CN117932594A - Terminal protection method, terminal, and computer-readable medium - Google Patents
Terminal protection method, terminal, and computer-readable medium Download PDFInfo
- Publication number
- CN117932594A CN117932594A CN202211252844.6A CN202211252844A CN117932594A CN 117932594 A CN117932594 A CN 117932594A CN 202211252844 A CN202211252844 A CN 202211252844A CN 117932594 A CN117932594 A CN 117932594A
- Authority
- CN
- China
- Prior art keywords
- input signal
- terminal
- input
- hardware
- input hardware
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Virology (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Telephone Function (AREA)
- User Interface Of Digital Computer (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
本公开提供了一种终端保护的方法,所述方法包括:响应于所述终端处于风险操作状态,检测所述终端的输入硬件的对应所述风险操作的输入信号;所述风险操作状态为待进行风险操作的状态;响应于所述输入硬件有对应所述风险操作的输入信号,允许所述风险操作;响应于所述输入硬件无对应所述风险操作的输入信号,禁止所述风险操作。本公开还提供了一种终端、计算机可读介质。
The present disclosure provides a terminal protection method, the method comprising: in response to the terminal being in a risky operation state, detecting an input signal of the input hardware of the terminal corresponding to the risky operation; the risky operation state is a state of waiting for a risky operation; in response to the input hardware having an input signal corresponding to the risky operation, allowing the risky operation; in response to the input hardware not having an input signal corresponding to the risky operation, prohibiting the risky operation. The present disclosure also provides a terminal and a computer-readable medium.
Description
技术领域Technical Field
本公开涉及终端保护技术领域,特别涉及一种终端保护的方法、终端、计算机可读介质。The present disclosure relates to the technical field of terminal protection, and in particular to a terminal protection method, a terminal, and a computer-readable medium.
背景技术Background technique
当前,手机、平板电脑等终端(智能终端)可能被植入恶意代码或木马程序,使终端被控制,在用户不知情的情况下进行一些操作,带来风险。Currently, mobile phones, tablet computers and other terminals (smart terminals) may be implanted with malicious codes or Trojan programs, which may control the terminals and perform certain operations without the user's knowledge, posing risks.
发明内容Summary of the invention
本公开提供一种终端保护的方法、终端、计算机可读介质。The present disclosure provides a terminal protection method, a terminal, and a computer-readable medium.
第一方面,本公开实施例提供一种终端保护的方法,包括:In a first aspect, an embodiment of the present disclosure provides a terminal protection method, including:
响应于所述终端处于风险操作状态,检测所述终端的输入硬件的对应所述风险操作的输入信号;所述风险操作状态为待进行风险操作的状态;In response to the terminal being in a risky operation state, detecting an input signal of the input hardware of the terminal corresponding to the risky operation; the risky operation state is a state in which a risky operation is to be performed;
响应于所述输入硬件有对应所述风险操作的输入信号,允许所述风险操作;In response to the input hardware having an input signal corresponding to the risk operation, allowing the risk operation;
响应于所述输入硬件无对应所述风险操作的输入信号,禁止所述风险操作。In response to the input hardware not having an input signal corresponding to the risky operation, the risky operation is prohibited.
第二方面,本公开实施例提供一种终端,其包括一个或多个输入设备、一个或多个存储器、一个或多个处理器;所述存储器存储有能被处理器执行的计算机程序,所述计算机程序被处理器执行时实现本公开实施例的任意一种终端保护的方法。In a second aspect, an embodiment of the present disclosure provides a terminal, which includes one or more input devices, one or more memories, and one or more processors; the memory stores a computer program that can be executed by the processor, and when the computer program is executed by the processor, it implements any terminal protection method of the embodiment of the present disclosure.
在一些实施例中,所述终端包括以下至少一项:手机、平板电脑、笔记本电脑、台式电脑。In some embodiments, the terminal includes at least one of the following: a mobile phone, a tablet computer, a laptop computer, and a desktop computer.
第三方面,本公开实施例提供一种计算机可读介质,其上存储有计算机程序,所述计算机程序被处理器执行时实现本公开实施例的任意一种终端保护的方法。In a third aspect, an embodiment of the present disclosure provides a computer-readable medium having a computer program stored thereon, and when the computer program is executed by a processor, any terminal protection method of the embodiment of the present disclosure is implemented.
本公开实施例中,在终端要执行有可能带来风险的操作(处于风险操作状态)时,检测终端的输入硬件实体是否接收到对应该风险操作的输入信号,也就是检测是否真有“人”操作终端执行风险操作,若没有人操作,则可认为是终端的系统受到恶意代码、木马程序等的影响而试图执行风险操作,从而可将其禁止,避免产生风险;由于任何恶意代码、木马程序等都只能从终端系统的层面直接产生操作信号,但无法使输入硬件的实体实际接收到输入信号,故本公开实施例可有效的识别出恶意代码、木马程序产生的操作,大大提高全性;同时,在确实是用户进行操作的情况下,本公开实施例又允许操作进行,从而不会影响终端的正常工作;另外,本公开实施例只在风险操作状态时进行,故在常规的情况下,终端的系统仍能进行操作,而不会影响正常的系统操作的进行。In the embodiment of the present disclosure, when the terminal is about to perform an operation that may bring risks (is in a risky operation state), it is detected whether the input hardware entity of the terminal receives the input signal corresponding to the risky operation, that is, it is detected whether there is really a "person" operating the terminal to perform the risky operation. If there is no human operation, it can be considered that the terminal system is affected by malicious code, Trojan program, etc. and attempts to perform the risky operation, which can be prohibited to avoid the risk. Since any malicious code, Trojan program, etc. can only directly generate operation signals from the terminal system level, but cannot make the input hardware entity actually receive the input signal, the embodiment of the present disclosure can effectively identify the operations generated by malicious code and Trojan program, greatly improving security. At the same time, in the case where the user is indeed performing the operation, the embodiment of the present disclosure allows the operation to proceed, so as not to affect the normal operation of the terminal. In addition, the embodiment of the present disclosure is only performed in the risky operation state, so under normal circumstances, the terminal system can still operate without affecting the normal system operation.
附图说明BRIEF DESCRIPTION OF THE DRAWINGS
在本公开实施例的附图中:In the accompanying drawings of the embodiments of the present disclosure:
图1为本公开实施例提供的一种终端保护的方法的流程图;FIG1 is a flow chart of a terminal protection method provided by an embodiment of the present disclosure;
图2为本公开实施例提供的另一种终端保护的方法的流程图;FIG2 is a flow chart of another terminal protection method provided by an embodiment of the present disclosure;
图3为本公开实施例提供的一种终端的组成框图;FIG3 is a block diagram of a terminal provided by an embodiment of the present disclosure;
图4为本公开实施例提供的一种计算机可读介质的组成框图;FIG4 is a block diagram of a computer-readable medium provided by an embodiment of the present disclosure;
图5为本公开实施例提供的另一种终端保护的方法中部分步骤的逻辑过程示意图;FIG5 is a logic process diagram of some steps in another terminal protection method provided by an embodiment of the present disclosure;
图6为本公开实施例提供的另一种终端保护的方法中部分步骤的逻辑过程示意图;FIG6 is a logic process diagram of some steps in another terminal protection method provided by an embodiment of the present disclosure;
图7为本公开实施例提供的另一种终端保护的方法中部分步骤的逻辑过程示意图。FIG. 7 is a logic process diagram of some steps in another terminal protection method provided in an embodiment of the present disclosure.
具体实施方式Detailed ways
为使本领域的技术人员更好地理解本公开的技术方案,下面结合附图对本公开实施例提供的终端保护的方法、终端、计算机可读介质进行详细描述。In order to enable those skilled in the art to better understand the technical solution of the present disclosure, the terminal protection method, terminal, and computer-readable medium provided by the embodiments of the present disclosure are described in detail below with reference to the accompanying drawings.
在下文中将参考附图更充分地描述本公开,但是所示的实施例可以以不同形式来体现,且本公开不应当被解释为限于以下阐述的实施例。反之,提供这些实施例的目的在于使本公开透彻和完整,并将使本领域技术人员充分理解本公开的范围。The present disclosure will be described more fully below with reference to the accompanying drawings, but the embodiments shown may be embodied in different forms, and the present disclosure should not be construed as being limited to the embodiments set forth below. On the contrary, the purpose of providing these embodiments is to make the present disclosure thorough and complete, and will enable those skilled in the art to fully understand the scope of the present disclosure.
本公开实施例的附图用来提供对本公开实施例的进一步理解,并且构成说明书的一部分,与详细实施例一起用于解释本公开,并不构成对本公开的限制。通过参考附图对详细实施例进行描述,以上和其它特征和优点对本领域技术人员将变得更加显而易见。The accompanying drawings of the embodiments of the present disclosure are used to provide a further understanding of the embodiments of the present disclosure, and constitute a part of the specification, and are used together with the detailed embodiments to explain the present disclosure, and do not constitute a limitation of the present disclosure. By describing the detailed embodiments with reference to the accompanying drawings, the above and other features and advantages will become more apparent to those skilled in the art.
本公开可借助本公开的理想示意图而参考平面图和/或截面图进行描述。因此,可根据制造技术和/或容限来修改示例图示。The present disclosure may be described with reference to plan views and/or cross-sectional views by means of ideal schematic views of the present disclosure. Therefore, the exemplary illustrations may be modified according to manufacturing techniques and/or tolerances.
在不冲突的情况下,本公开各实施例及实施例中的各特征可相互组合。In the absence of conflict, the various embodiments of the present disclosure and the various features therein may be combined with each other.
本公开所使用的术语仅用于描述特定实施例,且不意欲限制本公开。如本公开所使用的术语“和/或”包括一个或多个相关列举条目的任何和所有组合。如本公开所使用的单数形式“一个”和“该”也意欲包括复数形式,除非上下文另外清楚指出。如本公开所使用的术语“包括”、“由……制成”,指定存在所述特征、整体、步骤、操作、元件和/或组件,但不排除存在或添加一个或多个其它特征、整体、步骤、操作、元件、组件和/或其群组。The terms used in the present disclosure are only used to describe specific embodiments and are not intended to limit the present disclosure. The term "and/or" as used in the present disclosure includes any and all combinations of one or more related enumerated items. The singular forms "one" and "the" as used in the present disclosure are also intended to include plural forms, unless the context clearly indicates otherwise. The terms "including", "made of..." as used in the present disclosure specify the presence of the features, wholes, steps, operations, elements and/or components, but do not exclude the presence or addition of one or more other features, wholes, steps, operations, elements, components and/or groups thereof.
除非另外限定,否则本公开所用的所有术语(包括技术和科学术语)的含义与本领域普通技术人员通常理解的含义相同。还将理解,诸如那些在常用字典中限定的那些术语应当被解释为具有与其在相关技术以及本公开的背景下的含义一致的含义,且将不解释为具有理想化或过度形式上的含义,除非本公开明确如此限定。Unless otherwise defined, all terms (including technical and scientific terms) used in this disclosure have the same meaning as those commonly understood by those of ordinary skill in the art. It will also be understood that terms such as those defined in commonly used dictionaries should be interpreted as having a meaning consistent with their meaning in the context of the relevant art and this disclosure, and will not be interpreted as having an idealized or overly formal meaning unless explicitly defined in this disclosure.
本公开不限于附图中所示的实施例,而是包括基于制造工艺而形成的配置的修改。因此,附图中例示的区具有示意性属性,并且图中所示区的形状例示了元件的区的具体形状,但并不是旨在限制性的。The present disclosure is not limited to the embodiments shown in the drawings, but includes modifications of the configurations formed based on the manufacturing process. Therefore, the regions illustrated in the drawings have schematic properties, and the shapes of the regions shown in the drawings illustrate the specific shapes of the regions of the elements, but are not intended to be limiting.
手机、平板电脑等终端(智能终端),在研发调试阶段和量产后的故障分析可通过adb shell命令进行;同时,某些预置的应用程序也有执行adb shell命令的权限;而通过adb shell命令,终端可在触摸屏等输入硬件没有实际收到输入信号的情况下,通过软件命令控制系统进行一些操作。For mobile phones, tablet computers and other terminals (smart terminals), fault analysis can be performed through adb shell commands during the R&D and debugging stages and after mass production. At the same time, some pre-installed applications also have the permission to execute adb shell commands. Through adb shell commands, the terminal can perform some operations through the software command control system without actually receiving input signals from input hardware such as the touch screen.
由于终端多具有联网功能,故可能被植入恶意代码或木马程序,而恶意代码或木马程序可能获取到执行adb shell命令的权限,从而可在用户不知情的情况下,对终端进行一些会带来风险的操作,如通过下载一些应用、支付一些费用、关注其它的社交账号、向其它终端发送信息等,从而导致用户隐私信息的泄露或造成用户财产的损失等,引起安全性问题。Since most terminals have networking functions, they may be implanted with malicious code or Trojan programs. Malicious code or Trojan programs may obtain permission to execute adb shell commands, and thus perform risky operations on the terminal without the user's knowledge, such as downloading some applications, paying some fees, following other social accounts, sending information to other terminals, etc., which may lead to the leakage of user privacy information or cause loss of user property, etc., causing security issues.
在一些技术中,可通过在终端中安装安全软件、杀毒软件等提高终端安全性,但由于恶意代码、木马程序也在不断更新,故任何安全软件、杀毒软件都无法实现对所有恶意代码、木马程序的有效防范。In some technologies, terminal security can be improved by installing security software, anti-virus software, etc. in the terminal. However, since malicious codes and Trojan programs are constantly updated, no security software or anti-virus software can effectively prevent all malicious codes and Trojan programs.
第一方面,本公开实施例提供一种终端保护的方法。In a first aspect, an embodiment of the present disclosure provides a terminal protection method.
本公开实施例的方法用于在终端(智能终端)运行的过程中,保证其安全;其中,参照图3,适用本公开实施例的终端保护的方法终端是可以连接输入硬件的,即,用户可通过输入硬件向终端输入信息,对终端进行操作。The method of the embodiment of the present disclosure is used to ensure the security of the terminal (smart terminal) during its operation; wherein, referring to Figure 3, the terminal of the terminal protection method applicable to the embodiment of the present disclosure can be connected to input hardware, that is, the user can input information to the terminal through the input hardware to operate the terminal.
由此,本公开实施例的终端可以是任何能通过输入硬件接收用户的指令,并进行相应的数据处理的设备,其具体形式包括但不限于手机、平板电脑、笔记本电脑、台式电脑等。Therefore, the terminal of the embodiment of the present disclosure can be any device that can receive user instructions through input hardware and perform corresponding data processing, and its specific form includes but is not limited to mobile phones, tablet computers, laptops, desktop computers, etc.
参照图1,本公开实施例的终端保护的方法包括:1 , the terminal protection method of the embodiment of the present disclosure includes:
S101、响应于终端处于风险操作状态,检测终端的输入硬件的对应风险操作的输入信号。S101 . In response to a terminal being in a risky operation state, detecting an input signal of an input hardware of the terminal corresponding to the risky operation.
其中,风险操作状态为待进行风险操作的状态。Among them, the risk operation status is the status of the risk operation to be performed.
在本公开实施例中,当终端收到指令,要进行有可能带来风险的操作时(即处于风险操作状态),则检测来自其输入硬件的操作指令,并确定操作指令是否是用于实现该风险操作的操作指令(即对应风险操作的输入信号)。In the embodiment of the present disclosure, when the terminal receives an instruction to perform an operation that may bring risks (i.e., it is in a risky operation state), it detects the operation instruction from its input hardware and determines whether the operation instruction is an operation instruction for implementing the risky operation (i.e., an input signal corresponding to the risky operation).
S102、响应于输入硬件有对应风险操作的输入信号,允许风险操作。S102: In response to an input signal from the input hardware corresponding to a risky operation, allowing the risky operation.
S103、响应于输入硬件无对应风险操作的输入信号,禁止风险操作。S103 . In response to an input signal indicating that the input hardware has no corresponding risky operation, prohibiting the risky operation.
由此,如果输入硬件接收到对应风险操作的输入信号,则表明该风险操作确实是用户对终端进行的操作,而不是因恶意代码、木马程序等控制终端的系统而产生的操作,故可允许该风险操作进行,以让终端实现所需的功能。Therefore, if the input hardware receives an input signal corresponding to a risky operation, it indicates that the risky operation is indeed an operation performed by the user on the terminal, rather than an operation generated by a system that controls the terminal, such as malicious code or Trojan programs. Therefore, the risky operation can be allowed to proceed so that the terminal can achieve the required functions.
而如果输入硬件没有收到对应风险操作的输入信号(终端未连接输入硬件,或者是终端虽然连接输入硬件但输入硬件没有输入信号,或者是输入硬件虽然有输入信号但该输入信号不是对应风险操作的),则表明该风险操作可能是恶意代码、木马程序等控制终端的系统而产生的,属于“异常”,故应将其禁止,不允许该操作进行,避免产生风险。However, if the input hardware does not receive the input signal corresponding to the risk operation (the terminal is not connected to the input hardware, or the terminal is connected to the input hardware but the input hardware has no input signal, or the input hardware has an input signal but the input signal does not correspond to the risk operation), it indicates that the risk operation may be generated by malicious code, Trojan programs, etc., which is an "abnormal" system that controls the terminal, so it should be prohibited and the operation should not be allowed to avoid risks.
其中,在因输入硬件没有收到对应风险操作的输入信号而禁止风险操作进行时,还可进行提示报警等其它工作,在此不再详细描述。Among them, when the risk operation is prohibited because the input hardware does not receive the input signal corresponding to the risk operation, other tasks such as prompt alarms can also be performed, which will not be described in detail here.
本公开实施例中,在终端要执行有可能带来风险的操作(处于风险操作状态)时,检测终端的输入硬件实体是否接收到对应该风险操作的输入信号,也就是检测是否真有“人”操作终端执行风险操作,若没有人操作,则可认为是终端的系统受到恶意代码、木马程序等的影响而试图执行风险操作,从而可将其禁止,避免产生风险;由于任何恶意代码、木马程序等都只能从终端系统的层面直接产生操作信号,但无法使输入硬件的实体实际接收到输入信号,故本公开实施例可有效的识别出恶意代码、木马程序产生的操作,大大提高全性;同时,在确实是用户进行操作的情况下,本公开实施例又允许操作进行,从而不会影响终端的正常工作;另外,本公开实施例只在风险操作状态时进行,故在常规的情况下,终端的系统仍能进行操作,而不会影响正常的系统操作的进行。In the embodiment of the present disclosure, when the terminal is about to perform an operation that may bring risks (is in a risky operation state), it is detected whether the input hardware entity of the terminal receives the input signal corresponding to the risky operation, that is, it is detected whether there is really a "person" operating the terminal to perform the risky operation. If there is no human operation, it can be considered that the terminal system is affected by malicious code, Trojan program, etc. and attempts to perform the risky operation, which can be prohibited to avoid the risk. Since any malicious code, Trojan program, etc. can only directly generate operation signals from the terminal system level, but cannot make the input hardware entity actually receive the input signal, the embodiment of the present disclosure can effectively identify the operations generated by malicious code and Trojan program, greatly improving security. At the same time, in the case where the user is indeed performing the operation, the embodiment of the present disclosure allows the operation to proceed, so as not to affect the normal operation of the terminal. In addition, the embodiment of the present disclosure is only performed in the risky operation state, so under normal circumstances, the terminal system can still operate without affecting the normal system operation.
在一些实施例中,风险操作包括以下至少一项:输入验证码、输入密码、下载量超过第一阈值、上传量超过第二阈值、点击登录、发送信息、复制验证信息。In some embodiments, the risk operation includes at least one of the following: inputting a verification code, inputting a password, the download amount exceeds a first threshold, the upload amount exceeds a second threshold, clicking to log in, sending information, and copying verification information.
作为本公开实施例的一种方式,会触发进入风险操作状态的风险操作(可能造成风险的操作)具体可包括向某个界面输入验证码、向某个界面输入密码、一定时间内的数据下载量或上传量超过预设的阈值、点击以在某个界面进行登录、通过社交软件或短信向外发送某些信息、复制接收到的某些验证信息(如短信)的内容等。As one method of an embodiment of the present disclosure, risk operations (operations that may cause risks) that will trigger entry into a risk operation state may specifically include entering a verification code into a certain interface, entering a password into a certain interface, the amount of data downloaded or uploaded within a certain period of time exceeds a preset threshold, clicking to log in to a certain interface, sending certain information through social software or text messages, copying the content of certain verification information received (such as text messages), etc.
在一些实施例中,输入硬件包括以下至少一项:触摸屏、鼠标、键盘。In some embodiments, the input hardware includes at least one of the following: a touch screen, a mouse, and a keyboard.
作为本公开实施例的一种方式,输入硬件的具体形式可为触摸屏、鼠标、键盘等。As one embodiment of the present disclosure, the specific form of the input hardware may be a touch screen, a mouse, a keyboard, etc.
在一些实施例中,输入硬件包括触摸屏;检测终端的输入硬件的对应风险操作的输入信号(S101)包括:In some embodiments, the input hardware includes a touch screen; detecting an input signal of the input hardware of the terminal corresponding to the risk operation (S101) includes:
S1010、检测触摸屏的电容变化和/或电阻变化,根据电容变化和/或电阻变化确定输入硬件的对应风险操作的输入信号。S1010: Detect a change in capacitance and/or resistance of the touch screen, and determine an input signal corresponding to a risky operation of input hardware according to the change in capacitance and/or resistance.
作为本公开实施例的一种方式,输入硬件可包括触摸屏,而触摸屏可为电容式触摸屏、电阻式触摸屏等形式。由此,在有人对触摸屏进行触摸时,触摸屏的电容、电阻等会发生变化,如触摸位置的电容、电阻会发生变化,从而可通过检测触摸屏上的电容、电阻值是否实际发生变化,确定是否有对触摸屏的操作,还可进一步确定操作的位置,以确定是否有对应风险操作的输入信号。As one mode of the embodiment of the present disclosure, the input hardware may include a touch screen, and the touch screen may be in the form of a capacitive touch screen, a resistive touch screen, etc. Therefore, when someone touches the touch screen, the capacitance, resistance, etc. of the touch screen will change, such as the capacitance and resistance at the touch position will change, so that by detecting whether the capacitance and resistance values on the touch screen actually change, it can be determined whether there is an operation on the touch screen, and the position of the operation can be further determined to determine whether there is an input signal corresponding to the risk operation.
在一些实施例中,参照图2,本公开实施例的方法还包括:In some embodiments, referring to FIG. 2 , the method of the embodiment of the present disclosure further includes:
S100、响应于输入硬件存在输入信号,在预设的操作寄存器中写入输入信号记录。S100 , in response to the presence of an input signal in input hardware, writing an input signal record into a preset operation register.
检测终端的输入硬件的对应风险操作的输入信号(S101)包括:Detecting an input signal of a terminal input hardware corresponding to a risk operation (S101) includes:
S1011、读取操作寄存器中的输入信号记录,根据输入信号记录确定输入硬件的对应风险操作的输入信号。S1011. Read the input signal record in the operation register, and determine the input signal of the corresponding risk operation of the input hardware according to the input signal record.
作为本公开实施例的一种方式,可在有人对输入硬件进行操作(输入硬件存在输入信号)时,在预设的操作寄存器中写入输入信号记录(如在操作寄存器中写入1),以记录以上操作,如记录某时刻对某输入硬件进行了某种操作,具体可为对触摸屏的某个位置进行了触摸,点击了鼠标的某个键,按了键盘的某个按键等;而在无人对输入硬件进行操作时,可以是不向操作寄存器写入内容,或者是向操作寄存器写入其它的记录(如在操作寄存器中写入2)。As a method of an embodiment of the present disclosure, when someone operates the input hardware (there is an input signal in the input hardware), an input signal record may be written into a preset operation register (such as writing 1 into the operation register) to record the above operations, such as recording that a certain operation is performed on a certain input hardware at a certain moment, which may specifically be touching a certain position on the touch screen, clicking a certain key of the mouse, pressing a certain key on the keyboard, etc.; and when no one operates the input hardware, no content may be written into the operation register, or other records may be written into the operation register (such as writing 2 into the operation register).
由此,响应于终端处于风险操作状态,可读取操作寄存器中的输入信号记录,以据此确定输入硬件是否有对应风险操作的输入信号(如判断操作寄存器中的值是否为1)。Thus, in response to the terminal being in a risky operation state, the input signal record in the operation register may be read to determine whether the input hardware has an input signal corresponding to the risky operation (eg, determining whether the value in the operation register is 1).
在一些实施例中,检测终端的输入硬件的对应风险操作的输入信号(S101)包括:In some embodiments, detecting an input signal of an input hardware of a terminal corresponding to a risk operation (S101) includes:
S1012、检测在预定时间内的输入硬件的输入信号。S1012: Detect input signals of input hardware within a predetermined time.
作为本公开实施例的一种方式,由于人对输入硬件的操作通常应该是在一定时间内完成的,故可检测在预定时间(如1s)内输入硬件是否有输入信号,以确定是否有对应风险操作的输入信号。As one method of an embodiment of the present disclosure, since human operations on input hardware should usually be completed within a certain time, it is possible to detect whether there is an input signal in the input hardware within a predetermined time (such as 1s) to determine whether there is an input signal corresponding to a risky operation.
在一些实施例中,检测终端的输入硬件的对应风险操作的输入信号(S101)包括:In some embodiments, detecting an input signal of an input hardware of a terminal corresponding to a risk operation (S101) includes:
S1013、检测输入硬件的输入信号的操作信息,根据输入信号的操作信息确定输入硬件的对应风险操作的输入信号。S1013: Detect operation information of an input signal of the input hardware, and determine an input signal of the input hardware corresponding to the risk operation according to the operation information of the input signal.
作为本公开实施例的一种方式,在检测输入硬件是否有输入信号的情况下,还可进一步检测其具体的操作信息,也就是检测该输入信号具体是进行什么操作的信号,例如是触摸了触摸屏的哪个位置,点击了鼠标的哪个键,按了键盘的哪个按键等,进而可判断该操作信息是否与需要进行的风险操作匹配(比如判断触摸屏的触摸位置是否是界面中“确定”按钮的位置等),以确定是否有对应风险操作的输入信号。As a method of an embodiment of the present disclosure, when detecting whether the input hardware has an input signal, its specific operation information can be further detected, that is, the input signal can be detected as a signal for what specific operation is performed, such as which position of the touch screen is touched, which key of the mouse is clicked, which key of the keyboard is pressed, etc., and then it can be determined whether the operation information matches the risk operation that needs to be performed (for example, determining whether the touch position of the touch screen is the position of the "OK" button in the interface, etc.), so as to determine whether there is an input signal corresponding to the risk operation.
其中,以上在操作寄存器中存储输入信号记录的方式,判断预定时间内是否有输入信号的方式,检测输入信号的操作信息的方式可以是仅存在一项,也可以是多项同时存在。例如,可以是操作寄存器存储预定时间内的输入信号的操作信息,从而可根据其确定是否有对应风险操作的输入信号。Among them, the above-mentioned method of storing input signal records in the operation register, the method of determining whether there is an input signal within a predetermined time, and the method of detecting the operation information of the input signal may be only one or multiple at the same time. For example, the operation register may store the operation information of the input signal within a predetermined time, so as to determine whether there is an input signal corresponding to the risk operation based on it.
第二方面,参照图3,本公开实施例提供一种终端,其包括一个或多个输入设备、一个或多个存储器、一个或多个处理器;存储器存储有能被处理器执行的计算机程序,计算机程序被处理器执行时实现本公开实施例的任意一种终端保护的方法。In the second aspect, referring to Figure 3, an embodiment of the present disclosure provides a terminal, which includes one or more input devices, one or more memories, and one or more processors; the memory stores a computer program that can be executed by the processor, and when the computer program is executed by the processor, it implements any terminal protection method of the embodiment of the present disclosure.
在一些实施例中,终端包括以下至少一项:手机、平板电脑、笔记本电脑、台式电脑。In some embodiments, the terminal includes at least one of the following: a mobile phone, a tablet computer, a laptop computer, and a desktop computer.
第三方面,参照图4,本公开实施例提供一种计算机可读介质,其上存储有计算机程序,计算机程序被处理器执行时实现本公开实施例的任意一种终端保护的方法。In a third aspect, referring to FIG. 4 , an embodiment of the present disclosure provides a computer-readable medium having a computer program stored thereon, and when the computer program is executed by a processor, any terminal protection method of the embodiment of the present disclosure is implemented.
其中,处理器为具有数据处理能力的器件,其包括但不限于中央处理器(CPU)等;存储器为具有数据存储能力的器件,其包括但不限于随机存取存储器(RAM,更具体如SDRAM、DDR等)、只读存储器(ROM)、带电可擦可编程只读存储器(EEPROM)、闪存(FLASH);I/O接口(读写接口)连接在处理器与存储器间,能实现存储器与处理器的信息交互,其包括但不限于数据总线(Bus)等。Among them, the processor is a device with data processing capabilities, including but not limited to the central processing unit (CPU); the memory is a device with data storage capabilities, including but not limited to random access memory (RAM, more specifically SDRAM, DDR, etc.), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory (FLASH); the I/O interface (read-write interface) is connected between the processor and the memory, and can realize information exchange between the memory and the processor, including but not limited to the data bus (Bus), etc.
示例性的,对本公开实施例的一种终端保护的方法进行具体介绍。By way of example, a terminal protection method according to an embodiment of the present disclosure is specifically introduced.
本公开实施例的终端保护的方法用于具有电容式触摸屏(输入硬件)的手机终端。The terminal protection method of the embodiment of the present disclosure is used for a mobile phone terminal with a capacitive touch screen (input hardware).
电容式触摸屏中有多个交叉的发射电极(轮流发射信号)和接收电极,在对触摸屏的某个位置进行触摸时,手指在相应位置形成耦合电容,相当于将人体电场连接到触摸位置,从而在相应位置交叉的发射电极和接收电极间的电容情况产生变化,故当某个发射电极发射信号时,若某个接收电极感应到的信号有变化,则可确定该发射电极和接收电极的交叉处有触摸发生,也就是有输入信号;通过连续进行以上过程,可监控触摸和记录触摸的轨迹。而在系统工作时,触摸屏还会检测其屏幕表面电容值是否有变化,并将采集到的数据上报给系统。There are multiple intersecting transmitting electrodes (transmitting signals in turn) and receiving electrodes in a capacitive touch screen. When a certain position of the touch screen is touched, the finger forms a coupling capacitor at the corresponding position, which is equivalent to connecting the human body's electric field to the touch position, so that the capacitance between the intersecting transmitting electrodes and receiving electrodes at the corresponding position changes. Therefore, when a certain transmitting electrode transmits a signal, if the signal sensed by a certain receiving electrode changes, it can be determined that a touch occurs at the intersection of the transmitting electrode and the receiving electrode, that is, there is an input signal; by continuously performing the above process, the touch can be monitored and the touch trajectory can be recorded. When the system is working, the touch screen will also detect whether the capacitance value of its screen surface has changed, and report the collected data to the system.
参照图5,根据本公开实施例的终端保护的方法,在系统工作时,如触摸屏检测到其屏幕表面电容值有变化时,则可判定为有人对屏幕进行触摸(输入硬件有输入信号),从而可向状态寄存器(操作寄存器)写入状态值1(输入信号记录);而如触摸屏没有检测到电容值的变化,则向状态寄存器写入状态值2。由此,状态寄存器可将此前一定时间内的状态值都存储下来,即如果某个时刻有触摸则该时刻对应的状态值是1,而如果某个时刻没有触摸则该时刻对应的状态值是2。5, according to the terminal protection method of the embodiment of the present disclosure, when the system is working, if the touch screen detects a change in the capacitance value of the screen surface, it can be determined that someone is touching the screen (the input hardware has an input signal), so that the state value 1 (input signal record) can be written to the state register (operation register); if the touch screen does not detect a change in the capacitance value, the state value 2 is written to the state register. Thus, the state register can store all the state values within a certain period of time before, that is, if there is a touch at a certain moment, the state value corresponding to the moment is 1, and if there is no touch at a certain moment, the state value corresponding to the moment is 2.
参照图6,当系统对验证码输入栏进行信息输入(风险操作)时,则读取状态寄存器中最近的预定时间(如1s)的数据,若在预定时间内出现过状态值1则判定为正常用户操作,系统执行相应输入操作,即允许向输入栏中输入信息;若在预定时间内状态值一直为2,则判定出现异常,系统拦截相应输入操作,即不允许向输入栏中输入信息,同时,系统日志记录此操作异常,通过提示栏对用户进行异常提示。例如,一些APP(应用)会要求发送验证短信(验证信息),并根据验证短信中的验证码进行登录等操作,而若该APP被植入恶意代码,并已经获得了读取短信息的权限,则APP可不经过用户确认,直接控制向手机发送验证短信,再直接复制短信中的验证码并填入验证信息,这种情况可能造成在用户不知情的情况下进行非法登录等,带来安全隐患,而本公开实施例的方法可将其拦截。Referring to FIG6, when the system inputs information into the verification code input field (risk operation), the data of the most recent predetermined time (such as 1s) in the status register is read. If the status value 1 appears within the predetermined time, it is determined to be a normal user operation, and the system performs the corresponding input operation, that is, allows information to be input into the input field; if the status value is always 2 within the predetermined time, it is determined that an abnormality has occurred, and the system intercepts the corresponding input operation, that is, does not allow information to be input into the input field. At the same time, the system log records this operation abnormality and gives the user an abnormal prompt through the prompt bar. For example, some APPs (applications) will require the sending of a verification SMS (verification information) and perform operations such as logging in according to the verification code in the verification SMS. If the APP is implanted with malicious code and has obtained the permission to read SMS, the APP can directly control the sending of the verification SMS to the mobile phone without user confirmation, and then directly copy the verification code in the SMS and fill in the verification information. This situation may cause illegal login without the user's knowledge, etc., which brings security risks, and the method of the disclosed embodiment can intercept it.
再如,参照图7,当系统进行大流量上传或下载(风险操作)时,如果上传或下载的数据量超过预设的阈值,则同样需要读取状态寄存器中最近的预定时间(如2s)的数据,若在预定时间内出现过状态值1则判定为正常用户操作,继续进行下载或上传;若在预定时间内状态值一直为2,则判定出现异常,可能是恶意代码在未经用户许可的情况下进行下载,故可关闭网络连接。在判定出现异常时,还可弹出需要用户点击确认的提示栏,如用户在触摸屏上进行点击确认,则状态寄存器中会产生最新的状态值为1,故系统可读取状态寄存器中的新状态值,并发现有状态值1,故重新开放网络连接,继续之前的上传或下载;而如用户没有在触摸屏上点击确认,则状态寄存器中的状态值一直为2,持续保持网络关闭状态。For another example, referring to FIG7, when the system performs a large-volume upload or download (risk operation), if the amount of data uploaded or downloaded exceeds a preset threshold, it is also necessary to read the data of the most recent predetermined time (such as 2s) in the status register. If the status value 1 appears within the predetermined time, it is determined to be a normal user operation, and the download or upload continues; if the status value is always 2 within the predetermined time, it is determined that an abnormality has occurred, which may be malicious code that is downloaded without the user's permission, so the network connection can be closed. When it is determined that an abnormality has occurred, a prompt bar requiring the user to click to confirm can also be popped up. If the user clicks to confirm on the touch screen, the latest status value in the status register will be 1, so the system can read the new status value in the status register, and find that there is a status value 1, so the network connection is reopened to continue the previous upload or download; and if the user does not click to confirm on the touch screen, the status value in the status register is always 2, and the network is continuously closed.
本领域普通技术人员可以理解,上文中所公开的全部或某些步骤、系统、装置中的功能模块/单元可以被实施为软件、固件、硬件及其适当的组合。Those skilled in the art will appreciate that all or some of the steps, systems, and functional modules/units in the apparatus disclosed above may be implemented as software, firmware, hardware, or a suitable combination thereof.
在硬件实施方式中,在以上描述中提及的功能模块/单元之间的划分不一定对应于物理组件的划分;例如,一个物理组件可以具有多个功能,或者一个功能或步骤可以由若干物理组件合作执行。In hardware implementations, the division between functional modules/units mentioned in the above description does not necessarily correspond to the division of physical components; for example, one physical component may have multiple functions, or one function or step may be performed by several physical components in cooperation.
某些物理组件或所有物理组件可以被实施为由处理器,如中央处理器(CPU)、数字信号处理器或微处理器执行的软件,或者被实施为硬件,或者被实施为集成电路,如专用集成电路。这样的软件可以分布在计算机可读介质上,计算机可读介质可以包括计算机存储介质(或非暂时性介质)和通信介质(或暂时性介质)。如本领域普通技术人员公知的,术语计算机存储介质包括在用于存储信息(诸如计算机可读指令、数据结构、程序模块或其它数据)的任何方法或技术中实施的易失性和非易失性、可移除和不可移除介质。计算机存储介质包括但不限于随机存取存储器(RAM,更具体如SDRAM、DDR等)、只读存储器(ROM)、带电可擦可编程只读存储器(EEPROM)、闪存(FLASH)或其它磁盘存储器;只读光盘(CD-ROM)、数字多功能盘(DVD)或其它光盘存储器;磁盒、磁带、磁盘存储或其它磁存储器;可以用于存储期望的信息并且可以被计算机访问的任何其它的介质。此外,本领域普通技术人员公知的是,通信介质通常包含计算机可读指令、数据结构、程序模块或者诸如载波或其它传输机制之类的调制数据信号中的其它数据,并且可包括任何信息递送介质。Some physical components or all physical components may be implemented as software executed by a processor, such as a central processing unit (CPU), a digital signal processor or a microprocessor, or implemented as hardware, or implemented as an integrated circuit, such as an application-specific integrated circuit. Such software may be distributed on a computer-readable medium, which may include a computer storage medium (or non-temporary medium) and a communication medium (or temporary medium). As known to those of ordinary skill in the art, the term computer storage medium includes volatile and non-volatile, removable and non-removable media implemented in any method or technology for storing information (such as computer-readable instructions, data structures, program modules or other data). Computer storage media include, but are not limited to, random access memory (RAM, more specifically SDRAM, DDR, etc.), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory (FLASH) or other disk storage; read-only compact disk (CD-ROM), digital versatile disk (DVD) or other optical disk storage; magnetic cassettes, magnetic tapes, disk storage or other magnetic storage; any other medium that can be used to store desired information and can be accessed by a computer. Furthermore, it is well known to those skilled in the art that communication media typically embodies computer readable instructions, data structures, program modules, or other data in a modulated data signal such as a carrier wave or other transport mechanism, and may include any information delivery media.
本公开已经公开了示例实施例,并且虽然采用了具体术语,但它们仅用于并仅应当被解释为一般说明性含义,并且不用于限制的目的。在一些实例中,对本领域技术人员显而易见的是,除非另外明确指出,否则可单独使用与特定实施例相结合描述的特征、特性和/或元素,或可与其它实施例相结合描述的特征、特性和/或元件组合使用。因此,本领域技术人员将理解,在不脱离由所附的权利要求阐明的本公开的范围的情况下,可进行各种形式和细节上的改变。The present disclosure has disclosed example embodiments, and although specific terms are employed, they are used and should be interpreted only in a general illustrative sense and not for limiting purposes. In some instances, it will be apparent to those skilled in the art that, unless otherwise expressly stated, features, characteristics, and/or elements described in conjunction with a particular embodiment may be used alone or in combination with features, characteristics, and/or elements described in conjunction with other embodiments. Therefore, those skilled in the art will appreciate that various changes in form and detail may be made without departing from the scope of the present disclosure as set forth in the appended claims.
Claims (10)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211252844.6A CN117932594A (en) | 2022-10-13 | 2022-10-13 | Terminal protection method, terminal, and computer-readable medium |
PCT/CN2023/106811 WO2024078069A1 (en) | 2022-10-13 | 2023-07-11 | Terminal protection method, terminal, and computer-readable medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211252844.6A CN117932594A (en) | 2022-10-13 | 2022-10-13 | Terminal protection method, terminal, and computer-readable medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN117932594A true CN117932594A (en) | 2024-04-26 |
Family
ID=90668672
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211252844.6A Pending CN117932594A (en) | 2022-10-13 | 2022-10-13 | Terminal protection method, terminal, and computer-readable medium |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN117932594A (en) |
WO (1) | WO2024078069A1 (en) |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102902903B (en) * | 2012-10-10 | 2016-03-30 | 中孚信息股份有限公司 | A kind of ecommerce intelligent code key with button and its implementation |
US9619216B2 (en) * | 2014-04-28 | 2017-04-11 | Citrix Systems, Inc. | Modifying an application for managed execution |
CN112231702B (en) * | 2020-10-14 | 2024-06-21 | 深圳市百富智能新技术有限公司 | Application protection method, device, equipment and medium |
CN115062304A (en) * | 2022-06-21 | 2022-09-16 | 瑞数信息技术(上海)有限公司 | Risk identification method, device, electronic device and readable storage medium |
-
2022
- 2022-10-13 CN CN202211252844.6A patent/CN117932594A/en active Pending
-
2023
- 2023-07-11 WO PCT/CN2023/106811 patent/WO2024078069A1/en unknown
Also Published As
Publication number | Publication date |
---|---|
WO2024078069A1 (en) | 2024-04-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8281410B1 (en) | Methods and systems for providing resource-access information | |
US10706153B2 (en) | Preventing malicious cryptographic erasure of storage devices | |
JP5736305B2 (en) | Systems and programs for establishing and monitoring software evaluation | |
US20150227743A1 (en) | Portable media system with virus blocker and method of operation thereof | |
CN103646208A (en) | Monitoring method and device of eMMC | |
US20240211601A1 (en) | Firmware policy enforcement via a security processor | |
US20190325134A1 (en) | Neural network detection of malicious activity | |
CN113544665B (en) | Execution of measurements of trusted agents in resource-constrained environments using proof of work | |
CN113330436B (en) | Firmware subsystem recovery based on manufacturing state | |
JP5429906B2 (en) | Mobile terminal, program, and control method. | |
CN101150459B (en) | Method and system for improving security of information security device | |
US10872132B2 (en) | Systems and methods for distinguishing information handling system provider-supported information handling resource via system license | |
CN117932594A (en) | Terminal protection method, terminal, and computer-readable medium | |
US20030131112A1 (en) | Computer firewall system | |
US20070033648A1 (en) | Method for Executing Commands to Control a Portable Storage Device | |
US10839055B2 (en) | Storage apparatus managing method and storage apparatus managing system | |
US10853462B2 (en) | Authorizing file access with user I/O and hardware usage patterns | |
TWI669608B (en) | Storage apparatus managing method and storage apparatus managing system | |
CN101719905A (en) | Method and system for automatically accessing network | |
TW202121218A (en) | Access filter for security subsystem | |
CN119337357B (en) | Embedded firmware key definition data modification method, device, medium and equipment | |
CN105320580A (en) | Data storage system with information security protection | |
US20250190571A1 (en) | System and method for regulating access to secure functions | |
JP6832413B2 (en) | Information processing equipment and programs | |
CN120012050A (en) | Method, system and storage medium for preventing files to be protected from being copied |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination |