CN102831351A - Method and device for indicating security attribute of computer icons - Google Patents

Method and device for indicating security attribute of computer icons Download PDF

Info

Publication number
CN102831351A
CN102831351A CN2012103234083A CN201210323408A CN102831351A CN 102831351 A CN102831351 A CN 102831351A CN 2012103234083 A CN2012103234083 A CN 2012103234083A CN 201210323408 A CN201210323408 A CN 201210323408A CN 102831351 A CN102831351 A CN 102831351A
Authority
CN
China
Prior art keywords
icon
shortcut
computer
file
computer icon
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012103234083A
Other languages
Chinese (zh)
Other versions
CN102831351B (en
Inventor
姚彤
王煊
赵坤
张海洋
贺显祺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201210323408.3A priority Critical patent/CN102831351B/en
Publication of CN102831351A publication Critical patent/CN102831351A/en
Application granted granted Critical
Publication of CN102831351B publication Critical patent/CN102831351B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses a method and a device for indicating security attribute of computer icons, the method comprises the following steps: analyzing a file or function corresponding to computer icons; according to the analysis result, determining the computer icon having the potential security problem and the corresponding danger level, and labeling the danger level on the computer icon; and when the cursor stays on the computer icon having the potential security problem, indicating he analysis result of the computer icon and the corresponding operation suggestion. The method and the device greatly improve the security aiming at the computer icon operation.

Description

A kind of method and apparatus that is used to represent computer graphic target security attribute
Technical field
The present invention relates to computer security, be specifically related to a kind of method and apparatus that is used to represent computer graphic target security attribute.
Background technology
In the graphic user interface of computer nowadays operating system (the for example Windows of Microsoft); There is a kind of like this function; When moving to cursor on the icon; Some attribute informations that can show pairing file of this icon or function, for example title, description, position, type, size, date or the like.As shown in Figure 1, when cursor being moved to 360 security guard's master program file " 360Se.exe " last times, can on graphic user interface, show description, manufacturing company, FileVersion, date created, these attribute informations of size of this document.
Yet, these attribute informations greatly can the people for making amendment, like this, dangerous file or function just can be covered its true attribute, are clicked when moving at its icon, may damage system.
Summary of the invention
In view of the above problems, the present invention has been proposed, so that a kind of method and corresponding device thereof of being used to represent computer graphic target security attribute that overcomes the problems referred to above or address the above problem at least in part is provided.
According to one aspect of the present invention, a kind of method that is used to represent computer graphic target security attribute is provided, comprising:
Pairing file of anacom icon or function;
According to analysis result, confirm to exist the computer icon and the corresponding danger classes of potential safety problem, and on said computer icon, mark danger classes; And
When cursor rests on the said computer graphic that has a potential safety problem and puts on, represent said computer graphic target analysis result and corresponding suggestion for operation.
Said method also comprises: when cursor rests on the said computer graphic that has a potential safety problem and puts on; The attribute information of also representing pairing file of said computer icon or function, said attribute information comprise title, description, position, type, size, creation-time, modification time, in the access time one or more.
The step of the attribute information of the step of said expression said computer graphic target analysis result and corresponding suggestion for operation and pairing file of the said computer icon of said expression or function comprises: represent and/or represent through the audio output device of electronic equipment through the display device of electronic equipment.
Saidly confirm to exist the step of computer icon and the corresponding danger classes of potential safety problem to be based on the cloud inquiry or carry out based on predefined database according to analysis result.
Said according to analysis result, confirm to exist the computer icon of potential safety problem and the step of corresponding danger classes to comprise: the computer icon that will have one of following characteristic is confirmed as and is had potential safety problem and have first danger classes:
The file that points to as the computer icon of shortcut does not exist;
Point to the file of UNKNOWN TYPE as the computer icon of shortcut;
Computer icon as shortcut points to other shortcut;
Computer icon as shortcut points to script file;
Computer icon as shortcut points to network address;
Computer icon as shortcut points to the executable file with predefined dangerous characteristic;
The icon of the file that points to as the computer icon of shortcut is not a system default;
Computer icon as shortcut does not point to any file;
The file that computer icon is related or have predefined specific properties as the file that the computer icon of shortcut points to;
The related file of computer icon can not be by normal deletion;
The file corruption of pointing to as the computer icon of shortcut;
Computer icon as shortcut points to unknown path;
Computer icon as shortcut has and similar title of predefined shortcut icon and/or profile, but the file that points to is different with the file of said predefined shortcut sensing;
The file that points to as the computer icon of shortcut has and title like the predefined files classes/or icon, but the file that points to not is said predefined file;
Computer icon is the registration table associations on the operating system desktop;
Computer icon as shortcut points to unknown executable file;
Computer icon as shortcut points to specific hot key;
Computer icon as shortcut has and similar title of predefined shortcut icon and/or profile, but the executive mode of pointing to has parameter.
Said according to analysis result, confirm to exist the computer icon of potential safety problem and the step of corresponding danger classes to comprise: the computer icon that will have one of following characteristic is confirmed as and is had potential safety problem and have second danger classes:
Computer icon as shortcut points to the HTML type file that has redirect;
The file attribute of the file that computer icon is related is set to hide;
The related file of computer icon can't normally be deleted;
Computer icon is to create behind the predefined time point;
Class sign (CLSID) as the computer icon of shortcut is related can't be discerned, and related with registration table;
Computer icon as shortcut points to browser program;
The file that points to as the computer icon of shortcut has the title that surpasses predefined length.
Computer icon with first danger classes is compared with the computer icon with second danger classes and is existed the possibility of safety problem bigger, is to remove this computer icon to its suggestion for operation.
Said on said computer icon the mark danger classes step in, on computer icon with first danger classes the mark " danger ", on computer icon with second danger classes the mark " suspicious ".
According to a further aspect in the invention, a kind of device that is used to represent computer graphic target security attribute is provided, has comprised:
Analysis module is used for pairing file of anacom icon or function;
Danger classes is confirmed and labeling module, is used for according to analysis result, confirms to exist the computer icon and the corresponding danger classes of potential safety problem, and on said computer icon, marks danger classes; And
First representation module is used for when cursor rests on the said computer graphic that has a potential safety problem and puts on, representing said computer graphic target analysis result and corresponding suggestion for operation.
Said device also comprises: second representation module; Be used for when cursor rests on the said computer graphic that has a potential safety problem and puts on; The attribute information of also representing pairing file of said computer icon or function, said attribute information comprise title, description, position, type, size, creation-time, modification time, in the access time one or more.
Said first representation module and said second representation module are represented through the display device of electronic equipment and/or are represented through the audio output device of electronic equipment.
Said danger classes is confirmed to inquire about based on cloud with labeling module or based on predefined database, confirm to exist the computer icon and the corresponding danger classes of potential safety problem according to analysis result.
Said danger classes is confirmed that the computer icon that will have one of following characteristic with labeling module is confirmed as and is had potential safety problem and have first danger classes:
The file that points to as the computer icon of shortcut does not exist;
Point to the file of UNKNOWN TYPE as the computer icon of shortcut;
Computer icon as shortcut points to other shortcut;
Computer icon as shortcut points to script file;
Computer icon as shortcut points to network address;
Computer icon as shortcut points to the executable file with predefined dangerous characteristic;
The icon of the file that points to as the computer icon of shortcut is not a system default;
Computer icon as shortcut does not point to any file;
The file that computer icon is related or have predefined specific properties as the file that the computer icon of shortcut points to;
The related file of computer icon can not be by normal deletion;
The file corruption of pointing to as the computer icon of shortcut;
Computer icon as shortcut points to unknown path;
Computer icon as shortcut has and similar title of predefined shortcut icon and/or profile, but the file that points to is different with the file of said predefined shortcut sensing;
The file that points to as the computer icon of shortcut has and title like the predefined files classes/or icon, but the file that points to not is said predefined file;
Computer icon is the registration table associations on the operating system desktop;
Computer icon as shortcut points to unknown executable file;
Computer icon as shortcut points to specific hot key;
Computer icon as shortcut has and similar title of predefined shortcut icon and/or profile, but the executive mode of pointing to has parameter.
Said danger classes is confirmed that the computer icon that will have one of following characteristic with labeling module is confirmed as and is had potential safety problem and have second danger classes:
Computer icon as shortcut points to the HTML type file that has redirect;
The file attribute of the file that computer icon is related is set to hide;
The related file of computer icon can't normally be deleted;
Computer icon is to create behind the predefined time point;
Class sign (CLSID) as the computer icon of shortcut is related can't be discerned, and related with registration table;
Computer icon as shortcut points to browser program;
The file that points to as the computer icon of shortcut has the title that surpasses predefined length.
Computer icon with first danger classes is compared with the computer icon with second danger classes and is existed the possibility of safety problem bigger, is to remove this computer icon to its suggestion for operation.
Said danger classes is confirmed on the computer icon with first danger classes, to mark " danger " with labeling module, mark " suspicious " on the computer icon with second danger classes.
The invention provides a kind of method and apparatus that is used to represent computer graphic target security attribute.According to embodiments of the invention; Through pairing file of anacom icon or function; Confirm to exist the icon and the corresponding danger classes of potential safety problem in view of the above, on said icon, mark danger classes, and when cursor rests on the said icon that has a potential safety problem; Represent the analysis result and the corresponding suggestion for operation of said icon; Not only make the user can understand which icon intuitively and possibly have safety problem and corresponding danger classes, when the user rests on cursor on these icons, can also concrete analysis result and suggestion for operation to these icons be provided to the user through the mark on the icon; Make the user can take appropriate operation for these icons, the destruction of avoiding dangerous icon possibly bring to computer system.Thus, the present invention has greatly improved the security to the computer icon operation.
Above-mentioned explanation only is the general introduction of technical scheme of the present invention; Understand technological means of the present invention in order can more to know; And can implement according to the content of instructions; And for let above and other objects of the present invention, feature and advantage can be more obviously understandable, below special lifts embodiment of the present invention.
Description of drawings
Through reading the hereinafter detailed description of the preferred embodiment, various other advantage and benefits will become cheer and bright for those of ordinary skills.Accompanying drawing only is used to illustrate the purpose of preferred implementation, and does not think limitation of the present invention.And in whole accompanying drawing, represent identical parts with identical reference symbol.In the accompanying drawings:
Fig. 1 be in the prior art when cursor is moved to icon the synoptic diagram of display attribute information;
Fig. 2 is the process flow diagram that is used to represent the method for computer graphic target security attribute according to an embodiment of the invention;
Fig. 3 is the danger classes of display icon according to an embodiment of the invention and the synoptic diagram of analysis result and corresponding suggestion for operation; And
Fig. 4 is the block diagram that is used to represent the device of computer graphic target security attribute according to an embodiment of the invention.
Embodiment
Exemplary embodiment of the present disclosure is described below with reference to accompanying drawings in more detail.Though shown exemplary embodiment of the present disclosure in the accompanying drawing, yet should be appreciated that and to realize the disclosure and should do not limited with various forms by the embodiment that sets forth here.On the contrary, it is in order more thoroughly to understand the disclosure that these embodiment are provided, and can with the scope of the present disclosure complete convey to those skilled in the art.
Hereinafter, be example with the personal computer, principle of the present invention is described.Yet; This only is a purpose for example; Scope of the present invention is not limited to this; But be equally applicable to the electronic equipment that other has display device, and for example, portable electric appts such as mobile phone, panel computer, navigating instrument, audio frequency and/or video player, radio, mobile TV, multifunctional remote controlller; Stationary electronic device such as mainframe computer, printer, facsimile recorder, duplicating machine, all-in-one multifunctional machine, STB, public information query facility, interaction of multimedia information equipment; And the electronic equipment of other assembling display device.
In addition, in the description of carrying out to personal computer hereinafter, be example with the Windows operating system of Microsoft, principle of the present invention is described.Yet this only is a purpose for example, and scope of the present invention is not limited to this, but is equally applicable to the operating system that other has graphic user interface, for example Linux, Mac OS, Unix or the like.
Fig. 2 is the process flow diagram that is used to represent the method for computer graphic target security attribute according to an embodiment of the invention.As shown in Figure 2, in the method that is used for representing computer graphic target security attribute, at the beginning, execution in step S101: pairing file of anacom icon or function.According to embodiments of the invention; Can be injected into the explorer process through CreateRemoteThread function creation remote thread; And hook after hanging up hook, refreshes desktop on the IShellView interface; At this moment just can obtain icon corresponding file or the attribute information of function on the desktop through the IShellView interface, comprise position, size, display image and corresponding file or the like.
After step S101, execution in step S103:, confirm to exist the computer icon and the corresponding danger classes of potential safety problem, and on said computer icon, mark danger classes according to analysis result.
According to embodiments of the invention; Said danger classes can comprise first danger classes and second danger classes; The computer icon that wherein has first danger classes is compared with the computer icon with second danger classes and is existed the possibility of safety problem bigger; For example can be with first danger classes called after " danger " grade, with second danger classes called after " suspicious " grade.Yet; Scope of the present invention is not limited thereto; Can also stipulate only to exist a danger classes; Perhaps there are three or the danger classes more than three, for example with its called after " slightly suspicious ", " moderate is suspicious ", " highly suspicious ", " slight dangerous ", " poor risk ", " highly dangerous " or the like.
According to embodiments of the invention, saidly confirm to exist the step of computer icon and the corresponding danger classes of potential safety problem to be based on the cloud inquiry or carry out based on predefined database according to analysis result.Alternatively, said predefined database can be stored in the user's computer or server end.
According to embodiments of the invention; The step of mark danger classes can realize through following mode on said computer icon: at first call the DrawIcon function; Draw original icon; And then call the DrawIcon function, and draw the icon of " danger " of representing first danger classes and be superimposed upon original graph and put on face, perhaps draw the icon of " suspicious " of representing second danger classes and be superimposed upon original graph and put on face.
After step S103, execution in step S105: when cursor rests on the said computer graphic that has a potential safety problem and puts on, represent said computer graphic target analysis result and corresponding suggestion for operation.According to embodiments of the invention, when the user uses sensing equipment (for example mouse, touch pad etc.) moving cursor, can respond WM_MOUSEMOVE message, and, judge whether cursor is positioned at certain computer graphic and puts on according to the cursor position in this message.In addition, in the time of can defining near the zone of much scopes cursor rests on icon, just can think that cursor rests on this icon.Can also define cursor and how long be on the icon, just can think that cursor is to rest on this icon.
In addition; According to embodiments of the invention; Said method 100 can also comprise step S107: when cursor rests on the said computer graphic that has a potential safety problem and puts on; The attribute information of also representing pairing file of said computer icon or function, said attribute information comprise title, description, position, type, size, creation-time, modification time, in the access time one or more.Alternatively, said attribute information can show with above-mentioned analysis result and corresponding suggestion for operation together, also can separate demonstration in different positions, can also successively show according to particular order.
In addition; According to embodiments of the invention; When the cursor of computing machine rests on the computer graphic that does not have safety problem and puts on, can represent that there is not safety problem in said computer icon, and represent the attribute information of pairing file of said computer icon or function.
According to embodiments of the invention; In above-mentioned steps S105 and step S107; Can represent said computer graphic target analysis result and corresponding suggestion for operation through the display device of electronic equipment (for example computing machine) and/or through the audio output device of electronic equipment, represent that perhaps there is not safety problem in said computer icon.
According to embodiments of the invention, exist the possibility of safety problem bigger owing to have the computer icon of first danger classes (" danger "), therefore the suggestion for operation to it can be to remove this computer icon; And exist the possibility of safety problem less owing to have the computer icon of second danger classes (" suspicious "), therefore the suggestion for operation to it can be to let the user select whether to remove this computer icon voluntarily.
For instance; As shown in Figure 3; Marked its danger classes (" suspicious " or " danger ") on the computer icon of potential safety problem existing; And when cursor rests on the 4th icon of second row, shown analysis result and corresponding suggestion for operation about this icon, promptly " network address that this shortcut is pointed C: Files (x86) Explorer: //www.sssd.com is in 360 credible network address database; if not the shortcut that you create, suggestion is removed ".In addition, as substitute mode, when cursor rests on this icon, can also report above-mentioned analysis result and corresponding suggestion for operation with the mode of sound through the loudspeaker of computing machine about this icon.
According to embodiments of the invention, the computer icon that will have one of following characteristic is confirmed as and is had potential safety problem and have first danger classes (" danger "):
(a) file that points to as the computer icon of shortcut does not exist; This possibly be because program unloading does not thoroughly cause; Or the residual shortcut of wooden horse, also can the computer icon with this characteristic be confirmed as and have second danger classes (" suspicious ");
(b) point to the file of UNKNOWN TYPE as the computer icon of shortcut, if this is not the shortcut that the user creates, then suggestion is removed, and may bring security risk otherwise carry out this document;
(c) computer icon as shortcut points to other shortcut, and in the ordinary course of things, normal software can not produce this shortcut icon;
(d) computer icon as shortcut points to script file, if this is not the shortcut that the user creates, then suggestion is removed, and may bring security risk otherwise carry out this document;
(e) computer icon as shortcut points to network address; If this is not the shortcut that the user creates; Then suggestion is removed; Otherwise carry out this shortcut and may bring security risk, also can the computer icon with this characteristic be confirmed as and have second danger classes, let the user select whether to remove this computer icon voluntarily according to the credibility of network address pointed;
(f) computer icon as shortcut points to the executable file with predefined dangerous characteristic; In the ordinary course of things; Normal software can not produce this shortcut icon, and predefined dangerous characteristic can or be confirmed based on predefined database based on the cloud inquiry;
The icon of the file that (g) points to as the computer icon of shortcut is not a system default, if this is not the icon of user's modification, then suggestion is removed, and may bring security risk otherwise carry out this document;
(h) computer icon as shortcut does not point to any file, and this possibly be because program unloading does not thoroughly cause, or the residual shortcut of wooden horse, can the computer icon with this characteristic be confirmed as to have second danger classes yet;
(i) the related file of computer icon or have predefined specific properties as the file that the computer icon of shortcut points to; This type of file normally rogue program is created; Carry out this document folder and possibly bring security risk; Also can the computer icon with this characteristic be confirmed as and have second danger classes, said predefined specific properties can or be confirmed based on predefined database based on the cloud inquiry;
(j) the related file of computer icon can not be by normal deletion, and this possibly be because program unloading does not thoroughly cause, or the residual shortcut of wooden horse, also can the computer icon with this characteristic be confirmed as to have second danger classes;
(k) file corruption of pointing to as the computer icon of shortcut, this possibly be because program unloading does not thoroughly cause, or the residual shortcut of wooden horse;
(l) computer icon as shortcut points to unknown path, and in the ordinary course of things, normal software can not generate this shortcut;
(m) computer icon as shortcut has and similar title of predefined shortcut icon and/or profile; But the file that points to is different with the file that said predefined shortcut is pointed to; This type of shortcut is this predefined shortcut icon of disguise as normally, clicks to lure the user into;
(n) file that points to as the computer icon of shortcut has and title like the predefined files classes/or icon; But the file that points to not is said predefined file; This type of shortcut is this predefined shortcut icon of disguise as normally, clicks to lure the user into;
(o) computer icon is the registration table associations on the operating system desktop, it possibly cause icon display unusual, maybe can't move, this normally rogue program create;
(p) computer icon as shortcut points to unknown executable file, carries out this document and possibly bring security risk, also can the computer icon with this characteristic be confirmed as to have second danger classes;
(q) point to specific hot key as the computer icon of shortcut, in the ordinary course of things, normal software can not generate this shortcut, creates if not the user, and then suggestion is removed;
(r) computer icon as shortcut has and similar title of predefined shortcut icon and/or profile; But the executive mode of pointing to has parameter; This type of shortcut is this predefined shortcut icon of disguise as normally, clicks to lure the user into.
According to embodiments of the invention, the computer icon that will have one of following characteristic is confirmed as and is had potential safety problem and have second danger classes (" suspicious "):
(a ') points to the HTML type file that has redirect as the computer icon of shortcut, and is not under user's situation about creating in this shortcut, and suggestion is removed it;
The file attribute of the file that (b ') computer icon is related is set to hide, and this causes and possibly can't view this document, and it is repaired the normal demonstration that can recover this document;
The related file of (c ') computer icon can't normally be deleted, and this possibly be because program unloading does not thoroughly cause, or the residual shortcut of wooden horse;
(d ') computer icon be behind the predefined time point (in the for example nearest week) create, need the user to examine after, again this icon is operated;
(e ') can't discern as the related class sign (CLSID) of the computer icon of shortcut, and related with registration table, carry out this document and possibly bring security risk;
(f ') point to browser program as the computer icon of shortcut;
(g ') has the title that surpasses predefined length as the file that the computer icon of shortcut points to, and it possibly can't normally be opened or delete, and normal file seldom uses this type of overlength file name usually.
The invention provides a kind of method that is used to represent computer graphic target security attribute.According to embodiments of the invention; Through pairing file of anacom icon or function; Confirm to exist the icon and the corresponding danger classes of potential safety problem in view of the above, on said icon, mark danger classes, and when cursor rests on the said icon that has a potential safety problem; Represent the analysis result and the corresponding suggestion for operation of said icon; Not only make the user can understand which icon intuitively and possibly have safety problem and corresponding danger classes, when the user rests on cursor on these icons, can also concrete analysis result and suggestion for operation to these icons be provided to the user through the mark on the icon; Make the user can take appropriate operation for these icons, the destruction of avoiding dangerous icon possibly bring to computer system.Thus, the present invention has greatly improved the security to the computer icon operation.
Corresponding with above-mentioned method 100, the present invention also provides a kind of device 200 that is used to represent computer graphic target security attribute, and referring to Fig. 4, this device 200 comprises:
Analysis module 201 is used for pairing file of anacom icon or function, and it can be used for carrying out 100 step S101 according to the method for the invention;
Danger classes is confirmed and labeling module 203; Be used for according to analysis result; Confirm to exist the computer icon and the corresponding danger classes of potential safety problem, and on said computer icon, mark danger classes, it can be used for carrying out 100 step S103 according to the method for the invention; And
First representation module 205; Be used for when cursor rests on the said computer graphic that has a potential safety problem and puts on; Represent said computer graphic target analysis result and corresponding suggestion for operation, it can be used for carrying out 100 step S105 according to the method for the invention.
In an embodiment of the present invention; Said device 200 also comprises second representation module 207; Be used for when cursor rests on the said computer graphic that has a potential safety problem and puts on; The attribute information of also representing pairing file of said computer icon or function, said attribute information comprise title, description, position, type, size, creation-time, modification time, in the access time one or more, and it can be used for carrying out 100 step S107 according to the method for the invention.
In an embodiment of the present invention, said first representation module 205 and said second representation module 207 are represented through the display device of electronic equipment and/or are represented through the audio output device of electronic equipment.
In an embodiment of the present invention, said danger classes is confirmed to inquire about based on cloud with labeling module 203 or based on predefined database, confirm to exist the computer icon and the corresponding danger classes of potential safety problem according to analysis result.
In an embodiment of the present invention, said danger classes is confirmed that the computer icon that will have one of following characteristic with labeling module 203 is confirmed as and is had potential safety problem and have first danger classes:
The file that points to as the computer icon of shortcut does not exist;
Point to the file of UNKNOWN TYPE as the computer icon of shortcut;
Computer icon as shortcut points to other shortcut;
Computer icon as shortcut points to script file;
Computer icon as shortcut points to network address;
Computer icon as shortcut points to the executable file with predefined dangerous characteristic;
The icon of the file that points to as the computer icon of shortcut is not a system default;
Computer icon as shortcut does not point to any file;
The file that computer icon is related or have predefined specific properties as the file that the computer icon of shortcut points to;
The related file of computer icon can not be by normal deletion;
The file corruption of pointing to as the computer icon of shortcut;
Computer icon as shortcut points to unknown path;
Computer icon as shortcut has and similar title of predefined shortcut icon and/or profile, but the file that points to is different with the file of said predefined shortcut sensing;
The file that points to as the computer icon of shortcut has and title like the predefined files classes/or icon, but the file that points to not is said predefined file;
Computer icon is the registration table associations on the operating system desktop;
Computer icon as shortcut points to unknown executable file;
Computer icon as shortcut points to specific hot key;
Computer icon as shortcut has and similar title of predefined shortcut icon and/or profile, but the executive mode of pointing to has parameter.
In an embodiment of the present invention, said danger classes is confirmed that the computer icon that will have one of following characteristic with labeling module 203 is confirmed as and is had potential safety problem and have second danger classes:
Computer icon as shortcut points to the HTML type file that has redirect;
The file attribute of the file that computer icon is related is set to hide;
The related file of computer icon can't normally be deleted;
Computer icon is to create behind the predefined time point;
Class sign (CLSID) as the computer icon of shortcut is related can't be discerned, and related with registration table;
Computer icon as shortcut points to browser program;
The file that points to as the computer icon of shortcut has the title that surpasses predefined length.
In an embodiment of the present invention, the computer icon with first danger classes is compared with the computer icon with second danger classes and is existed the possibility of safety problem bigger, is to remove this computer icon to its suggestion for operation.
In an embodiment of the present invention, said danger classes is confirmed on the computer icon with first danger classes, to mark " danger " with labeling module 203, mark " suspicious " on the computer icon with second danger classes.
Because above-mentioned respectively to install embodiment corresponding with aforementioned approaches method embodiment, therefore no longer each installed embodiment and be described in detail.
Intrinsic not relevant at this algorithm that provides with any certain computer, virtual system or miscellaneous equipment with demonstration.Various general-purpose systems also can be used with the teaching that is based on this.According to top description, it is conspicuous constructing the desired structure of this type systematic.In addition, the present invention is not also to any certain programmed language.Should be understood that and to utilize various programming languages to realize content of the present invention described here, and the top description that language-specific is done is in order to disclose preferred forms of the present invention.
In the instructions that is provided herein, a large amount of details have been described.Yet, can understand, embodiments of the invention can be put into practice under the situation of these details not having.In some instances, be not shown specifically known method, structure and technology, so that not fuzzy understanding of this description.
Similarly; Be to be understood that; In order to simplify the disclosure and to help to understand one or more in each inventive aspect, in the above in the description to exemplary embodiment of the present invention, each characteristic of the present invention be grouped together into sometimes single embodiment, figure, or the description to it in.Yet should this disclosed method be construed to the following intention of reflection: promptly the present invention for required protection requires the more characteristic of characteristic clearly put down in writing than institute in each claim.Or rather, as following claims reflected, inventive aspect was to be less than all characteristics of the disclosed single embodiment in front.Therefore, follow claims of embodiment and incorporate this embodiment thus clearly into, wherein each claim itself is all as independent embodiment of the present invention.
Those skilled in the art are appreciated that and can adaptively change and be arranged on them in one or more devices different with this embodiment the module in the device among the embodiment.Can be combined into the plurality of modules among the embodiment module or unit or assembly, and can be divided into a plurality of submodules or subelement or sub-component to them in addition.In such characteristic and/or process or module at least some are each other repelling, and can adopt any combination to disclosed all characteristics in this instructions (comprising claim, summary and the accompanying drawing followed) and so all processes or the unit of disclosed any method or equipment make up.Only if clearly statement in addition, disclosed each characteristic can be by providing identical, being equal to or similar purpose alternative features replaces in this instructions (comprising claim, summary and the accompanying drawing followed).
In addition; Those skilled in the art can understand; Although some said embodiment comprise some characteristic rather than further feature included among other embodiment, the combination of features of different embodiment means and is within the scope of the present invention and forms various embodiment.For example, in claims, the one of any of embodiment required for protection can be used with array mode arbitrarily.
Each device embodiment of the present invention can realize with hardware, perhaps realizes with the software module of on one or more processor, moving, and perhaps the combination with them realizes.It will be understood by those of skill in the art that and to use microprocessor or digital signal processor (DSP) to realize in practice according to some or all some or repertoire of modules in the device of the embodiment of the invention.The present invention can also be embodied as part or all the device program (for example, computer program and computer program) that is used to carry out described method here.Such realization program of the present invention can be stored on the computer-readable medium, perhaps can have the form of one or more signal.Such signal can be downloaded from internet website and obtain, and perhaps on carrier signal, provides, and perhaps provides with any other form.
It should be noted the foregoing description the present invention will be described rather than limit the invention, and those skilled in the art can design alternative embodiment under the situation of the scope that does not break away from accompanying claims.In claim, should any reference symbol between bracket be configured to the restriction to claim.Word " comprises " not to be got rid of existence and is not listed in element or step in the claim.Being positioned at word " " or " " before the element does not get rid of and has a plurality of such elements.The present invention can realize by means of the hardware that includes some different elements and by means of the computing machine of suitably programming.In having enumerated the unit claim of some devices, several in these devices can be to come imbody through same hardware branch.Any order is not represented in the use of word first, second and C grade.Can be title with these word explanations.

Claims (16)

1. method (100) that is used to represent computer graphic target security attribute comprising:
Pairing file of anacom icon or function (S101);
According to analysis result, confirm to exist the computer icon and the corresponding danger classes of potential safety problem, and on said computer icon, mark danger classes (S103); And
When cursor rests on the said computer graphic that has a potential safety problem and puts on, represent said computer graphic target analysis result and corresponding suggestion for operation (S105).
2. the method for claim 1; Also comprise: when cursor rests on the said computer graphic that has a potential safety problem and puts on; The attribute information (S107) of also representing pairing file of said computer icon or function, said attribute information comprise title, description, position, type, size, creation-time, modification time, in the access time one or more.
3. according to claim 1 or claim 2 method, the step of the attribute information of the step of wherein said expression said computer graphic target analysis result and corresponding suggestion for operation and pairing file of the said computer icon of said expression or function comprises: represent and/or represent through the audio output device of electronic equipment through the display device of electronic equipment.
4. the method for claim 1 is wherein saidly confirmed to exist the step of computer icon and the corresponding danger classes of potential safety problem to be based on the cloud inquiry or is carried out based on predefined database according to analysis result.
5. the method for claim 1; Wherein said according to analysis result, confirm to exist the computer icon of potential safety problem and the step of corresponding danger classes to comprise: the computer icon that will have one of following characteristic is confirmed as and is had potential safety problem and have first danger classes:
The file that points to as the computer icon of shortcut does not exist;
Point to the file of UNKNOWN TYPE as the computer icon of shortcut;
Computer icon as shortcut points to other shortcut;
Computer icon as shortcut points to script file;
Computer icon as shortcut points to network address;
Computer icon as shortcut points to the executable file with predefined dangerous characteristic;
The icon of the file that points to as the computer icon of shortcut is not a system default;
Computer icon as shortcut does not point to any file;
The file that computer icon is related or have predefined specific properties as the file that the computer icon of shortcut points to;
The related file of computer icon can not be by normal deletion;
The file corruption of pointing to as the computer icon of shortcut;
Computer icon as shortcut points to unknown path;
Computer icon as shortcut has and similar title of predefined shortcut icon and/or profile, but the file that points to is different with the file of said predefined shortcut sensing;
The file that points to as the computer icon of shortcut has and title like the predefined files classes/or icon, but the file that points to not is said predefined file;
Computer icon is the registration table associations on the operating system desktop;
Computer icon as shortcut points to unknown executable file;
Computer icon as shortcut points to specific hot key;
Computer icon as shortcut has and similar title of predefined shortcut icon and/or profile, but the executive mode of pointing to has parameter.
6. the method for claim 1; Wherein said according to analysis result, confirm to exist the computer icon of potential safety problem and the step of corresponding danger classes to comprise: the computer icon that will have one of following characteristic is confirmed as and is had potential safety problem and have second danger classes:
Computer icon as shortcut points to the HTML type file that has redirect;
The file attribute of the file that computer icon is related is set to hide;
The related file of computer icon can't normally be deleted;
Computer icon is to create behind the predefined time point;
The class sign CLSID related as the computer icon of shortcut can't discern, and related with registration table;
Computer icon as shortcut points to browser program;
The file that points to as the computer icon of shortcut has the title that surpasses predefined length.
7. like claim 5 or 6 described methods, the computer icon that wherein has first danger classes is compared with the computer icon with second danger classes and is existed the possibility of safety problem bigger, is to remove this computer icon to its suggestion for operation.
8. method as claimed in claim 7; Wherein said on said computer icon the mark danger classes step in; Mark " danger " on computer icon with first danger classes, mark " suspicious " on computer icon with second danger classes.
9. device (200) that is used to represent computer graphic target security attribute comprising:
Analysis module (201) is used for pairing file of anacom icon or function;
Danger classes is confirmed and labeling module (203), is used for according to analysis result, confirms to exist the computer icon and the corresponding danger classes of potential safety problem, and on said computer icon, marks danger classes; And
First representation module (205) is used for when cursor rests on the said computer graphic that has a potential safety problem and puts on, representing said computer graphic target analysis result and corresponding suggestion for operation.
10. device as claimed in claim 9; Also comprise: second representation module (207); Be used for when cursor rests on the said computer graphic that has a potential safety problem and puts on; The attribute information of also representing pairing file of said computer icon or function, said attribute information comprise title, description, position, type, size, creation-time, modification time, in the access time one or more.
11. like claim 9 or 10 described devices, wherein said first representation module (205) and said second representation module (207) are represented through the display device of electronic equipment and/or are represented through the audio output device of electronic equipment.
12. device as claimed in claim 9; Wherein said danger classes is confirmed to inquire about based on cloud with labeling module (203) or based on predefined database, confirm to exist the computer icon and the corresponding danger classes of potential safety problem according to analysis result.
13. device as claimed in claim 9, wherein said danger classes are confirmed that the computer icon that will have one of following characteristic with labeling module (203) is confirmed as and are had potential safety problem and have first danger classes:
The file that points to as the computer icon of shortcut does not exist;
Point to the file of UNKNOWN TYPE as the computer icon of shortcut;
Computer icon as shortcut points to other shortcut;
Computer icon as shortcut points to script file;
Computer icon as shortcut points to network address;
Computer icon as shortcut points to the executable file with predefined dangerous characteristic;
The icon of the file that points to as the computer icon of shortcut is not a system default;
Computer icon as shortcut does not point to any file;
The file that computer icon is related or have predefined specific properties as the file that the computer icon of shortcut points to;
The related file of computer icon can not be by normal deletion;
The file corruption of pointing to as the computer icon of shortcut;
Computer icon as shortcut points to unknown path;
Computer icon as shortcut has and similar title of predefined shortcut icon and/or profile, but the file that points to is different with the file of said predefined shortcut sensing;
The file that points to as the computer icon of shortcut has and title like the predefined files classes/or icon, but the file that points to not is said predefined file;
Computer icon is the registration table associations on the operating system desktop;
Computer icon as shortcut points to unknown executable file;
Computer icon as shortcut points to specific hot key;
Computer icon as shortcut has and similar title of predefined shortcut icon and/or profile, but the executive mode of pointing to has parameter.
14. device as claimed in claim 9, wherein said danger classes are confirmed that the computer icon that will have one of following characteristic with labeling module (203) is confirmed as and are had potential safety problem and have second danger classes:
Computer icon as shortcut points to the HTML type file that has redirect;
The file attribute of the file that computer icon is related is set to hide;
The related file of computer icon can't normally be deleted;
Computer icon is to create behind the predefined time point;
The class sign CLSID related as the computer icon of shortcut can't discern, and related with registration table;
Computer icon as shortcut points to browser program;
The file that points to as the computer icon of shortcut has the title that surpasses predefined length.
15. like claim 13 or 14 described devices, the computer icon that wherein has first danger classes is compared with the computer icon with second danger classes and is existed the possibility of safety problem bigger, is to remove this computer icon to its suggestion for operation.
16. device as claimed in claim 15, wherein said danger classes are confirmed on the computer icon with first danger classes, to mark " danger " with labeling module (203), mark " suspicious " on the computer icon with second danger classes.
CN201210323408.3A 2012-09-04 2012-09-04 A kind of method and apparatus for representing computer graphic target security attribute Active CN102831351B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210323408.3A CN102831351B (en) 2012-09-04 2012-09-04 A kind of method and apparatus for representing computer graphic target security attribute

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210323408.3A CN102831351B (en) 2012-09-04 2012-09-04 A kind of method and apparatus for representing computer graphic target security attribute

Publications (2)

Publication Number Publication Date
CN102831351A true CN102831351A (en) 2012-12-19
CN102831351B CN102831351B (en) 2015-08-05

Family

ID=47334484

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210323408.3A Active CN102831351B (en) 2012-09-04 2012-09-04 A kind of method and apparatus for representing computer graphic target security attribute

Country Status (1)

Country Link
CN (1) CN102831351B (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103412707A (en) * 2013-07-29 2013-11-27 北京小米科技有限责任公司 Displaying method, device and equipment for display frame
CN103942043A (en) * 2014-03-17 2014-07-23 可牛网络技术(北京)有限公司 Method and device for managing mobile terminal desktop icons
CN104462442A (en) * 2014-12-15 2015-03-25 北京奇虎科技有限公司 Page link safety prompting method and device
CN105373728A (en) * 2014-09-01 2016-03-02 深圳富泰宏精密工业有限公司 Advertisement prompting system and method
CN105630877A (en) * 2015-12-17 2016-06-01 北京奇虎科技有限公司 File cleaning method and system
CN105956471A (en) * 2016-05-05 2016-09-21 北京金山安全软件有限公司 Desktop icon detection method and device
CN106325844A (en) * 2015-06-30 2017-01-11 联想(北京)有限公司 Information processing method and electronic device
JP6069685B1 (en) * 2016-02-05 2017-02-01 株式会社ラック Icon display device, icon display method and program
CN109033868A (en) * 2018-06-29 2018-12-18 北京奇虎科技有限公司 A kind of management method and device of movable storage device file
CN113505099A (en) * 2021-05-11 2021-10-15 深圳软牛科技有限公司 File hiding method, device, equipment and storage medium of Windows system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6931597B1 (en) * 2002-04-17 2005-08-16 Pss Systems, Inc. Indications of secured digital assets
CN101419546A (en) * 2007-10-26 2009-04-29 英业达股份有限公司 Graphic user interface speech prompting system and method
CN102541527A (en) * 2010-12-17 2012-07-04 深圳市金蝶中间件有限公司 Hovering prompting system and method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6931597B1 (en) * 2002-04-17 2005-08-16 Pss Systems, Inc. Indications of secured digital assets
CN101419546A (en) * 2007-10-26 2009-04-29 英业达股份有限公司 Graphic user interface speech prompting system and method
CN102541527A (en) * 2010-12-17 2012-07-04 深圳市金蝶中间件有限公司 Hovering prompting system and method

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103412707A (en) * 2013-07-29 2013-11-27 北京小米科技有限责任公司 Displaying method, device and equipment for display frame
WO2015014138A1 (en) * 2013-07-29 2015-02-05 小米科技有限责任公司 Method, device, and equipment for displaying display frame
CN103412707B (en) * 2013-07-29 2017-10-27 小米科技有限责任公司 Method, device and equipment that a kind of display box is shown
CN103942043A (en) * 2014-03-17 2014-07-23 可牛网络技术(北京)有限公司 Method and device for managing mobile terminal desktop icons
CN103942043B (en) * 2014-03-17 2017-11-07 可牛网络技术(北京)有限公司 A kind of method and device for managing mobile terminal desktop icon
CN105373728A (en) * 2014-09-01 2016-03-02 深圳富泰宏精密工业有限公司 Advertisement prompting system and method
CN104462442A (en) * 2014-12-15 2015-03-25 北京奇虎科技有限公司 Page link safety prompting method and device
CN106325844A (en) * 2015-06-30 2017-01-11 联想(北京)有限公司 Information processing method and electronic device
CN105630877A (en) * 2015-12-17 2016-06-01 北京奇虎科技有限公司 File cleaning method and system
WO2017135233A1 (en) * 2016-02-05 2017-08-10 株式会社ラック Icon display device, icon display method and program
JP6069685B1 (en) * 2016-02-05 2017-02-01 株式会社ラック Icon display device, icon display method and program
CN105956471A (en) * 2016-05-05 2016-09-21 北京金山安全软件有限公司 Desktop icon detection method and device
CN109033868A (en) * 2018-06-29 2018-12-18 北京奇虎科技有限公司 A kind of management method and device of movable storage device file
CN113505099A (en) * 2021-05-11 2021-10-15 深圳软牛科技有限公司 File hiding method, device, equipment and storage medium of Windows system

Also Published As

Publication number Publication date
CN102831351B (en) 2015-08-05

Similar Documents

Publication Publication Date Title
CN102831351A (en) Method and device for indicating security attribute of computer icons
US9058105B2 (en) Automated adjustment of input configuration
US9135445B2 (en) Providing information about a web application or extension offered by website based on information about the application or extension gathered from a trusted site
CN103164654B (en) A kind of method carrying out information alert in pop-up and user interface display device
US20110022955A1 (en) Mashup Application Processing System
KR102095069B1 (en) Extension activation for related documents
CN102867147B (en) A kind of method and apparatus of file scan
EP2810149B1 (en) Intelligent prioritization of activated extensions
CN103080873A (en) Extension framework for input method editor
KR20140094540A (en) Cross window animation
CN109388468B (en) Multi-program window management method and device
CN103678487A (en) Method and device for generating web page snapshot
CN103179125A (en) Display method of website authentication information and browser
US20150242474A1 (en) Inline and context aware query box
CN111385633A (en) Resource searching method based on voice, intelligent terminal and storage medium
CN105183724A (en) Translation method and electronic device
CN103324438A (en) Electronic equipment, and page turning method and page turning device for browser
US10824306B2 (en) Presenting captured data
CN104182229A (en) Callback display method and device and callback method and device
US20140372936A1 (en) Method and apparatus for displaying tag data
CN102819717A (en) Method and device for carrying out protection processing on file
US10078412B2 (en) GUI configuration based on a user selected event
CN105242848A (en) Method for translating texts on web page and electronic device
US20120124091A1 (en) Application file system access
CN104077390A (en) Search display method and device based on browsers and electronic device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20220708

Address after: Room 801, 8th floor, No. 104, floors 1-19, building 2, yard 6, Jiuxianqiao Road, Chaoyang District, Beijing 100015

Patentee after: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Patentee before: Qizhi software (Beijing) Co., Ltd

TR01 Transfer of patent right