Unlock instant, AI-driven research and patent intelligence for your innovation.

Malicious behavior detection method and system based on smartphone radio interface layer

A technology of radio interface layer and smart phone, which is applied in transmission system, wireless communication, wireless network protocol, etc. It can solve the problems of undeveloped and inaccessible communication data operation, etc., and achieve the effect of improving the overall security

Active Publication Date: 2013-09-11
BEIJING ZHONGYAN RUIFENG INFORMATION TECH RES ISTITUTE PARTNERSHIP
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] All applications of the Android operating system run independently in the DalvikVM virtual machine. The virtual machine is characterized by providing a virtual operating environment for each application. All communication operations directly interact with the hardware through the virtual machine. The applications that developers can develop through the Application Framework (application framework) also run in the DalvikVM virtual machine. The characteristics of the DalvikVM virtual machine can only obtain data communication operations related to their own programs, and cannot obtain other running data in the operating system. The communication data operation of the application program, due to the characteristics of the DalvikVM virtual machine, many well-known security product developers have failed to develop an application software that can monitor the communication behavior of mobile phones, including Google itself.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious behavior detection method and system based on smartphone radio interface layer
  • Malicious behavior detection method and system based on smartphone radio interface layer
  • Malicious behavior detection method and system based on smartphone radio interface layer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The invention provides a method and system for detecting communication behaviors based on the radio interface layer of smart phones, so that malicious behaviors can be quickly and accurately judged, and the purpose of protecting smart phone users is achieved. The main steps of the detection method include monitoring user application layer communication and smart phone radio interface layer communication at the same time, using the two kinds of data to distinguish normal user communication from abnormal user communication, and prompting the user to choose to block or allow or process the current communication according to system rules communication connection, and then save the processing results to the database.

[0048] figure 1 It is a flow chart of the malicious behavior detection system based on the radio interface layer of the present invention, which is described in detail as follows: In the conventional smart phone operating system, the telephone application laye...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a malicious behavior detection method and system based on the radio interface layer of a smart phone. When the operating system and the underlying radio hardware perform data exchange and communication, the data instructions are monitored and the instructions are decoded and analyzed, and the operating system is accurately learned from the underlying layer. Information about whether the application layer is performing dial-up, voice communication, data communication, SMS communication, etc. and radio hardware data communication, to make up for the system defect that the smartphone operating system architecture cannot know the current mobile phone data communication status from the bottom layer, and will obtain The relevant application program and the underlying radio hardware communication status data information are intelligently matched with the relevant application program in the user layer of the smartphone operating system to distinguish which applications are legal data communication behaviors and which applications are illegal data communication behaviors, so as to target Various malicious software behaviors can provide timely and powerful protection and improve the security of smartphone users.

Description

technical field [0001] The invention belongs to the technical field of mobile communication, and in particular relates to a method and system for detecting malicious behaviors based on the radio interface layer of smart phones, which can effectively protect malicious communication behaviors of smart phone application programs. Background technique [0002] With the continuous development of mobile phone operating system technology, more and more mobile phone manufacturers choose to use the mainstream smart phone operating system in their new products. Smart phone operating systems have great differences with traditional mobile phones in terms of software installation and application. the difference. Traditional mobile phones only have several prefabricated single software functions, which cannot meet the various needs of users. However, in mainstream smart phone operating systems, a concept of "software market" can be easily used. Choose the application you need from thousa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/12H04W88/02H04W12/122
CPCH04L63/1425H04L63/162H04W80/00H04W4/50H04W12/121
Inventor 蔡雪飞
Owner BEIJING ZHONGYAN RUIFENG INFORMATION TECH RES ISTITUTE PARTNERSHIP