Information safety detection method and a mobile terminal

A detection method and information security technology, applied in the field of communication, can solve problems such as inability to prevent virus operation, inability to identify unknown viruses and malware, and achieve the effect of protecting user information security

Inactive Publication Date: 2011-01-26
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF4 Cites 49 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the existing anti-virus software based on virus database scanning cannot identify u

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information safety detection method and a mobile terminal
  • Information safety detection method and a mobile terminal
  • Information safety detection method and a mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to make the purpose, technical solution and advantages of the present invention clearer, the embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0021] See figure 1 , figure 1 It is a flow chart of the first embodiment of the information security detection method of the present invention. Such as figure 1 As shown, the process of the method specifically includes:

[0022] Step S101, after the target software is downloaded, the target software is simulated and run in the dynamic virtual machine.

[0023] Step S102: Determine whether the target software is malicious software according to the malicious behavior rules in the malicious software knowledge base.

[0024] Step S103, if the target software is malicious software, perform security processing on the target software; otherwise, perform step S104.

[0025] Step S104, allowing the target software to run in the mobile terminal.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an information safety detection method. The method comprises the following steps of: after downloading target software, simulating to run the target software in a dynamic virtual machine; according to malicious behavior rules in a malicious software knowledge base, judging whether the target software is malicious software or not; if the target software is the malicious software, performing safety processing on the target software; and if the target software is not the malicious software, allowing the target software to run in a mobile terminal. Correspondingly, the invention also discloses the mobile terminal used for implementing the method. Because the target software is simulated to run in the dynamic virtual machine, the malicious software does not threaten the mobile terminal, the malicious software can be effectively intercepted at the same time and then the user information safety is protected.

Description

technical field [0001] The invention relates to the communication field, in particular to an information security detection method and a mobile terminal. Background technique [0002] The rapid development of mobile terminals enables them to provide more and more intelligent functions. The Internet function of mobile terminals accounts for an increasing proportion in daily use. Mobile terminals can download various application software and games through the Internet, and the use of this mobile terminal to download software through the network also makes a lot of malicious software, Viruses targeting mobile terminals pose a threat to user information security, and even cause user information to be stolen, resulting in serious problems at any time, such as personal privacy, transaction information, financial information, business information and other important information in mobile terminals being stolen and used. [0003] For the aforementioned malicious software, existing ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/12H04W88/02G06F9/445H04W12/128H04W12/80
Inventor 曹希彬
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products