Information processing method and electronic device

ABSTRACT

An information processing method is described that is applied to an electronic device capable of running an application. The method includes inserting a first execution module into a target process of the application for triggering a detection for network connection safety; the first execution module acquiring a first network connection from the target process and invoking a second execution module; the second execution module validating safety of the first network connection and feeding back a second network connection, the second network connection is a safe connection corresponding to the same content as the first network connection; the target process acquiring the second network connection. An electronic device corresponding thereto is also disclosed.

This application claims priority to Chinese patent application No.201410468922.5 filed on Sep. 15, 2014 the entire contents of which areincorporated herein by reference.

BACKGROUND

The present disclosure relates to the field of electronic technology,and particularly to an information processing method and an electronicdevice.

With a development of Internet technology and an increasing populationof electronic devices such as a cell phone, a computer, a tablet, or thelike, the life style of the human being has been changed a lot.

In the related art, there are more and more applications for surfing onInternet in the electronic device, such as the browser, the chatsoftware, the game software or the like. Such software is applied widelyin the human life. For example, if a user wants to open a webpagethrough the browser, the browser will transmit a link request for thewebpage to a server side when the user opens the webpage. After theserver side receives the link request transmitted from the browser, theuser can open the corresponding webpage.

The inventors of the present application have found at least thefollowing technical problems in the related art when implementing thetechnical solutions of the embodiments of the present disclosure.

In the related art, when it is required to open the webpage through thebrowser, the browser will transmit a link request for the webpage to theserver side. However, in practice, the link request may not be safe.There may be the malicious code, the virus, the Trojan or the like. Thesystem of the cell phone may be attacked, resulting in that the systemis broken down or even cannot run.

It can be seen that there is a technical problem of a poor safety whenthe electronic device is networked in the related art.

Due to the above technical problem, the electronic device cannot link toa desired webpage in time, and may be attacked by the malicious code,the virus or the Trojan, resulting in that the system of the cell phoneis broken down, which bothers the user a lot. Therefore, the electronicdevice in the related art has a problem of a poor user experience.

SUMMARY

An information processing method is provided in an embodiment of thepresent disclosure, which is applied to an electronic device capable ofrunning an application, the method including: inserting a firstexecution module into a target process corresponding to the application,for triggering a detection for network connection safety; the firstexecution module acquiring a first network connection from the targetprocess; the first execution module invoking a second execution module;the second execution module validating safety of the first networkconnection and feeding back a second network connection, the secondnetwork connection is a safe connection corresponding to the samecontent as the first network connection; and the target processacquiring the second network connection.

Optionally, the method further includes: storing a running state of thetarget process in a register of the electronic device, before insertingthe first execution module into the target process; and the targetprocess reading out the running state from the register after acquiringthe second network connection from the register.

Optionally, the method further includes: setting the second executionmodule before the first execution acquiring the first network connectionfrom the target process, so that the second execution module operativelyresponding to the invoking of the first execution module by replacing athird execution module, the third execution module is an originalinvoked module of the first execution module.

Optionally, the second execution module validating the safety of thefirst network connection and feeding back the second network connectionincludes: determining whether the first network connection is a safeconnection and obtaining a determination result; feeding back the firstnetwork connection to act as the second network connection if thedetermination result indicates that the first network connection is asafe connection; feeding back a third network connection to act as thesecond network connection if the determination result indicates that thefirst network connection is not a safe connection, the third networkconnection is a safe connection corresponding to the same content as thefirst network connection.

Optionally, the method further includes: generating and outputtingprompt information by the second execution module if the determinationresult indicates that the first network connection is not the safeconnection, the prompt information indicates that the first networkconnection is not safe.

In another aspect, an electronic device capable of running anapplication is provided in an embodiment of the present disclosure, theelectronic device includes: an inserting module operative to insert afirst execution module into a target process corresponding to theapplication, for triggering a detection for network connection safety;the first execution module is operative to acquire a first networkconnection from the target process, and to invoke a second executionmodule; the second execution module is operative to validate a safety ofthe first network connection and to feed back a second networkconnection, the second network connection is a safe connectioncorresponding to the same content as the first network connection; and aprocess management module operative to control the target process toacquire the second network connection.

Optionally, the electronic device further comprises a register; astorage module operative to store a running state of the target processin the register; and the process management module is further operativeto control the target process to read out the running state from theregister after acquiring the second network connection.

Optionally, the electronic device further includes: a setting moduleoperative to set the second execution module before the first executionmodule acquiring the first network connection from the target process,and to control the second execution module to respond to the invoking ofthe first execution module by replacing a third execution module, thethird execution module is an original invoked module of the firstexecution module.

Optionally, the second execution module is further operative to:determine whether the first network connection is a safe connection andobtain a determination result; feedback the first network connection toact as the second network connection, if the determination resultindicates that the first network connection is a safe connection; andfeedback a third network connection to act as the second networkconnection, if the determination result indicates that the first networkconnection is not a safe connection, the third network connection is asafe connection corresponding to the same content as the first networkconnection.

Optionally, the second execution module is further operative to generateand output prompt information if the determination result indicates thatthe first network connection is not a safe connection, the promptinformation indicating that the first network connection is not safe.

In still another aspect, a computer readable storage medium is providedin an embodiment of the present disclosure, which has stored thereincomputer program instructions which, when being executed by a processorof an electronic device, performs any one of the above method.

BRIEF DESCRIPTION OF THE DRAWINGS

In order to describe the embodiments of the present disclosure or thetechnical solutions in the related art more clearly, hereinafter, theaccompany drawings necessary to be used in the description of theembodiments will be introduced briefly. Apparently, the accompanydrawings in the following description are only some embodiments of thepresent disclosure.

FIG. 1 is an electronic device provided in an embodiment of the presentdisclosure.

FIG. 2 is a schematic flowchart of an information processing methodprovided in an embodiment of the present disclosure.

FIG. 3 is a schematic flowchart before a step S101 is performed providedin an embodiment of the present disclosure.

FIG. 4 is a schematic flowchart of a detailed implementation of a stepS104 provided in an embodiment of the present disclosure.

FIG. 5 is an electronic device provided in another embodiment of thepresent disclosure.

FIG. 6 is a schematic flowchart of an information processing methodprovided in another embodiment of the present disclosure.

FIG. 7 is a schematic flowchart of an information processing methodprovided in another embodiment of the present disclosure.

DETAILED DESCRIPTION

An information processing method and an electronic device are providedin embodiments of the present disclosure, in order to solve thetechnical problem of the poor safety when the electronic device isnetworked, so as to achieve the technical effect of improving thenetworking safety of the electronic device.

In order to solve the above technical problem, the general idea of thetechnical solution in the embodiments of the present disclosure is asfollows.

A first execution module for triggering a detection for networkconnection safety is inserted into a target process corresponding to theapplication, when the application is running.

A first network connection is acquired from the target process by thefirst execution module, when the first execution module is in a runningprocedure.

A second execution module is invoked by the first execution module.

A safety of the first network connection is validated and a secondnetwork connection is fed back by the second execution module, whereinthe second network connection is a safe connection, and the firstnetwork connection and the second network connection correspond to thesame content.

The second network connection is acquired by the target process.

In the above technical solution, since the technical solution in theembodiment of the present disclosure uses the second execution moduledifferent from the first execution module to validate the safety of thefirst network connection and to feed back the second network connectionwhich is a safe connection, and the first network connection and thesecond network connection correspond to the same content, the followingproblem will not occur. That is, in the related art, the sever wouldn'treplace the unsafe first network connection with a safe networkconnection when the first network connection transmitted by theelectronic device is not safe, which results in that the system of thecell phone is attacked, broken down or even cannot run. Therefore, withthe technical solution of the present disclosure, the attack to thesystem of the cell phone may be avoided, and the technical problem ofthe poor safety when the electronic device is networked in the relatedart can be solved effectively, and the technical effect of improving thesafety of the networking of the electronic device is realized.

In order to make the above technical solution better understood, thetechnical solution of the present disclosure will be described in detailby the accompany drawings and the detailed embodiments. It shouldunderstand that the embodiments and the specific features in theembodiments of the present disclosure are detailed description of thetechnical solution of the present disclosure, but not a limitation tothe technical solution of the present disclosure. The embodiments andthe technical features in the embodiments of the present disclosure maybe combined with each other without confliction.

First Embodiment

An information processing method is provided in an embodiment of thepresent disclosure, which is applied to an electronic device capable ofrunning an application. Referring to FIG. 1, the electronic device inthe embodiment of the present disclosure can run the application, andcomprises an inserting module 10 operative to insert a first executionmodule 30 for triggering a detection for network connection safety intoa target process 20 corresponding to the application, when theapplication is running; the first execution module 30 operative toacquire a first network connection from the target process 20, when thefirst execution module 30 is in a running procedure; the first executionmodule 30 further operative to invoke a second execution module 40; thesecond execution module 40 operative to validate a safety of the firstnetwork connection and to feed back a second network connection, whereinthe second network connection is a safe connection, and the firstnetwork connection and the second network connection correspond to thesame content; and a process management module 50 operative to controlthe target process 20 to acquire the second network connection.

In the embodiment of the present disclosure, the electronic device maybe a cell phone terminal, a notebook computer or a tablet computer. Theapplication may be a browser, an application of game software, anapplication of chat software, or other applications which will notlisted here in detail.

Hereinafter, the implementation procedure of the method in theembodiment of the present disclosure will be described in detail withreference to FIG. 2. The method comprises the following steps.

In a step S101, a first execution module 30 for triggering a detectionfor network connection safety is inserted into a target process 20corresponding to the application, when the application is running.

In a step S102, a first network connection is acquired from the targetprocess 20 by the first execution module 30, when the first executionmodule 30 is in a running procedure.

In a step S103, a second execution module 40 is invoked by the firstexecution module 30.

In a step S104, a safety of the first network connection is validatedand a second network connection is fed back by the second executionmodule 40, wherein the second network connection is a safe connection,and the first network connection and the second network connectioncorrespond to the same content.

In a step S105, the second network connection is acquired by the targetprocess 20.

In order to ensure that the target process 20 can run normally after thetarget process 20 is inserted with the first execution module 30, a stepS201 is included before the step S101 is performed. Hereinafter, theimplementation procedure of the method in the embodiment of the presentdisclosure will be described with reference to FIG. 3 in detail. Themethod further comprises the following step.

In the step S201, a running state of the target process 20 is stored inthe register.

Accordingly, the method further comprises a step S202, in which thetarget process 20 reads out the running state from the register andcontinues to run, after the target process 20 acquires the secondnetwork connection.

In the specific implementation, when the electronic device is the cellphone terminal and the application running on the electronic device is abrowser application, the implementation of the step S101 is as follows.

When a browser is required to be started, the shortcut of the browser onthe terminal is clicked first. At this time, the run application of thebrowser will transmit the first network connection to the server side.In order to determine the safety of the first network connection beforethe server side responds to the first network connection, the firstexecution module 30 capable of acquiring the first network connectionneeds to be inserted into the target process 20. However, in order forthe target process 20 to run normally after inserting with the firstexecution module 30 and running the first execution module 30, therunning state of the target process 20 needs to be stored in theregister first before the first execution module 30 is inserted into thetarget process 20. In the embodiment of the present disclosure, theserver is arranged at the network side, which may be a notebookcomputer, a personal computer or the like. The register may be aninstruction register for storing instructions being executed or anapplication timer for storing address of a unit where the nextinstruction is located. Then, the process of inserting with the firstexecution module 30 capable of acquiring the first link request is asfollows.

Find_Proccess(system, target_process_pid);

struct StoreRegister StoreR;

strcpy(&StoreR,CurrentRegister);

pthread_safe_thread;

pthread_create(&safe_thread, NULL, thread_handle, NULL);

After the target process 20 is inserted with the first execution module30 and before performing the step S102, the following step is performed.The second execution module 40 is set, and the invoked of the firstexecution module 30 is responded by replacing a third execution moduleby the second execution module 40, wherein the third execution module isan original invoked module of the first execution module 30. Afterperforming the above step, the step S102 is performed. That is, thefirst network connection is acquired from the target process 20 by thefirst execution module 30, when the first execution module 30 is in therunning procedure.

After the first network connection is obtained after performing the stepS102, the step S103 is performed, in which a second execution module 40is invoked by the first execution module 30. In the embodiment of thepresent disclosure, the second execution module 40 may be inserted intothe target process 20 like the first execution module 30. Alternatively,it may not be inserted into the target process 20 like the firstexecution module 30, but is invoked by the first execution module 30when the first execution module 30 is performed, so as to complete thedetermination of the safety of the first network connection.

After performing the step S103, a step S104 is performed in which thesafety of the first network connection is validated and a second networkconnection is fed back by the second execution module 40, wherein thesecond network connection is a safe connection and the first networkconnection and the second network connection correspond to the samecontent.

Referring to FIG. 4, the step S104 comprises the following processes indetail.

The validation of a safety of the first network connection and thefeedback of a second network connection by the second execution module40 different from the first execution module 30 comprises the followingsteps in detail.

In a step S1041, it is determined whether the first network connectionis the safe connection or not to obtain a determination result, by thesecond execution module 40.

In a step S1042, the first network connection is fed back by the secondexecution module 40, when the determination result indicates that thefirst network connection is the safe connection, wherein the firstnetwork connection is acting as the second network connection at thistime.

In a step S1043, a third network connection is acquired and fed back bythe second execution module 40 when the determination result indicatesthat the first network connection is not the safe connection, whereinthe third network connection is the safe connection, the first networkconnection and the third network connection correspond to the samecontent, and the third network connection is acting as the secondnetwork connection at this time.

After performing the step S1041 in which it is determined whether thefirst network connection is the safe connection or not to obtain adetermination result by the second execution module 40, the methodfurther comprises the following step.

Prompt information is generated and output by the second executionmodule 40 when the determination result indicates that the first networkconnection is not the safe connection, the prompt information indicatingthat the first network connection is not the safe connection.

In the embodiment of the present disclosure, the second execution module40 is to be run. Since the pointer invoked by the first execution module30 originally points to the third execution module which is the originalinvoked module of the first execution module 30, firstly, the locationwhich is originally pointed to by the pointer invoked by the firstexecution module 30 needs to be found out. Then, the pointed is modifiedto point to the second execution module 40, so that the second executionmodule 40 can be executed. The first network connection may behttp://baike.baidu.com/view/178145.htm, or http://www.ifeng.com/, orother network connections which will not be listed here in detail. Thefirst network connection may be a safe network connection or not a safenetwork connection. The specific implementation of the first executionmodule 30 is as follows.

  char *thread_handle( )   {    void *phttp.getHost =find(Android_Java_Vm,http.getHost);    Replace_http_getHost( );   native http.getHost( );    phttp.getHost = Replace_http_getHost;   char *pAdress = Excute_Func(Android_Java_Vm,Replace_http_getHost);

After the first execution module 30 obtains the first networkconnection, the first execution module 30 invokes the second executionmodule 40 to determine the safety of the first network connection. Thefirst network connection is fed back to the target process 20, when thedetermination result is yes indicating that the first network connectionis the safe connection. When the determination result is no indicatingthat the first network connection is not the safe connection, forexample there may be the malicious code, the virus, the Trojan, or otherunsafe factors which are not listed here, at this time, it is necessaryto replace the first network connection with a safe network connection,i.e., the third network connection, wherein the third network connectionis stored in the local database and is a safe network connectioncorresponding to the first network connection.

In the embodiment of the present disclosure, when there is no safenetwork connection corresponding to the first network connection in thelocal database, it is necessary to download a new safe networkconnection from the server side to update the local database. When thereis no safe network connection corresponding to the first networkconnection in the local database and the corresponding safe networkconnection cannot be downloaded from the server side, the secondexecution module 40 generates and outputs the prompt information. Forexample, the user is prompted by information such as, ‘the webpage to beopened is not a safe webpage in which there may be the Trojan, the virusor the like’. At this time, there may be prompt such as “is it OK toenter?” on the cell phone, and the user of the cell phone may decidewhether to open the webpage or not himself/herself.

After performing the step S104, the step S105 is performed, in which thesecond network connection is acquired by the target process 20.

In the specific implementation, when the determination result indicatesthat the first network connection is the safe connection, the secondexecution module 40 feeds back the first network connection to thetarget process 20. When the determination result indicates that thefirst network connection is not safe, the second execution module 40feeds back the third network connection to the target process 20.

After performing the step S105, the step S202 is performed, in which thetarget process 20 reads out the running state from the register andcontinues to run.

In the specific implementation, the target process 20 reads out therunning state of the target process 20 from the register so that thetarget process 20 recovers to the running state, and opens thecorresponding network address by responding to the server side.Particularly, the second execution module 40 is as follows.

if (TRUE== Check_Database(pAdress) );   {     return pAdress;   }   else  {     return Instead(safe_pAdress,pAdress);   }    pthread_exit(NULL);     }

Corresponding to the method in the first embodiment, a second embodimentis provided in the present disclosure.

Referring to FIG. 1, an electronic device is provided in the secondembodiment of the present disclosure, which is capable of running anapplication. In the second embodiment of the present disclosure, theelectronic device may be a cell phone terminal, a notebook computer or atablet computer. The application may be a browser, an application ofgame software, an application of chat software or other applicationswhich will not listed here. The electronic device comprises: aninserting module operative to insert a first execution module 30 fortriggering a detection for network connection safety into a targetprocess 20 corresponding to the application, when the application isrunning; the first execution module 30 operative to acquire a firstnetwork connection from the target process 20, when the first executionmodule 30 is in a running procedure; the first execution module 30further operative to invoke a second execution module 40; the secondexecution module 40 operative to validate a safety of the first networkconnection and to feed back a second network connection, wherein thesecond network connection is a safe connection, and the first networkconnection and the second network connection correspond to the samecontent; and a process management module 50 operative to control thetarget process 20 to acquire the second network connection.

In order for the target process 20 to continue running normally afterexecuting the first execution module 30, the electronic device comprisesa storage module which stores a running state of the target process 20in the register; and the process management module 50 controls thetarget process 20 to read out the running state from the register andcontinue to run accordingly, after the target process 20 acquires thesecond network connection.

In the second embodiment of the present disclosure, the register may bean instruction register for storing the instruction being executed atpresent, or an application timer for storing the address of the unitwhere the next instruction is located. The second execution module 40may be inserted into the target process 20 like the first executionmodule 30, or not be inserted into the target process 20 like the firstexecution module 30, but is invoked by the first execution module 30when the first execution module 30 is being executed, so as to completethe determination of the safety of the first network connection.

Therefore, in order to complete the determination of the safety of thefirst network connection, the electronic device further comprises asetting module operative to set the second execution module 40 andcontrols the second execution module 40 to replace a third executionmodule so as to respond to the invoked of the first execution module 30,before acquiring a first network connection from the target process 20by the first execution module 30, wherein the third execution module isan original invoked module of the first execution module 30.

After invoking the second execution module 40, the second executionmodule 40 further determines whether the first network connection is thesafe connection or not to obtain a determination result.

The second execution module 40 further feeds back the first networkconnection, when the determination result indicates that the firstnetwork connection is the safe connection, wherein the first networkconnection is the second network connection at this time.

The second execution module 40 further acquires and feeds back a thirdnetwork connection when the determination result indicates that thefirst network connection is not the safe connection, wherein the thirdnetwork connection is the safe connection, the first network connectionand the third network connection correspond to the same content, and thethird network connection is the second network connection at this time.

When there is no safe network connection corresponding to the firstnetwork connection in the local database, the second execution module 40further generates and outputs prompt information when the determinationresult indicates that the first network connection is not the safeconnection, the prompt information indicating that the first networkconnection is not the safe connection.

With one or more technical solutions in the embodiments of the presentdisclosure, the following one or more technical effects can be realized.

Firstly, since the technical solution in the embodiment of the presentdisclosure uses the second execution module different from the firstexecution module to validate the safety of the first network connectionand to feed back the second network connection which is a safeconnection, and the first network connection and the second networkconnection correspond to the same content, the following problem willnot occur. That is, in the related art, the sever wouldn't replace theunsafe first network connection with a safe network connection when thefirst network connection transmitted by the electronic device is notsafe, which results in that the system of the cell phone is attacked,broken down or even cannot run. Therefore, with the technical solutionof the present disclosure, the attack to the system of the cell phonemay be avoided, and the technical problem of the poor safety when theelectronic device is networked in the related art can be solvedeffectively, and the technical effect of improving the safety of thenetworking of the electronic device is realized.

Secondly, since the technical solution in the embodiment of the presentdisclosure uses the second execution module different from the firstexecution module to validate the safety of the first network connectionand to feed back the second network connection which is a safeconnection, and the first network connection and the second networkconnection correspond to the same content, the following problem willnot occur. That is, in the related art, when the first networkconnection transmitted by the electronic device is not safe, the user ofthe electronic device cannot link to the desired webpage in time, andwill be attacked by the malicious code, the virus or the Trojan to makethe system of the cell phone break down. Therefore, the technical effectof improving the user experience of the electronic device can berealized by the technical solution of the present disclosure.

Those skilled in the art may recognize that the embodiments of thepresent disclosure may be provided as the method, the device or thecomputer program product. Therefore, the present disclosure may adopt aform of a hardware embodiment, a software embodiment, or an embodimentcombining software with hardware. Also, the present disclosure may adopta form of one or more computer program product implemented on a computerusable storage medium, which includes, but not limited to, a magneticstorage and an optical storage or the like, embodied with computerusable program code therein.

The disclosure is described with reference to flowchart illustrationsand/or block diagrams of methods, apparatus and computer programproducts. It will be understood that each block of the flowchartillustrations and/or block diagrams, and combinations of blocks in theflowchart illustrations and/or block diagrams, can be implemented bycomputer program instructions. These computer program instructions maybe provided to a processor of a general purpose computer, specialpurpose computer, or other programmable data processing apparatus toproduce a machine, such that the instructions, which execute via theprocessor of the computer or other programmable data processingapparatus, create means for implementing the functions/acts specified inthe flowchart and/or block diagram block or blocks.

These computer program instructions may also be stored in a computerreadable medium that can direct a computer, other programmable dataprocessing apparatus, or other devices to function in a particularmanner, such that the instructions stored in the computer readablemedium produce an article of manufacture including instructions whichimplement the function/act specified in the flowchart and/or blockdiagram block or blocks.

The computer program instructions may also be loaded onto a computer,other programmable data processing apparatus, or other devices to causea series of operational steps to be performed on the computer, otherprogrammable apparatus or other devices to produce a computerimplemented process such that the instructions which execute on thecomputer or other programmable apparatus provide processes forimplementing the functions/acts specified in the flowchart and/or blockdiagram block or blocks.

Particularly, the computer program instruction corresponding to theinformation processing method in the embodiment of the presentdisclosure may be stored on a storage medium such as an optical disk, ahard disk, a USB disk or the like. When the computer program instructioncorresponding to the information processing method in the storage mediumis read or executed by an electronic device, the following steps areperformed.

A first execution module for triggering a detection for networkconnection safety is inserted into a target process corresponding to theapplication, when the application is running.

A first network connection is acquired from the target process by thefirst execution module, when the first execution module is in a runningprocedure.

A second execution module is invoked by the first execution module.

A safety of the first network connection is validated and a secondnetwork connection is fed back by the second execution module, whereinthe second network connection is a safe connection, and the firstnetwork connection and the second network connection correspond to thesame content.

The second network connection is acquired by the target process.

Optionally, the computer program instruction stored in the storagemedium, when being executed, further makes the electronic device performthe following step.

A running state of the target process is stored in the register, beforeinserting a first execution module for triggering a detection fornetwork connection safety into a target process corresponding to theapplication when the application is executed.

The target process reads the running state from the register andcontinues to run, after the target process acquires the second networkconnection.

Optionally, the computer program instruction stored in the storagemedium, when being executed, further makes the electronic device performthe following step.

The second execution module is set and the invoked of the firstexecution module is responded by replacing a third execution module bythe second execution module, before acquiring a first network connectionfrom the target process by the first execution module, when the firstexecution module is in a running procedure, wherein the third executionmodule is an original invoked module of the first execution module.

Optionally, the computer program instruction stored in the storagemedium, when being executed, further makes the electronic device performthe following step.

It is determined whether the first network connection is the safeconnection or not to obtain a determination result, by the secondexecution module.

The first network connection is fed back by the second execution module,when the determination result indicates that the first networkconnection is the safe connection, wherein the first network connectionis the second network connection at this time.

A third network connection is acquired and fed back by the secondexecution module when the determination result indicates that the firstnetwork connection is not the safe connection, wherein the third networkconnection is the safe connection, the first network connection and thethird network connection correspond to the same content, and the thirdnetwork connection is the second network connection at this time.

Optionally, the computer program instruction stored in the storagemedium, when being executed, further makes the electronic device performthe following step.

Prompt information is generated and output by the second executionmodule when the determination result indicates that the first networkconnection is not the safe connection, after determining whether thefirst network connection is the safe connection or not to obtain adetermination result by the second execution module, the promptinformation indicating that the first network connection is not the safeconnection.

Although some embodiments of the present disclosure have been describedabove, those skilled in the art may make additional alternations andmodifications to the embodiments once being taught about the basicinventive concept. Therefore, the appended claims are intended to beconstrued to comprise the embodiments and all the alternations andmodifications which fall within the scope of the present disclosure.

Apparently, those skilled in the art may make various modifications andvariations to the present disclosure without departing from the scopeand the spirit of the present disclosure. Thus, the modifications andvariations of the present disclosure belong to the scope of the claimsas well as the equivalents of the present disclosure, and the presentdisclosure intends to incorporate these modifications and variations.

The invention claimed is:
 1. An information processing method applied toan electronic device capable of running an application, the methodcomprising: inserting a first execution module into a target processcorresponding to the application for triggering a detection for networkconnection safety; the first execution module acquiring a first networkconnection from the target process; the first execution module invokinga second execution module; the second execution module validating safetyof the first network connection and feeding back a second networkconnection, wherein the second network connection is a safe connectioncorresponding to the same content as the first network connection; andthe target process acquiring the second network connection.
 2. Themethod of claim 1 further comprising: storing a running state of thetarget process in a register of the electronic device, before insertingthe first execution module into the target process; and the targetprocess reading out the running state from the register after acquiringthe second network connection.
 3. The method of claim 1 furthercomprising setting the second execution module before the firstexecution module acquiring the first network connection from the targetprocess, so that the second execution module operatively responding tothe invoking of the first execution module by replacing a thirdexecution module, wherein the third execution module is an originalinvoked module of the first execution module.
 4. The method of claim 1,wherein the second execution module validating the safety of the firstnetwork connection and feeding back the second network connectioncomprises: determining whether the first network connection is a safeconnection and obtaining a determination result; feeding back the firstnetwork connection to act as the second network connection, if thedetermination result indicates that the first network connection is asafe connection; and feeding back a third network connection to act asthe second network connection, if the determination result indicatesthat the first network connection is not a safe connection, wherein thethird network connection is a safe connection corresponding to the samecontent as the first network connection.
 5. The method of claim 4further comprising generating and outputting prompt information by thesecond execution module, if the determination result indicates that thefirst network connection is not a safe connection, wherein the promptinformation indicates that the first network connection is not safe. 6.A non-transitory computer readable storage medium having stored thereincomputer program instructions which, when being executed by a processorof an electronic device, performs the method of claim
 1. 7. Anelectronic device capable of running an application, comprising: aninserting module operative to insert a first execution module into atarget process corresponding to the application, for triggering adetection for network connection safety; the first execution modulebeing operative to acquire a first network connection from the targetprocess, and to invoke a second execution module; the second executionmodule being operative to validate safety of the first networkconnection and to feed back a second network connection, wherein thesecond network connection is a safe connection corresponding to the samecontent as the first network connection; and a process management moduleoperative to control the target process to acquire the second networkconnection.
 8. The electronic device of claim 7 further comprising: aregister; a storage module operative to store a running state of thetarget process in the register; and wherein the process managementmodule is further operative to control the target process to read outthe running state from the register after acquiring the second networkconnection.
 9. The electronic device of claim 7 further comprising asetting module operative to set the second execution module before thefirst execution module acquiring the first network connection from thetarget process, and to control the second execution module to respond tothe invoking of the first execution module by replacing a thirdexecution module, wherein the third execution module is an originalinvoked module of the first execution module.
 10. The electronic deviceof claim 7, wherein the second execution module is further operative to:determine whether the first network connection is a safe connection andobtain a determination result; feed back the first network connection toact as the second network connection, if the determination resultindicates that the first network connection is a safe connection, andfeed back a third network connection to act as the second networkconnection, if the determination result indicates that the first networkconnection is not a safe connection, wherein the third networkconnection is a safe connection corresponding to the same content as thefirst network connection.
 11. The electronic device of claim 10, whereinthe second execution module is further operative to generate and outputprompt information if the determination result indicates that the firstnetwork connection is not a safe connection, the prompt informationindicating that the first network connection is not safe.