CN106709339A - Scanning result display method and device - Google Patents
Scanning result display method and device Download PDFInfo
- Publication number
- CN106709339A CN106709339A CN201610464388.XA CN201610464388A CN106709339A CN 106709339 A CN106709339 A CN 106709339A CN 201610464388 A CN201610464388 A CN 201610464388A CN 106709339 A CN106709339 A CN 106709339A
- Authority
- CN
- China
- Prior art keywords
- program
- scanning
- file
- scanning result
- scan procedure
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/033—Test or assess software
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention discloses a scanning result display method and device, and belongs to the technical field of electronics. The method comprises the following steps of: starting a scanning process through a system program; when a malicious program scanning instruction triggered by a user in a safety class application program is received, sending a scanning request to the scanning process through the safety class application program so as to carry out malicious program scanning by the scanning process; when the malicious program scanning is completed, sending a scanning result to the safety class application program through the scanning process; and displaying the scanning result through the safety class application program. By adoption of the scanning result display method and device, the malicious program scanning efficiency can be improved.
Description
Technical field
The present invention relates to electronic technology field, more particularly to a kind of method and apparatus for showing scanning result.
Background technology
With the development of electronic technology, various terminals are widely used, the application in corresponding terminal
The species of program is more and more, function is increasingly enriched.Such as, it is a kind of security classes being in daily use that virus searches application program
Application program, such as the application program such as computer house keeper.
User can carry out viral lookup by the file in security classes application scan terminal, and at present, terminal is searched
Virus method be usually:When terminal receives scan instruction, scan procedure can be started by security classes application program,
By scan procedure come the file in end of scan, to carry out rogue program (such as trojan horse program) lookup, after lookup terminates,
Security classes application program will close scan procedure, and show final scanning result.
Realize it is of the invention during, inventor find prior art at least there is problems with:
When user carries out rogue program every time to search, i.e., when terminal is connected to scan instruction, based on above-mentioned treatment side
Formula, is required to terminal restarting scan procedure, so that, cause the less efficient of rogue program scanning.
The content of the invention
In order to solve problem of the prior art, a kind of method and dress for showing scanning result is the embodiment of the invention provides
Put.The technical scheme is as follows:
First aspect, there is provided a kind of method of display scanning result, methods described includes:
By system program, start scan procedure;
When the rogue program scan instruction that user triggers in security classes application program is received, by the security classes
Application program sends scan request to the scan procedure, so that the scan procedure carries out rogue program scanning;
When rogue program is scanned to be completed, scanning knot is sent to the security classes application program by the scan procedure
Really;
The scanning result is shown by the security classes application program.
Optionally, it is described by system program, start scan procedure, including:
When system program starts, by the system program, start scan procedure.
So, whenever needing to carry out rogue program scanning, terminal need not restart scan procedure, and then, Ke Yiti
The efficiency of height scanning rogue program.
Optionally, it is described by system program, start scan procedure, including:
When the security classes application program installation, by system program, start scan procedure.
So, whenever needing to carry out rogue program scanning, terminal need not restart scan procedure, and then, Ke Yiti
The efficiency of height scanning rogue program.
Optionally, the scan procedure carries out rogue program scanning, including:
The scan procedure carries out rogue program scanning to the file destination for meeting the default condition of scanning.
So, only to being probably that the file of rogue program carries out rogue program scanning, without to being unlikely to be rogue program
File carry out rogue program scanning, can improve rogue program scanning efficiency.
Optionally, it is described when rogue program scans completion, by the scan procedure to the security classes application program
Scanning result is sent, including:
When rogue program is scanned to be completed, based on the first scanning result that scanning is obtained, quilt in all file destinations is determined
It is judged to the file of non-malicious program, and the characteristic information of the file of non-malicious program is judged as described in acquisition;
To server send described in be judged as non-malicious program file characteristic information so that the server according to
The characteristic information of the file for being judged as non-malicious program, to the file for being judged as non-malicious program, is disliked
Meaning program scanning, when rogue program is scanned to be completed, the second scanning result that scanning is obtained is sent to terminal;
Second scanning result that the server sends is received, is swept based on first scanning result and described second
Result is retouched, it is determined that final scanning result, wherein, the file of rogue program is judged as in the final scanning result, wrap
The All Files that rogue program is judged as in first scanning result and second scanning result is included, described final sweeps
Retouch the file that non-malicious program is judged as in result, including the text that non-malicious program is judged as in second scanning result
Part;
The final scanning result is sent to the security classes application program by the scan procedure.
So, the feature in the virus base in terminal can be prevented not full-time, the scanning result for mistake occur.
Second aspect, there is provided a kind of device of display scanning result, described device includes:
Starting module, for by system program, starting scan procedure;
First sending module, the rogue program scan instruction that user triggers in security classes application program is received for working as
When, scan request is sent to the scan procedure by the security classes application program, so that the scan procedure carries out malice
Program scanning;
Second sending module, for when rogue program scans completion, being answered to the security classes by the scan procedure
Scanning result is sent with program;
Display module, for showing the scanning result by the security classes application program.
Optionally, the starting module, is used for:
When system program starts, by the system program, start scan procedure.
Optionally, the starting module, is used for:
When the security classes application program installation, by system program, start scan procedure.
Optionally, first sending module, is used for:
The scan procedure carries out rogue program scanning to the file destination for meeting the default condition of scanning.
Optionally, second sending module, including:
Acquisition submodule, for when rogue program scans completion, based on the first scanning result that scanning is obtained, determining institute
There is a file that non-malicious program is judged as in file destination, and the feature of the file of non-malicious program is judged as described in obtaining
Information;
First sending submodule, believes for the feature to the file that non-malicious program is judged as described in server transmission
Breath so that the server is judged as the characteristic information of the file of non-malicious program according to, to it is described be judged as it is non-
The file of rogue program, carries out rogue program scanning, when rogue program is scanned to be completed, scanning is obtained second is sent to terminal
Scanning result;
Determination sub-module, for receiving second scanning result that the server sends, based on the described first scanning
Result and second scanning result, it is determined that final scanning result, wherein, it is judged as disliking in the final scanning result
All texts of rogue program are judged as in the file of meaning program, including first scanning result and second scanning result
Part, is judged as being determined in the file of non-malicious program, including second scanning result in the final scanning result
It is the file of non-malicious program;
Second sending submodule, for sending described final to the security classes application program by the scan procedure
Scanning result.
The beneficial effect that technical scheme provided in an embodiment of the present invention is brought is:
In the embodiment of the present invention, terminal can start scan procedure by system program, and then, pacifying when user is received
During the rogue program scan instruction triggered in universal class application program, can be sent to scan procedure by security classes application program and swept
Request is retouched, so that scan procedure carries out rogue program scanning, when rogue program is scanned to be completed, terminal can be by scan procedure
Scanning result is sent to security classes application program, and then, terminal can show scanning result by security classes application program.This
Sample, scan procedure belongs to system process, always in terminal running background after startup, when terminal receives scan instruction, and can be with
Rogue program scanning is directly carried out by scan procedure, without starting scan procedure, it is thus possible to improve rogue program scanning
Efficiency.
Brief description of the drawings
Technical scheme in order to illustrate more clearly the embodiments of the present invention, below will be to that will make needed for embodiment description
Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for
For those of ordinary skill in the art, on the premise of not paying creative work, other can also be obtained according to these accompanying drawings
Accompanying drawing.
Fig. 1 is a kind of method flow diagram for showing scanning result provided in an embodiment of the present invention;
Fig. 2 is a kind of interface schematic diagram provided in an embodiment of the present invention;
Fig. 3 is a kind of interface schematic diagram provided in an embodiment of the present invention;
Fig. 4 is a kind of apparatus structure schematic diagram for showing scanning result provided in an embodiment of the present invention;
Fig. 5 is a kind of apparatus structure schematic diagram for showing scanning result provided in an embodiment of the present invention;
Fig. 6 is a kind of terminal structure schematic diagram provided in an embodiment of the present invention.
Specific embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with accompanying drawing to embodiment party of the present invention
Formula is described in further detail.
A kind of method for showing scanning result is the embodiment of the invention provides, the executive agent of the method is terminal.Wherein,
Terminal can be the terminal with rogue program scan function, can be the mobile terminals such as mobile phone, panel computer, or PC
(Personal Computer, PC).Processor, memory and display unit can be provided with terminal, processor can
For starting scan procedure and the related treatment of rogue program scanning, memory can be used for storing in following processing procedures
The data for needing and producing, display unit is displayed for scanning the scanning result for obtaining, such as, can be display.
Below in conjunction with specific embodiment, the handling process shown in Fig. 1 is described in detail, content can be as
Under:
Step 101, by system program, starts scan procedure.
Wherein, scan procedure can be the system process for rogue program scanning.
In force, for Internet Security, security classes application program can be installed in terminal, wherein, security classes application
Program can be used for triggering terminal carries out rogue program scanning by scan procedure.Terminal can be swept by system program, startup
Retouch process.
Optionally, terminal can start scan procedure in start, and accordingly, the processing procedure of step 101 can be as
Under:When system program starts, by system program, start scan procedure.
In force, security classes application program can with it is built-in in the terminal, i.e. terminal has been installed when dispatching from the factory in terminal
There is security classes application program, in such cases, terminal can be started and scanned in start or restarting by system program
Process, scan procedure can directly be carried out rogue program and swept always in running background, to have during scan task after startup
Retouch, so that, whenever needing to carry out rogue program scanning, terminal need not restart scan procedure, and then, scanning can be improved
The efficiency of rogue program.
Optionally, terminal can start scan procedure when security classes application program installation is detected, accordingly,
The processing procedure of step 101 can be as follows:When security classes application program installation, by system program, startup is scanned into
Journey.
In force, user can independently install above-mentioned security classes application program after terminal is obtained, when mounted, peace
The scan service included in the installation kit of universal class application program can be arranged in system partitioning, i.e., terminal can be by scan service
Be set to system service, in such cases, when security classes application program installation is detected, can by system program,
Open scan service, that is, start scan procedure, after startup scan procedure always in running background, to have during scan task, can
Directly to carry out rogue program scanning, so that, whenever needing to carry out rogue program scanning, terminal is scanned into without restarting
Journey, and then, the efficiency of scanning rogue program can be improved.
Step 102, when the rogue program scan instruction that user triggers in security classes application program is received, by peace
Universal class application program sends scan request to scan procedure, so that scan procedure carries out rogue program scanning.
In force, when in the desired determination terminal of user whether comprising rogue program, can be shown by operating triggering terminal
Show the main interface of security classes application program, virus can be shown in main interface and searches option, user can click on the virus and look into
Option is looked for, as shown in Figure 2, it will triggering display virus searches the page, can be shown in the virus lookup page and begun look for
Option, user can click on and begin look for option, and terminal will receive rogue program scan instruction, and then, will can scan
Task is committed to scan procedure, you can send scan request to scan procedure with by security classes application program, scan procedure connects
After receiving scan request, rogue program scanning can be carried out.Specifically, security classes application program can be according to the mark of scan procedure
Know (such as can be the title of scan procedure) to be scanned into by system process ServiceManager (service managerZ-HU) acquisitions
The handle of journey, wherein, ServiceManager is stored with the mark (i.e. the title of system process) and handle of each system process,
And then, scan procedure is called by the handle of the scan procedure for obtaining, rogue program scanning is carried out by scan procedure.Additionally,
Scan procedure is just run with System Privileges on startup, so, whenever scan request is received, can directly be disliked
Meaning program scanning, without repeating to obtain System Privileges, it is thus possible to save overhead.Scan procedure can also realize authority
Management function, for example, mark for the application program that can call scan procedure that can be stored with scan procedure etc..
Optionally, scan procedure can carry out rogue program scanning to the file of some specific formats, accordingly, treat
Journey can be as follows:Scan procedure carries out rogue program scanning to the file destination for meeting the default condition of scanning.
Wherein, the default condition of scanning can be pre-set for judging whether local file needs to carry out rogue program
The condition of scanning, the default condition of scanning can be that the file type of file is default file type, such as, default file type can
Being the file type of the executable files such as apk file types, elf file types.
In force, the condition of scanning can be pre-set in terminal, when scan procedure receives security classes application program hair
During the scan request sent, it can be determined that whether each file in local file meets the default condition of scanning, that is, judge local file
Whether it is executable file, determines the file destination for meeting the default condition of scanning, and then, scan procedure is to the target determined
File carries out rogue program scanning.So, only to being probably that the file of rogue program carries out rogue program scanning, without to can not
Can be that the file of rogue program carries out rogue program scanning, the efficiency of rogue program scanning can be improved.
In addition, it is necessary to the file destination for carrying out rogue program scanning can also be the file that user specifies, specifically, above-mentioned
Virus described in Fig. 2 is searched in the page, can also show scan position selection key, and user can click on scan position choosing
Button is selected, as shown in figure 3, terminal will eject drop-down menu, wherein option is searched in display totally and specified location searches option,
User can click on specified location and search option, and terminal will eject scan position selection window, the scan position selection window
In can show multiple predeterminated position lists, user can select at least one predeterminated position therein, wherein, user selection
At least one predeterminated position in store local file be the file destination for needing to carry out rogue program scanning, scan position
Determination button can also be shown in selection window, after user's selection, determination button can be clicked on, now, terminal will pass through
Security classes application program sends scan request to scan procedure, wherein, the mark of file destination is carried in scan request, enter
And, the mark that scan procedure can be based on the file destination carried in scan request carries out rogue program scanning to file destination.
Step 103, when rogue program is scanned to be completed, scanning knot is sent by scan procedure to security classes application program
Really.
In force, when scan procedure carries out rogue program scanning to local file to be completed, terminal can be by scanning
Process sends scanning result to security classes application program, wherein, scanning result can be the corresponding judgement knot of each file of scanning
Really, result of determination is non-malicious program or rogue program.
Optionally, terminal can also send scan request, accordingly, the place of step 103 by scan procedure to server
Reason process can be as follows:When rogue program is scanned to be completed, based on the first scanning result that scanning is obtained, all target texts are determined
The file of non-malicious program is judged as in part, and obtains the characteristic information of the file for being judged as non-malicious program;To service
Device sends the characteristic information of the file for being judged as non-malicious program, so that server is according to the text for being judged as non-malicious program
The characteristic information of part, the file to being judged as non-malicious program, carries out rogue program scanning, is completed when rogue program is scanned
When, send the second scanning result that scanning is obtained to terminal;The second scanning result that the reception server sends, based on the first scanning
Result and the second scanning result, it is determined that final scanning result, wherein, it is judged as rogue program in final scanning result
The All Files of rogue program, final scanning knot are judged as in file, including the first scanning result and the second scanning result
The file of non-malicious program, including the file that non-malicious program is judged as in the second scanning result are judged as in fruit;Pass through
Scan procedure sends final scanning result to security classes application program.
Wherein, characteristic information can be the information for characterizing file characteristic, can be the cryptographic Hash, or file of file
File name.
In force, scan procedure can have communication function, can be communicated with server, specifically, when scanning
When process carries out rogue program scanning completion to local file, can be in the first scanning result that scanning is obtained, it is determined that being judged to
It is set to the file of non-malicious program, it is possible to obtain the characteristic information of the file for being judged as non-malicious program, and then, can be by
The characteristic information of the file for being judged as non-malicious program for obtaining is sent to server, wherein, server can be security classes
The background server of application program.The judgement that server can be sent with receiving terminal is believed for the feature of the file of non-malicious program
Breath, and each characteristic information in the virus base for prestoring, the file to being judged as non-malicious program, carry out malice journey
Sequence is scanned, and when rogue program is scanned to be completed, the second scanning result that scanning is obtained is sent to terminal.Terminal can receive service
The second scanning result that device sends, and then, scan procedure can determine to be determined in the first scanning result and the second scanning result
It is the All Files of rogue program, and as the file of rogue program is judged as in final scanning result, determines
The All Files of non-malicious program is judged as in two scanning results, as being judged as non-evil in final scanning result
The file of meaning program.After obtaining final scanning result, terminal can be sent most by scan procedure to security classes application program
Whole scanning result.So, the feature in the virus base in terminal can be prevented not full-time, the scanning result for mistake occur.
Step 104, scanning result is shown by security classes application program.
In force, after security classes application program receives the scanning result of scan procedure transmission, can show in screen
Show the scanning result that scan procedure sends.
In the embodiment of the present invention, terminal can start scan procedure by system program, and then, pacifying when user is received
During the rogue program scan instruction triggered in universal class application program, can be sent to scan procedure by security classes application program and swept
Request is retouched, so that scan procedure carries out rogue program scanning, when rogue program is scanned to be completed, terminal can be by scan procedure
Scanning result is sent to security classes application program, and then, terminal can show scanning result by security classes application program.This
Sample, scan procedure belongs to system process, always in terminal running background after startup, when terminal receives scan instruction, and can be with
Rogue program scanning is directly carried out by scan procedure, without starting scan procedure, it is thus possible to improve rogue program scanning
Efficiency.
Based on identical technology design, the embodiment of the present invention additionally provides a kind of device for showing scanning result, such as Fig. 4 institutes
Show, the device includes:
Starting module 410, for by system program, starting scan procedure;
First sending module 420, the rogue program scanning that user triggers in security classes application program is received for working as
During instruction, scan request is sent to the scan procedure by the security classes application program, so that the scan procedure is carried out
Rogue program is scanned;
Second sending module 430, for when rogue program scans completion, by the scan procedure to the security classes
Application program sends scanning result;
Display module 440, for showing the scanning result by the security classes application program.
Optionally, the starting module 410, is used for:
When system program starts, by the system program, start scan procedure.
Optionally, the starting module 410, is used for:
When the security classes application program installation, by system program, start scan procedure.
Optionally, first sending module 420, is used for:
The scan procedure carries out rogue program scanning to the file destination for meeting the default condition of scanning.
Optionally, as shown in figure 5, second sending module 430, including:
Acquisition submodule 4301, for when rogue program scan complete when, based on the first scanning result for obtaining of scanning, really
The file of non-malicious program is judged as in fixed all file destinations, and the file of non-malicious program is judged as described in acquisition
Characteristic information;
First sending submodule 4302, for the feature to the file that non-malicious program is judged as described in server transmission
Information, so that the server is judged as the characteristic information of the file of non-malicious program according to, is judged as to described
The file of non-malicious program, carries out rogue program scanning, when rogue program is scanned to be completed, scanning is obtained the is sent to terminal
Two scanning results;
Determination sub-module 4303, for receiving second scanning result that the server sends, based on described first
Scanning result and second scanning result, it is determined that final scanning result, wherein, it is determined in the final scanning result
It is the institute that rogue program is judged as in the file of rogue program, including first scanning result and second scanning result
There is file, quilt in the file of non-malicious program, including second scanning result is judged as in the final scanning result
It is judged to the file of non-malicious program;
Second sending submodule 4304, for by the scan procedure to the security classes application program send described in most
Whole scanning result.
In the embodiment of the present invention, terminal can start scan procedure by system program, and then, pacifying when user is received
During the rogue program scan instruction triggered in universal class application program, can be sent to scan procedure by security classes application program and swept
Request is retouched, so that scan procedure carries out rogue program scanning, when rogue program is scanned to be completed, terminal can be by scan procedure
Scanning result is sent to security classes application program, and then, terminal can show scanning result by security classes application program.This
Sample, scan procedure belongs to system process, always in terminal running background after startup, when terminal receives scan instruction, and can be with
Rogue program scanning is directly carried out by scan procedure, without starting scan procedure, it is thus possible to improve rogue program scanning
Efficiency.
It should be noted that:Above-described embodiment provide display scanning result device show scanning result when, only
Carried out with the division of above-mentioned each functional module for example, in practical application, can as needed and by above-mentioned functions distribution by
Different functional module is completed, will the internal structure of terminal be divided into different functional modules, it is described above complete to complete
Portion or partial function.In addition, above-described embodiment device for showing scanning result for providing and the method reality for showing scanning result
Apply example and belong to same design, it implements process and refers to embodiment of the method, repeats no more here.
Fig. 6 is refer to, it illustrates the structural representation of the terminal involved by the embodiment of the present invention, the terminal can be used for
The method for showing scanning result provided in above-described embodiment is provided.Specifically:
Terminal 600 can include RF (Radio Frequency, radio frequency) circuit 110, include one or more meters
The memory 120 of calculation machine readable storage medium storing program for executing, input block 130, display unit 140, sensor 150, voicefrequency circuit 160,
WiFi (wireless fidelity, Wireless Fidelity) module 170, include one or the treatment of more than one processing core
The part such as device 180 and power supply 190.It will be understood by those skilled in the art that the terminal structure shown in Fig. 6 do not constitute it is right
The restriction of terminal, can include part more more or less than diagram, or combine some parts, or different part cloth
Put.Wherein:
RF circuits 110 can be used to receiving and sending messages or communication process in, the reception and transmission of signal, especially, by base station
After downlink information is received, transfer to one or more than one processor 180 is processed;In addition, will be related to up data is activation to
Base station.Generally, RF circuits 110 include but is not limited to antenna, at least one amplifier, tuner, one or more oscillators, use
Family identity module (SIM) card, transceiver, coupler, LNA (Low Noise Amplifier, low-noise amplifier), duplex
Device etc..Additionally, RF circuits 110 can also be communicated by radio communication with network and other equipment.The radio communication can make
With any communication standard or agreement, and including but not limited to GSM (Global System of Mobile communication, entirely
Ball mobile communcations system), GPRS (General Packet Radio Service, general packet radio service), CDMA (Code
Division Multiple Access, CDMA), WCDMA (Wideband Code Division Multiple
Access, WCDMA), LTE (Long Term Evolution, Long Term Evolution), Email, SMS (Short
Messaging Service, Short Message Service) etc..
Memory 120 can be used to store software program and module, and processor 180 is by running storage in memory 120
Software program and module, so as to perform various function application and data processing.Memory 120 can mainly include storage journey
Sequence area and storage data field, wherein, the application program (ratio that storing program area can be needed for storage program area, at least one function
Such as sound-playing function, image player function) etc.;Storage data field can be stored and use created number according to terminal 600
According to (such as voice data, phone directory etc.) etc..Additionally, memory 120 can include high-speed random access memory, can also wrap
Include nonvolatile memory, for example, at least one disk memory, flush memory device or other volatile solid-state parts.
Correspondingly, memory 120 can also include Memory Controller, to provide processor 180 and input block 130 to memory
120 access.
Input block 130 can be used to receive the numeral or character information of input, and generation is set and function with user
The relevant keyboard of control, mouse, action bars, optics or trace ball signal input.Specifically, input block 130 may include to touch
Sensitive surfaces 131 and other input equipments 132.Touch sensitive surface 131, also referred to as touch display screen or Trackpad, can collect use
Family thereon or neighbouring touch operation (such as user is using any suitable objects such as finger, stylus or annex in touch-sensitive table
Operation on face 131 or near Touch sensitive surface 131), and corresponding attachment means are driven according to formula set in advance.It is optional
, Touch sensitive surface 131 may include two parts of touch detecting apparatus and touch controller.Wherein, touch detecting apparatus detection is used
The touch orientation at family, and the signal that touch operation brings is detected, transmit a signal to touch controller;Touch controller is from touch
Touch information is received in detection means, and is converted into contact coordinate, then give processor 180, and can receiving processor 180
The order sent simultaneously is performed.Furthermore, it is possible to using polytypes such as resistance-type, condenser type, infrared ray and surface acoustic waves
Realize Touch sensitive surface 131.Except Touch sensitive surface 131, input block 130 can also include other input equipments 132.Specifically,
Other input equipments 132 can include but is not limited to physical keyboard, function key (such as volume control button, switch key etc.),
One or more in trace ball, mouse, action bars etc..
Display unit 140 can be used to showing by user input information or be supplied to the information and terminal 600 of user
Various graphical user interface, these graphical user interface can be made up of figure, text, icon, video and its any combination.
Display unit 140 may include display panel 141, optionally, can use LCD (Liquid Crystal Display, liquid crystal
Show device), the form such as OLED (Organic Light-Emitting Diode, Organic Light Emitting Diode) configure display panel
141.Further, Touch sensitive surface 131 can cover display panel 141, when Touch sensitive surface 131 is detected thereon or neighbouring is touched
After touching operation, processor 180 is sent to determine the type of touch event, with preprocessor 180 according to the type of touch event
Corresponding visual output is provided on display panel 141.Although in figure 6, Touch sensitive surface 131 and display panel 141 are conducts
Two independent parts come realize input and input function, but in some embodiments it is possible to by Touch sensitive surface 131 with display
Panel 141 is integrated and realization is input into and output function.
Terminal 600 may also include at least one sensor 150, such as optical sensor, motion sensor and other sensings
Device.Specifically, optical sensor may include ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to environment
The light and shade of light adjusts the brightness of display panel 141, and proximity transducer can close display when terminal 600 is moved in one's ear
Panel 141 and/or backlight.As one kind of motion sensor, in the detectable all directions of Gravity accelerometer (generally
Three axles) acceleration size, size and the direction of gravity are can detect that when static, can be used for recognize mobile phone attitude application (ratio
Such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap);Extremely
The other sensors such as gyroscope, barometer, hygrometer, thermometer, the infrared ray sensor that be can also configure in terminal 600, herein
Repeat no more.
Voicefrequency circuit 160, loudspeaker 161, microphone 162 can provide the COBBAIF between user and terminal 600.Audio
Electric signal after the voice data conversion that circuit 160 will can be received, is transferred to loudspeaker 161, and sound is converted to by loudspeaker 161
Sound signal output;On the other hand, the voice signal of collection is converted to electric signal by microphone 162, after being received by voicefrequency circuit 160
Voice data is converted to, then after voice data output processor 180 is processed, through RF circuits 110 being sent to such as another end
End, or voice data is exported to memory 120 so as to further treatment.Voicefrequency circuit 160 is also possible that earphone jack,
To provide the communication of peripheral hardware earphone and terminal 600.
WiFi belongs to short range wireless transmission technology, and terminal 600 can help user's transceiver electronicses by WiFi module 170
Mail, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and has accessed.Although Fig. 6 shows
WiFi module 170, but it is understood that, it is simultaneously not belonging to must be configured into for terminal 600, can exist as needed completely
Do not change in the essential scope of invention and omit.
Processor 180 is the control centre of terminal 600, using various interfaces and each portion of connection whole mobile phone
Point, by running or performing software program and/or module of the storage in memory 120, and storage is called in memory 120
Interior data, perform the various functions and processing data of terminal 600, so as to carry out integral monitoring to mobile phone.Optionally, processor
180 may include one or more processing cores;Preferably, processor 180 can integrated application processor and modem processor,
Wherein, application processor mainly processes operating system, user interface and application program etc., and modem processor mainly processes nothing
Line communicates.It is understood that above-mentioned modem processor can not also be integrated into processor 180.
Terminal 600 also includes the power supply 190 (such as battery) powered to all parts, it is preferred that power supply can be by electricity
Management system is logically contiguous with processor 180, so as to realize management charging, electric discharge and power consumption by power-supply management system
The functions such as management.Power supply 190 can also include one or more direct current or AC power, recharging system, power supply event
The random component such as barrier detection circuit, power supply changeover device or inverter, power supply status indicator.
Although not shown, terminal 600 can also will not be repeated here including camera, bluetooth module etc..Specifically in this reality
Apply in example, the display unit of terminal 600 is touch-screen display, and terminal 600 also includes memory, and one or one
More than program, one of them or more than one program storage in memory, and be configured to by one or one with
Upper computing device states one or more than one program bag contains the instruction for being used for carrying out following operation:
By system program, start scan procedure;
When the rogue program scan instruction that user triggers in security classes application program is received, by the security classes
Application program sends scan request to the scan procedure, so that the scan procedure carries out rogue program scanning;
When rogue program is scanned to be completed, scanning knot is sent to the security classes application program by the scan procedure
Really;
The scanning result is shown by the security classes application program.
Optionally, it is described by system program, start scan procedure, including:
When system program starts, by the system program, start scan procedure.
Optionally, it is described by system program, start scan procedure, including:
When the security classes application program installation, by system program, start scan procedure.
Optionally, the scan procedure carries out rogue program scanning, including:
The scan procedure carries out rogue program scanning to the file destination for meeting the default condition of scanning.
Optionally, it is described when rogue program scans completion, by the scan procedure to the security classes application program
Scanning result is sent, including:
When rogue program is scanned to be completed, based on the first scanning result that scanning is obtained, quilt in all file destinations is determined
It is judged to the file of non-malicious program, and the characteristic information of the file of non-malicious program is judged as described in acquisition;
To server send described in be judged as non-malicious program file characteristic information so that the server according to
The characteristic information of the file for being judged as non-malicious program, to the file for being judged as non-malicious program, is disliked
Meaning program scanning, when rogue program is scanned to be completed, the second scanning result that scanning is obtained is sent to terminal;
Second scanning result that the server sends is received, is swept based on first scanning result and described second
Result is retouched, it is determined that final scanning result, wherein, the file of rogue program is judged as in the final scanning result, wrap
The All Files that rogue program is judged as in first scanning result and second scanning result is included, described final sweeps
Retouch the file that non-malicious program is judged as in result, including the text that non-malicious program is judged as in second scanning result
Part;
The final scanning result is sent to the security classes application program by the scan procedure.
In the embodiment of the present invention, terminal can start scan procedure by system program, and then, pacifying when user is received
During the rogue program scan instruction triggered in universal class application program, can be sent to scan procedure by security classes application program and swept
Request is retouched, so that scan procedure carries out rogue program scanning, when rogue program is scanned to be completed, terminal can be by scan procedure
Scanning result is sent to security classes application program, and then, terminal can show scanning result by security classes application program.This
Sample, scan procedure belongs to system process, always in terminal running background after startup, when terminal receives scan instruction, and can be with
Rogue program scanning is directly carried out by scan procedure, without starting scan procedure, it is thus possible to improve rogue program scanning
Efficiency.
One of ordinary skill in the art will appreciate that realizing that all or part of step of above-described embodiment can be by hardware
To complete, it is also possible to instruct the hardware of correlation to complete by program, described program can be stored in a kind of computer-readable
In storage medium, storage medium mentioned above can be read-only storage, disk or CD etc..
The foregoing is only presently preferred embodiments of the present invention, be not intended to limit the invention, it is all it is of the invention spirit and
Within principle, any modification, equivalent substitution and improvements made etc. should be included within the scope of the present invention.
Claims (10)
1. it is a kind of show scanning result method, it is characterised in that methods described includes:
By system program, start scan procedure;
When the rogue program scan instruction that user triggers in security classes application program is received, by the security classes application
Program sends scan request to the scan procedure, so that the scan procedure carries out rogue program scanning;
When rogue program is scanned to be completed, scanning result is sent to the security classes application program by the scan procedure;
The scanning result is shown by the security classes application program.
2. method according to claim 1, it is characterised in that described by system program, starts scan procedure, including:
When system program starts, by the system program, start scan procedure.
3. method according to claim 1, it is characterised in that described by system program, starts scan procedure, including:
When the security classes application program installation, by system program, start scan procedure.
4. method according to claim 1, it is characterised in that the scan procedure carries out rogue program scanning, including:
The scan procedure carries out rogue program scanning to the file destination for meeting the default condition of scanning.
5. method according to claim 4, it is characterised in that it is described when rogue program scan complete when, swept by described
Retouch process and send scanning result to the security classes application program, including:
When rogue program is scanned to be completed, based on the first scanning result that scanning is obtained, determine to be determined in all file destinations
It is the file of non-malicious program, and the characteristic information of the file of non-malicious program is judged as described in acquisition;
To the characteristic information of the file that non-malicious program is judged as described in server transmission, so that the server is according to
The characteristic information of the file of non-malicious program is judged as, to the file for being judged as non-malicious program, malice journey is carried out
Sequence is scanned, and when rogue program is scanned to be completed, the second scanning result that scanning is obtained is sent to terminal;
Second scanning result that the server sends is received, based on first scanning result and the second scanning knot
Really, it is determined that final scanning result, wherein, the file of rogue program, including institute are judged as in the final scanning result
State the All Files that rogue program is judged as in the first scanning result and second scanning result, the final scanning knot
The file of non-malicious program, including the file that non-malicious program is judged as in second scanning result are judged as in fruit;
The final scanning result is sent to the security classes application program by the scan procedure.
6. it is a kind of show scanning result device, it is characterised in that described device includes:
Starting module, for by system program, starting scan procedure;
First sending module, for when the rogue program scan instruction that user triggers in security classes application program is received,
Scan request is sent to the scan procedure by the security classes application program, so that the scan procedure carries out rogue program
Scanning;
Second sending module, for when rogue program scans completion, by the scan procedure to the security classes application journey
Sequence sends scanning result;
Display module, for showing the scanning result by the security classes application program.
7. device according to claim 6, it is characterised in that the starting module, is used for:
When system program starts, by the system program, start scan procedure.
8. device according to claim 6, it is characterised in that the starting module, is used for:
When the security classes application program installation, by system program, start scan procedure.
9. device according to claim 6, it is characterised in that first sending module, is used for:
The scan procedure carries out rogue program scanning to the file destination for meeting the default condition of scanning.
10. device according to claim 9, it is characterised in that second sending module, including:
Acquisition submodule, for when rogue program scans completion, based on the first scanning result that scanning is obtained, determining all mesh
The file of non-malicious program is judged as in mark file, and the feature letter of the file of non-malicious program is judged as described in acquisition
Breath;
First sending submodule, for server send described in be judged as non-malicious program file characteristic information, with
Make the server that the characteristic information of the file of non-malicious program is judged as according to, non-malicious journey is judged as to described
The file of sequence, carries out rogue program scanning, when rogue program is scanned to be completed, the second scanning knot that scanning is obtained is sent to terminal
Really;
Determination sub-module, for receiving second scanning result that the server sends, based on first scanning result
With second scanning result, it is determined that final scanning result, wherein, be judged as malice journey in the final scanning result
The All Files of rogue program is judged as in the file of sequence, including first scanning result and second scanning result,
It is judged as being judged as in the file of non-malicious program, including second scanning result in the final scanning result non-
The file of rogue program;
Second sending submodule, for sending the final scanning to the security classes application program by the scan procedure
As a result.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610464388.XA CN106709339B (en) | 2016-06-23 | 2016-06-23 | A kind of method and apparatus of display scanning result |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610464388.XA CN106709339B (en) | 2016-06-23 | 2016-06-23 | A kind of method and apparatus of display scanning result |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106709339A true CN106709339A (en) | 2017-05-24 |
CN106709339B CN106709339B (en) | 2018-11-09 |
Family
ID=58940616
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610464388.XA Active CN106709339B (en) | 2016-06-23 | 2016-06-23 | A kind of method and apparatus of display scanning result |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106709339B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109063466A (en) * | 2018-07-26 | 2018-12-21 | 北京盘石信用管理有限公司 | A kind of methods of exhibiting of APP safety |
CN111625823A (en) * | 2020-04-13 | 2020-09-04 | 北京邮电大学 | Security detection method and device for VPN application of Andriod platform |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102930215A (en) * | 2012-09-19 | 2013-02-13 | 无锡华御信息技术有限公司 | Method for generating portable data safety device and data safety control method |
CN103324887A (en) * | 2013-07-05 | 2013-09-25 | 百度在线网络技术(北京)有限公司 | Mobile terminal, security defense device thereof and security defense method thereof |
CN103455755A (en) * | 2012-05-28 | 2013-12-18 | 联想(北京)有限公司 | Electronic device and safety protection method applied to electronic device |
-
2016
- 2016-06-23 CN CN201610464388.XA patent/CN106709339B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103455755A (en) * | 2012-05-28 | 2013-12-18 | 联想(北京)有限公司 | Electronic device and safety protection method applied to electronic device |
CN102930215A (en) * | 2012-09-19 | 2013-02-13 | 无锡华御信息技术有限公司 | Method for generating portable data safety device and data safety control method |
CN103324887A (en) * | 2013-07-05 | 2013-09-25 | 百度在线网络技术(北京)有限公司 | Mobile terminal, security defense device thereof and security defense method thereof |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109063466A (en) * | 2018-07-26 | 2018-12-21 | 北京盘石信用管理有限公司 | A kind of methods of exhibiting of APP safety |
CN111625823A (en) * | 2020-04-13 | 2020-09-04 | 北京邮电大学 | Security detection method and device for VPN application of Andriod platform |
Also Published As
Publication number | Publication date |
---|---|
CN106709339B (en) | 2018-11-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104780164B (en) | A kind of method and apparatus of running game client | |
CN104519485B (en) | Communication means, device and system between a kind of terminal | |
CN105824958B (en) | A kind of methods, devices and systems of inquiry log | |
CN104238893B (en) | A kind of method and apparatus that video preview picture is shown | |
CN104657666B (en) | A kind of optimization method and device of terminal operating environment | |
CN106371964B (en) | Method and device for prompting message | |
CN106547844B (en) | A kind for the treatment of method and apparatus of user interface | |
CN107172266A (en) | Method for controlling fingerprint identification and Related product | |
CN107357725A (en) | Application testing method and device | |
CN105912919B (en) | A kind of unlocked by fingerprint method and terminal | |
CN105530239B (en) | Multi-medium data acquisition methods and device | |
CN106131930A (en) | A kind of WiFi network connection control method, device and terminal | |
CN106371749A (en) | Method and device for terminal control | |
CN106254910A (en) | A kind of method and apparatus recording image | |
CN104699501B (en) | A kind of method and device for running application program | |
CN106951139A (en) | Message notifying frame display methods and device | |
CN108270757A (en) | A kind of user account switching method, device, client and system | |
CN106200897A (en) | A kind of method and apparatus showing control menu | |
CN105278925B (en) | The method and device of rubbish removing is carried out to the software of unloading | |
CN105553718B (en) | Guidance information display methods and device | |
CN107423050A (en) | A kind of method and apparatus for penetrating operation | |
CN106709339B (en) | A kind of method and apparatus of display scanning result | |
CN105007609B (en) | A kind of methods, devices and systems that Wireless LAN is added | |
CN104216935B (en) | The method and terminal of a kind of ff | |
CN107766351A (en) | The recognition methods of file directory and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |