Summary of the invention
For the defects in the prior art, the present invention provides a kind of safety protecting method and device, can solve existing
Security strategy is occupied in user resources has contradiction between application validity.
In a first aspect, the present invention provides a kind of safety devices, comprising:
Uploading unit, when matching preset local trigger policy for the behavior in process, by the behavior of the process
Description information is uploaded to server-side, so that server-side matches in the behavior for determining the process with any default risk behavior
When, issue the interim security strategy that risk behavior is preset corresponding to this;Include in the interim security strategy: the interim safety
The revocation condition of strategy, and processing operation and its trigger condition for coping with default risk behavior;
Receiving unit, for receiving the interim security strategy from the server-side;
Loading unit, the interim security strategy obtained for loading the receiving unit, in any trigger condition
Corresponding processing operation is executed when meeting, and cancels the interim security strategy when any revocation condition meets.
Optionally, the loading unit is further used for for the interim security strategy being loaded onto memory, so that described
Interim security strategy voluntarily cancels after memory power-off.
Optionally, the behavior for matching the process of the local trigger policy includes any one or more following:
Access the network address unrelated with the function of process owning application;
Download the file unrelated with the function of process owning application;
Establish the process unrelated with the function of process owning application;
To other process injecting codes unrelated with process owning application;
File is written under shielded file directory;
The behavior of process relevant to the application program in blacklist.
Optionally, the situation that the behavior of the process and any default risk behavior match includes any one following
Or it is a variety of:
The process matches with any default risk process;
The behavior of the process matches with any default risk behavior;
The behavior of the process and the omen behavior of any default risk behavior match.
Optionally, the revocation condition of the interim security strategy includes any one or more following:
The entry-into-force time of the interim security strategy is more than predetermined threshold;
User has granted the default risk behavior in prompting message;
In the interim security strategy there is the processing operation for terminating label to have completed;
Receive the cancel an order message from the server-side.
Optionally, the processing operation and its trigger condition for coping with default risk behavior includes following any one
Kind is a variety of:
There is no trigger condition, limits the operation of the operating right and/or system resource occupancy of the process;
Using detect default risk behavior as trigger condition, the operation that the behavior of the process is intercepted;
To detect that default very dangerous behavior as trigger condition, terminates the process or terminates to answer belonging to the process
With the operation of program;
Using detect Stub File as trigger condition, the operation that the Stub File is cleared up.
Second aspect, the present invention also provides a kind of safety devices, comprising:
Receiving unit, for receiving the description information for carrying out the behavior of process of self terminal;The description of the behavior of the process
The preset local trigger policy of the information matches terminal;
Judging unit, the description information for being obtained according to the receiving unit judge that the behavior of the process is
It is no to match with any default risk behavior;
Issuance unit matches for the behavior in the judging unit determinating processes with any default risk behavior
When, Xiang Suoshu terminal issues the interim security strategy that risk behavior is preset corresponding to this, so that the terminal receives and loads institute
State interim security strategy;
Wherein, include in the interim security strategy: the revocation condition of the interim security strategy, and it is pre- for coping with
If the processing operation and its trigger condition of risk behavior, so that the terminal of the load interim security strategy is in any triggering
Corresponding processing operation is executed when condition meets, and cancels the interim security strategy when any revocation condition meets.
Optionally, the situation that the behavior of the process and any default risk behavior match includes any one following
Or it is a variety of:
The process matches with any default risk process;
The behavior of the process matches with any default risk behavior;
The behavior of the process and the omen behavior of any default risk behavior match.
The third aspect, the present invention also provides a kind of safety protecting methods, comprising:
In the preset local trigger policy of the behavior matching of process, the description information of the behavior of the process is uploaded to
Server-side, so that server-side when matching the behavior and any default risk behavior for determining the process, is issued to correspond to and is somebody's turn to do
The interim security strategy of default risk behavior;Include in the interim security strategy: the revocation condition of the interim security strategy,
And processing operation and its trigger condition for coping with default risk behavior;
Receive the interim security strategy from the server-side;
The interim security strategy is loaded, to execute corresponding processing operation when any trigger condition meets, and
The interim security strategy is cancelled when any revocation condition meets.
Fourth aspect, the present invention also provides a kind of safety protecting methods, comprising:
Receive the description information for carrying out the behavior of process of self terminal;The description information of the behavior of the process matches the terminal
Preset local trigger policy;
According to the description information, judge whether the behavior of the process matches with any default risk behavior;
When the behavior of process and any default risk behavior match, Xiang Suoshu terminal issues default corresponding to this
The interim security strategy of risk behavior, so that the terminal receives and loads the interim security strategy;
Wherein, include in the interim security strategy: the revocation condition of the interim security strategy, and it is pre- for coping with
If the processing operation and its trigger condition of risk behavior, so that the terminal of the load interim security strategy is in any triggering
Corresponding processing operation is executed when condition meets, and cancels the interim security strategy when any revocation condition meets.
As shown from the above technical solution, the present invention can identify that process will be held based on the setting of local trigger policy
Capable risk operations, and risk operations can be performed corresponding processing based on the setting of interim security strategy.It is understood that
, targetedly interim security strategy can effectively cope with rogue program using stringent monitoring means, and due to facing
When security strategy include revocation condition thus will not the resource to user terminal occupied for a long time.Therefore, of the invention
Can solve existing security strategy and occupy in user resources has contradiction between application validity.
Compared with the existing technology, the present invention can improve answering for security strategy under conditions of same user resources occupy
With validity, user resources can also be reduced under conditions of ensureing using validity and occupied.Moreover, the present invention can be directed to
Property handle the risk operations of rogue program, can not only user resources occupy, promoted and apply validity, can also realize that risk is grasped
The clearance of the interception of work and other operations.It, can be in addition, realize the storage, maintenance and distribution of interim security strategy by server-side
Efficiently use its powerful information storage, collection and operational capability.It can be seen that the present invention may provide the user with it is safer and
Efficient security protection greatly promotes the operational efficiency and user experience of protection capacity of safety protection software.
Certainly, implement any of the products of the present invention or method it is not absolutely required at the same reach all the above excellent
Point.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention
In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is
A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art
Every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
Fig. 1 is a kind of step flow diagram of safety protecting method in one embodiment of the invention.It is described referring to Fig. 1
Safety protecting method includes:
Step 101: in the preset local trigger policy of the behavior matching of process, the description of the behavior of the process being believed
Breath is uploaded to server-side, so that server-side is issued when matching the behavior and any default risk behavior for determining the process
The interim security strategy of risk behavior is preset corresponding to this;Include in interim security strategy: the revocation condition of interim security strategy,
And processing operation and its trigger condition for coping with default risk behavior;
Step 102: receiving the interim security strategy from server-side;
Step 103: interim security strategy is loaded, to execute corresponding processing operation when any trigger condition meets, and
Interim security strategy is cancelled when any revocation condition meets.
Wherein it is understood that safety protecting method of the invention can be applied on any one terminal device, example
Such as personal computer (such as desktop computer, laptop, tablet computer, all-in-one machine), smart phone, e-book, smart television, number
Any one equipment such as code photo frame, Intelligent navigator.And it is understood that above-mentioned steps 101 can be independently of step 102
And be individually performed except step 103, it does not need with inevitable sequencing;And step 102 and step 103 are needed in step
It is executed after 101, and step 103 needs to execute after step 102.
And corresponding to the safety protecting method shown in FIG. 1 applied to terminal, Fig. 2 is a kind of in further embodiment of this invention
The step flow diagram of safety protecting method applied to server-side.Referring to fig. 2, this method comprises:
Step 201: receiving the description information for carrying out the behavior of process of self terminal;The description information matching of the behavior of process should
The preset local trigger policy of terminal;
Step 202: according to description information, judging whether the behavior of process matches with any default risk behavior;
Step 203: when the behavior of process and any default risk behavior match, being issued to terminal default corresponding to this
The interim security strategy of risk behavior, so that terminal receives and loads interim security strategy;
Wherein, include in interim security strategy: the revocation condition of interim security strategy, and for coping with default risk row
For processing operation and its trigger condition so that the terminal for loading interim security strategy executes phase when any trigger condition meets
The processing operation answered, and interim security strategy is cancelled when any revocation condition meets.
It is understood that safety protecting method of the invention can be applied in any one server device, such as
Single server apparatus, server farm, server cluster or Cloud Server equipment etc., the present invention does not limit this
System.
It should be noted that above-mentioned process can be operation in an operating system, for any one or more application programs
Execute the process of corresponding function;The behavior of above-mentioned process refers to the set of the practical operation carried out of process or operation, than
Following published article part, to disk write-in file, to other process injecting codes etc..Above-mentioned local trigger policy is to be pre-configured with
, the angle needs for being mainly used for describing which type of process and/or its behavior for security protection attract attention;When
Both so, it may come from issuing for external equipment, can be from the setting in user based on default version, can also be
Combination, the present invention it is without limitation.Foregoing description information may belong to a part of local trigger policy, be also possible to
It is separately provided, is mainly used for describing which parameter focused particularly on for process of interest and/or its behavior.
It is understood that equipment applied by above-mentioned server-side and safety protecting method has network connection relation, make
The server-side can be uploaded to when getting foregoing description information by obtaining equipment.And the server-side is mainly used for the row of analysis process
Whether to match with any default risk behavior, and corresponding interim security strategy is issued to equipment.Wherein, risk behavior is preset
It refers to having had in server-side the record of corresponding description information and is determined that (source can be artificial fixed there are the operation of risk
Justice, to gather data automatically analyze or its combination), such as bundle some software, certain advertisement popularization, steal certain software
User name and password etc. belong to the object that protection capacity of safety protection software needs to cope with processing.And above-mentioned interim security strategy then corresponds to
Risk behavior is preset in a certain or certain class, is mainly used within the entry-into-force time targetedly reply default risk row accordingly
For.As can be seen that interim security strategy, which can be established in above-mentioned server-side, safeguard and be issued, (can be manual operation, be based on
Data analysis be automatically brought into operation or its combination), and be targetedly additionally provided with revocation condition simultaneously having.Specifically, equipment
Load to interim security strategy is so that interim security strategy comes into force, to execute when any trigger condition meets corresponding
Processing operation, such as intercepted when detecting downloading rogue program;And equipment to the revocation of interim security strategy i.e. so that
Interim security strategy failure, so that interim security strategy can no longer occupy any system resource.
As shown from the above technical solution, the safety protecting method of any one of the above can be based on local trigger policy
Be arranged to identify risk operations that process will execute, and can based on the setting of interim security strategy come to risk operations into
The corresponding processing of row.It is understood that targetedly interim security strategy can be effectively using stringent monitoring means
Cope with rogue program, and due to interim security strategy include revocation condition thus will not the resource to user terminal carry out long when
Between occupancy.Therefore, the embodiment of the present invention can solve existing security strategy user resources occupy with application validity it
Between there are problems that contradiction.
Compared with the existing technology, the embodiment of the present invention can improve safe plan under conditions of same user resources occupy
Application validity slightly can also reduce user resources under conditions of ensureing using validity and occupy.Moreover, the present invention is implemented
Example can targetedly handle the risk operations of rogue program, can not only user resources occupy, promoted and apply validity, may be used also
To realize the clearance of interception and other operations of risk operations.In addition, realizing storage, the maintenance of interim security strategy by server-side
And distribution, its powerful information storage, collection and operational capability can be efficiently used.It can be seen that the embodiment of the present invention can be with
Safer and efficient security protection is provided the user with, the operational efficiency and user experience of protection capacity of safety protection software are greatly promoted.
As a kind of more specific example, Fig. 3 is the friendship in one embodiment of the invention between a kind of terminal and server-side
Mutual process schematic.Referring to Fig. 3, terminal is when the behavior of process matches preset local trigger policy first, by the process
The description information of the behavior is uploaded to server-side (above-mentioned steps 101), so that server-side receives the behavior for carrying out the process of self terminal
Description information (above-mentioned steps 201), and according to description information, judge process behavior whether with any default risk behavior phase
It matches (above-mentioned steps 202).It is understood that since the upload of description information is primarily to judge that default risk behavior is
It is no to occur or occur, so terminal can not carry out respective handling to the behavior of process when uploading description information
And directly let pass, respective handling can also be carried out to avoid loss, local security policy is depended primarily on and the process is somebody's turn to do
The judgement of behavior, the present invention are without limitation.And the behavior of server-side determinating processes not with any default risk behavior
When matching, illustrate that any security risk is not detected in the behavior of the process, so as to terminal return corresponding message with
Clearance processing or server-side and terminal are not done and are further handled to reduce the use of system resource.
However, server-side issues correspondence to terminal if the behavior of process matches with any default risk behavior
In the interim security strategy (above-mentioned steps 203) for presetting risk behavior, so that terminal receives interim security strategy (above-mentioned steps
102) and interim security strategy is loaded, to execute corresponding processing operation when any trigger condition meets, and in any revocation
Interim security strategy (above-mentioned steps 103) are cancelled when condition meets.For example, server-side is clear according to the description information judgement received
The downloading file behavior of device process look at is matched with the default risk behavior of binding music player software, to issue pair to terminal
It should be in the interim security strategy of binding music player software.In interim security strategy, contain with any process to disk write
Processing operation that any associated documents for entering music player software are trigger condition, that write-in behavior is intercepted, and
The revocation condition of the associated documents of all music player softwares is completed in cleaning.It is understood that shown in Fig. 3 interacted
Journey corresponds to issuing, coming into force and failure procedure for an interim security strategy, then can be same in actual application scenarios
When have multiple such processes side by side or carry out across.
Further, it for the revocation mechanism of interim security strategy represented by above-mentioned revocation condition, is given below several
The representative example of kind:
First, directly in memory by the load of interim security strategy so that interim security strategy after memory power-off voluntarily
Revocation.That is above-mentioned steps 103: loading interim security strategy, to execute corresponding processing operation when any trigger condition meets,
And interim security strategy is cancelled when any revocation condition meets, include the steps that 103a not shown in figures: will temporarily pacify
Full strategy is loaded onto memory, so that interim security strategy voluntarily cancels after memory power-off.In the case, for instructing end
The information of interim security strategy load in memory is equally included in interim security strategy with a kind of revocation condition by end.
Certainly, other revocation conditions can not be set in the case of this in interim security strategy, and may correspond to other should cancel
Situation other revocation conditions are set, the present invention is without limitation.
Second, it is more than predetermined threshold that revocation condition, which includes the entry-into-force time of interim security strategy,.Wherein, preset threshold can be with
It is server-side based on the behavior and the relationship of default risk behavior in time for matching local trigger policy, and combination is to terminal
System resource occupancy situation determines.For example, downloading bundled software installation kit behavior with to user's pop-up prompt whether
It will not be usually spaced for a long time between the behavior of installation, and a small amount of system resource only can be occupied to the monitoring of pop-up, so comprehensive
Closing and predetermined threshold can be set under considering is 15~40 minutes.Certainly, when description information includes the information of free system resources,
Server-side can integrated terminal system resource occupancy situation and above-mentioned temporal relationship determine specific preset threshold.
Third, revocation condition include that user has granted default risk behavior in prompting message.For example, interim security strategy
The prompt whether intercepted can be issued the user in intercepting default risk behavior, if user has selected the license default wind
Dangerous behavior, for example user's selection allows the installation of the bundled software during intercepting bundled software, then interim safe plan
Slightly then can under the conditions of above-mentioned revocation not revival, to avoid further occupying system resources.
4th, revocation condition includes in interim security strategy there is the processing operation for terminating label to have completed.It is specific next
Say, some in the processing operation that interim security strategy is included be as terminate item, therefore can in advance these processing behaviour
Addition terminates label on work;To when interim security strategy has executed any one in these processing operations, so that it may press
Interim security strategy is set to fail according to above-mentioned revocation condition, to avoid further occupying system resources.
5th, revocation condition includes receiving the cancel an order message from server-side.Specifically, interim security strategy
Revocation condition can not judge in local process and be executed by server-side.For example, determining in server-side for certain process behavior
There is the possibility of the default risk behavior of installation trojan horse program, has just issued corresponding interim safe plan for the default risk behavior
Slightly;However in server-side based on the judgement to subsequent processes behavior, and determine the risk for not having installation trojan horse program, thus can
To issue cancel an order message to terminal again, so that the interim security strategy failure previously issued.As a result, compared with the prior art
For above-mentioned safety protecting method more default risk behavior can be prevented, play more preferably security protection effect
Fruit.
It should be noted that the set-up mode of above-mentioned revocation condition can be optionally first, or pass through any way group
It closes, to be adapted to different application scenarios, the present invention is without limitation.
As the set-up mode specific example of above-mentioned local trigger policy, the behavior for matching the process of local trigger policy can
To include any one or more following:
Access the network address unrelated with the function of process owning application;
Download the file unrelated with the function of process owning application;
Establish the process unrelated with the function of process owning application;
To other process injecting codes unrelated with process owning application;
File is written under shielded file directory;
The behavior of process relevant to the application program in blacklist.
It should be noted that process owning application refers to the application program of the object serviced as process, and
It is functionally whether related, whether process related to application program, the blacklist of protected catalogue and application program can come
From the default setting for issuing either protection capacity of safety protection software in user setting, server-side, the invention is not limited in this regard.
As can be seen that there is installation or the operation bundled software, trojan horse program, spy of varying degree in above-mentioned process behavior
The rogue programs such as software, or convenient risk, therefore these rows are provided for the installation, operation and self-protection of rogue program
For that can be arranged in above-mentioned local trigger policy according to specific application scenarios.
It is above-mentioned for coping with the processing of default risk behavior as the set-up mode specific example of above-mentioned interim security strategy
Operation and its trigger condition include any one or more following:
There is no a trigger condition, the operation of the operating right of limiting process and/or system resource occupancy (such as limitation network
Access is to prevent process from downloading or continuing the installation kit of downloading rogue program);
Using detect default risk behavior as trigger condition, the operation that the behavior of process is intercepted (such as into
Journey pop-up is intercepted when promoting advertisement);
To detect that default very dangerous behavior as trigger condition, terminates application program belonging to process or end process
It operates (for example terminating corresponding erection schedule in the installation for detecting trojan horse program);
To detect Stub File as trigger condition, the operation cleared up Stub File (for example is detecting wood
It is cleared up accordingly when horse program Stub File).
It is understood that being related to detecting and handle in both sides in the known default risk behavior for needing to cope with
Very strong specific aim can be had by stating processing operation and its trigger condition, by including without being only limitted to above-mentioned each mode to answer
To corresponding default risk behavior.
Furthermore it should be noted that the situation that the behavior of above-mentioned process matches with any default risk behavior may include
Any one or more following: process matches with any default risk process;The behavior of process and any default risk row
To match;The behavior of process and the omen behavior of any default risk behavior match.That is, server-side judge into
When whether the behavior of journey and any default risk behavior match, can be not limited only to process behavior and any default risk row
To match, the process that can also be matches with default risk or the behavior of process and any default risk behavior
The situation that omen behavior matches.Accordingly, for process itself there is the behavior of risk, process to have risk and process
Omen these types situation of the risky behavior of behavior, server-side can be selected according to specific application scenarios, to realize more
Excellent security protection effect.
Based on same inventive concept, Fig. 4 is a kind of structural block diagram of safety device in one embodiment of the invention.
Referring to fig. 4, which includes:
Uploading unit 41, when matching preset local trigger policy for the behavior in process, by the behavior of the process
Description information be uploaded to server-side so that server-side determine the process the behavior match with any default risk behavior
When, issue the interim security strategy that risk behavior is preset corresponding to this;Include in interim security strategy: interim security strategy is removed
Pin strip part, and processing operation and its trigger condition for coping with default risk behavior;
Receiving unit 42, for receiving the interim security strategy from server-side;
Loading unit 43, the interim security strategy obtained for loading receiving unit 42, to meet in any trigger condition
The corresponding processing operation of Shi Zhihang, and interim security strategy is cancelled when any revocation condition meets.
It is understood that the step of function realized of the safety device and safety protecting method shown in FIG. 1
Process corresponds, therefore can have corresponding structure and function, for example corresponds to above-mentioned steps 103a, above-mentioned load list
Member 43 can also be further used for for interim security strategy being loaded onto memory so that interim security strategy after memory power-off from
Row revocation, details are not described herein.
Based on same inventive concept, Fig. 5 is a kind of structural block diagram of safety device in one embodiment of the invention.
Referring to Fig. 5, which includes:
Receiving unit 51, for receiving the description information for carrying out the behavior of process of self terminal;The description of the behavior of process is believed
Breath matches the preset local trigger policy of the terminal;
Judging unit 52, the description information for being obtained according to receiving unit 51, judge process behavior whether with it is any
Default risk behavior matches;
Issuance unit 53, when matching for the behavior in 52 determinating processes of judging unit with any default risk behavior,
The interim security strategy that risk behavior is preset corresponding to this is issued to terminal, so that terminal receives and loads interim security strategy;
Wherein, include in interim security strategy: the revocation condition of interim security strategy, and for coping with default risk row
For processing operation and its trigger condition so that the terminal for loading interim security strategy executes phase when any trigger condition meets
The processing operation answered, and interim security strategy is cancelled when any revocation condition meets.
It is understood that the step of function realized of the safety device and safety protecting method shown in Fig. 2
Process corresponds, therefore can have corresponding structure and function, and details are not described herein.