CN104598812A - Webpage browsing method and device in sandbox - Google Patents

Webpage browsing method and device in sandbox Download PDF

Info

Publication number
CN104598812A
CN104598812A CN201510053350.9A CN201510053350A CN104598812A CN 104598812 A CN104598812 A CN 104598812A CN 201510053350 A CN201510053350 A CN 201510053350A CN 104598812 A CN104598812 A CN 104598812A
Authority
CN
China
Prior art keywords
sandbox
browser
run
event
browser page
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510053350.9A
Other languages
Chinese (zh)
Other versions
CN104598812B (en
Inventor
孙晓俊
肖鹏
朱翼鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
360 Digital Security Technology Group Co Ltd
Original Assignee
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qizhi Software Beijing Co Ltd filed Critical Qizhi Software Beijing Co Ltd
Priority to CN201510053350.9A priority Critical patent/CN104598812B/en
Priority claimed from CN201110448835.XA external-priority patent/CN102592086B/en
Publication of CN104598812A publication Critical patent/CN104598812A/en
Application granted granted Critical
Publication of CN104598812B publication Critical patent/CN104598812B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment

Abstract

The invention discloses a webpage browsing method and device in a sandbox. The webpage browsing method comprises the following steps: operating a browser process or a browser webpage process in the sandbox; monitoring the browser process or the browser webpage process operating in the sand box; when the browser process or the browser webpage process operating in the sandbox generates an event of calling the process, operating the called process in the sandbox, wherein the sandbox is the sandbox where the browser process or the browser webpage process is located. According to the webpage browsing method and device disclosed by the invention, the safety can be ensured more effectively when a sandbox technology and a browser technology are combined for safety protection.

Description

Web-page approach and device is browsed in sandbox
Technical field
The present invention relates to secure browser technical field, particularly relate to and browse web-page approach and device in sandbox.
Background technology
Along with the development of computer network is with universal, the problem of network security aspect also becomes increasingly conspicuous, and no matter when load code on STA and perform in this locality, safety is all vital problem.Such as, click a link and can start the application program that is browsed webpage.During an access webpage, all Applet (adopting the program based on HTML that Java creates) wherein also can automatically start.If click a link again, or during an access webpage, the machine of user can install arbitrary code, so offender just may eavesdrop confidential information, reading financial data or adapter subscriber set at this moment to send advertisement etc.
In order to solve this problem, except using except the instruments such as traditional antivirus software protect, sandbox technology can also combine with browser technology by prior art, thus realizes the security fence browsed in webpage process.So-called sandbox technology is exactly for user provides the virtual execution environment of a safety (being equivalent to the copy of system environments), the any apocrypha opened in sandbox, it is all directed the operation of hard disk and system registry and is assigned in temporary folder, modifies to system copy.Like this, even if file is with the rogue program such as trojan horse, ad plug-in, be also be limited in virtual environment, real computer system can not be affected, and, along with the disappearance of sandbox, the apocrypha that ran also can automatically remove, therefore computer also would not be poisoning.
But the present inventor is realizing finding in process of the present invention, prior art sandbox technology is combined with browser technology carry out security fence time, in the process browsing webpage, still may there is the situation of being attacked by rogue program.
Summary of the invention
The invention provides and browse web-page approach and device in sandbox, sandbox technology is combined with browser technology carry out security fence time, more effectively can ensure security.
The invention provides following scheme:
In sandbox, browse a method for webpage, comprising:
Browser process or browser page process are put into sandbox run;
The browser process run in sandbox or browser page process are monitored;
When the browser process run in described sandbox or browser page process produce the event of calling process, invoked process is put into sandbox and runs, the sandbox at this sandbox and described browser process or browser page process place is same sandbox.
Wherein, described invoked process comprises downloading process, described invoked process is put into sandbox run comprise:
The download event that browser process in seizure sandbox or browser page process produce;
File storing path corresponding for this download event is redirected in the catalogue of specifying in sandbox.
Wherein, described invoked process comprises installation file process, described invoked process is put into sandbox run comprise:
The installation file event that browser process in seizure sandbox or browser page process produce;
File installation path corresponding for this Installation Events is redirected in the catalogue of specifying in sandbox.
Wherein, described browser process to running in sandbox or browser page process are carried out monitoring and are comprised:
By monitoring the interface function of browser process or the browser page process transfer run in sandbox, the browser process in described sandbox or browser page process are monitored.
Wherein, when described browser process when running in described sandbox or browser page process producing the event of calling process, called process being put into sandbox and running and comprise:
When the browser process run in described sandbox or browser page process produce the event of calling process, judge whether the event of this calling process is that the script automatically run in webpage produces;
If so, then invoked process is put in sandbox and run.
In sandbox, browse a device for webpage, comprising:
Browser process puts into unit, runs for browser process or browser page process are put into sandbox;
Monitoring unit, for monitoring the browser process run in sandbox or browser page process;
Called process puts into unit, for when the browser process run in described sandbox or browser page process produce the event of calling process, invoked process is put into sandbox run, the sandbox at this sandbox and described browser process or browser page process place is same sandbox.
Wherein, described invoked process comprises downloading process, and described called process is put into unit and comprised:
First event capture subelement, for catching the download event that browser process in sandbox or browser page process produce;
First is redirected subelement, for being redirected in the catalogue of specifying in sandbox by file storing path corresponding for this download event.
Wherein, described invoked process comprises installation file process, and described called process is put into unit and comprised:
Second event catches subelement, for catching the installation file event that browser process in sandbox or browser page process produce;
Second is redirected subelement, for being redirected in the catalogue of specifying in sandbox by file installation path corresponding for this Installation Events.
Wherein, described monitoring unit specifically for:
By monitoring the interface function of browser process or the browser page process transfer run in sandbox, the browser process in described sandbox or browser page process are monitored.
Wherein, described called process is put into unit and is comprised:
Judgment sub-unit, for when the browser process run in described sandbox or browser page process produce the event of calling process, judges whether the event of this calling process is that the script automatically run in webpage produces;
Put into subelement, if be yes for the judged result of described judgment sub-unit, then described invoked process put in sandbox and run.
According to specific embodiment provided by the invention, invention achieves following technique effect:
Pass through the present invention, when browsing webpage in sandbox, not only browser process or browser page process can be put in sandbox and run, and, process browser process or browser page process can also called in operational process, also put in sandbox and run, thus sandbox technology is combined with browser technology carry out security fence time, more effectively ensure security.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, be briefly described to the accompanying drawing used required in embodiment below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is the process flow diagram of the method that the embodiment of the present invention provides;
Fig. 2 is the schematic diagram of the device that the embodiment of the present invention provides.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, the every other embodiment that those of ordinary skill in the art obtain, all belongs to the scope of protection of the invention.
First it should be noted that, the present inventor is realizing finding in process of the present invention, why there will be in prior art and " sandbox technology is combined with browser technology when carrying out security fence, still the situation of being attacked by rogue program is there is " in the process browsing webpage, because what case is browser process only put in and run by prior art, and other processes relevant to browser process (such as downloading) are still run outward at sandbox, like this, if browser process needs to call downloading process, downloading process will be carried out outside sandbox, also be, the file downloaded to can be kept at this locality, now, call if this downloading process is the download event automatically produced by the script run in webpage, then the file that this download event is corresponding is likely just a unsafe file, like this, just causes the situation attacked by rogue program.
Based on above-mentioned consideration, embodiments provide a kind of method browsing webpage in sandbox, see Fig. 1, the method comprises:
S101: browser process or browser page process are put into sandbox and runs;
During specific implementation, when browser starts, automatically browser process can be put in sandbox and runs; Or, also can, after browser starts, when user manually boots the operation entering sandbox, then browser be carried out putting in sandbox; Moreover, if browser possesses the function identifying that whether webpage is safe, then, when can also work as the dangerous webpage of discovery or link, automatically browser process is put in sandbox and run, etc.
In addition, when specific implementation, simply whole browser process all can be put in sandbox and run.Or, also only browser page process can be put into sandbox, and the framework process of browser is stayed sandbox run outward.For the latter, owing to providing the framework process of user operation part to operate in outside sandbox, not by the drawbacks limit of sandbox, therefore, the operating result (such as carrying out web site collection or change browser arranging) of user can be kept at this locality; Meanwhile, browser process runs in sandbox, and the result of web page access is stored in the temp directory of sandbox, and the rogue program in webpage operates in the virtual environment of sandbox, therefore, can not destroy the real system of user, thus ensure that the security of browser.In a word, both can ensure the convenience of user operation, also can meet the security requirement of web page access.
Therefore, in embodiments of the present invention, the process in sandbox can be complete browser process, or, also can be the page process of browser.
S102: the browser process run in sandbox or browser page process are monitored;
After browser process or browser page process are put into sandbox, will monitor browser process or browser page process, judge whether browser process or browser page process create the event calling certain associated process, such as, download event, running paper event, file Installation Events etc. is comprised.It should be noted that, when browser process produces certain event, corresponding interface function can be called (such as, " download file " interface that download event is corresponding etc.), therefore, call situation by what monitor these interface functions, just can judge whether create corresponding event, create which kind of event, and be whether this event that browser process in sandbox or browser page process produce.
S103: when the browser process run in described sandbox or browser page process produce the event of calling process, the described process called is put into sandbox and runs, to complete browsing webpage.It should be noted that, in actual applications, multiple sandbox may be there is, and for the consideration of security, normally do not allow between different sandbox to intercom mutually, therefore, when saying that invoked process puts into sandbox, ensure that the sandbox at the sandbox that this invoked process is placed into and browser process or browser page process place is same sandbox.
If the browser process monitored in sandbox or browser page process need to call certain associated process, then this associated process is also put in sandbox and run, thus guarantee the security in navigation process.Such as, in the webpage browsed, there is a video, and if this video will be play, need first to download and just passable after installing a plug-in unit, now, the browser process in sandbox or browser page process just may produce a series of event.As, first may detect that browser process in sandbox or browser page process create the event of download plug-in, need to call downloading process, now, just downloading process can be put in sandbox and run, also be, when capturing this download event, the download path of file is redirected in the catalogue that in sandbox, is specified, thus file is kept in sandbox, and can not the local file of reality be had an impact; After downloading completes, can also monitor the operation conditions of file, carry out writing the events such as registry entry if produced, it may be then the operation needing to perform installation file, now, also the process of installation file can be put in sandbox and carry out, thus the operation of edit the registry is also limited within sandbox, can not have an impact to the registration table of reality.And then the security browsed in webpage process is protected, meanwhile, also can make video in webpage can normal play, ensure that the realization of browser basic function.
It should be noted that, in actual applications, may not be that the event calling all processes all exists unsafe factor, therefore, before determining whether to need invoked process to put in sandbox and running, first can also judge, if really may unsafe factor be there is, more invoked process is put in sandbox run.Such as, browse in the process of webpage at use browser, some event may be the instruction manually occurred by user, such as, download button in webpage clicking downloads certain file, or manual installation plug-in unit etc., then can be considered as the confirmation that this operation have passed through user, its security is relatively high; Such as, but also have some events to be automatically produced by some scripts inserted in webpage, automatically download and install certain file etc., the security of this situation will be very low.Visible, the source that can produce according to event, judges the security of event.Also be, when producing the event of certain calling process, first can judge that this event manually clicks generation by user, or produced by the script automatically run in webpage, if the former, then invoked process can not put in sandbox and run, and if the latter, then need invoked process to put in sandbox to run.
The benefit done like this is, for the event that the script automatically run in webpage produces, because its level of security is lower, therefore, can by corresponding performance constraint in sandbox, after browser program exits, sandbox can delete these temporary files, avoids impacting local file.And for the manual operation of user, because its level of security is relatively high, since and be the operation of user, then its wish may will be kept at this locality to by certain file exactly, or the registry entry of this locality is modified etc., therefore, also can meet the wish of user, avoid causing user to want the file preserved to preserve, or want the setting carried out successfully cannot wait the generation of phenomenon.
Wherein, judging that the event calling associated process is produced by user's manual operation, or when being produced by the script automatically run in webpage, multiple implementation can had.Such as; due to if user's manual operation produce event; then usually can be attended by and click the mouse or the outside input operation such as keyboard; and if the script that automatically runs of webpage, then do not have outside input operation, but directly produce relevant event by internal command; therefore; just whether can be attended by outside input operation according to the generation of event, distinguishing is the event that user's manual operation produces, or the event that the script automatically run in webpage produces.In addition, can also judge by other means, repeat no more here.
In a word, in embodiments of the present invention, when browsing webpage in sandbox, not only browser process or browser page process can be put in sandbox and run, and process browser process or browser page process can also called in operational process, also puts in sandbox and runs, thus sandbox technology is combined with browser technology carry out security fence time, more effectively ensure security.
Corresponding with the method browsing webpage in sandbox that the embodiment of the present invention provides, the embodiment of the present invention additionally provides a kind of device browsing webpage in sandbox, and see Fig. 2, this device comprises:
Browser process puts into unit 201, runs for browser process or browser page process are put into sandbox;
Monitoring unit 202, for monitoring the browser process run in sandbox or browser page process;
Called process puts into unit 203, for when the browser process run in described sandbox or browser page process produce the event of calling process, invoked process is put into sandbox and runs, to complete browsing webpage.
During specific implementation, invoked process can comprise downloading process, and accordingly, called process is put into unit 203 and can be comprised:
First event capture subelement, for catching the download event that browser process in sandbox or browser page process produce;
First is redirected subelement, for being redirected in the catalogue of specifying in sandbox by file storing path corresponding for this download event.
Or described invoked process can also comprise installation file process, accordingly, called process is put into unit 203 and can be comprised:
Second event catches subelement, for catching the installation file event that browser process in sandbox or browser page process produce;
Second is redirected subelement, for being redirected in the catalogue of specifying in sandbox by file installation path corresponding for this Installation Events.
In actual applications, monitoring unit 202 specifically may be used for:
By monitoring the interface function of browser process or the browser page process transfer run in sandbox, the browser process in described sandbox or browser page process are monitored.
In order to realize the basic function of browser better, called process is put into unit 203 and specifically can be comprised:
Judgment sub-unit, for when the browser process run in described sandbox or browser page process produce the event of calling process, judges whether the event of this calling process is that the script automatically run in webpage produces;
Put into subelement, if be yes for the judged result of described judgment sub-unit, then described associated process put in sandbox and run.
In a word, by the device browsing webpage in sandbox that the embodiment of the present invention provides, when browsing webpage in sandbox, not only browser process or browser page process can be put in sandbox and run, and process browser process or browser page process can also called in operational process, also puts in sandbox and runs, thus sandbox technology is combined with browser technology carry out security fence time, more effectively ensure security.
As seen through the above description of the embodiments, those skilled in the art can be well understood to the mode that the present invention can add required general hardware platform by software and realizes.Based on such understanding, technical scheme of the present invention can embody with the form of software product the part that prior art contributes in essence in other words, this computer software product can be stored in storage medium, as ROM/RAM, magnetic disc, CD etc., comprising some instructions in order to make a computer equipment (can be personal computer, server, or the network equipment etc.) perform the method described in some part of each embodiment of the present invention or embodiment.
Each embodiment in this instructions all adopts the mode of going forward one by one to describe, between each embodiment identical similar part mutually see, what each embodiment stressed is the difference with other embodiments.Especially, for device or system embodiment, because it is substantially similar to embodiment of the method, so describe fairly simple, relevant part illustrates see the part of embodiment of the method.Apparatus and system embodiment described above is only schematic, the wherein said unit illustrated as separating component or can may not be and physically separates, parts as unit display can be or may not be physical location, namely can be positioned at a place, or also can be distributed in multiple network element.Some or all of module wherein can be selected according to the actual needs to realize the object of the present embodiment scheme.Those of ordinary skill in the art, when not paying creative work, are namely appreciated that and implement.
In sandbox, web-page approach and device is browsed above to provided by the present invention, be described in detail, apply specific case herein to set forth principle of the present invention and embodiment, the explanation of above embodiment just understands method of the present invention and core concept thereof for helping; Meanwhile, for one of ordinary skill in the art, according to thought of the present invention, all will change in specific embodiments and applications.In sum, this description should not be construed as limitation of the present invention.

Claims (10)

1. in sandbox, browse a method for webpage, it is characterized in that, comprising:
Browser process or browser page process are put into sandbox run;
The browser process run in sandbox or browser page process are monitored;
When the browser process run in described sandbox or browser page process produce the event of calling process, invoked process is put into sandbox and runs, the sandbox at this sandbox and described browser process or browser page process place is same sandbox.
2. method according to claim 1, is characterized in that, described invoked process comprises downloading process, described invoked process is put into sandbox run comprise:
The download event that browser process in seizure sandbox or browser page process produce;
File storing path corresponding for this download event is redirected in the catalogue of specifying in sandbox.
3. method according to claim 1, is characterized in that, described invoked process comprises installation file process, described invoked process is put into sandbox run comprise:
The installation file event that browser process in seizure sandbox or browser page process produce;
File installation path corresponding for this Installation Events is redirected in the catalogue of specifying in sandbox.
4. the method according to any one of claims 1 to 3, is characterized in that, described browser process to running in sandbox or browser page process are carried out monitoring and comprised:
By monitoring the interface function of browser process or the browser page process transfer run in sandbox, the browser process in described sandbox or browser page process are monitored.
5. the method according to any one of claims 1 to 3, is characterized in that, when described browser process when running in described sandbox or browser page process producing the event of calling process, called process being put into sandbox and running and comprise:
When the browser process run in described sandbox or browser page process produce the event of calling process, judge whether the event of this calling process is that the script automatically run in webpage produces;
If so, then invoked process is put in sandbox and run.
6. in sandbox, browse a device for webpage, it is characterized in that, comprising:
Browser process puts into unit, runs for browser process or browser page process are put into sandbox;
Monitoring unit, for monitoring the browser process run in sandbox or browser page process;
Called process puts into unit, for when the browser process run in described sandbox or browser page process produce the event of calling process, invoked process is put into sandbox run, the sandbox at this sandbox and described browser process or browser page process place is same sandbox.
7. device according to claim 6, is characterized in that, described invoked process comprises downloading process, and described called process is put into unit and comprised:
First event capture subelement, for catching the download event that browser process in sandbox or browser page process produce;
First is redirected subelement, for being redirected in the catalogue of specifying in sandbox by file storing path corresponding for this download event.
8. device according to claim 6, is characterized in that, described invoked process comprises installation file process, and described called process is put into unit and comprised:
Second event catches subelement, for catching the installation file event that browser process in sandbox or browser page process produce;
Second is redirected subelement, for being redirected in the catalogue of specifying in sandbox by file installation path corresponding for this Installation Events.
9. the device according to any one of claim 6 to 8, is characterized in that, described monitoring unit specifically for:
By monitoring the interface function of browser process or the browser page process transfer run in sandbox, the browser process in described sandbox or browser page process are monitored.
10. the device according to any one of claim 6 to 8, is characterized in that, described called process is put into unit and comprised:
Judgment sub-unit, for when the browser process run in described sandbox or browser page process produce the event of calling process, judges whether the event of this calling process is that the script automatically run in webpage produces;
Put into subelement, if be yes for the judged result of described judgment sub-unit, then described invoked process put in sandbox and run.
CN201510053350.9A 2011-12-28 2011-12-28 Web-page approach and device are browsed in sandbox Active CN104598812B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510053350.9A CN104598812B (en) 2011-12-28 2011-12-28 Web-page approach and device are browsed in sandbox

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201110448835.XA CN102592086B (en) 2011-12-28 2011-12-28 Method and device for browsing webpages in sandbox
CN201510053350.9A CN104598812B (en) 2011-12-28 2011-12-28 Web-page approach and device are browsed in sandbox

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201110448835.XA Division CN102592086B (en) 2011-12-28 2011-12-28 Method and device for browsing webpages in sandbox

Publications (2)

Publication Number Publication Date
CN104598812A true CN104598812A (en) 2015-05-06
CN104598812B CN104598812B (en) 2017-11-21

Family

ID=53124590

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510053350.9A Active CN104598812B (en) 2011-12-28 2011-12-28 Web-page approach and device are browsed in sandbox

Country Status (1)

Country Link
CN (1) CN104598812B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106777183A (en) * 2016-12-23 2017-05-31 中国银联股份有限公司 File synchronisation method and device between Virtual File System and real file system
CN107506641A (en) * 2017-09-30 2017-12-22 北京奇虎科技有限公司 Sandbox management method and device, computing device, storage medium
CN109558217A (en) * 2018-12-19 2019-04-02 北京恒泰实达科技股份有限公司 Data processing script program operation method and data processing container
CN113641923A (en) * 2021-08-26 2021-11-12 挂号网(杭州)科技有限公司 Access page generation method and device, electronic equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5974549A (en) * 1997-03-27 1999-10-26 Soliton Ltd. Security monitor
US20070136579A1 (en) * 2005-12-09 2007-06-14 University Of Washington Web browser operating system
CN101739412A (en) * 2008-11-18 2010-06-16 爱思开电讯投资(中国)有限公司 Web page safety evaluating device and web page safety evaluating method for intelligent card
CN102254111A (en) * 2010-05-17 2011-11-23 北京知道创宇信息技术有限公司 Malicious site detection method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5974549A (en) * 1997-03-27 1999-10-26 Soliton Ltd. Security monitor
US20070136579A1 (en) * 2005-12-09 2007-06-14 University Of Washington Web browser operating system
CN101739412A (en) * 2008-11-18 2010-06-16 爱思开电讯投资(中国)有限公司 Web page safety evaluating device and web page safety evaluating method for intelligent card
CN102254111A (en) * 2010-05-17 2011-11-23 北京知道创宇信息技术有限公司 Malicious site detection method and device

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106777183A (en) * 2016-12-23 2017-05-31 中国银联股份有限公司 File synchronisation method and device between Virtual File System and real file system
CN107506641A (en) * 2017-09-30 2017-12-22 北京奇虎科技有限公司 Sandbox management method and device, computing device, storage medium
CN109558217A (en) * 2018-12-19 2019-04-02 北京恒泰实达科技股份有限公司 Data processing script program operation method and data processing container
CN109558217B (en) * 2018-12-19 2020-08-04 北京恒泰实达科技股份有限公司 Data processing script program running method and data processing container
CN113641923A (en) * 2021-08-26 2021-11-12 挂号网(杭州)科技有限公司 Access page generation method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN104598812B (en) 2017-11-21

Similar Documents

Publication Publication Date Title
CN102592086B (en) Method and device for browsing webpages in sandbox
CN102436507B (en) Method and device for browsing web pages
CN102436508B (en) Method and device for browsing webpage based on sandbox technique
AU2005237120B2 (en) Computer security management, such as in a virtual machine or hardened operating system
CN101213557B (en) Anti-hack protection to restrict installation of operating systems and other software
US20130160126A1 (en) Malware remediation system and method for modern applications
WO2013170064A2 (en) Methods and apparatus for identifying and removing malicious applications
US10599834B1 (en) Detecting malicious code existing in internet advertisements
WO2007120954A2 (en) File origin determination
CN102737188A (en) Method and device for detecting malicious webpage
WO2016019893A1 (en) Application installation method and apparatus
US20140283078A1 (en) Scanning and filtering of hosted content
US20130074160A1 (en) Method of controlling information processing system, computer-readable recording medium storing program for controlling apparatus
CN104598812A (en) Webpage browsing method and device in sandbox
CN103345603B (en) The method and device of webpage is browsed based on sandbox technology
CN101950339B (en) Security protection method and system of computer
KR20090031393A (en) Web shell monitoring system and method based on pattern detection
KR101500512B1 (en) Device and method for securing computer
EP2754082B1 (en) Content handling for applications
Pecka et al. Privilege escalation attack scenarios on the devops pipeline within a kubernetes environment
CN102156650A (en) Method and device capable of implementing automatic analysis of patch
Pan et al. Advertisement removal of Android applications by reverse engineering
CN104021167A (en) Method and device for browsing webpage
CN104239112A (en) Device driver installation method and device
CN104021168A (en) Method and device for browsing webpage

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: 100015 rooms 301-306, 2 / F and 3 / F, block B, building 2, yard 6, Jiuxianqiao Road, Chaoyang District, Beijing

Patentee after: Beijing Qizhi Business Consulting Co.,Ltd.

Address before: 100015 rooms 301-306, 2 / F and 3 / F, block B, building 2, yard 6, Jiuxianqiao Road, Chaoyang District, Beijing

Patentee before: Qizhi software (Beijing) Co.,Ltd.

CP01 Change in the name or title of a patent holder
TR01 Transfer of patent right

Effective date of registration: 20220216

Address after: Room 801, 8th floor, No. 104, floors 1-19, building 2, yard 6, Jiuxianqiao Road, Chaoyang District, Beijing 100015

Patentee after: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Address before: 100015 rooms 301-306, 2 / F and 3 / F, block B, building 2, yard 6, Jiuxianqiao Road, Chaoyang District, Beijing

Patentee before: Beijing Qizhi Business Consulting Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220324

Address after: 100016 1773, 15 / F, 17 / F, building 3, No.10, Jiuxianqiao Road, Chaoyang District, Beijing

Patentee after: Sanliu0 Digital Security Technology Group Co.,Ltd.

Address before: Room 801, 8th floor, No. 104, floors 1-19, building 2, yard 6, Jiuxianqiao Road, Chaoyang District, Beijing 100015

Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

TR01 Transfer of patent right