Method and system for killing mobile terminal viruses

A mobile terminal and virus technology, applied in instruments, computing, electronic digital data processing, etc., can solve problems such as leakage of personal information, user mobile phone data security issues, and missing viruses, so as to protect data security, improve antivirus capabilities, and repair damage effect

Inactive Publication Date: 2011-10-19
ZTE CORP
View PDF3 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Mobile phone virus is a contagious and destructive mobile phone program, which can be spread by sending text messages, multimedia messages, emails, browsing websites, downloading ringtones, Bluetooth, WIFI, etc. Delete and send out spam to leak personal information, automatically make calls, send short (MMS) messages, etc. to deduct fees maliciously, monitor user calls and data interactions, and even damage SIM cards, chips and other hardware, resulting in users being unable to use normally Mobile phones have seriously affected the use and normal life of users
[0004] At present, various virus scanning methods, such as feature code scanning and heuristic scanning, require terminals with strong processing and execution capabilities. Although the existing mobile phone antivirus software can also scan and kill viruses, due to mobile phone memory Due to the limitation of space and processing capacity, the mobile phone antivirus software does not check and kill viruses comprehensively, and sometimes misses virus checks, causing serious consequences to users, and the data security of users' mobile phones becomes a problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for killing mobile terminal viruses
  • Method and system for killing mobile terminal viruses
  • Method and system for killing mobile terminal viruses

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment

[0054] Such as image 3 As shown, the external processor is an example of a PC, and the mobile terminal is an example of a mobile phone. This embodiment provides a method for checking and killing viruses on a mobile phone using the supporting PC side software of the mobile phone, including the following steps:

[0055] S201: Start the antivirus module in the PC side software;

[0056] The initialization operation is performed when starting the antivirus module in the PC side software, including updating the virus library of the antivirus module in real time, starting the virus scanning engine and the virtual machine, and the virus library of the antivirus module includes a virus signature library and a dangerous behavior pattern library.

[0057] S202: Start the mobile phone side antivirus module through the communication interface between the PC and the mobile phone;

[0058] After the antivirus module on the mobile phone side is started, it is in a monitoring state, waiting f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a system for killing mobile terminal viruses. The system comprises an external processor and a mobile terminal which are connected through communication interfaces. The method comprises the following steps that the external processor acquires data to be subject to virus killing from the mobile terminal; and after the data is subject to the virus killing, non-virus data after the virus killing is transmitted to the mobile terminal. The method and the system can make up the defect that mobile terminal virus-killing software has limit space and processing capability so that the virus check and killing is not complete, can avoid the serious consequences caused by virus check leakage to a user, improves the capability of killing viruses of the mobile terminal, and better protects the data safety of the mobile terminal.

Description

technical field [0001] The invention relates to the field of mobile communication data security, in particular to a method and system for virus killing of a mobile terminal, and a method for virus checking of a mobile terminal. Background technique [0002] As the use of smartphones has become more and more common, smartphone operating systems have quickly become popular with most people. However, while bringing convenience and enjoyment to people, smart phones also have various security risks. Once these security risks are exploited, it is likely to cause damage to the mobile phone system and data, thereby affecting users. use. Especially for the Android (Android) smart system, the number of mobile phone viruses for this system is also increasing rapidly. It is undeniable that the Android system will become an important target for hacker attacks. [0003] Mobile phone virus is a contagious and destructive mobile phone program, which can be spread by sending text messages,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F21/56
Inventor 张嘉伟
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products