(B) The terminal determines whether to retry the download of other resources or the user chooses whether to download or directly download the application based on the result of whether the server is malicious or not obtained according to the big data:

(C)终端下载安装该应用程序并提取信息,发送到判定服务器进行安全性认证;(C) The terminal downloads and installs the application program, extracts the information, and sends it to the determination server for security authentication;

(D)终端基于判定服务器的安全性认证,确定在终端中保留该应用程序还是卸载该应用程序;以及(D) the terminal determines whether to keep the application in the terminal or uninstall the application based on the security authentication of the decision server; and

(E)终端确定保留该应用程序之后,后续应用程序运行、访问终端上的敏感或隐私数据时进行权限管理以将其使能或禁止。(E) After the terminal determines to retain the application, permission management is performed to enable or disable the subsequent application running and accessing sensitive or private data on the terminal.

根据本发明的示范性实施例,图2图示图1的一种基于终端的大数据分析方法的具体实现的流程图。该方法进一步包括以下步骤:According to an exemplary embodiment of the present invention, FIG. 2 illustrates a flowchart of a specific implementation of a terminal-based big data analysis method of FIG. 1 . The method further includes the following steps:

步骤S1,终端经由无线网络搜索所需的应用程序,并获取含有应用程序的资源服务器的名称和/或IP信息;Step S1, the terminal searches for the required application program via the wireless network, and obtains the name and/or IP information of the resource server containing the application program;

步骤S2,终端将该资源服务器的名称和/或IP信息发送到判定服务器进行恶意与否的确认;Step S2, the terminal sends the name and/or IP information of the resource server to the determination server to confirm whether it is malicious or not;

步骤S3,终端根据判定服务器基于大数据确认的恶意与否的结果执行对应操作:如果恶意则阻断与该资源服务器的通信链路并继续尝试步骤S1中获取的其它资源服务器且顺次执行步骤S2和S3,直到判定服务器确认非恶意或者尝试次数达到用户预设次数;如果非恶意则由用户选择是否下载或直接下载该应用程序;Step S3, the terminal performs corresponding operations according to the result of whether the determination server is malicious or not based on the big data confirmation: if it is malicious, block the communication link with the resource server and continue to try other resource servers obtained in step S1 and execute steps in sequence. S2 and S3, until the determination server confirms that it is not malicious or the number of attempts reaches the user preset number; if it is not malicious, the user chooses whether to download or directly download the application;

步骤S4,下载后终端安装该应用程序并提取其信息,对该应用程序进行签名处理,并将提取的信息发送到判定服务器进行安全性认证;Step S4, after downloading, the terminal installs the application and extracts its information, performs signature processing on the application, and sends the extracted information to the determination server for security authentication;

步骤S5,终端根据判定服务器基于大数据的安全性认证结果,确定在终端中保留该应用程序还是卸载该应用程序;当保留该应用程序时,对该应用程序赋予特有的权限,而当卸载时将该应用程序的信息发送到判定服务器以更新用于大数据分析、判定和确认的数据库;Step S5, the terminal determines whether to keep the application program in the terminal or uninstall the application program according to the security authentication result based on the big data of the judgment server; Send the application's information to the decision server to update the database for big data analysis, decision and validation;

步骤S6,当该应用程序在终端上执行时,获取其运行参数并进行分析;Step S6, when the application is executed on the terminal, obtain its operating parameters and analyze;

步骤S7,基于分析的结果进一步确定在终端中保留该应用程序还是卸载该应用程序,并将该应用程序的信息发送到判定服务器以更新用于大数据分析、判定和确认的数据库;Step S7, based on the analysis result, further determine whether to keep the application program in the terminal or uninstall the application program, and send the information of the application program to the determination server to update the database for big data analysis, determination and confirmation;

步骤S8,当该应用程序请求访问终端上的用户隐私数据时,终端根据权限配置表确认其访问权限,并执行对应操作;Step S8, when the application program requests to access the user privacy data on the terminal, the terminal confirms its access authority according to the authority configuration table, and performs corresponding operations;

步骤S9,当终端有新的即时通讯消息传入并且该应用程序请求访问时,终端基于访问设置而对该应用程序的访问使能或禁止。Step S9, when a new instant messaging message is incoming to the terminal and the application program requests access, the terminal enables or disables access to the application program based on the access setting.

根据以上所述的基于终端的大数据分析方法,能够利用大数据和信息安全技术,在安装阶段对应用程序进行安全性检测,并且对终端有危害的应用程序进行拦截,并对其源头进行确认和阻断;并且针对应用程序对于终端中用户隐私信息的合法或非法访问问题,通过合理管理而进行隐私信息读取并且确保读取不超越预设权限,或者通过设置避免应用程序对隐私程序的不合理访问,进而基于大数据和权限管理实现系统的安全。According to the terminal-based big data analysis method described above, it is possible to use big data and information security technology to perform security detection on applications in the installation stage, intercept applications that are harmful to terminals, and confirm their sources. and blocking; and for the legal or illegal access of the user’s private information in the terminal by the application, read the private information through reasonable management and ensure that the reading does not exceed the preset permissions, or avoid the application’s access to the privacy program by setting. Unreasonable access, and then based on big data and rights management to achieve system security.

优选地,步骤S1进一步包括:直接经由终端安装的浏览器,通过输入期望的应用程序的名称,通过搜索引擎进行搜索;或者在当前的非浏览器应用中,通过用户手指长按屏幕,在屏幕上出现选择文字的选项,用户通过选择和高亮应用程序的全部或部分名称,并在选定后点击屏幕上出现的搜索按钮,通过点击该搜索按钮而出现一个或多个浏览器的选择图标以供选择,在选择对应的浏览器图标后进行搜索;或者在当前的非浏览器应用中,通过选择该非浏览器应用中的搜索图标,在屏幕上出现输入框,通过输入期望的应用程序名称后,该非浏览器应用要么直接调用默认的第三方浏览器进行搜索,要么出现一个或多个浏览器的选择图标以供选择并且在选择对应的浏览器图标后进行搜索;或者在内嵌有浏览器的即时通讯应用中,要么通过用户手指长按屏幕并在屏幕上出现选择文字的选项,通过选择和高亮应用程序的全部或部分名称并在选定后点击屏幕上出现的搜索按钮而调用嵌入的浏览器进行搜索,要么通过选择该非浏览器应用中的搜索图标而在屏幕上出现输入框,通过输入期望的应用程序名称而调用嵌入的浏览器进行搜索。在经由无线网络搜索所需的应用程序之后,根据结果获取用于标识含有应用程序的资源服务器的名称和/或IP地址。Preferably, step S1 further includes: directly via the browser installed on the terminal, by inputting the name of the desired application program, and searching through a search engine; The option to select text appears on the screen, the user selects and highlights all or part of the application name, and clicks the search button that appears on the screen after selection. By clicking the search button, one or more browser selection icons appear For selection, search after selecting the corresponding browser icon; or in the current non-browser application, by selecting the search icon in the non-browser application, an input box appears on the screen, and by entering the desired application After the name, the non-browser application either directly calls the default third-party browser to search, or one or more browser selection icons appear for selection and search after selecting the corresponding browser icon; or embedded In instant messaging apps with browsers, either by pressing and holding the user's finger on the screen and an option to select text appears on the screen, by selecting and highlighting all or part of the app's name and clicking the search button that appears on the screen after selection For invoking the embedded browser to search, either by selecting the search icon in the non-browser application, an input box appears on the screen, and by entering the desired application name, the embedded browser is invoked to perform the search. After searching for the desired application program via the wireless network, the name and/or IP address for identifying the resource server containing the application program is obtained according to the result.

优选地,步骤S2进一步包括:终端选择该资源服务器的名称和/或IP信息中的任一者或两者,并将其以固定的包传输格式打包在待传输的包中,并将包的报头设置为请求属性,在待传输的包中的名称和/或IP信息中的任一者或两者之后通过固定的结束符终止,以便于判定服务器识别,之后将该包通过无线链路发送到判定服务器,以供进行恶意与否的确认。Preferably, step S2 further includes: the terminal selects any one or both of the resource server's name and/or IP information, and packs it in a to-be-transmitted packet in a fixed packet transmission format, and packs the The header is set as a request attribute, terminated by a fixed terminator after either or both of the name and/or IP information in the packet to be transmitted, to facilitate identification by the decision server, after which the packet is sent over the wireless link to the judgment server for malicious or malicious confirmation.

优选地,步骤S3进一步包括:判定服务器内部设置有用于大数据分析、确认和判定的数据库,该数据库存储有用于终端的应用程序的安全属性信息,包括恶意、安全和待定,该安全属性信息随着时间的流逝而进行更新,其更新方式通过用户上传、信息中心通知等方式中的任一种而进行;判定服务器接收终端传输的包,并基于预设的拆分包规则,提取包中的资源服务器的名称和/或IP信息中的任一者或两者,并将其输入到内部设置的数据库,以进行信息匹配,当有符合安全或恶意的匹配项以及无匹配而被确认为待定时,将该明确和待定的安全属性信息的结果进行打包,经由无线链路发送到终端;终端接收该包并拆分包,提取其中的安全属性信息,如果为恶意则阻断与该资源服务器的通信链路,并继续尝试步骤S1中获取的其它资源服务器且顺次执行步骤S2和S3,直到判定服务器确认非恶意或者尝试次数达到用户预设次数;如果是安全则由用户选择是否下载该应用程序:如果是安全则由用户选择是否下载或直接下载该应用程序,其中如果是安全则直接下载该应用程序,而如果是待定则由用户选择是否下载该应用程序,若下载则进行后续步骤,若不下载则确定直接退出该方法还是继续尝试步骤S1中获取的其它资源服务器且顺次执行步骤S2和S3直到判定服务器确认符合用户期望的安全属性或尝试次数达到用户预设次数。Preferably, step S3 further includes: a database for big data analysis, confirmation and determination is set inside the determination server, and the database stores the security attribute information of the application program used for the terminal, including malicious, safe and pending, and the security attribute information varies with It is updated with the passage of time, and the update method is carried out by any one of user uploading, information center notification, etc.; the determination server receives the packet transmitted by the terminal, and based on the preset packet splitting rules, extracts the packets in the packet. Either or both of the resource server's name and/or IP information and enter it into a database set up internally for information matching, when there are matches that are safe or malicious and no matches are confirmed as pending When the definite and undetermined security attribute information results are packaged and sent to the terminal via the wireless link; the terminal receives the packet and splits the packet, extracts the security attribute information in it, and blocks communication with the resource server if it is malicious and continue to try other resource servers obtained in step S1 and execute steps S2 and S3 in sequence, until the determination server confirms that it is not malicious or the number of attempts reaches the user’s preset number of times; if it is safe, the user chooses whether to download the Application: if it is safe, the user chooses whether to download or directly download the application, wherein if it is safe, the application is downloaded directly, and if it is pending, the user chooses whether to download the application, and if it is downloaded, proceed to the next step , if it is not downloaded, determine whether to exit the method directly or continue to try other resource servers obtained in step S1 and execute steps S2 and S3 in sequence until it is determined that the server confirms that the security attributes meet the user's expectations or the number of attempts reaches the user's preset number.

优选地,步骤S4进一步包括:在下载后终端安装该应用程序并提取其信息,对该应用程序进行签名处理,并将提取的信息发送到判定服务器进行安全性认证的步骤中,其中的终端在安装该应用程序的过程中,更改应用程序的文件后缀名以进行解压而得到其中包括的经过编译和工具打包形成的第一文件,获得变换工具以将包括类别名称的类别文件拷贝到第一目录位置,在第一目录位置处通过类别转换命令而生成应用程序中的分组数据;通过遍历分组数据的库函数而获取调取的函数,通过调取的函数的行为信息确定其行为属性,其中该行为信息包括访问行为信息、创建进程行为信息、操作进程行为信息、操作注册表行为信息、申请调取其它应用程序的标识符和权限的行为信息、安装行为信息、压缩打包行为信息和移动数据传输行为信息,而行为属性包括恶意与否;根据行为属性确定调取的函数的行为执行路径,将该执行路径进行记录,作为提取的信息的一部分,以在后续步骤中上传到判定服务器,通过将该执行路径的部分或全部与判定服务器中的基于字节码的路径大数据进行分析,进而进行安全性认证。其中终端对该应用程序进行签名处理的过程中,基于解压后的应用程序,获取应用程序中所有文件;将第一类型的文件用安全哈希算法计算摘要信息,并对该摘要信息进行编码,之后将编码值存入不同于第一类型的第二类型的第一文件中,以及将先前保存在第二类型的第一文件中的摘要信息和私钥信息生成一组签名信息并保存在第二类型的与第一文件不同的第二文件中的第一位置,将签名信息和公钥存入第二文件中的第二位置中,其中第一类型和第二类型涉及不同目录类型的文件。Preferably, step S4 further includes: after downloading, the terminal installs the application program and extracts its information, performs signature processing on the application program, and sends the extracted information to the determination server for security authentication, wherein the terminal is in the steps of In the process of installing the application, change the file suffix name of the application to decompress to obtain the first file included in it after compilation and tool packaging, and obtain a transformation tool to copy the category file including the category name to the first directory. Location, at the first directory location, the grouped data in the application is generated through the category conversion command; the called function is obtained by traversing the library function of the grouped data, and its behavior attribute is determined by the behavior information of the called function, wherein the Behavior information includes access behavior information, process creation behavior information, operation process behavior information, registry operation behavior information, application for calling identifiers and permissions of other applications, installation behavior information, compression and packaging behavior information, and mobile data transmission. Behavior information, and the behavior attribute includes malicious or not; determine the behavior execution path of the called function according to the behavior attribute, record the execution path as part of the extracted information, and upload it to the judgment server in the subsequent steps. Part or all of the execution path is analyzed with the bytecode-based path big data in the determination server, and then security authentication is performed. In the process of signing the application, the terminal obtains all the files in the application based on the decompressed application; the first type of file is used to calculate the digest information with the secure hash algorithm, and the digest information is encoded, Then store the encoded value in a first file of a second type different from the first type, and generate a set of signature information from the digest information and private key information previously saved in the first file of the second type and save it in the first file. The first position in the second file of the two types is different from the first file, and the signature information and the public key are stored in the second position in the second file, wherein the first type and the second type relate to files of different directory types .

优选地,在上述步骤S4中,提取信息进一步包括提取信息的其它部分,即:将应用程序的文件重命名为后缀名为压缩包形式的文件并进行解压,进而得到第一配置文件,使用第一开源软件将第一配置文件转换成可操作的文本格式;将使用第二开源软件反编译解压的结果中的二进制的源码文件;使用第三开源软件还原二进制的源码文件以获得该应用程序的文件的源码;基于应用程序的文件的源码,使用匹配算法将源码进行扫描,并对指定关键词进行统计,获取指定的各个关键词在类文件中的数量和对应位置并使用矩阵存储,基于距离算法计算每两个关键词之间的相似距离;基于相似距离对关键词分类,并将矩阵中的每个关键词作为根节点,把与各个节点之间相似度高的关键词聚合在一起,与存储的所在的位置的矩阵比对,去除不同类别的关键词,进而归类存储;将终端中的特征数据库中存储的安全应用程序的特征与归类存储的特征进行对比,去除该应用程序的特征中包含的安全特征以避免增加信息处理量并增加信息处理时间和功耗以及浪费终端有限的处理资源;将归类存储并去除特征的数据作为提取的信息的其它部分,与其它信息一起被发送到判定服务器进行安全性认证。Preferably, in the above step S4, extracting the information further includes extracting other parts of the information, that is: renaming the file of the application to a file with a suffix in the form of a compressed package and decompressing it, and then obtaining the first configuration file, using the first configuration file. An open source software converts the first configuration file into an operable text format; uses the second open source software to decompile and decompress the binary source code file; uses the third open source software to restore the binary source code file to obtain the application's source code file The source code of the file; based on the source code of the application program, the source code is scanned by the matching algorithm, and the specified keywords are counted, and the number and corresponding position of each specified keyword in the class file are obtained and stored in a matrix, based on distance The algorithm calculates the similarity distance between every two keywords; the keywords are classified based on the similarity distance, and each keyword in the matrix is used as the root node, and the keywords with high similarity with each node are aggregated together. Compare with the matrix of the stored location, remove keywords of different categories, and then classify and store; compare the features of the security application stored in the feature database in the terminal with the features of the classified storage, and remove the application. The security features included in the features of the system can avoid increasing the amount of information processing and increasing the information processing time and power consumption, as well as wasting the limited processing resources of the terminal; the data that is classified and stored and features are removed as other parts of the extracted information, together with other information Sent to the decision server for security authentication.

优选地,步骤S5进一步包括:终端接收判定服务器基于大数据的安全性认证结果,并基于该结果进一步确定是否为恶意,当为恶意时卸载该应用程序,当为安全时在终端中保留该应用程序,而当待定时将风险提示信息在显示屏上展示给用户以供用户了解安全属性并选择卸载还是保留;当保留该应用程序时,对该应用程序赋予权限,该权限包括存储权限、拍照权限,麦克风使用的权限、录音权限、调用终端传感器的权限、读取和发送短消息权限、拨打电话权限、识别终端安装的SIM卡号码的权限、读取通信录的权限、读取用户运动数据的权限、开启移动运营商通信网络连接权限、开启无线保真连接权限、读取其它应用程序的权限、读取即时通讯软件的通信记录的权限,赋予权限包括赋予启用权限或者赋予禁用权限;当确定卸载时,将该应用程序的信息发送到判定服务器以更新判定服务器中用于大数据分析、判定和确认的数据库。Preferably, step S5 further includes: the terminal receives the big data-based security authentication result of the determination server, and further determines whether it is malicious based on the result, uninstalls the application when it is malicious, and retains the application in the terminal when it is safe When the application is to be reserved, the risk prompt information will be displayed to the user on the display screen for the user to understand the security attributes and choose to uninstall or retain it; when the application is retained, the application is given permissions, including storage permissions, taking pictures Permissions, permission to use the microphone, permission to record, permission to call terminal sensors, permission to read and send short messages, permission to make phone calls, permission to identify the SIM card number installed on the terminal, permission to read contacts, and read user motion data Permission to open the communication network connection permission of the mobile operator, permission to enable Wi-Fi connection, permission to read other applications, permission to read the communication records of instant messaging software, granting permission includes granting enable permission or granting disable permission; when When it is determined to uninstall, the information of the application is sent to the decision server to update the database used for big data analysis, decision and validation in the decision server.

优选地,步骤S6中,当该应用程序在终端上执行时,获取其运行参数并进行分析,其中包括:执行应用程序,获取其运行过程中的行为参数,该行为参数包括系统API、文件权限的变化、进程和线程运行数据、调用数据、网络访问请求数据、发送的网络数据,将该行为参数记录在日志文件中;监控应用程序中可移植的执行文件的创建操作,确定其创建主体,在终端存储器中建立可移植的执行文件与其创建主体间的对应关系;使用模拟工具自行运行和模拟终端用户的运行操作,以获得日志文件记录和网络数据分组文件记录;在模拟工具运行结束,并且在网络链路开启接通和随着时间的流逝而数据通信结束之后,将日志文件记录和网络数据分组文件记录存储在第一存储位置中;对日志文件记录和网络数据分组文件记录进行分析,其中使用特征提取对日志文件记录和网络数据分组文件记录的特征量化,将权限、API、URL和字符串转换成数值特征,使用采用基于均值和方差的特征选择算法选择特征的子集,结合分类和聚类以及标签构建规则对数值特征进行预测,基于该数值特征与预设配置文件中的参数的数值匹配而确定其运行行为属性,即安装的该应用程序对于终端来说是否安全,并将其作为分析的结果的第一部分;当结果为安全或相反时,将应用程序中可移植的执行文件与其创建主体的对应关系作为分析的结果的第二部分,当为不安全即恶意时,另外将创建主体的相关信息进行标记以作为标识该应用程序会对终端造成影响的恶意标识信息并作为第二部分的补充部分,以供发送到判定服务器更新大数据分析判定和确认的数据库,并且在终端进行记录并存储到安全信息数据库中以作为恶意的来源,在后续安装时可将该来源的应用程序作为来自恶意来源的应用程序而提供和显示给用户,供用户可选地对该源头进行彻底查杀并掐断该源头和来自其的所有应用程序的安装以及该源头对终端的任何访问请求;聚合分析的结果的第一部分和分析的结果的第二部分以作为该应用程序的信息。Preferably, in step S6, when the application program is executed on the terminal, its operation parameters are obtained and analyzed, including: executing the application program, and obtaining behavior parameters during its operation process, the behavior parameters include system API, file permissions changes, process and thread running data, call data, network access request data, sent network data, and record the behavior parameters in the log file; monitor the creation of portable executable files in the application, and determine its creation subject, Establish the corresponding relationship between the portable executable file and its creation body in the terminal memory; use the simulation tool to run and simulate the operation of the terminal user to obtain log file records and network data packet file records; after the simulation tool runs, and After the network link is turned on and the data communication ends over time, the log file record and the network data packet file record are stored in the first storage location; the log file record and the network data packet file record are analyzed, Among them, feature extraction is used to quantify the features of log file records and network data grouping file records, permissions, APIs, URLs and strings are converted into numerical features, and a subset of features is selected using a feature selection algorithm based on mean and variance, combined with classification and clustering and label construction rules to predict the numerical feature, and determine its running behavior attribute based on the numerical feature matching the value of the parameter in the preset configuration file, that is, whether the installed application is safe for the terminal, and the It is used as the first part of the analysis result; when the result is safe or vice versa, the corresponding relationship between the portable executable file in the application and its creation body is used as the second part of the analysis result; when it is unsafe or malicious, in addition Mark the relevant information of the created subject as malicious identification information that identifies that the application will affect the terminal and as a supplementary part of the second part, for sending to the judgment server to update the database of big data analysis judgment and confirmation, and in the The terminal records and stores it in the security information database as a malicious source. In subsequent installations, the application program from this source can be provided and displayed to the user as an application program from a malicious source, so that the user can optionally perform operations on the source. Completely kill and cut off the installation of the source and all applications from it, and any access requests from the source to the terminal; aggregate the first part of the analysis result and the second part of the analysis result as the application information.

优选地,步骤S7中,基于分析的结果进一步确定在终端中保留该应用程序还是卸载该应用程序,并将该应用程序的信息发送到判定服务器以更新用于大数据分析、判定和确认的数据库进一步包括:终端基于分析的结果的第一部分,当为安全的应用程序时保留该应用程序,而当为恶意时卸载该应用程序,并将包括分析的结果的第一部分和分析的结果的第二部分的应用程序的信息发送到判定服务器以更新用于大数据分析、判定和确认的数据库,其中为恶意时,分析的结果的第二部分还包括有将创建主体的相关信息进行标记以作为标识该应用程序会对终端造成影响的恶意标识信息的补充部分。Preferably, in step S7, based on the analysis result, it is further determined whether to keep the application program in the terminal or uninstall the application program, and send the information of the application program to the determination server to update the database for big data analysis, determination and confirmation Further comprising: the terminal is based on the first part of the analyzed result, retains the application when it is a safe application, and uninstalls the application when it is malicious, and will include the first part of the analyzed result and the second part of the analyzed result The information of part of the application is sent to the judgment server to update the database for big data analysis, judgment and confirmation. When it is malicious, the second part of the analysis result also includes marking the relevant information of the created subject as an identification. Supplementary part of malicious identification information that the application affects the endpoint.

优选地,在步骤S7中,在执行完上述步骤之后,进一步执行以下操作:在卸载应用程序之后,当终端启动网络通信时激活监控程序,进而使得该监控程序实时截取通过网络收发的数据,并将发送的数据宿和/或接收的数据源与之前确定的恶意的来源进行特征匹配,当符合匹配标准时将该结果显示给用户并分析待发送的数据所在的位置以及对该数据进行调用的实体的名称和位置,并将该调用的实体的名称和位置进行定点移除,之后显示移除成功与否的结果,如果不成功则重复上述移除操作并展示给用户移除进程,直到符合预设要求为止。Preferably, in step S7, after the above steps are performed, the following operations are further performed: after uninstalling the application program, activate the monitoring program when the terminal starts network communication, so that the monitoring program intercepts the data sent and received through the network in real time, and Match the characteristics of the sent data sink and/or the received data source with the previously determined malicious source, display the result to the user when the matching criteria are met, and analyze the location of the data to be sent and the entity calling the data name and location of the calling entity, and remove the name and location of the called entity at a fixed point, and then display the result of whether the removal is successful or not. until required.

进一步地,分析待发送的数据所在的位置的同时还分析待发送的数据,以确定是否含有用户的账号、联系人、验证码、联系方式的信息,如果存在则将风险提示给用户。Further, while analyzing the location of the data to be sent, the data to be sent is also analyzed to determine whether there is information about the user's account, contact person, verification code, and contact information, and if there is, the risk is prompted to the user.

优选地,步骤S8中,当该应用程序请求访问终端上的用户隐私数据时,终端根据权限配置表确认其访问权限,并执行对应操作进一步包括:当该应用程序请求访问终端上的用户隐私数据时,应用程序将访问请求发送给终端的处理器,处理器将应用程序标识发送至权限管理模块,以根据权限管理模块中的权限配置表确定该应用程序的访问权限,当应用程序具有复数种隐私数据中的一种或多种的访问权限时,处理器确定该应用程序请求访问的终端上的用户隐私数据的访问权限是否符合权限配置表确定的访问权限,如果符合则给应用程序分配一个对应的解释引擎,处理器发布跳转指令,并经过执行跳转指令后将应用程序引导至解释引擎的入口,以用于由该解释引擎对请求访问的终端上的用户隐私数据进行解释,并将解释的用户隐私数据发送给该应用程序。Preferably, in step S8, when the application program requests to access the user privacy data on the terminal, the terminal confirms its access authority according to the permission configuration table, and performs corresponding operations further including: when the application program requests to access the user privacy data on the terminal When the application program sends an access request to the processor of the terminal, the processor sends the application program identifier to the rights management module to determine the access rights of the application program according to the rights configuration table in the rights management module. When there is one or more access rights in the private data, the processor determines whether the access rights of the user's private data on the terminal that the application requests to access complies with the access rights determined by the rights configuration table, and if so, assigns a For the corresponding interpretation engine, the processor issues a jump instruction, and after executing the jump instruction, the application program is guided to the entrance of the interpretation engine, so that the interpretation engine can interpret the user privacy data on the terminal requesting access, and Send the explained user privacy data to the app.

优选地,该用户隐私数据是为了保障用户信息安全而被转换的数据,其在终端中存储时不会明码存储而被恶意代码或文件或软件攻击获取进而给用户造成不可挽回的损失,其中该用户隐私数据首先由原始函数的代码形式转换成仅仅可以由终端的解释引擎解释、对于第三方软件来说无法有效分割破解并且看上去没有明显含义的字节码,该字节码以片段形式由解释引擎进行解释,并且该片段长度由该解释引擎限定,同时在各个片段之间、在前一个片段的末尾以解释引擎可识别的、表示间隔的、以有限数据长度的字节码形式的分隔符;为字节码设定跳转指令,并存储在寄存器中,同时擦除由原始函数的代码形式表示的用户隐私数据;当应用程序请求访问终端上的用户隐私数据时,如果处理器确定该应用程序请求访问的终端上的用户隐私数据的访问权限是否符合权限配置表确定的访问权限,则处理器调取并发布跳转指令,并经过执行跳转指令后将应用程序引导至解释引擎的入口,以用于由该解释引擎对请求访问的终端上的用户隐私数据进行解释,并将解释的用户隐私数据发送给该应用程序。Preferably, the user privacy data is data that is converted to ensure the security of user information. When stored in the terminal, it will not be stored in plaintext, but will be acquired by malicious code, files or software attacks, thereby causing irreparable losses to the user. User privacy data is first converted from the code form of the original function into a bytecode that can only be interpreted by the interpretation engine of the terminal, cannot be effectively split and cracked for third-party software, and does not seem to have obvious meaning. The interpretation engine interprets and the segment length is defined by the interpretation engine, while separating each segment, at the end of the previous segment, in bytecodes that are recognizable by the interpretation engine and represent the interval, in the form of bytecodes of limited data length symbol; set the jump instruction for the bytecode and store it in the register, while erasing the user's private data represented by the code form of the original function; when the application requests to access the user's private data on the terminal, if the processor determines Whether the access authority of the user's private data on the terminal that the application requests to access conforms to the access authority determined by the authority configuration table, the processor calls and issues the jump instruction, and after executing the jump instruction, the application program is guided to the interpretation engine The entry for the interpretation engine to interpret the user privacy data on the terminal requesting access, and send the interpreted user privacy data to the application.

优选地,步骤S9中,当终端有新的即时通讯消息传入并且该应用程序请求访问时,终端基于访问设置而对该应用程序的访问使能或禁止进一步包括:当终端有新的即时通讯消息传入时,终端对该新传入的即时通讯消息进行接收,并由终端的消息分析模块分析其中包含的涉密信息,终端的消息分析模块判断传入的即时通讯消息中是否包含用户密码、账号、验证码中的任一个或多个与有效时间的组合的信息,当包含其中的任一个或多个与有效时间的组合的信息时,将该新传入的即时通讯消息存储到终端的私密存储库中,否则将新传入的即时通讯消息存储到终端的常规存储库中;当包含其中的任一个或多个与有效时间的组合的信息,且当安装的应用程序试图访问该传入的即时通讯消息时,权限管理模块验证该应用程序是否具有对传入的即时通讯消息的访问权限,(i)如果不具有访问权限,则权限管理模块通知终端的私密存储库不将新传入的即时通讯消息发送给该应用程序,以及(ii)如果具有访问权限,则权限管理模块向私密存储库发送应用程序对私密存储库中消息的读取请求,并且权限管理模块通知终端的消息分析模块判断当前时段是否在存储的新传入的即时通讯消息的有效读取时段中,当处于新传入的即时通讯消息的有效读取时段中时,则由私密存储库将其中存储的新传入的即时通讯消息发送给应用程序,否则当不处于新传入的即时通讯消息的有效读取时段中,即处于新传入的即时通讯消息的禁止读取时段中时,私密存储库拒绝将其中存储的新传入的即时通讯消息发送给应用程序,直到其禁止读取时段解除,此时即使应用程序尝试读取私密信息成功,由于已经随着时间的过去而超出新传入的即时通讯消息的可以访问的有效读取时段,所以即使应用程序读取到私密信息,也因为过了有效时段而无法对终端构成攻击,极大地降低了恶意应用程序对终端的私密信息的窃取和泄露;以及当将新传入的即时通讯消息存储到终端的常规存储库中,且当安装的应用程序试图访问该传入的即时通讯消息时,权限管理模块验证该应用程序是否具有对传入的即时通讯消息的访问权限,(i)如果不具有访问权限,则权限管理模块通知终端的常规存储库不将新传入的即时通讯消息发送给该应用程序,以及(ii)如果具有访问权限,则限管理模块向常规存储库发送应用程序对常规存储库中消息的读取请求,并且由常规存储库将其中存储的新传入的即时通讯消息发送给应用程序。Preferably, in step S9, when a new instant messaging message is incoming to the terminal and the application requests access, enabling or disabling the terminal's access to the application based on the access settings further includes: when the terminal has a new instant messaging When a message is incoming, the terminal receives the newly incoming instant messaging message, and the message analysis module of the terminal analyzes the confidential information contained therein, and the message analysis module of the terminal determines whether the incoming instant messaging message contains the user password , account number, verification code and any one or more of the information in combination with the valid time, when including any one or more of the information in combination with the valid time, the newly incoming instant messaging message is stored in the terminal in the private storage of the terminal, otherwise the newly incoming instant messaging message is stored in the regular storage of the terminal; when any one or more of the information in combination with the valid time is contained, and when the installed application attempts to access the Incoming instant messaging messages, the rights management module verifies whether the application has access rights to the incoming instant messaging messages, (i) if not, the rights management module notifies the terminal's private repository not to add new The incoming instant messaging message is sent to the application, and (ii) if there is access rights, the rights management module sends the application's read request for the message in the private repository to the private repository, and the rights management module notifies the terminal's The message analysis module judges whether the current period is in the valid reading period of the newly incoming instant messaging message stored, and when it is in the valid reading period of the newly incoming instant messaging message, the private storage repository will The new incoming instant messaging message is sent to the application, otherwise when it is not in the valid reading period of the newly incoming instant messaging message, that is, in the forbidden reading period of the new incoming instant messaging message, the private repository Refuse to send new incoming instant messenger messages stored in it to the app until its no-read period is lifted, at which point even if the app tries to read the private message successfully, since the new incoming instant message has been exceeded over time The valid reading period of instant messaging messages can be accessed, so even if the application reads the private information, it cannot attack the terminal because the valid period has passed, which greatly reduces the stealing of the private information of the terminal by malicious applications. disclosure; and when a newly incoming instant messaging message is stored in the terminal's regular repository, and when an installed application attempts to access the incoming instant messaging message, the rights management module verifies whether the application has access to the incoming instant messaging access rights to instant messaging messages, (i) if not having access rights, the rights management module informs the terminal's regular repository not to send newly incoming IM messages to the application, and (ii) if having access rights , the limit management module sends an application reading request for messages in the conventional repository to the conventional repository, and the conventional repository sends the newly incoming instant messaging messages stored in the conventional repository to the application.

根据本发明的示范性实施例,图3图示一种基于终端的大数据分析系统,包括终端和判定服务器,其中终端包括:处理器,权限管理模块,解释引擎,消息分析模块,私密存储库,常规存储库;判定服务器内部设置有用于大数据分析、确认和判定的数据库。According to an exemplary embodiment of the present invention, FIG. 3 illustrates a terminal-based big data analysis system, including a terminal and a decision server, wherein the terminal includes: a processor, a rights management module, an interpretation engine, a message analysis module, and a private repository , a conventional repository; a database for big data analysis, confirmation and judgment is set inside the judgment server.

优选地,所述基于终端的大数据分析系统用于执行以下方法和步骤:终端搜索所需的应用程序并将其发送到判定服务器进行恶意与否的确认;终端基于判定服务器根据大数据获得的恶意与否的结果,确定重新尝试其它资源下载或用户选择是否下载或直接下载该应用程序:终端下载安装该应用程序并提取信息,发送到判定服务器进行安全性认证;终端基于判定服务器的安全性认证,确定在终端中保留该应用程序还是卸载该应用程序;以及终端确定保留该应用程序之后,后续应用程序运行、访问终端上的敏感或隐私数据时进行权限管理以将其使能或禁止。Preferably, the terminal-based big data analysis system is used to perform the following methods and steps: the terminal searches for the required application program and sends it to the determination server to confirm whether it is malicious or not; Whether the result is malicious or not, it is determined to retry the download of other resources or the user chooses whether to download or directly download the application: the terminal downloads and installs the application, extracts the information, and sends it to the judgment server for security authentication; the terminal is based on the security of the judgment server. Authentication, to determine whether to keep the application in the terminal or to uninstall the application; and after the terminal determines to retain the application, the subsequent application runs and accesses sensitive or private data on the terminal. Permission management is performed to enable or disable it.

优选地,所述基于终端的大数据分析系统进一步执行以下步骤:步骤S1,终端经由无线网络搜索所需的应用程序,并获取含有应用程序的资源服务器的名称和/或IP信息;步骤S2,终端将该资源服务器的名称和/或IP信息发送到判定服务器进行恶意与否的确认;步骤S3,终端根据判定服务器基于大数据确认的恶意与否的结果执行对应操作:如果恶意则阻断与该资源服务器的通信链路并继续尝试步骤S1中获取的其它资源服务器且顺次执行步骤S2和S3,直到判定服务器确认非恶意或者尝试次数达到用户预设次数;如果非恶意则由用户选择是否下载或直接下载该应用程序;步骤S4,下载后终端安装该应用程序并提取其信息,对该应用程序进行签名处理,并将提取的信息发送到判定服务器进行安全性认证;步骤S5,终端根据判定服务器基于大数据的安全性认证结果,确定在终端中保留该应用程序还是卸载该应用程序;当保留该应用程序时,对该应用程序赋予特有的权限,而当卸载时将该应用程序的信息发送到判定服务器以更新用于大数据分析、判定和确认的数据库;步骤S6,当该应用程序在终端上执行时,获取其运行参数并进行分析;步骤S7,基于分析的结果进一步确定在终端中保留该应用程序还是卸载该应用程序,并将该应用程序的信息发送到判定服务器以更新用于大数据分析、判定和确认的数据库;步骤S8,当该应用程序请求访问终端上的用户隐私数据时,终端根据权限配置表确认其访问权限,并执行对应操作;步骤S9,当终端有新的即时通讯消息传入并且该应用程序请求访问时,终端基于访问设置而对该应用程序的访问使能或禁止。Preferably, the terminal-based big data analysis system further performs the following steps: step S1, the terminal searches for the required application program via the wireless network, and obtains the name and/or IP information of the resource server containing the application program; step S2, The terminal sends the name and/or IP information of the resource server to the determination server to confirm whether it is malicious or not; step S3, the terminal performs a corresponding operation according to the result of whether the determination server confirms whether it is malicious or not based on the big data: if it is malicious, block the The communication link of the resource server continues to try other resource servers obtained in step S1 and executes steps S2 and S3 in sequence, until it is determined that the server confirms that it is not malicious or the number of attempts reaches the user preset number; if it is not malicious, the user chooses whether to Download or directly download the application; step S4, after downloading, the terminal installs the application and extracts its information, performs signature processing on the application, and sends the extracted information to the determination server for security authentication; step S5, the terminal according to The determination server determines whether to keep the application in the terminal or uninstall the application based on the security authentication result of the big data; The information is sent to the judgment server to update the database for big data analysis, judgment and confirmation; step S6, when the application is executed on the terminal, obtain its operating parameters and analyze; step S7, based on the analysis result, further determine the Whether to keep the application program in the terminal or uninstall the application program, and send the information of the application program to the determination server to update the database for big data analysis, determination and confirmation; step S8, when the application program requests to access the user on the terminal When the data is private, the terminal confirms its access authority according to the authority configuration table, and performs corresponding operations; step S9, when a new instant messaging message is incoming to the terminal and the application requests access, the terminal determines the application's access authority based on the access settings. Access is enabled or disabled.

根据以上所述的基于终端的大数据分析系统,能够利用大数据和信息安全技术,在安装阶段对应用程序进行安全性检测,并且对终端有危害的应用程序进行拦截,并对其源头进行确认和阻断;并且针对应用程序对于终端中用户隐私信息的合法或非法访问问题,通过合理管理而进行隐私信息读取并且确保读取不超越预设权限,或者通过设置避免应用程序对隐私程序的不合理访问,进而基于大数据和权限管理实现系统的安全。According to the terminal-based big data analysis system described above, it is possible to use big data and information security technology to perform security detection on applications in the installation stage, intercept applications that are harmful to terminals, and confirm their sources. and blocking; and for the legal or illegal access of the user’s private information in the terminal by the application, read the private information through reasonable management and ensure that the reading does not exceed the preset permissions, or avoid the application’s access to the privacy program by setting. Unreasonable access, and then based on big data and rights management to achieve system security.

优选地,所述基于终端的大数据分析系统进一步执行以下步骤:直接经由终端安装的浏览器,通过输入期望的应用程序的名称,通过搜索引擎进行搜索;或者在当前的非浏览器应用中,通过用户手指长按屏幕,在屏幕上出现选择文字的选项,用户通过选择和高亮应用程序的全部或部分名称,并在选定后点击屏幕上出现的搜索按钮,通过点击该搜索按钮而出现一个或多个浏览器的选择图标以供选择,在选择对应的浏览器图标后进行搜索;或者在当前的非浏览器应用中,通过选择该非浏览器应用中的搜索图标,在屏幕上出现输入框,通过输入期望的应用程序名称后,该非浏览器应用要么直接调用默认的第三方浏览器进行搜索,要么出现一个或多个浏览器的选择图标以供选择并且在选择对应的浏览器图标后进行搜索;或者在内嵌有浏览器的即时通讯应用中,要么通过用户手指长按屏幕并在屏幕上出现选择文字的选项,通过选择和高亮应用程序的全部或部分名称并在选定后点击屏幕上出现的搜索按钮而调用嵌入的浏览器进行搜索,要么通过选择该非浏览器应用中的搜索图标而在屏幕上出现输入框,通过输入期望的应用程序名称而调用嵌入的浏览器进行搜索。在经由无线网络搜索所需的应用程序之后,根据结果获取用于标识含有应用程序的资源服务器的名称和/或IP地址。Preferably, the terminal-based big data analysis system further performs the following steps: directly via the browser installed on the terminal, by entering the name of the desired application program, and searching through a search engine; or in the current non-browser application, By long pressing the screen with the user's finger, the option to select text appears on the screen. The user selects and highlights all or part of the name of the application, and clicks the search button that appears on the screen after selection. Select icons of one or more browsers for selection, and perform a search after selecting the corresponding browser icon; or in the current non-browser application, by selecting the search icon in the non-browser application, it will appear on the screen Input box, after entering the desired application name, the non-browser application will either directly call the default third-party browser to search, or one or more browser selection icons will appear for selection and the corresponding browser will be selected. search after the icon; or in instant messaging applications with embedded browsers, or by long-pressing the screen with the user's finger and an option to select text appears on the screen, by selecting and highlighting all or part of the application name and selecting Then click the search button that appears on the screen to invoke the embedded browser to search, or select the search icon in the non-browser application and an input box appears on the screen, and invoke the embedded browser by entering the desired application name to search. After searching for the desired application program via the wireless network, the name and/or IP address for identifying the resource server containing the application program is obtained according to the result.

优选地,所述基于终端的大数据分析系统进一步执行以下步骤:终端选择该资源服务器的名称和/或IP信息中的任一者或两者,并将其以固定的包传输格式打包在待传输的包中,并将包的报头设置为请求属性,在待传输的包中的名称和/或IP信息中的任一者或两者之后通过固定的结束符终止,以便于判定服务器识别,之后将该包通过无线链路发送到判定服务器,以供进行恶意与否的确认。Preferably, the terminal-based big data analysis system further performs the following steps: the terminal selects any one or both of the resource server's name and/or IP information, and packages it in a fixed packet transmission format in the waiting list In the transmitted packet, and set the header of the packet as the request attribute, terminated by a fixed terminator after either or both of the name and/or IP information in the packet to be transmitted, so as to facilitate identification by the decision server, The packet is then sent to the decision server through the wireless link for malicious or malicious confirmation.

优选地,所述基于终端的大数据分析系统进一步执行以下步骤S3:判定服务器内部设置有用于大数据分析、确认和判定的数据库,该数据库存储有用于终端的应用程序的安全属性信息,包括恶意、安全和待定,该安全属性信息随着时间的流逝而进行更新,其更新方式通过用户上传、信息中心通知等方式中的任一种而进行;判定服务器接收终端传输的包,并基于预设的拆分包规则,提取包中的资源服务器的名称和/或IP信息中的任一者或两者,并将其输入到内部设置的数据库,以进行信息匹配,当有符合安全或恶意的匹配项以及无匹配而被确认为待定时,将该明确和待定的安全属性信息的结果进行打包,经由无线链路发送到终端;终端接收该包并拆分包,提取其中的安全属性信息,如果为恶意则阻断与该资源服务器的通信链路,并继续尝试步骤S1中获取的其它资源服务器且顺次执行步骤S2和S3,直到判定服务器确认非恶意或者尝试次数达到用户预设次数;如果是安全则由用户选择是否下载该应用程序:如果是安全则由用户选择是否下载或直接下载该应用程序,其中如果是安全则直接下载该应用程序,而如果是待定则由用户选择是否下载该应用程序,若下载则进行后续步骤,若不下载则确定直接退出所述基于终端的大数据分析系统执行的方法还是继续尝试步骤S1中获取的其它资源服务器且顺次执行步骤S2和S3直到判定服务器确认符合用户期望的安全属性或尝试次数达到用户预设次数;Preferably, the terminal-based big data analysis system further performs the following step S3: the determination server is internally provided with a database for big data analysis, confirmation and determination, and the database stores the security attribute information of the application program for the terminal, including malicious , security and pending, the security attribute information is updated with the passage of time, and its update method is carried out by any one of user uploading, information center notification, etc.; it is determined that the server receives the packet transmitted by the terminal, and based on the preset The split package rule extracts either or both of the resource server's name and/or IP information in the package and enters it into an internally set database for information matching, when there is a safe or malicious The matching item and the unmatched item are confirmed as pending, the result of the clear and pending security attribute information is packaged, and sent to the terminal via the wireless link; the terminal receives the packet and splits the packet, extracts the security attribute information in it, If it is malicious, block the communication link with the resource server, and continue to try other resource servers obtained in step S1 and execute steps S2 and S3 in sequence, until the determination server confirms that it is not malicious or the number of attempts reaches the user preset number; If it is safe, the user chooses whether to download the application: if it is safe, the user chooses whether to download or directly download the application, wherein if it is safe, the application is downloaded directly, and if it is pending, the user chooses whether to download or not. If the application is downloaded, proceed to the next steps; if not, determine whether to directly exit the method executed by the terminal-based big data analysis system or continue to try other resource servers obtained in step S1 and execute steps S2 and S3 in sequence until It is determined that the server confirms that the security attributes meet the user's expectations or that the number of attempts reaches the user's preset number of times;

优选地,所述基于终端的大数据分析系统进一步执行以下步骤S4:在下载后终端安装该应用程序并提取其信息,对该应用程序进行签名处理,并将提取的信息发送到判定服务器进行安全性认证的步骤中,其中的终端在安装该应用程序的过程中,更改应用程序的文件后缀名以进行解压而得到其中包括的经过编译和工具打包形成的第一文件,获得变换工具以将包括类别名称的类别文件拷贝到第一目录位置,在第一目录位置处通过类别转换命令而生成应用程序中的分组数据;通过遍历分组数据的库函数而获取调取的函数,通过调取的函数的行为信息确定其行为属性,其中该行为信息包括访问行为信息、创建进程行为信息、操作进程行为信息、操作注册表行为信息、申请调取其它应用程序的标识符和权限的行为信息、安装行为信息、压缩打包行为信息和移动数据传输行为信息,而行为属性包括恶意与否;根据行为属性确定调取的函数的行为执行路径,将该执行路径进行记录,作为提取的信息的一部分,以在后续步骤中上传到判定服务器,通过将该执行路径的部分或全部与判定服务器中的基于字节码的路径大数据进行分析,进而进行安全性认证。其中终端对该应用程序进行签名处理的过程中,基于解压后的应用程序,获取应用程序中所有文件;将第一类型的文件用安全哈希算法计算摘要信息,并对该摘要信息进行编码,之后将编码值存入不同于第一类型的第二类型的第一文件中,以及将先前保存在第二类型的第一文件中的摘要信息和私钥信息生成一组签名信息并保存在第二类型的与第一文件不同的第二文件中的第一位置,将签名信息和公钥存入第二文件中的第二位置中,其中第一类型和第二类型涉及不同目录类型的文件。Preferably, the terminal-based big data analysis system further performs the following step S4: after downloading, the terminal installs the application and extracts its information, performs signature processing on the application, and sends the extracted information to the determination server for security In the step of sexual authentication, in the process of installing the application, the terminal changes the file suffix name of the application to decompress it to obtain the first file included in it after compilation and tool packaging, and obtains a transformation tool to convert the included The category file of the category name is copied to the first directory location, and the grouped data in the application program is generated by the category conversion command at the first directory location; the called function is obtained by traversing the library function of the grouped data, and the called function is obtained by traversing the library function of the grouped data. The behavior information determines its behavior attributes, where the behavior information includes access behavior information, process creation behavior information, operation process behavior information, registry operation behavior information, application for calling identifiers and permissions of other applications, and installation behavior. information, compression and packaging behavior information and mobile data transmission behavior information, and behavior attributes include malicious or not; determine the behavior execution path of the called function according to the behavior attributes, record the execution path as part of the extracted information, In the subsequent steps, it is uploaded to the determination server, and security authentication is performed by analyzing part or all of the execution path with the bytecode-based path big data in the determination server. In the process of signing the application, the terminal obtains all the files in the application based on the decompressed application; the first type of file is used to calculate the digest information with the secure hash algorithm, and the digest information is encoded, Then store the encoded value in a first file of a second type different from the first type, and generate a set of signature information from the digest information and private key information previously saved in the first file of the second type and save it in the first file. The first position in the second file of the two types is different from the first file, and the signature information and the public key are stored in the second position in the second file, wherein the first type and the second type relate to files of different directory types .

优选地,所述基于终端的大数据分析系统进一步执行以下步骤S4,提取信息进一步包括提取信息的其它部分,即:将应用程序的文件重命名为后缀名为压缩包形式的文件并进行解压,进而得到第一配置文件,使用第一开源软件将第一配置文件转换成可操作的文本格式;将使用第二开源软件反编译解压的结果中的二进制的源码文件;使用第三开源软件还原二进制的源码文件以获得该应用程序的文件的源码;基于应用程序的文件的源码,使用匹配算法将源码进行扫描,并对指定关键词进行统计,获取指定的各个关键词在类文件中的数量和对应位置并使用矩阵存储,基于距离算法计算每两个关键词之间的相似距离;基于相似距离对关键词分类,并将矩阵中的每个关键词作为根节点,把与各个节点之间相似度高的关键词聚合在一起,与存储的所在的位置的矩阵比对,去除不同类别的关键词,进而归类存储;将终端中的特征数据库中存储的安全应用程序的特征与归类存储的特征进行对比,去除该应用程序的特征中包含的安全特征以避免增加信息处理量并增加信息处理时间和功耗以及浪费终端有限的处理资源;将归类存储并去除特征的数据作为提取的信息的其它部分,与其它信息一起被发送到判定服务器进行安全性认证。Preferably, the terminal-based big data analysis system further performs the following step S4, and extracting information further includes extracting other parts of the information, namely: renaming the file of the application program to a file with a suffix named as a compressed package and decompressing it, Then obtain the first configuration file, use the first open source software to convert the first configuration file into an operable text format; use the second open source software to decompile and decompress the binary source code file in the result; use the third open source software to restore the binary Based on the source code of the application file, use the matching algorithm to scan the source code, and count the specified keywords to obtain the number and amount of each specified keyword in the class file. Corresponding positions and using matrix storage, calculate the similarity distance between each two keywords based on distance algorithm; classify keywords based on similarity distance, and use each keyword in the matrix as the root node, and compare the similarity with each node. The keywords with high degree are aggregated together, compared with the matrix of the stored location, and the keywords of different categories are removed, and then classified and stored; the characteristics and classification of the security application stored in the feature database in the terminal are stored. Compare the features of the application, remove the security features contained in the features of the application to avoid increasing the amount of information processing, increasing the information processing time and power consumption, and wasting the limited processing resources of the terminal; classify and store and remove the feature data as extracted data The rest of the information, along with other information, is sent to the decision server for security authentication.

优选地,所述基于终端的大数据分析系统进一步执行以下步骤S5:终端接收判定服务器基于大数据的安全性认证结果,并基于该结果进一步确定是否为恶意,当为恶意时卸载该应用程序,当为安全时在终端中保留该应用程序,而当待定时将风险提示信息在显示屏上展示给用户以供用户了解安全属性并选择卸载还是保留;当保留该应用程序时,对该应用程序赋予权限,该权限包括存储权限、拍照权限,麦克风使用的权限、录音权限、调用终端传感器的权限、读取和发送短消息权限、拨打电话权限、识别终端安装的SIM卡号码的权限、读取通信录的权限、读取用户运动数据的权限、开启移动运营商通信网络连接权限、开启无线保真连接权限、读取其它应用程序的权限、读取即时通讯软件的通信记录的权限,赋予权限包括赋予启用权限或者赋予禁用权限;当确定卸载时,将该应用程序的信息发送到判定服务器以更新判定服务器中用于大数据分析、判定和确认的数据库。Preferably, the terminal-based big data analysis system further performs the following step S5: the terminal receives the big data-based security authentication result of the determination server, and further determines whether it is malicious based on the result, and uninstalls the application when it is malicious, When it is safe, keep the application in the terminal, and display the risk prompt information on the display screen to the user when it is to be scheduled, so that the user can understand the security attribute and choose to uninstall or keep it; when the application is reserved, the application Grant permissions, which include storage permissions, photographing permissions, microphone usage permissions, recording permissions, calling terminal sensors, reading and sending short messages, making phone calls, identifying the SIM card number installed on the terminal, reading Permissions for address book, permission to read user motion data, permission to enable mobile operator communication network connection, permission to enable Wi-Fi connection, permission to read other applications, permission to read communication records of instant messaging software, grant permission Including granting the enable permission or granting the disable permission; when it is determined to uninstall, the information of the application is sent to the decision server to update the database in the decision server for big data analysis, decision and confirmation.

优选地,所述基于终端的大数据分析系统进一步执行以下步骤S6,当该应用程序在终端上执行时,获取其运行参数并进行分析,其中包括:执行应用程序,获取其运行过程中的行为参数,该行为参数包括系统API、文件权限的变化、进程和线程运行数据、调用数据、网络访问请求数据、发送的网络数据,将该行为参数记录在日志文件中;监控应用程序中可移植的执行文件的创建操作,确定其创建主体,在终端存储器中建立可移植的执行文件与其创建主体间的对应关系;使用模拟工具自行运行和模拟终端用户的运行操作,以获得日志文件记录和网络数据分组文件记录;在模拟工具运行结束,并且在网络链路开启接通和随着时间的流逝而数据通信结束之后,将日志文件记录和网络数据分组文件记录存储在第一存储位置中;对日志文件记录和网络数据分组文件记录进行分析,其中使用特征提取对日志文件记录和网络数据分组文件记录的特征量化,将权限、API、URL和字符串转换成数值特征,使用采用基于均值和方差的特征选择算法选择特征的子集,结合分类和聚类以及标签构建规则对数值特征进行预测,基于该数值特征与预设配置文件中的参数的数值匹配而确定其运行行为属性,即安装的该应用程序对于终端来说是否安全,并将其作为分析的结果的第一部分;当结果为安全或相反时,将应用程序中可移植的执行文件与其创建主体的对应关系作为分析的结果的第二部分,当为不安全即恶意时,另外将创建主体的相关信息进行标记以作为标识该应用程序会对终端造成影响的恶意标识信息并作为第二部分的补充部分,以供发送到判定服务器更新大数据分析判定和确认的数据库,并且在终端进行记录并存储到安全信息数据库中以作为恶意的来源,在后续安装时可将该来源的应用程序作为来自恶意来源的应用程序而提供和显示给用户,供用户可选地对该源头进行彻底查杀并掐断该源头和来自其的所有应用程序的安装以及该源头对终端的任何访问请求;聚合分析的结果的第一部分和分析的结果的第二部分以作为该应用程序的信息。Preferably, the terminal-based big data analysis system further executes the following step S6, when the application is executed on the terminal, obtains its running parameters and analyzes it, including: executing the application and obtaining its behavior during the running process Parameters, the behavior parameters include system API, changes in file permissions, process and thread running data, call data, network access request data, sent network data, and record the behavior parameters in the log file; monitor the portable Execute the file creation operation, determine its creation subject, and establish the corresponding relationship between the portable executable file and its creation subject in the terminal memory; use the simulation tool to run and simulate the terminal user's operation operation to obtain log file records and network data Packet file records; store log file records and network data packet file records in a first storage location after the simulation tool run ends, and after network links are turned on and data communications over time have ended; File records and network data group file records are analyzed, where feature extraction is used to quantify features of log file records and network data group file records, permissions, APIs, URLs, and strings are converted into numerical features, using mean- and variance-based The feature selection algorithm selects a subset of features, predicts numerical features based on classification and clustering and label construction rules, and determines its operational behavior attributes based on the numerical value matching of the numerical features with the parameters in the preset configuration file. Whether the application is safe for the terminal is taken as the first part of the analysis result; when the result is safe or vice versa, the correspondence between the portable executable file in the application and its creation body is taken as the second part of the analysis result. If it is unsafe or malicious, the relevant information of the created subject will be marked as the malicious identification information that the application will affect the terminal, and as a supplementary part of the second part, it will be sent to the judgment server for update. The database of big data analysis, judgment and confirmation, and recorded at the terminal and stored in the security information database as a malicious source, the application from this source can be provided and displayed as an application from a malicious source during subsequent installations. User, for the user to optionally completely kill the source and cut off the installation of the source and all applications from it, as well as any access requests from the source to the terminal; the first part of the results of the aggregate analysis and the end of the analysis results. The second part serves as the information for the application.

优选地,所述基于终端的大数据分析系统进一步执行以下步骤S7,基于分析的结果进一步确定在终端中保留该应用程序还是卸载该应用程序,并将该应用程序的信息发送到判定服务器以更新用于大数据分析、判定和确认的数据库进一步包括:终端基于分析的结果的第一部分,当为安全的应用程序时保留该应用程序,而当为恶意时卸载该应用程序,并将包括分析的结果的第一部分和分析的结果的第二部分的应用程序的信息发送到判定服务器以更新用于大数据分析、判定和确认的数据库,其中为恶意时,分析的结果的第二部分还包括有将创建主体的相关信息进行标记以作为标识该应用程序会对终端造成影响的恶意标识信息的补充部分。Preferably, the terminal-based big data analysis system further executes the following step S7, further determines whether to keep the application program in the terminal or uninstall the application program based on the analysis result, and sends the information of the application program to the determination server for updating The database for big data analysis, determination and confirmation further includes: the first part of the result of the terminal based on the analysis, retains the application when it is a safe application, and uninstalls the application when it is malicious, and will include the analyzed The application information of the first part of the result and the second part of the analysis result is sent to the judgment server to update the database for big data analysis, judgment and confirmation, and when it is malicious, the second part of the analysis result also includes: The relevant information of the creation body is marked as a supplementary part of the malicious identification information that identifies the application that will affect the terminal.

优选地,所述基于终端的大数据分析系统进一步执行以下步骤S7,在执行完上述步骤之后,进一步执行以下操作:在卸载应用程序之后,当终端启动网络通信时激活监控程序,进而使得该监控程序实时截取通过网络收发的数据,并将发送的数据宿和/或接收的数据源与之前确定的恶意的来源进行特征匹配,当符合匹配标准时将该结果显示给用户并分析待发送的数据所在的位置以及对该数据进行调用的实体的名称和位置,并将该调用的实体的名称和位置进行定点移除,之后显示移除成功与否的结果,如果不成功则重复上述移除操作并展示给用户移除进程,直到符合预设要求为止。Preferably, the terminal-based big data analysis system further performs the following step S7, and after performing the above steps, further performs the following operations: after uninstalling the application program, activate the monitoring program when the terminal starts network communication, thereby enabling the monitoring program The program intercepts the data sent and received over the network in real time, and matches the sent data sink and/or received data source with the previously determined malicious source. When the matching criteria are met, the result is displayed to the user and the location of the data to be sent is analyzed. location and the name and location of the entity calling the data, and remove the name and location of the calling entity at a fixed point, and then display the result of the removal success or not, if unsuccessful, repeat the above removal operation and Show the user the removal process until the preset requirements are met.

进一步地,分析待发送的数据所在的位置的同时还分析待发送的数据,以确定是否含有用户的账号、联系人、验证码、联系方式的信息,如果存在则将风险提示给用户。Further, while analyzing the location of the data to be sent, the data to be sent is also analyzed to determine whether there is information about the user's account, contact person, verification code, and contact information, and if there is, the risk is prompted to the user.

优选地,所述基于终端的大数据分析系统进一步执行以下步骤S8,当该应用程序请求访问终端上的用户隐私数据时,终端根据权限配置表确认其访问权限,并执行对应操作进一步包括:当该应用程序请求访问终端上的用户隐私数据时,应用程序将访问请求发送给终端的处理器,处理器将应用程序标识发送至权限管理模块,以根据权限管理模块中的权限配置表确定该应用程序的访问权限,当应用程序具有复数种隐私数据中的一种或多种的访问权限时,处理器确定该应用程序请求访问的终端上的用户隐私数据的访问权限是否符合权限配置表确定的访问权限,如果符合则给应用程序分配一个对应的解释引擎,处理器发布跳转指令,并经过执行跳转指令后将应用程序引导至解释引擎的入口,以用于由该解释引擎对请求访问的终端上的用户隐私数据进行解释,并将解释的用户隐私数据发送给该应用程序。Preferably, the terminal-based big data analysis system further executes the following step S8, when the application program requests to access user privacy data on the terminal, the terminal confirms its access authority according to the authority configuration table, and performs corresponding operations further comprising: when When the application program requests to access the user's private data on the terminal, the application program sends the access request to the processor of the terminal, and the processor sends the application program identifier to the rights management module to determine the application according to the rights configuration table in the rights management module The access rights of the program, when the application program has one or more access rights of multiple types of private data, the processor determines whether the access rights of the user's private data on the terminal that the application program requests to access conform to the access rights determined by the rights configuration table Access rights, if it matches, assign a corresponding interpretation engine to the application program, the processor issues a jump instruction, and after executing the jump instruction, the application program is guided to the entry of the interpretation engine for the interpretation engine to access the request The user privacy data on the terminal is interpreted, and the interpreted user privacy data is sent to the application.

优选地,该用户隐私数据是为了保障用户信息安全而被转换的数据,其在终端中存储时不会明码存储而被恶意代码或文件或软件攻击获取进而给用户造成不可挽回的损失,其中该用户隐私数据首先由原始函数的代码形式转换成仅仅可以由终端的解释引擎解释、对于第三方软件来说无法有效分割破解并且看上去没有明显含义的字节码,该字节码以片段形式由解释引擎进行解释,并且该片段长度由该解释引擎限定,同时在各个片段之间、在前一个片段的末尾以解释引擎可识别的、表示间隔的、以有限数据长度的字节码形式的分隔符;为字节码设定跳转指令,并存储在寄存器中,同时擦除由原始函数的代码形式表示的用户隐私数据;当应用程序请求访问终端上的用户隐私数据时,如果处理器确定该应用程序请求访问的终端上的用户隐私数据的访问权限是否符合权限配置表确定的访问权限,则处理器调取并发布跳转指令,并经过执行跳转指令后将应用程序引导至解释引擎的入口,以用于由该解释引擎对请求访问的终端上的用户隐私数据进行解释,并将解释的用户隐私数据发送给该应用程序。Preferably, the user privacy data is data that is converted to ensure the security of user information. When stored in the terminal, it will not be stored in plaintext, but will be acquired by malicious code, files or software attacks, thereby causing irreparable losses to the user. User privacy data is first converted from the code form of the original function into a bytecode that can only be interpreted by the interpretation engine of the terminal, cannot be effectively split and cracked for third-party software, and does not seem to have obvious meaning. The interpretation engine interprets and the segment length is defined by the interpretation engine, while separating each segment, at the end of the previous segment, in bytecodes that are recognizable by the interpretation engine and represent the interval, in the form of bytecodes of limited data length symbol; set the jump instruction for the bytecode and store it in the register, while erasing the user's private data represented by the code form of the original function; when the application requests to access the user's private data on the terminal, if the processor determines Whether the access authority of the user's private data on the terminal that the application requests to access conforms to the access authority determined by the authority configuration table, the processor calls and issues the jump instruction, and after executing the jump instruction, the application program is guided to the interpretation engine The entry for the interpretation engine to interpret the user privacy data on the terminal requesting access, and send the interpreted user privacy data to the application.

优选地,所述基于终端的大数据分析系统进一步执行以下步骤S9,当终端有新的即时通讯消息传入并且该应用程序请求访问时,终端基于访问设置而对该应用程序的访问使能或禁止进一步包括:当终端有新的即时通讯消息传入时,终端对该新传入的即时通讯消息进行接收,并由终端的消息分析模块分析其中包含的涉密信息,终端的消息分析模块判断传入的即时通讯消息中是否包含用户密码、账号、验证码中的任一个或多个与有效时间的组合的信息,当包含其中的任一个或多个与有效时间的组合的信息时,将该新传入的即时通讯消息存储到终端的私密存储库中,否则将新传入的即时通讯消息存储到终端的常规存储库中;当包含其中的任一个或多个与有效时间的组合的信息,且当安装的应用程序试图访问该传入的即时通讯消息时,权限管理模块验证该应用程序是否具有对传入的即时通讯消息的访问权限,(i)如果不具有访问权限,则权限管理模块通知终端的私密存储库不将新传入的即时通讯消息发送给该应用程序,以及(ii)如果具有访问权限,则权限管理模块向私密存储库发送应用程序对私密存储库中消息的读取请求,并且权限管理模块通知终端的消息分析模块判断当前时段是否在存储的新传入的即时通讯消息的有效读取时段中,当处于新传入的即时通讯消息的有效读取时段中时,则由私密存储库将其中存储的新传入的即时通讯消息发送给应用程序,否则当不处于新传入的即时通讯消息的有效读取时段中,即处于新传入的即时通讯消息的禁止读取时段中时,私密存储库拒绝将其中存储的新传入的即时通讯消息发送给应用程序,直到其禁止读取时段解除,此时即使应用程序尝试读取私密信息成功,由于已经随着时间的过去而超出新传入的即时通讯消息的可以访问的有效读取时段,所以即使应用程序读取到私密信息,也因为过了有效时段而无法对终端构成攻击,极大地降低了恶意应用程序对终端的私密信息的窃取和泄露;以及当将新传入的即时通讯消息存储到终端的常规存储库中,且当安装的应用程序试图访问该传入的即时通讯消息时,权限管理模块验证该应用程序是否具有对传入的即时通讯消息的访问权限,(i)如果不具有访问权限,则权限管理模块通知终端的常规存储库不将新传入的即时通讯消息发送给该应用程序,以及(ii)如果具有访问权限,则限管理模块向常规存储库发送应用程序对常规存储库中消息的读取请求,并且由常规存储库将其中存储的新传入的即时通讯消息发送给应用程序。Preferably, the terminal-based big data analysis system further executes the following step S9, when a new instant messaging message is incoming to the terminal and the application requests access, the terminal enables or enables access to the application based on the access settings. The prohibition further includes: when a new instant messaging message is incoming to the terminal, the terminal receives the newly incoming instant messaging message, and the message analysis module of the terminal analyzes the confidential information contained therein, and the message analysis module of the terminal determines Whether the incoming instant messaging message contains information about any one or more of the user password, account number, and verification code in combination with the valid time, when it contains any one or more of the information in combination with the valid time, the The newly incoming instant messaging message is stored in the private storage repository of the terminal, otherwise the newly incoming instant messaging message is stored in the regular storage storage of the terminal; information, and when an installed application attempts to access the incoming IM message, the rights management module verifies whether the application has access rights to the incoming IM messages, (i) if not, the rights The management module informs the private repository of the terminal not to send new incoming instant messaging messages to the application, and (ii) if there is access rights, the rights management module sends the private repository the application's information on the messages in the private repository. Read the request, and the authority management module notifies the message analysis module of the terminal to determine whether the current period is in the valid reading period of the newly incoming instant messaging message stored, and when it is in the valid reading period of the newly incoming instant messaging message when the new incoming instant messaging message stored in the private repository is sent to the application, otherwise when it is not in the valid reading period of the newly incoming instant messaging message, that is, it is in the newly incoming instant messaging message During the forbidden reading period, the private repository refuses to send new incoming instant messaging messages stored in it to the application until its forbidden reading period is lifted, at which point even if the application attempts to read the private information successfully, due to the With the passage of time, the accessible effective reading period of newly incoming instant messaging messages is exceeded, so even if the application reads the private information, it cannot attack the terminal because the effective period has passed, which greatly reduces the Theft and disclosure of private information of the terminal by malicious applications; and when a newly incoming instant messaging message is stored in the terminal's regular repository, and when an installed application attempts to access the incoming instant messaging message, permissions The management module verifies whether the application has access rights to incoming instant messaging messages, (i) if not, the rights management module informs the terminal's regular repository not to send new incoming instant messaging messages to the The application, and (ii) if it has access rights, the limited management module sends the application's read request for messages in the regular repository to the regular repository, and the regular repository will store new incoming instant messenger messages in it sent to the application.

上述的各个技术术语是本领域中的具有通常含义的常规技术术语,为了不模糊本发明的重点,在此不对其进行进一步的解释。The above-mentioned various technical terms are conventional technical terms with ordinary meanings in the art, and are not further explained herein in order not to obscure the focus of the present invention.

综上,在本发明的技术方案中,通过采用了一种基于终端的大数据分析方法及系统,其能够利用大数据和信息安全技术,在安装阶段对应用程序进行安全性检测,并且对终端有危害的应用程序进行拦截,并对其源头进行确认和阻断;并且针对应用程序对于终端中用户隐私信息的合法或非法访问问题,本发明对于终端的隐私信息进行加密处理,对于合法访问,通过合理管理而进行隐私信息读取并且确保读取不超越预设权限,而对于非法访问,通过时间设置或者权限阻断设置而避免应用程序对隐私程序的不合理访问。通过本发明的方法及系统,可以基于大数据和权限管理实现系统的安全,并且最终保证应用程序在终端上的下载、运行和数据访问的安全性。To sum up, in the technical solution of the present invention, by adopting a terminal-based big data analysis method and system, it can use big data and information security technology to perform security detection on the application program in the installation stage, and perform security detection on the terminal. The harmful application program is intercepted, and its source is confirmed and blocked; and for the legal or illegal access of the application program to the user's private information in the terminal, the present invention encrypts the terminal's private information, and for legal access, Read privacy information through reasonable management and ensure that the reading does not exceed the preset permissions, and for illegal access, use time settings or permission blocking settings to avoid unreasonable access to privacy programs by applications. With the method and system of the present invention, the security of the system can be realized based on big data and rights management, and finally the security of downloading, running and data access of the application program on the terminal is guaranteed.

将理解的是:可以硬件、软件或硬件和软件的组合的形式实现本发明的示例和实施例。如上所述,可存储任何执行这种方法的主体,以挥发性或非挥发性存储的形式,例如存储设备,像ROM,无论可抹除或可重写与否,或者以存储器的形式,诸如例如RAM、存储器芯片、设备或集成电路或在光或磁可读的介质上,诸如例如CD、DVD、磁盘或磁带。将理解的是:存储设备和存储介质是适合于存储一个或多个程序的机器可读存储的示例,当被执行时,所述一个或多个程序实现本发明的示例。经由任何介质,诸如通过有线或无线耦合载有的通信信号,可以电子地传递本发明的示例,并且示例适当地包含相同内容。It will be appreciated that the examples and embodiments of the present invention may be implemented in hardware, software or a combination of hardware and software. As mentioned above, any body performing this method may be stored, in the form of volatile or non-volatile storage, such as a storage device, like a ROM, whether erasable or rewritable or not, or in the form of a memory such as For example RAM, memory chips, devices or integrated circuits or on optically or magnetically readable media such as eg CD, DVD, magnetic disk or magnetic tape. It will be appreciated that storage devices and storage media are examples of machine-readable storage suitable for storing one or more programs that, when executed, implement examples of the present invention. Examples of the present invention may be communicated electronically via any medium, such as a communication signal carried by a wired or wireless coupling, and examples suitably incorporate the same.

应当注意的是:因为本发明解决了利用大数据和信息安全技术,在安装阶段对应用程序进行安全性检测,并且对终端有危害的应用程序进行拦截,并对其源头进行确认和阻断;并且针对应用程序对于终端中用户隐私信息的合法或非法访问问题,本发明对于终端的隐私信息进行加密处理,对于合法访问,通过合理管理而进行隐私信息读取并且确保读取不超越预设权限,而对于非法访问,通过时间设置或者权限阻断设置而避免应用程序对隐私程序的不合理访问。通过本发明的方法及系统,可以基于大数据和权限管理实现系统的安全,并且最终保证应用程序在终端上的下载、运行和数据访问的安全性的技术问题,采用了本技术领域中技术人员在阅读本说明书之后根据其教导所能理解的技术手段,并获取了有益技术效果,所以在所附权利要求中要求保护的方案属于专利法意义上的技术方案。另外,因为所附权利要求要求保护的技术方案可以在工业中制造或使用,因此该方案具备实用性。It should be noted that: because the present invention solves the problem of using big data and information security technology to perform security detection on the application program in the installation stage, and intercepting the application program that is harmful to the terminal, and confirming and blocking its source; And in view of the legal or illegal access of the application to the user's private information in the terminal, the present invention encrypts the private information of the terminal, and for legal access, reads the private information through reasonable management and ensures that the reading does not exceed the preset authority. , and for illegal access, use the time setting or permission blocking setting to avoid the unreasonable access of the application to the privacy program. Through the method and system of the present invention, the security of the system can be realized based on big data and rights management, and the technical problem of finally ensuring the security of downloading, running and data access of the application program on the terminal adopts the technical problems of those skilled in the art. After reading this specification, the technical means that can be understood according to the teachings thereof have obtained beneficial technical effects, so the solutions claimed in the appended claims belong to the technical solutions in the sense of the patent law. In addition, the technical solutions claimed in the appended claims are practical because they can be manufactured or used in industry.

以上所述,仅为本发明的较佳的具体实施方式,但本发明的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本发明揭露的技术范围内,可轻易想到的变化或替换,都应包涵在本发明的保护范围之内。除非以其他方式明确陈述,否则公开的每个特征仅是一般系列的等效或类似特征的一个示例。因此,本发明的保护范围应该以权利要求书的保护范围为准。The above description is only a preferred embodiment of the present invention, but the protection scope of the present invention is not limited to this. Any person skilled in the art can easily think of changes within the technical scope disclosed by the present invention. Or replacement should be included within the protection scope of the present invention. Unless expressly stated otherwise, each feature disclosed is only one example of a generic series of equivalent or similar features. Therefore, the protection scope of the present invention should be based on the protection scope of the claims.

Claims (10)

1.一种基于终端的大数据分析方法,包括:1. A terminal-based big data analysis method, comprising: 步骤S1,终端经由无线网络搜索所需的应用程序,并获取含有应用程序的资源服务器的名称和/或IP信息;Step S1, the terminal searches for the required application program via the wireless network, and obtains the name and/or IP information of the resource server containing the application program; 步骤S2,终端将该资源服务器的名称和/或IP信息发送到判定服务器进行恶意与否的确认;Step S2, the terminal sends the name and/or IP information of the resource server to the determination server to confirm whether it is malicious or not; 步骤S3,终端根据判定服务器基于大数据确认的恶意与否的结果执行对应操作:如果恶意则阻断与该资源服务器的通信链路并继续尝试步骤S1中获取的其它资源服务器且顺次执行步骤S2和S3,直到判定服务器确认非恶意或者尝试次数达到用户预设次数;如果非恶意则由用户选择是否下载或直接下载该应用程序;Step S3, the terminal performs corresponding operations according to the result of whether the determination server is malicious or not based on the big data confirmation: if it is malicious, block the communication link with the resource server and continue to try other resource servers obtained in step S1 and execute steps in sequence. S2 and S3, until the determination server confirms that it is not malicious or the number of attempts reaches the user preset number; if it is not malicious, the user chooses whether to download or directly download the application; 步骤S4,下载后终端安装该应用程序并提取其信息,对该应用程序进行签名处理,并将提取的信息发送到判定服务器进行安全性认证;Step S4, after downloading, the terminal installs the application and extracts its information, performs signature processing on the application, and sends the extracted information to the determination server for security authentication; 步骤S5,终端根据判定服务器基于大数据的安全性认证结果,确定在终端中保留该应用程序还是卸载该应用程序;当保留该应用程序时,对该应用程序赋予特有的权限,而当卸载时将该应用程序的信息发送到判定服务器以更新用于大数据分析、判定和确认的数据库;Step S5, the terminal determines whether to keep the application program in the terminal or uninstall the application program according to the security authentication result based on the big data of the judgment server; Send the application's information to the decision server to update the database for big data analysis, decision and validation; 步骤S6,当该应用程序在终端上执行时,获取其运行参数并进行分析;Step S6, when the application is executed on the terminal, obtain its operating parameters and analyze; 步骤S7,基于分析的结果进一步确定在终端中保留该应用程序还是卸载该应用程序,并将该应用程序的信息发送到判定服务器以更新用于大数据分析、判定和确认的数据库;Step S7, based on the analysis result, further determine whether to keep the application program in the terminal or uninstall the application program, and send the information of the application program to the determination server to update the database for big data analysis, determination and confirmation; 其中步骤S4进一步包括:在下载后终端安装该应用程序并提取其信息,对该应用程序进行签名处理,并将提取的信息发送到判定服务器进行安全性认证的步骤中,其中的终端在安装该应用程序的过程中,更改应用程序的文件后缀名以进行解压而得到其中包括的经过编译和工具打包形成的第一文件,获得变换工具以将包括类别名称的类别文件拷贝到第一目录位置,在第一目录位置处通过类别转换命令而生成应用程序中的分组数据;通过遍历分组数据的库函数而获取调取的函数,通过调取的函数的行为信息确定其行为属性,其中该行为信息包括访问行为信息、创建进程行为信息、操作进程行为信息、操作注册表行为信息、申请调取其它应用程序的标识符和权限的行为信息、安装行为信息、压缩打包行为信息和移动数据传输行为信息,而行为属性包括恶意与否;根据行为属性确定调取的函数的行为执行路径,将该执行路径进行记录,作为提取的信息的一部分,以在后续步骤中上传到判定服务器,通过将该执行路径的部分或全部与判定服务器中的基于字节码的路径大数据进行分析,进而进行安全性认证;其中终端对该应用程序进行签名处理的过程中,基于解压后的应用程序,获取应用程序中所有文件;将第一类型的文件用安全哈希算法计算摘要信息,并对该摘要信息进行编码,之后将编码值存入不同于第一类型的第二类型的第一文件中,以及将先前保存在第二类型的第一文件中的摘要信息和私钥信息生成一组签名信息并保存在第二类型的与第一文件不同的第二文件中的第一位置,将签名信息和公钥存入第二文件中的第二位置中,其中第一类型和第二类型涉及不同目录类型的文件;Wherein step S4 further includes: after downloading, the terminal installs the application and extracts its information, performs signature processing on the application, and sends the extracted information to the determination server for security authentication, wherein the terminal is installing the application. In the process of applying the program, change the file suffix name of the application program to decompress to obtain the first file included in it after compilation and tool packaging, and obtain a transformation tool to copy the category file including the category name to the first directory location, At the first directory location, the group data in the application program is generated through the category conversion command; the called function is obtained by traversing the library functions of the group data, and the behavior attribute of the called function is determined by the behavior information of the called function, wherein the behavior information Including access behavior information, process creation behavior information, operation process behavior information, registry operation behavior information, application for calling identifiers and permissions of other applications, installation behavior information, compression and packaging behavior information, and mobile data transmission behavior information , and the behavior attribute includes whether it is malicious or not; determine the behavior execution path of the called function according to the behavior attribute, record the execution path as part of the extracted information, and upload it to the judgment server in the subsequent steps. Part or all of the path is analyzed with the bytecode-based path big data in the judgment server, and then security authentication is performed; in the process of signing the application, the terminal obtains the application based on the decompressed application. All files in the file; use the secure hash algorithm to calculate the digest information for the first type of file, and encode the digest information, and then store the encoded value in the first file of the second type different from the first type, and the The digest information and private key information previously saved in the first file of the second type generate a set of signature information and save it in the first position in the second file of the second type that is different from the first file. the key is stored in a second location in a second file, wherein the first type and the second type relate to files of different directory types; 步骤S5进一步包括:终端接收判定服务器基于大数据的安全性认证结果,并基于该结果进一步确定是否为恶意,当为恶意时卸载该应用程序,当为安全时在终端中保留该应用程序,而当待定时将风险提示信息在显示屏上展示给用户以供用户了解安全属性并选择卸载还是保留;当保留该应用程序时,对该应用程序赋予权限,该权限包括存储权限、拍照权限,麦克风使用的权限、录音权限、调用终端传感器的权限、读取和发送短消息权限、拨打电话权限、识别终端安装的SIM卡号码的权限、读取通信录的权限、读取用户运动数据的权限、开启移动运营商通信网络连接权限、开启无线保真连接权限、读取其它应用程序的权限、读取即时通讯软件的通信记录的权限,赋予权限包括赋予启用权限或者赋予禁用权限;当确定卸载时,将该应用程序的信息发送到判定服务器以更新判定服务器中用于大数据分析、判定和确认的数据库;Step S5 further includes: the terminal receives the big data-based security authentication result of the determination server, and further determines whether it is malicious based on the result, uninstalls the application when it is malicious, retains the application in the terminal when it is safe, and When the risk prompt information is to be displayed to the user on the display screen, the user can understand the security attributes and choose to uninstall or keep it; when the application is retained, the application is given permissions, including storage permission, camera permission, microphone permission Permission to use, permission to record, permission to call terminal sensors, permission to read and send short messages, permission to make phone calls, permission to identify the SIM card number installed on the terminal, permission to read contacts, permission to read user motion data, Permission to enable mobile operator communication network connection, permission to enable Wi-Fi connection, permission to read other applications, permission to read communication records of instant messaging software, granting permission includes granting enable permission or granting disable permission; when it is determined to uninstall , send the application's information to the decision server to update the database in the decision server for big data analysis, decision and validation; 步骤S6中,当该应用程序在终端上执行时,获取其运行参数并进行分析,其中包括:执行应用程序,获取其运行过程中的行为参数,该行为参数包括系统API、文件权限的变化、进程和线程运行数据及调用数据、网络访问请求数据、发送的网络数据,将该行为参数记录在日志文件中;监控应用程序中可移植的执行文件的创建操作,确定其创建主体,在终端存储器中建立可移植的执行文件与其创建主体间的对应关系;使用模拟工具自行运行和模拟终端用户的运行操作,以获得日志文件记录和网络数据分组文件记录;在模拟工具运行结束,并且在网络链路开启接通和数据通信结束之后,将日志文件记录和网络数据分组文件记录存储在第一存储位置中;对日志文件记录和网络数据分组文件记录进行分析,其中使用特征提取对日志文件记录和网络数据分组文件记录的特征量化,将权限、API、URL和字符串转换成数值特征,使用基于均值和方差的特征选择算法选择特征的子集,结合分类和聚类以及标签构建规则对数值特征进行预测,基于该数值特征与预设配置文件中的参数的数值匹配而确定安装的该应用程序对于终端来说是否安全,并将其作为分析结果的第一部分;当结果为安全或恶意时,将应用程序中可移植的执行文件与其创建主体的对应关系作为分析结果的第二部分,当为恶意时,另外将创建主体的相关信息进行标记以作为标识该应用程序会对终端造成影响的恶意标识信息并作为第二部分的补充部分,以供发送到判定服务器更新用于大数据分析、判定和确认的数据库,并且在终端进行记录并存储到安全信息数据库中以作为恶意的来源,在后续安装时可将该来源的应用程序作为来自恶意来源的应用程序而提供和显示给用户,供用户可选地对源头进行彻底查杀并掐断该源头和来自其的所有应用程序的安装以及该源头对终端的任何访问请求;聚合分析结果的第一部分和分析结果的第二部分以作为该应用程序的信息。In step S6, when the application program is executed on the terminal, its operation parameters are obtained and analyzed, including: executing the application program, and obtaining behavior parameters during its operation process, the behavior parameters include system API, changes in file permissions, Process and thread running data and call data, network access request data, and sent network data, record the behavior parameters in the log file; monitor the creation of portable executable files in the application program, determine its creation subject, and store it in the terminal memory. Establish the corresponding relationship between the portable executable file and its creation body; use the simulation tool to run and simulate the operation of the end user to obtain log file records and network data packet file records; after the simulation tool runs, and in the network chain After the road is turned on and the data communication ends, the log file records and the network data packet file records are stored in the first storage location; the log file records and the network data packet file records are analyzed, wherein the log file records and the network data packet file records are analyzed using feature extraction. Feature quantification of network data grouping file records, converting permissions, APIs, URLs, and strings into numerical features, using mean- and variance-based feature selection algorithms to select subsets of features, combining classification and clustering and label building rules for numerical features Make a prediction, determine whether the installed application is safe for the terminal based on the value matching of the numerical feature and the parameter in the preset configuration file, and use it as the first part of the analysis result; when the result is safe or malicious, The corresponding relationship between the portable executable file in the application and its creation subject is used as the second part of the analysis result. When it is malicious, the relevant information of the creation subject is also marked as a malicious sign that the application will affect the terminal. The identification information is used as a supplementary part of the second part to be sent to the judgment server to update the database for big data analysis, judgment and confirmation, and is recorded at the terminal and stored in the security information database as the source of maliciousness. During installation, the application from the source can be provided and displayed to the user as an application from a malicious source, so that the user can optionally completely kill the source and cut off the installation of the source and all applications from it and the installation of the source. Any access request from the source to the terminal; the first part of the analysis result and the second part of the analysis result are aggregated as the information of the application. 2.根据权利要求1所述的基于终端的大数据分析方法,其中在上述步骤S4中,提取信息进一步包括提取信息的其它部分,具体为将应用程序的文件重命名为后缀名为压缩包形式的文件并进行解压,进而得到第一配置文件,使用第一开源软件将第一配置文件转换成可操作的文本格式;将使用第二开源软件反编译解压的结果中的二进制的源码文件;使用第三开源软件还原二进制的源码文件以获得该应用程序的文件的源码;基于应用程序的文件的源码,使用匹配算法将源码进行扫描,并对指定关键词进行统计,获取指定的各个关键词在类文件中的数量和对应位置并使用矩阵存储,基于距离算法计算每两个关键词之间的相似距离;基于相似距离对关键词分类,并将矩阵中的每个关键词作为根节点,把与各个节点之间相似度高的关键词聚合在一起,与存储的所在的位置的矩阵比对,去除不同类别的关键词,进而归类存储;将终端中的特征数据库中存储的安全应用程序的特征与归类存储的特征进行对比,去除该应用程序的特征中包含的安全特征以避免增加信息处理量并增加信息处理时间和功耗以及浪费终端有限的处理资源;将归类存储并去除特征的数据作为提取的信息的其它部分,与其它信息一起被发送到判定服务器进行安全性认证。2. The terminal-based big data analysis method according to claim 1, wherein in the above-mentioned step S4, extracting information further comprises extracting other parts of the information, specifically renaming the file of the application program into a suffix named compressed package form and decompress the file, and then obtain the first configuration file, use the first open source software to convert the first configuration file into an operable text format; use the second open source software to decompile and decompress the binary source code file in the result; use The third open source software restores the binary source code file to obtain the source code of the file of the application program; based on the source code of the file of the application program, the source code is scanned by the matching algorithm, and the specified keywords are counted, and each specified keyword is obtained in The number and corresponding position in the class file are stored in a matrix, and the similarity distance between each two keywords is calculated based on the distance algorithm; the keywords are classified based on the similarity distance, and each keyword in the matrix is used as the root node. The keywords with high similarity between each node are aggregated, compared with the matrix of the stored location, and the keywords of different categories are removed, and then classified and stored; the security application stored in the feature database in the terminal is stored. Compare the features of the application program with the features of classification and storage, and remove the security features contained in the features of the application program to avoid increasing the amount of information processing, increasing the information processing time and power consumption, and wasting the limited processing resources of the terminal; The data of the feature is sent to the decision server for security authentication along with other information as other parts of the extracted information. 3.根据权利要求2所述的基于终端的大数据分析方法,其中该方法进一步包括:3. The terminal-based big data analysis method according to claim 2, wherein the method further comprises: 步骤S8,当该应用程序请求访问终端上的用户隐私数据时,终端根据权限配置表确认其访问权限,并执行对应操作。Step S8, when the application program requests to access the user's private data on the terminal, the terminal confirms its access authority according to the authority configuration table, and performs corresponding operations. 4.根据权利要求3所述的基于终端的大数据分析方法,其中该方法进一步包括:4. The terminal-based big data analysis method according to claim 3, wherein the method further comprises: 步骤S9,当终端有新的即时通讯消息传入并且该应用程序请求访问时,终端基于访问设置而对该应用程序的访问使能或禁止。Step S9, when a new instant messaging message is incoming to the terminal and the application program requests access, the terminal enables or disables access to the application program based on the access setting. 5.根据权利要求4所述的基于终端的大数据分析方法,其中步骤S1进一步包括:直接经由终端安装的浏览器,通过输入期望的应用程序的名称,通过搜索引擎进行搜索;或者在当前的非浏览器应用中,通过用户手指长按屏幕,在屏幕上出现选择文字的选项,用户通过选择和高亮应用程序的全部或部分名称,并在选定后点击屏幕上出现的搜索按钮,通过点击该搜索按钮而出现一个或多个浏览器的选择图标以供选择,在选择对应的浏览器图标后进行搜索。5. The terminal-based big data analysis method according to claim 4, wherein step S1 further comprises: directly via the browser installed on the terminal, by inputting the name of the desired application, searching through a search engine; In non-browser applications, the user's finger presses the screen for a long time, and the option to select text appears on the screen. The user selects and highlights all or part of the name of the application, and clicks the search button that appears on the screen after selection. Click the search button to display one or more browser selection icons for selection, and perform a search after selecting the corresponding browser icon. 6.根据权利要求4所述的基于终端的大数据分析方法,其中步骤S1进一步包括:在内嵌有浏览器的即时通讯应用中,通过用户手指长按屏幕并在屏幕上出现选择文字的选项,通过选择和高亮应用程序的全部或部分名称并在选定后点击屏幕上出现的搜索按钮而调用嵌入的浏览器进行搜索,或者通过选择非浏览器应用中的搜索图标而在屏幕上出现输入框,通过输入期望的应用程序名称而调用嵌入的浏览器进行搜索。6. The terminal-based big data analysis method according to claim 4, wherein step S1 further comprises: in an instant messaging application with a built-in browser, long press the screen by the user's finger and an option to select text appears on the screen , invoking the embedded browser to search by selecting and highlighting all or part of the application's name and clicking the search button that appears on the screen after selection, or by selecting the search icon in a non-browser application Input box to invoke the embedded browser to search by entering the desired application name. 7.根据权利要求5-6中任一项所述的基于终端的大数据分析方法,其中:在经由无线网络搜索所需的应用程序之后,根据结果获取用于标识含有应用程序的资源服务器的名称和/或IP地址。7. The terminal-based big data analysis method according to any one of claims 5-6, wherein: after searching for a required application program via a wireless network, a data for identifying a resource server containing the application program is obtained according to the result. name and/or IP address. 8.根据权利要求1所述的基于终端的大数据分析方法,其中步骤S2进一步包括:终端选择该资源服务器的名称和/或IP信息中的任一者或两者,并将其以固定的包传输格式打包在待传输的包中,并将包的报头设置为请求属性,在待传输的包中的名称和/或IP信息中的任一者或两者之后通过固定的结束符终止,以便于判定服务器识别,之后将该包通过无线链路发送到判定服务器,以供进行恶意与否的确认。8. The terminal-based big data analysis method according to claim 1, wherein step S2 further comprises: the terminal selects any one or both of the name and/or IP information of the resource server, and assigns it to a fixed number. The packet transmission format is packaged in the packet to be transmitted, and the header of the packet is set as a request attribute, terminated by a fixed terminator after either or both of the name and/or IP information in the packet to be transmitted, In order to facilitate the identification of the determination server, the packet is then sent to the determination server through the wireless link for confirmation of maliciousness or not. 9.根据权利要求1所述的基于终端的大数据分析方法,其中步骤S3进一步包括:判定服务器内部设置有用于大数据分析、确认和判定的数据库,该数据库存储有用于终端的应用程序的安全属性信息,包括恶意、安全和待定,该安全属性信息基于时间而更新,其更新方式通过用户上传、信息中心通知方式中的任一种而进行;判定服务器接收终端传输的包,并基于预设的拆分包规则,提取包中的资源服务器的名称和/或IP信息中的任一者或两者,并将其输入到内部设置的数据库,以进行信息匹配,当有符合安全或恶意的匹配项以及无匹配而被确认为待定时,将上述安全、恶意或待定的安全属性信息的结果进行打包,经由无线链路发送到终端;终端接收该包并拆分包,提取其中的安全属性信息,如果为恶意则阻断与该资源服务器的通信链路,并继续尝试步骤S1中获取的其它资源服务器且顺次执行步骤S2和S3,直到判定服务器确认非恶意或者尝试次数达到用户预设次数;如果是安全则由用户直接下载该应用程序,而如果是待定则由用户选择是否下载该应用程序,若下载则进行后续步骤,若不下载则确定直接退出该方法还是继续尝试步骤S1中获取的其它资源服务器且顺次执行步骤S2和S3直到判定服务器确认符合用户期望的安全属性或尝试次数达到用户预设次数。9. The terminal-based big data analysis method according to claim 1, wherein step S3 further comprises: determining that the server is internally provided with a database for big data analysis, confirmation and determination, and the database stores the security of the application program for the terminal Attribute information, including malicious, safe, and pending, the security attribute information is updated based on time, and its update method is carried out through any one of user uploading and information center notification methods; the determination server receives the packet transmitted by the terminal, and based on the preset The split package rule extracts either or both of the resource server's name and/or IP information in the package and enters it into an internally set database for information matching, when there is a safe or malicious The matching item and the unmatched item are confirmed to be pending, and the result of the above-mentioned security, malicious or pending security attribute information is packaged and sent to the terminal via the wireless link; the terminal receives the packet and splits the packet to extract the security attribute. information, if it is malicious, block the communication link with the resource server, and continue to try other resource servers obtained in step S1 and execute steps S2 and S3 in sequence, until the determination server confirms that it is not malicious or the number of attempts reaches the user preset. The number of times; if it is safe, the user directly downloads the application, and if it is pending, the user chooses whether to download the application, if it is downloaded, proceed to the next step, if not, decide to exit the method directly or continue to try step S1 Obtain other resource servers and perform steps S2 and S3 in sequence until it is determined that the server confirms that the security attributes meet the user's expectations or the number of attempts reaches the user's preset number of times. 10.一种基于终端的大数据分析系统,包括终端和判定服务器,其中终端包括:处理器,权限管理模块,解释引擎,消息分析模块,私密存储库,常规存储库;判定服务器内部设置有用于大数据分析、确认和判定的数据库;所述基于终端的大数据分析系统用于执行权利要求9所述的基于终端的大数据分析方法。10. A terminal-based big data analysis system, comprising a terminal and a determination server, wherein the terminal comprises: a processor, a rights management module, an interpretation engine, a message analysis module, a private repository, and a conventional repository; A database for big data analysis, confirmation and determination; the terminal-based big data analysis system is used to execute the terminal-based big data analysis method of claim 9 .
CN201910336086.8A 2019-04-24 2019-04-24 Terminal-based big data analysis method and system Active CN110071924B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910336086.8A CN110071924B (en) 2019-04-24 2019-04-24 Terminal-based big data analysis method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910336086.8A CN110071924B (en) 2019-04-24 2019-04-24 Terminal-based big data analysis method and system

Publications (2)

Publication Number Publication Date
CN110071924A CN110071924A (en) 2019-07-30
CN110071924B true CN110071924B (en) 2020-07-31

Family

ID=67368716

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910336086.8A Active CN110071924B (en) 2019-04-24 2019-04-24 Terminal-based big data analysis method and system

Country Status (1)

Country Link
CN (1) CN110071924B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110801630B (en) * 2019-11-04 2023-07-25 网易(杭州)网络有限公司 Method, device, equipment and storage medium for determining cheating program
CN111092993B (en) * 2020-03-20 2020-06-30 北京热云科技有限公司 Method and system for detecting hijacking behavior of apk file
CN112613035A (en) * 2020-12-18 2021-04-06 深圳市安络科技有限公司 Ios system-based app security detection method, device and equipment
CN114329633A (en) * 2021-12-31 2022-04-12 深圳依时货拉拉科技有限公司 Data storage and access method and device and computer equipment
CN114866532B (en) * 2022-04-25 2023-11-10 安天科技集团股份有限公司 Method, device, equipment and medium for uploading security check result information of endpoint file

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103368987B (en) * 2012-03-27 2017-02-08 百度在线网络技术(北京)有限公司 Cloud server, application program verification, certification and management system and application program verification, certification and management method
CN103019938B (en) * 2012-12-26 2016-12-28 北京搜狐新媒体信息技术有限公司 A kind of method and device in the application of local test cloud platform
CN103927476B (en) * 2014-05-07 2017-09-15 上海联彤网络通讯技术有限公司 Realize the intelligence system and method for application program rights management
CN104318153B (en) * 2014-09-30 2017-06-23 北京金和软件股份有限公司 It is a kind of to monitor the system that mobile device downloads Mobile solution on-line
CN104715196B (en) * 2015-03-27 2017-05-31 北京奇虎科技有限公司 The Static Analysis Method and system of smart mobile phone application program
CN104850779A (en) * 2015-06-04 2015-08-19 北京奇虎科技有限公司 Safe application program installing method and safe application program installing device
CN105095696B (en) * 2015-06-25 2018-10-16 三星电子(中国)研发中心 Method, system and the equipment of safety certification are carried out to application program
CN105975849A (en) * 2016-05-04 2016-09-28 深圳市永兴元科技有限公司 Security installation method and system of application software
CN106548074A (en) * 2016-12-09 2017-03-29 江苏通付盾科技有限公司 Application program analyzing monitoring method and system
CN107908953A (en) * 2017-11-21 2018-04-13 广东欧珀移动通信有限公司 Notifications service control method, device, terminal device and storage medium
CN107871080A (en) * 2017-12-04 2018-04-03 杭州安恒信息技术有限公司 The hybrid Android malicious code detecting methods of big data and device

Also Published As

Publication number Publication date
CN110071924A (en) 2019-07-30

Similar Documents

Publication Publication Date Title
CN110071924B (en) Terminal-based big data analysis method and system
CN110084064B (en) Big data analysis processing method and system based on terminal
CN111433775B (en) Security enhancing method and electronic device thereof
KR101373986B1 (en) Method and apparatus to vet an executable program using a model
Malik et al. CREDROID: Android malware detection by network traffic analysis
JP5396051B2 (en) Method and system for creating and updating a database of authorized files and trusted domains
CN110046494B (en) Big data processing method and system based on terminal
JP5802848B2 (en) Computer-implemented method, non-temporary computer-readable medium and computer system for identifying Trojanized applications (apps) for mobile environments
US20100122313A1 (en) Method and system for restricting file access in a computer system
US20140096246A1 (en) Protecting users from undesirable content
CN112084497A (en) Embedded Linux system malicious program detection method and device
CN103679031A (en) File virus immunizing method and device
KR20150044490A (en) A detecting device for android malignant application and a detecting method therefor
KR102180098B1 (en) A malware detecting system performing monitoring of malware and controlling a device of user
CN104504337A (en) Method for detecting malicious application disclosing Android data
US9779250B1 (en) Intelligent application wrapper
JP5478390B2 (en) Log extraction system and program
CN111563015A (en) Data monitoring method and device, computer readable medium and terminal equipment
US11750660B2 (en) Dynamically updating rules for detecting compromised devices
US8127033B1 (en) Method and apparatus for accessing local computer system resources from a browser
CN112231686A (en) System security authentication method and device based on security authentication identifier
JP2012008732A (en) Installation control device and program
CN107766342A (en) A kind of recognition methods of application and device
CN104484598A (en) Method and device for protecting safety of intelligent terminal
CN110287722A (en) Sensitive Permission Extraction Method for Privacy Policy Check in iOS Apps

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200709

Address after: No.368, Menghu commercial and residential building, No.318, Youyi Avenue, Wuchang District, Wuhan City, Hubei Province

Applicant after: Wuhan Wufang Information Service Co.,Ltd.

Address before: 510000 A30 house 68 (1), Nanxiang Road, Whampoa District, Guangzhou, Guangdong.

Applicant before: GUANGZHOU ZHIHONG TECHNOLOGY Co.,Ltd.

GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address
CP03 Change of name, title or address

Address after: 430061 Hubei Province, Wuhan City, Wuchang District, west side of the intersection of Xudong Street and Youyi Avenue, Junlin Tianxia A plot/building/unit 4th floor Commercial 2, Commercial 3

Patentee after: Wuhan Shouyi New Energy Technology Co.,Ltd.

Country or region after: China

Address before: No.368, Menghu commercial and residential building, No.318, Youyi Avenue, Wuchang District, Wuhan City, Hubei Province

Patentee before: Wuhan Wufang Information Service Co.,Ltd.

Country or region before: China