CN106709339A - Scanning result display method and device - Google Patents

Scanning result display method and device Download PDF

Info

Publication number
CN106709339A
CN106709339A CN201610464388.XA CN201610464388A CN106709339A CN 106709339 A CN106709339 A CN 106709339A CN 201610464388 A CN201610464388 A CN 201610464388A CN 106709339 A CN106709339 A CN 106709339A
Authority
CN
China
Prior art keywords
program
scanning
file
scanning result
scan procedure
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610464388.XA
Other languages
Chinese (zh)
Other versions
CN106709339B (en
Inventor
李亚超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201610464388.XA priority Critical patent/CN106709339B/en
Publication of CN106709339A publication Critical patent/CN106709339A/en
Application granted granted Critical
Publication of CN106709339B publication Critical patent/CN106709339B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a scanning result display method and device, and belongs to the technical field of electronics. The method comprises the following steps of: starting a scanning process through a system program; when a malicious program scanning instruction triggered by a user in a safety class application program is received, sending a scanning request to the scanning process through the safety class application program so as to carry out malicious program scanning by the scanning process; when the malicious program scanning is completed, sending a scanning result to the safety class application program through the scanning process; and displaying the scanning result through the safety class application program. By adoption of the scanning result display method and device, the malicious program scanning efficiency can be improved.

Description

A kind of method and apparatus for showing scanning result
Technical field
The present invention relates to electronic technology field, more particularly to a kind of method and apparatus for showing scanning result.
Background technology
With the development of electronic technology, various terminals are widely used, the application in corresponding terminal The species of program is more and more, function is increasingly enriched.Such as, it is a kind of security classes being in daily use that virus searches application program Application program, such as the application program such as computer house keeper.
User can carry out viral lookup by the file in security classes application scan terminal, and at present, terminal is searched Virus method be usually:When terminal receives scan instruction, scan procedure can be started by security classes application program, By scan procedure come the file in end of scan, to carry out rogue program (such as trojan horse program) lookup, after lookup terminates, Security classes application program will close scan procedure, and show final scanning result.
Realize it is of the invention during, inventor find prior art at least there is problems with:
When user carries out rogue program every time to search, i.e., when terminal is connected to scan instruction, based on above-mentioned treatment side Formula, is required to terminal restarting scan procedure, so that, cause the less efficient of rogue program scanning.
The content of the invention
In order to solve problem of the prior art, a kind of method and dress for showing scanning result is the embodiment of the invention provides Put.The technical scheme is as follows:
First aspect, there is provided a kind of method of display scanning result, methods described includes:
By system program, start scan procedure;
When the rogue program scan instruction that user triggers in security classes application program is received, by the security classes Application program sends scan request to the scan procedure, so that the scan procedure carries out rogue program scanning;
When rogue program is scanned to be completed, scanning knot is sent to the security classes application program by the scan procedure Really;
The scanning result is shown by the security classes application program.
Optionally, it is described by system program, start scan procedure, including:
When system program starts, by the system program, start scan procedure.
So, whenever needing to carry out rogue program scanning, terminal need not restart scan procedure, and then, Ke Yiti The efficiency of height scanning rogue program.
Optionally, it is described by system program, start scan procedure, including:
When the security classes application program installation, by system program, start scan procedure.
So, whenever needing to carry out rogue program scanning, terminal need not restart scan procedure, and then, Ke Yiti The efficiency of height scanning rogue program.
Optionally, the scan procedure carries out rogue program scanning, including:
The scan procedure carries out rogue program scanning to the file destination for meeting the default condition of scanning.
So, only to being probably that the file of rogue program carries out rogue program scanning, without to being unlikely to be rogue program File carry out rogue program scanning, can improve rogue program scanning efficiency.
Optionally, it is described when rogue program scans completion, by the scan procedure to the security classes application program Scanning result is sent, including:
When rogue program is scanned to be completed, based on the first scanning result that scanning is obtained, quilt in all file destinations is determined It is judged to the file of non-malicious program, and the characteristic information of the file of non-malicious program is judged as described in acquisition;
To server send described in be judged as non-malicious program file characteristic information so that the server according to The characteristic information of the file for being judged as non-malicious program, to the file for being judged as non-malicious program, is disliked Meaning program scanning, when rogue program is scanned to be completed, the second scanning result that scanning is obtained is sent to terminal;
Second scanning result that the server sends is received, is swept based on first scanning result and described second Result is retouched, it is determined that final scanning result, wherein, the file of rogue program is judged as in the final scanning result, wrap The All Files that rogue program is judged as in first scanning result and second scanning result is included, described final sweeps Retouch the file that non-malicious program is judged as in result, including the text that non-malicious program is judged as in second scanning result Part;
The final scanning result is sent to the security classes application program by the scan procedure.
So, the feature in the virus base in terminal can be prevented not full-time, the scanning result for mistake occur.
Second aspect, there is provided a kind of device of display scanning result, described device includes:
Starting module, for by system program, starting scan procedure;
First sending module, the rogue program scan instruction that user triggers in security classes application program is received for working as When, scan request is sent to the scan procedure by the security classes application program, so that the scan procedure carries out malice Program scanning;
Second sending module, for when rogue program scans completion, being answered to the security classes by the scan procedure Scanning result is sent with program;
Display module, for showing the scanning result by the security classes application program.
Optionally, the starting module, is used for:
When system program starts, by the system program, start scan procedure.
Optionally, the starting module, is used for:
When the security classes application program installation, by system program, start scan procedure.
Optionally, first sending module, is used for:
The scan procedure carries out rogue program scanning to the file destination for meeting the default condition of scanning.
Optionally, second sending module, including:
Acquisition submodule, for when rogue program scans completion, based on the first scanning result that scanning is obtained, determining institute There is a file that non-malicious program is judged as in file destination, and the feature of the file of non-malicious program is judged as described in obtaining Information;
First sending submodule, believes for the feature to the file that non-malicious program is judged as described in server transmission Breath so that the server is judged as the characteristic information of the file of non-malicious program according to, to it is described be judged as it is non- The file of rogue program, carries out rogue program scanning, when rogue program is scanned to be completed, scanning is obtained second is sent to terminal Scanning result;
Determination sub-module, for receiving second scanning result that the server sends, based on the described first scanning Result and second scanning result, it is determined that final scanning result, wherein, it is judged as disliking in the final scanning result All texts of rogue program are judged as in the file of meaning program, including first scanning result and second scanning result Part, is judged as being determined in the file of non-malicious program, including second scanning result in the final scanning result It is the file of non-malicious program;
Second sending submodule, for sending described final to the security classes application program by the scan procedure Scanning result.
The beneficial effect that technical scheme provided in an embodiment of the present invention is brought is:
In the embodiment of the present invention, terminal can start scan procedure by system program, and then, pacifying when user is received During the rogue program scan instruction triggered in universal class application program, can be sent to scan procedure by security classes application program and swept Request is retouched, so that scan procedure carries out rogue program scanning, when rogue program is scanned to be completed, terminal can be by scan procedure Scanning result is sent to security classes application program, and then, terminal can show scanning result by security classes application program.This Sample, scan procedure belongs to system process, always in terminal running background after startup, when terminal receives scan instruction, and can be with Rogue program scanning is directly carried out by scan procedure, without starting scan procedure, it is thus possible to improve rogue program scanning Efficiency.
Brief description of the drawings
Technical scheme in order to illustrate more clearly the embodiments of the present invention, below will be to that will make needed for embodiment description Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for For those of ordinary skill in the art, on the premise of not paying creative work, other can also be obtained according to these accompanying drawings Accompanying drawing.
Fig. 1 is a kind of method flow diagram for showing scanning result provided in an embodiment of the present invention;
Fig. 2 is a kind of interface schematic diagram provided in an embodiment of the present invention;
Fig. 3 is a kind of interface schematic diagram provided in an embodiment of the present invention;
Fig. 4 is a kind of apparatus structure schematic diagram for showing scanning result provided in an embodiment of the present invention;
Fig. 5 is a kind of apparatus structure schematic diagram for showing scanning result provided in an embodiment of the present invention;
Fig. 6 is a kind of terminal structure schematic diagram provided in an embodiment of the present invention.
Specific embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with accompanying drawing to embodiment party of the present invention Formula is described in further detail.
A kind of method for showing scanning result is the embodiment of the invention provides, the executive agent of the method is terminal.Wherein, Terminal can be the terminal with rogue program scan function, can be the mobile terminals such as mobile phone, panel computer, or PC (Personal Computer, PC).Processor, memory and display unit can be provided with terminal, processor can For starting scan procedure and the related treatment of rogue program scanning, memory can be used for storing in following processing procedures The data for needing and producing, display unit is displayed for scanning the scanning result for obtaining, such as, can be display.
Below in conjunction with specific embodiment, the handling process shown in Fig. 1 is described in detail, content can be as Under:
Step 101, by system program, starts scan procedure.
Wherein, scan procedure can be the system process for rogue program scanning.
In force, for Internet Security, security classes application program can be installed in terminal, wherein, security classes application Program can be used for triggering terminal carries out rogue program scanning by scan procedure.Terminal can be swept by system program, startup Retouch process.
Optionally, terminal can start scan procedure in start, and accordingly, the processing procedure of step 101 can be as Under:When system program starts, by system program, start scan procedure.
In force, security classes application program can with it is built-in in the terminal, i.e. terminal has been installed when dispatching from the factory in terminal There is security classes application program, in such cases, terminal can be started and scanned in start or restarting by system program Process, scan procedure can directly be carried out rogue program and swept always in running background, to have during scan task after startup Retouch, so that, whenever needing to carry out rogue program scanning, terminal need not restart scan procedure, and then, scanning can be improved The efficiency of rogue program.
Optionally, terminal can start scan procedure when security classes application program installation is detected, accordingly, The processing procedure of step 101 can be as follows:When security classes application program installation, by system program, startup is scanned into Journey.
In force, user can independently install above-mentioned security classes application program after terminal is obtained, when mounted, peace The scan service included in the installation kit of universal class application program can be arranged in system partitioning, i.e., terminal can be by scan service Be set to system service, in such cases, when security classes application program installation is detected, can by system program, Open scan service, that is, start scan procedure, after startup scan procedure always in running background, to have during scan task, can Directly to carry out rogue program scanning, so that, whenever needing to carry out rogue program scanning, terminal is scanned into without restarting Journey, and then, the efficiency of scanning rogue program can be improved.
Step 102, when the rogue program scan instruction that user triggers in security classes application program is received, by peace Universal class application program sends scan request to scan procedure, so that scan procedure carries out rogue program scanning.
In force, when in the desired determination terminal of user whether comprising rogue program, can be shown by operating triggering terminal Show the main interface of security classes application program, virus can be shown in main interface and searches option, user can click on the virus and look into Option is looked for, as shown in Figure 2, it will triggering display virus searches the page, can be shown in the virus lookup page and begun look for Option, user can click on and begin look for option, and terminal will receive rogue program scan instruction, and then, will can scan Task is committed to scan procedure, you can send scan request to scan procedure with by security classes application program, scan procedure connects After receiving scan request, rogue program scanning can be carried out.Specifically, security classes application program can be according to the mark of scan procedure Know (such as can be the title of scan procedure) to be scanned into by system process ServiceManager (service managerZ-HU) acquisitions The handle of journey, wherein, ServiceManager is stored with the mark (i.e. the title of system process) and handle of each system process, And then, scan procedure is called by the handle of the scan procedure for obtaining, rogue program scanning is carried out by scan procedure.Additionally, Scan procedure is just run with System Privileges on startup, so, whenever scan request is received, can directly be disliked Meaning program scanning, without repeating to obtain System Privileges, it is thus possible to save overhead.Scan procedure can also realize authority Management function, for example, mark for the application program that can call scan procedure that can be stored with scan procedure etc..
Optionally, scan procedure can carry out rogue program scanning to the file of some specific formats, accordingly, treat Journey can be as follows:Scan procedure carries out rogue program scanning to the file destination for meeting the default condition of scanning.
Wherein, the default condition of scanning can be pre-set for judging whether local file needs to carry out rogue program The condition of scanning, the default condition of scanning can be that the file type of file is default file type, such as, default file type can Being the file type of the executable files such as apk file types, elf file types.
In force, the condition of scanning can be pre-set in terminal, when scan procedure receives security classes application program hair During the scan request sent, it can be determined that whether each file in local file meets the default condition of scanning, that is, judge local file Whether it is executable file, determines the file destination for meeting the default condition of scanning, and then, scan procedure is to the target determined File carries out rogue program scanning.So, only to being probably that the file of rogue program carries out rogue program scanning, without to can not Can be that the file of rogue program carries out rogue program scanning, the efficiency of rogue program scanning can be improved.
In addition, it is necessary to the file destination for carrying out rogue program scanning can also be the file that user specifies, specifically, above-mentioned Virus described in Fig. 2 is searched in the page, can also show scan position selection key, and user can click on scan position choosing Button is selected, as shown in figure 3, terminal will eject drop-down menu, wherein option is searched in display totally and specified location searches option, User can click on specified location and search option, and terminal will eject scan position selection window, the scan position selection window In can show multiple predeterminated position lists, user can select at least one predeterminated position therein, wherein, user selection At least one predeterminated position in store local file be the file destination for needing to carry out rogue program scanning, scan position Determination button can also be shown in selection window, after user's selection, determination button can be clicked on, now, terminal will pass through Security classes application program sends scan request to scan procedure, wherein, the mark of file destination is carried in scan request, enter And, the mark that scan procedure can be based on the file destination carried in scan request carries out rogue program scanning to file destination.
Step 103, when rogue program is scanned to be completed, scanning knot is sent by scan procedure to security classes application program Really.
In force, when scan procedure carries out rogue program scanning to local file to be completed, terminal can be by scanning Process sends scanning result to security classes application program, wherein, scanning result can be the corresponding judgement knot of each file of scanning Really, result of determination is non-malicious program or rogue program.
Optionally, terminal can also send scan request, accordingly, the place of step 103 by scan procedure to server Reason process can be as follows:When rogue program is scanned to be completed, based on the first scanning result that scanning is obtained, all target texts are determined The file of non-malicious program is judged as in part, and obtains the characteristic information of the file for being judged as non-malicious program;To service Device sends the characteristic information of the file for being judged as non-malicious program, so that server is according to the text for being judged as non-malicious program The characteristic information of part, the file to being judged as non-malicious program, carries out rogue program scanning, is completed when rogue program is scanned When, send the second scanning result that scanning is obtained to terminal;The second scanning result that the reception server sends, based on the first scanning Result and the second scanning result, it is determined that final scanning result, wherein, it is judged as rogue program in final scanning result The All Files of rogue program, final scanning knot are judged as in file, including the first scanning result and the second scanning result The file of non-malicious program, including the file that non-malicious program is judged as in the second scanning result are judged as in fruit;Pass through Scan procedure sends final scanning result to security classes application program.
Wherein, characteristic information can be the information for characterizing file characteristic, can be the cryptographic Hash, or file of file File name.
In force, scan procedure can have communication function, can be communicated with server, specifically, when scanning When process carries out rogue program scanning completion to local file, can be in the first scanning result that scanning is obtained, it is determined that being judged to It is set to the file of non-malicious program, it is possible to obtain the characteristic information of the file for being judged as non-malicious program, and then, can be by The characteristic information of the file for being judged as non-malicious program for obtaining is sent to server, wherein, server can be security classes The background server of application program.The judgement that server can be sent with receiving terminal is believed for the feature of the file of non-malicious program Breath, and each characteristic information in the virus base for prestoring, the file to being judged as non-malicious program, carry out malice journey Sequence is scanned, and when rogue program is scanned to be completed, the second scanning result that scanning is obtained is sent to terminal.Terminal can receive service The second scanning result that device sends, and then, scan procedure can determine to be determined in the first scanning result and the second scanning result It is the All Files of rogue program, and as the file of rogue program is judged as in final scanning result, determines The All Files of non-malicious program is judged as in two scanning results, as being judged as non-evil in final scanning result The file of meaning program.After obtaining final scanning result, terminal can be sent most by scan procedure to security classes application program Whole scanning result.So, the feature in the virus base in terminal can be prevented not full-time, the scanning result for mistake occur.
Step 104, scanning result is shown by security classes application program.
In force, after security classes application program receives the scanning result of scan procedure transmission, can show in screen Show the scanning result that scan procedure sends.
In the embodiment of the present invention, terminal can start scan procedure by system program, and then, pacifying when user is received During the rogue program scan instruction triggered in universal class application program, can be sent to scan procedure by security classes application program and swept Request is retouched, so that scan procedure carries out rogue program scanning, when rogue program is scanned to be completed, terminal can be by scan procedure Scanning result is sent to security classes application program, and then, terminal can show scanning result by security classes application program.This Sample, scan procedure belongs to system process, always in terminal running background after startup, when terminal receives scan instruction, and can be with Rogue program scanning is directly carried out by scan procedure, without starting scan procedure, it is thus possible to improve rogue program scanning Efficiency.
Based on identical technology design, the embodiment of the present invention additionally provides a kind of device for showing scanning result, such as Fig. 4 institutes Show, the device includes:
Starting module 410, for by system program, starting scan procedure;
First sending module 420, the rogue program scanning that user triggers in security classes application program is received for working as During instruction, scan request is sent to the scan procedure by the security classes application program, so that the scan procedure is carried out Rogue program is scanned;
Second sending module 430, for when rogue program scans completion, by the scan procedure to the security classes Application program sends scanning result;
Display module 440, for showing the scanning result by the security classes application program.
Optionally, the starting module 410, is used for:
When system program starts, by the system program, start scan procedure.
Optionally, the starting module 410, is used for:
When the security classes application program installation, by system program, start scan procedure.
Optionally, first sending module 420, is used for:
The scan procedure carries out rogue program scanning to the file destination for meeting the default condition of scanning.
Optionally, as shown in figure 5, second sending module 430, including:
Acquisition submodule 4301, for when rogue program scan complete when, based on the first scanning result for obtaining of scanning, really The file of non-malicious program is judged as in fixed all file destinations, and the file of non-malicious program is judged as described in acquisition Characteristic information;
First sending submodule 4302, for the feature to the file that non-malicious program is judged as described in server transmission Information, so that the server is judged as the characteristic information of the file of non-malicious program according to, is judged as to described The file of non-malicious program, carries out rogue program scanning, when rogue program is scanned to be completed, scanning is obtained the is sent to terminal Two scanning results;
Determination sub-module 4303, for receiving second scanning result that the server sends, based on described first Scanning result and second scanning result, it is determined that final scanning result, wherein, it is determined in the final scanning result It is the institute that rogue program is judged as in the file of rogue program, including first scanning result and second scanning result There is file, quilt in the file of non-malicious program, including second scanning result is judged as in the final scanning result It is judged to the file of non-malicious program;
Second sending submodule 4304, for by the scan procedure to the security classes application program send described in most Whole scanning result.
In the embodiment of the present invention, terminal can start scan procedure by system program, and then, pacifying when user is received During the rogue program scan instruction triggered in universal class application program, can be sent to scan procedure by security classes application program and swept Request is retouched, so that scan procedure carries out rogue program scanning, when rogue program is scanned to be completed, terminal can be by scan procedure Scanning result is sent to security classes application program, and then, terminal can show scanning result by security classes application program.This Sample, scan procedure belongs to system process, always in terminal running background after startup, when terminal receives scan instruction, and can be with Rogue program scanning is directly carried out by scan procedure, without starting scan procedure, it is thus possible to improve rogue program scanning Efficiency.
It should be noted that:Above-described embodiment provide display scanning result device show scanning result when, only Carried out with the division of above-mentioned each functional module for example, in practical application, can as needed and by above-mentioned functions distribution by Different functional module is completed, will the internal structure of terminal be divided into different functional modules, it is described above complete to complete Portion or partial function.In addition, above-described embodiment device for showing scanning result for providing and the method reality for showing scanning result Apply example and belong to same design, it implements process and refers to embodiment of the method, repeats no more here.
Fig. 6 is refer to, it illustrates the structural representation of the terminal involved by the embodiment of the present invention, the terminal can be used for The method for showing scanning result provided in above-described embodiment is provided.Specifically:
Terminal 600 can include RF (Radio Frequency, radio frequency) circuit 110, include one or more meters The memory 120 of calculation machine readable storage medium storing program for executing, input block 130, display unit 140, sensor 150, voicefrequency circuit 160, WiFi (wireless fidelity, Wireless Fidelity) module 170, include one or the treatment of more than one processing core The part such as device 180 and power supply 190.It will be understood by those skilled in the art that the terminal structure shown in Fig. 6 do not constitute it is right The restriction of terminal, can include part more more or less than diagram, or combine some parts, or different part cloth Put.Wherein:
RF circuits 110 can be used to receiving and sending messages or communication process in, the reception and transmission of signal, especially, by base station After downlink information is received, transfer to one or more than one processor 180 is processed;In addition, will be related to up data is activation to Base station.Generally, RF circuits 110 include but is not limited to antenna, at least one amplifier, tuner, one or more oscillators, use Family identity module (SIM) card, transceiver, coupler, LNA (Low Noise Amplifier, low-noise amplifier), duplex Device etc..Additionally, RF circuits 110 can also be communicated by radio communication with network and other equipment.The radio communication can make With any communication standard or agreement, and including but not limited to GSM (Global System of Mobile communication, entirely Ball mobile communcations system), GPRS (General Packet Radio Service, general packet radio service), CDMA (Code Division Multiple Access, CDMA), WCDMA (Wideband Code Division Multiple Access, WCDMA), LTE (Long Term Evolution, Long Term Evolution), Email, SMS (Short Messaging Service, Short Message Service) etc..
Memory 120 can be used to store software program and module, and processor 180 is by running storage in memory 120 Software program and module, so as to perform various function application and data processing.Memory 120 can mainly include storage journey Sequence area and storage data field, wherein, the application program (ratio that storing program area can be needed for storage program area, at least one function Such as sound-playing function, image player function) etc.;Storage data field can be stored and use created number according to terminal 600 According to (such as voice data, phone directory etc.) etc..Additionally, memory 120 can include high-speed random access memory, can also wrap Include nonvolatile memory, for example, at least one disk memory, flush memory device or other volatile solid-state parts. Correspondingly, memory 120 can also include Memory Controller, to provide processor 180 and input block 130 to memory 120 access.
Input block 130 can be used to receive the numeral or character information of input, and generation is set and function with user The relevant keyboard of control, mouse, action bars, optics or trace ball signal input.Specifically, input block 130 may include to touch Sensitive surfaces 131 and other input equipments 132.Touch sensitive surface 131, also referred to as touch display screen or Trackpad, can collect use Family thereon or neighbouring touch operation (such as user is using any suitable objects such as finger, stylus or annex in touch-sensitive table Operation on face 131 or near Touch sensitive surface 131), and corresponding attachment means are driven according to formula set in advance.It is optional , Touch sensitive surface 131 may include two parts of touch detecting apparatus and touch controller.Wherein, touch detecting apparatus detection is used The touch orientation at family, and the signal that touch operation brings is detected, transmit a signal to touch controller;Touch controller is from touch Touch information is received in detection means, and is converted into contact coordinate, then give processor 180, and can receiving processor 180 The order sent simultaneously is performed.Furthermore, it is possible to using polytypes such as resistance-type, condenser type, infrared ray and surface acoustic waves Realize Touch sensitive surface 131.Except Touch sensitive surface 131, input block 130 can also include other input equipments 132.Specifically, Other input equipments 132 can include but is not limited to physical keyboard, function key (such as volume control button, switch key etc.), One or more in trace ball, mouse, action bars etc..
Display unit 140 can be used to showing by user input information or be supplied to the information and terminal 600 of user Various graphical user interface, these graphical user interface can be made up of figure, text, icon, video and its any combination. Display unit 140 may include display panel 141, optionally, can use LCD (Liquid Crystal Display, liquid crystal Show device), the form such as OLED (Organic Light-Emitting Diode, Organic Light Emitting Diode) configure display panel 141.Further, Touch sensitive surface 131 can cover display panel 141, when Touch sensitive surface 131 is detected thereon or neighbouring is touched After touching operation, processor 180 is sent to determine the type of touch event, with preprocessor 180 according to the type of touch event Corresponding visual output is provided on display panel 141.Although in figure 6, Touch sensitive surface 131 and display panel 141 are conducts Two independent parts come realize input and input function, but in some embodiments it is possible to by Touch sensitive surface 131 with display Panel 141 is integrated and realization is input into and output function.
Terminal 600 may also include at least one sensor 150, such as optical sensor, motion sensor and other sensings Device.Specifically, optical sensor may include ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to environment The light and shade of light adjusts the brightness of display panel 141, and proximity transducer can close display when terminal 600 is moved in one's ear Panel 141 and/or backlight.As one kind of motion sensor, in the detectable all directions of Gravity accelerometer (generally Three axles) acceleration size, size and the direction of gravity are can detect that when static, can be used for recognize mobile phone attitude application (ratio Such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap);Extremely The other sensors such as gyroscope, barometer, hygrometer, thermometer, the infrared ray sensor that be can also configure in terminal 600, herein Repeat no more.
Voicefrequency circuit 160, loudspeaker 161, microphone 162 can provide the COBBAIF between user and terminal 600.Audio Electric signal after the voice data conversion that circuit 160 will can be received, is transferred to loudspeaker 161, and sound is converted to by loudspeaker 161 Sound signal output;On the other hand, the voice signal of collection is converted to electric signal by microphone 162, after being received by voicefrequency circuit 160 Voice data is converted to, then after voice data output processor 180 is processed, through RF circuits 110 being sent to such as another end End, or voice data is exported to memory 120 so as to further treatment.Voicefrequency circuit 160 is also possible that earphone jack, To provide the communication of peripheral hardware earphone and terminal 600.
WiFi belongs to short range wireless transmission technology, and terminal 600 can help user's transceiver electronicses by WiFi module 170 Mail, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and has accessed.Although Fig. 6 shows WiFi module 170, but it is understood that, it is simultaneously not belonging to must be configured into for terminal 600, can exist as needed completely Do not change in the essential scope of invention and omit.
Processor 180 is the control centre of terminal 600, using various interfaces and each portion of connection whole mobile phone Point, by running or performing software program and/or module of the storage in memory 120, and storage is called in memory 120 Interior data, perform the various functions and processing data of terminal 600, so as to carry out integral monitoring to mobile phone.Optionally, processor 180 may include one or more processing cores;Preferably, processor 180 can integrated application processor and modem processor, Wherein, application processor mainly processes operating system, user interface and application program etc., and modem processor mainly processes nothing Line communicates.It is understood that above-mentioned modem processor can not also be integrated into processor 180.
Terminal 600 also includes the power supply 190 (such as battery) powered to all parts, it is preferred that power supply can be by electricity Management system is logically contiguous with processor 180, so as to realize management charging, electric discharge and power consumption by power-supply management system The functions such as management.Power supply 190 can also include one or more direct current or AC power, recharging system, power supply event The random component such as barrier detection circuit, power supply changeover device or inverter, power supply status indicator.
Although not shown, terminal 600 can also will not be repeated here including camera, bluetooth module etc..Specifically in this reality Apply in example, the display unit of terminal 600 is touch-screen display, and terminal 600 also includes memory, and one or one More than program, one of them or more than one program storage in memory, and be configured to by one or one with Upper computing device states one or more than one program bag contains the instruction for being used for carrying out following operation:
By system program, start scan procedure;
When the rogue program scan instruction that user triggers in security classes application program is received, by the security classes Application program sends scan request to the scan procedure, so that the scan procedure carries out rogue program scanning;
When rogue program is scanned to be completed, scanning knot is sent to the security classes application program by the scan procedure Really;
The scanning result is shown by the security classes application program.
Optionally, it is described by system program, start scan procedure, including:
When system program starts, by the system program, start scan procedure.
Optionally, it is described by system program, start scan procedure, including:
When the security classes application program installation, by system program, start scan procedure.
Optionally, the scan procedure carries out rogue program scanning, including:
The scan procedure carries out rogue program scanning to the file destination for meeting the default condition of scanning.
Optionally, it is described when rogue program scans completion, by the scan procedure to the security classes application program Scanning result is sent, including:
When rogue program is scanned to be completed, based on the first scanning result that scanning is obtained, quilt in all file destinations is determined It is judged to the file of non-malicious program, and the characteristic information of the file of non-malicious program is judged as described in acquisition;
To server send described in be judged as non-malicious program file characteristic information so that the server according to The characteristic information of the file for being judged as non-malicious program, to the file for being judged as non-malicious program, is disliked Meaning program scanning, when rogue program is scanned to be completed, the second scanning result that scanning is obtained is sent to terminal;
Second scanning result that the server sends is received, is swept based on first scanning result and described second Result is retouched, it is determined that final scanning result, wherein, the file of rogue program is judged as in the final scanning result, wrap The All Files that rogue program is judged as in first scanning result and second scanning result is included, described final sweeps Retouch the file that non-malicious program is judged as in result, including the text that non-malicious program is judged as in second scanning result Part;
The final scanning result is sent to the security classes application program by the scan procedure.
In the embodiment of the present invention, terminal can start scan procedure by system program, and then, pacifying when user is received During the rogue program scan instruction triggered in universal class application program, can be sent to scan procedure by security classes application program and swept Request is retouched, so that scan procedure carries out rogue program scanning, when rogue program is scanned to be completed, terminal can be by scan procedure Scanning result is sent to security classes application program, and then, terminal can show scanning result by security classes application program.This Sample, scan procedure belongs to system process, always in terminal running background after startup, when terminal receives scan instruction, and can be with Rogue program scanning is directly carried out by scan procedure, without starting scan procedure, it is thus possible to improve rogue program scanning Efficiency.
One of ordinary skill in the art will appreciate that realizing that all or part of step of above-described embodiment can be by hardware To complete, it is also possible to instruct the hardware of correlation to complete by program, described program can be stored in a kind of computer-readable In storage medium, storage medium mentioned above can be read-only storage, disk or CD etc..
The foregoing is only presently preferred embodiments of the present invention, be not intended to limit the invention, it is all it is of the invention spirit and Within principle, any modification, equivalent substitution and improvements made etc. should be included within the scope of the present invention.

Claims (10)

1. it is a kind of show scanning result method, it is characterised in that methods described includes:
By system program, start scan procedure;
When the rogue program scan instruction that user triggers in security classes application program is received, by the security classes application Program sends scan request to the scan procedure, so that the scan procedure carries out rogue program scanning;
When rogue program is scanned to be completed, scanning result is sent to the security classes application program by the scan procedure;
The scanning result is shown by the security classes application program.
2. method according to claim 1, it is characterised in that described by system program, starts scan procedure, including:
When system program starts, by the system program, start scan procedure.
3. method according to claim 1, it is characterised in that described by system program, starts scan procedure, including:
When the security classes application program installation, by system program, start scan procedure.
4. method according to claim 1, it is characterised in that the scan procedure carries out rogue program scanning, including:
The scan procedure carries out rogue program scanning to the file destination for meeting the default condition of scanning.
5. method according to claim 4, it is characterised in that it is described when rogue program scan complete when, swept by described Retouch process and send scanning result to the security classes application program, including:
When rogue program is scanned to be completed, based on the first scanning result that scanning is obtained, determine to be determined in all file destinations It is the file of non-malicious program, and the characteristic information of the file of non-malicious program is judged as described in acquisition;
To the characteristic information of the file that non-malicious program is judged as described in server transmission, so that the server is according to The characteristic information of the file of non-malicious program is judged as, to the file for being judged as non-malicious program, malice journey is carried out Sequence is scanned, and when rogue program is scanned to be completed, the second scanning result that scanning is obtained is sent to terminal;
Second scanning result that the server sends is received, based on first scanning result and the second scanning knot Really, it is determined that final scanning result, wherein, the file of rogue program, including institute are judged as in the final scanning result State the All Files that rogue program is judged as in the first scanning result and second scanning result, the final scanning knot The file of non-malicious program, including the file that non-malicious program is judged as in second scanning result are judged as in fruit;
The final scanning result is sent to the security classes application program by the scan procedure.
6. it is a kind of show scanning result device, it is characterised in that described device includes:
Starting module, for by system program, starting scan procedure;
First sending module, for when the rogue program scan instruction that user triggers in security classes application program is received, Scan request is sent to the scan procedure by the security classes application program, so that the scan procedure carries out rogue program Scanning;
Second sending module, for when rogue program scans completion, by the scan procedure to the security classes application journey Sequence sends scanning result;
Display module, for showing the scanning result by the security classes application program.
7. device according to claim 6, it is characterised in that the starting module, is used for:
When system program starts, by the system program, start scan procedure.
8. device according to claim 6, it is characterised in that the starting module, is used for:
When the security classes application program installation, by system program, start scan procedure.
9. device according to claim 6, it is characterised in that first sending module, is used for:
The scan procedure carries out rogue program scanning to the file destination for meeting the default condition of scanning.
10. device according to claim 9, it is characterised in that second sending module, including:
Acquisition submodule, for when rogue program scans completion, based on the first scanning result that scanning is obtained, determining all mesh The file of non-malicious program is judged as in mark file, and the feature letter of the file of non-malicious program is judged as described in acquisition Breath;
First sending submodule, for server send described in be judged as non-malicious program file characteristic information, with Make the server that the characteristic information of the file of non-malicious program is judged as according to, non-malicious journey is judged as to described The file of sequence, carries out rogue program scanning, when rogue program is scanned to be completed, the second scanning knot that scanning is obtained is sent to terminal Really;
Determination sub-module, for receiving second scanning result that the server sends, based on first scanning result With second scanning result, it is determined that final scanning result, wherein, be judged as malice journey in the final scanning result The All Files of rogue program is judged as in the file of sequence, including first scanning result and second scanning result, It is judged as being judged as in the file of non-malicious program, including second scanning result in the final scanning result non- The file of rogue program;
Second sending submodule, for sending the final scanning to the security classes application program by the scan procedure As a result.
CN201610464388.XA 2016-06-23 2016-06-23 A kind of method and apparatus of display scanning result Active CN106709339B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610464388.XA CN106709339B (en) 2016-06-23 2016-06-23 A kind of method and apparatus of display scanning result

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610464388.XA CN106709339B (en) 2016-06-23 2016-06-23 A kind of method and apparatus of display scanning result

Publications (2)

Publication Number Publication Date
CN106709339A true CN106709339A (en) 2017-05-24
CN106709339B CN106709339B (en) 2018-11-09

Family

ID=58940616

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610464388.XA Active CN106709339B (en) 2016-06-23 2016-06-23 A kind of method and apparatus of display scanning result

Country Status (1)

Country Link
CN (1) CN106709339B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109063466A (en) * 2018-07-26 2018-12-21 北京盘石信用管理有限公司 A kind of methods of exhibiting of APP safety
CN111625823A (en) * 2020-04-13 2020-09-04 北京邮电大学 Security detection method and device for VPN application of Andriod platform

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102930215A (en) * 2012-09-19 2013-02-13 无锡华御信息技术有限公司 Method for generating portable data safety device and data safety control method
CN103324887A (en) * 2013-07-05 2013-09-25 百度在线网络技术(北京)有限公司 Mobile terminal, security defense device thereof and security defense method thereof
CN103455755A (en) * 2012-05-28 2013-12-18 联想(北京)有限公司 Electronic device and safety protection method applied to electronic device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103455755A (en) * 2012-05-28 2013-12-18 联想(北京)有限公司 Electronic device and safety protection method applied to electronic device
CN102930215A (en) * 2012-09-19 2013-02-13 无锡华御信息技术有限公司 Method for generating portable data safety device and data safety control method
CN103324887A (en) * 2013-07-05 2013-09-25 百度在线网络技术(北京)有限公司 Mobile terminal, security defense device thereof and security defense method thereof

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109063466A (en) * 2018-07-26 2018-12-21 北京盘石信用管理有限公司 A kind of methods of exhibiting of APP safety
CN111625823A (en) * 2020-04-13 2020-09-04 北京邮电大学 Security detection method and device for VPN application of Andriod platform

Also Published As

Publication number Publication date
CN106709339B (en) 2018-11-09

Similar Documents

Publication Publication Date Title
CN104780164B (en) A kind of method and apparatus of running game client
CN104519485B (en) Communication means, device and system between a kind of terminal
CN105824958B (en) A kind of methods, devices and systems of inquiry log
CN104238893B (en) A kind of method and apparatus that video preview picture is shown
CN104657666B (en) A kind of optimization method and device of terminal operating environment
CN106371964B (en) Method and device for prompting message
CN106547844B (en) A kind for the treatment of method and apparatus of user interface
CN107172266A (en) Method for controlling fingerprint identification and Related product
CN107357725A (en) Application testing method and device
CN105912919B (en) A kind of unlocked by fingerprint method and terminal
CN105530239B (en) Multi-medium data acquisition methods and device
CN106131930A (en) A kind of WiFi network connection control method, device and terminal
CN106371749A (en) Method and device for terminal control
CN106254910A (en) A kind of method and apparatus recording image
CN104699501B (en) A kind of method and device for running application program
CN106951139A (en) Message notifying frame display methods and device
CN108270757A (en) A kind of user account switching method, device, client and system
CN106200897A (en) A kind of method and apparatus showing control menu
CN105278925B (en) The method and device of rubbish removing is carried out to the software of unloading
CN105553718B (en) Guidance information display methods and device
CN107423050A (en) A kind of method and apparatus for penetrating operation
CN106709339B (en) A kind of method and apparatus of display scanning result
CN105007609B (en) A kind of methods, devices and systems that Wireless LAN is added
CN104216935B (en) The method and terminal of a kind of ff
CN107766351A (en) The recognition methods of file directory and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant