Method, device and system for defending malicious program for terminal

A malicious program and malicious technology are applied in the field of a method, device and system for terminal defense against malicious programs, which can solve the problems of poor security of anti-virus solutions and inability to timely prevent the harm of malicious programs, so as to improve the ability to defend against malicious programs, The effect of ensuring safety

Inactive Publication Date: 2010-12-01
HUAWEI DEVICE CO LTD
View PDF0 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Existing anti-virus solutions are relatively passive in the process of preventing and controlling malicious programs. They can only find malicious programs by scanning the files and processes infected by malicious programs after the application pro...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for defending malicious program for terminal
  • Method, device and system for defending malicious program for terminal
  • Method, device and system for defending malicious program for terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] This embodiment provides a method for defending against malicious programs, such as figure 2 As shown, the method includes:

[0031] Step 101, before executing the intermediate code of the application, detect the application according to the intermediate code of the application to determine whether the application is a malicious program;

[0032] The intermediate code here refers to the intermediate code that the program generates during the compilation process and is not the binary code that can finally be executed by the machine. It is usually some middleware such as virtual machine instructions, such as Java bytecode, Microsoft .NET, etc. The common intermediate language (Common Intermediate Language, CIL) of the framework, etc. The malicious programs mentioned here refer to programs that damage the system, such as viruses and Trojan horses.

[0033] Step 102, when it is determined that the application program is a malicious program, perform defense processing on ...

Embodiment 2

[0038] This embodiment specifically provides a method for defending against malicious programs. In a specific embodiment, the application program described in Embodiment 1 is a program written in JAVA language, and the method runs on a mobile terminal loaded with an Android operating system, and the method is applied to image 3 As shown in the Android middleware layer, the runtime software is Android Runtime. Of course, those skilled in the art can understand that the JAVA language and the Android operating system are only specific examples, which does not mean that this embodiment is only applicable to the JAVA language and the Android operating system. Such as Figure 4 As shown, the method includes:

[0039] Step 201, before executing the intermediate code of the application, detect the application according to the intermediate code of the application to determine whether the application is a malicious program;

[0040] Specifically, step 201 can be implemented in the f...

Embodiment 3

[0053] This embodiment provides an apparatus 300 for defending against malicious programs. The apparatus can be installed in a mobile terminal such as a mobile phone, and specifically can be located in a middleware layer of an operating system. Such as Figure 5 As shown, it includes: a detection module 31 and a processing module 32 .

[0054] The detection module 31 is used to detect the application program according to the intermediate code of the application program before executing the intermediate code of the application program, and determine whether the application program is a malicious program; the processing module 32 is used to When the detection module 31 determines that the application program is a malicious program, defense processing is performed on the application program.

[0055] Wherein, the detection module 31 includes: a detection manager 311 and at least one detection unit 312 .

[0056] The detection manager 311 is configured to manage the detection un...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a method, a device and a system for defending a malicious program for a terminal, relates to the technical field of information security and communication and solves the technical problem of poor security of an antivirus scheme used in terminals such as a mobile phone and the like in the prior art. The method in the embodiment of the invention mainly comprises the following steps of: before executing an intermediate code of an application program, detecting the application program according to the intermediate code of the application program to determine whether the application program is a malicious program or not; and performing defense treatment on the application program if the application program is a malicious program. The method, the device and the system in the embodiment of the invention are mainly used for improving the information security.

Description

technical field [0001] The invention relates to a terminal supporting JAVA applications, in particular to a method, a device and a system for defending the terminal against malicious programs, belonging to the technical fields of information security and communication. Background technique [0002] With the development of technology, many existing terminals are becoming multi-functional. For example: a smart phone with a corresponding open operating system installed in the mobile phone is one of them. Because smart phones can install third-party programs, they can install and uninstall applications at will like computers, and thus make mobile phones have richer functions. [0003] Some of the existing smartphones will use the Android mobile phone operating system. The bottom layer of the Android mobile phone operating system is based on the work of the Linux kernel, which only provides basic functions; applications that can provide other functions are developed by each com...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/22G06F21/56
Inventor 段鹏
Owner HUAWEI DEVICE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products