A detection method and system for mobile terminal short message interception type malicious code

A mobile terminal and malicious code technology, which is applied in the field of mobile terminal malicious code detection, can solve problems such as economic loss, difficulty in implementation, and impact on system performance, and achieve the effects of low operating overhead, low difficulty in implementation, and accurate judgment results

Inactive Publication Date: 2011-12-21
SHENZHEN ANZHITIAN INFORMATION TECH
View PDF2 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

45% of viruses and malicious software (hereinafter collectively referred to as "malicious code") have malicious deduction behaviors, of which more than 53% of malicious deduction software trick users or send service subscription SMS directly to mobile value-added service providers in the background, And intercept the confirmation text message, so that the user pays the business service fee without knowing it, and suffers the most direct economic loss
The problem with this method is that virus analysts with specialized skills are required to analyze and judge, the analysis is difficult and the efficiency is low; Malicious behaviors such as interception have occurred on a large number of users' mobile phones
However, this method is difficult to implement; and it is necessary to modify the Android system module and replace the original module when using it, which may affect the stability of the system operation; in addition, it is necessary to judge the type of broadcast event, and various broadcast messages in the system Too many, the additional judgment overhead will have a non-negligible impact on system performance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A detection method and system for mobile terminal short message interception type malicious code
  • A detection method and system for mobile terminal short message interception type malicious code
  • A detection method and system for mobile terminal short message interception type malicious code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to enable those skilled in the art to better understand the technical solutions in the embodiments of the present invention, and to make the above-mentioned purposes, features and advantages of the present invention more obvious and easy to understand, the technical solutions in the present invention will be further detailed below in conjunction with the accompanying drawings illustrate.

[0038] The invention provides a method and system for detecting malicious codes intercepting short messages of mobile terminals. The method and system can be used for automatic detection and judgment of malicious codes, and can also be used for real-time security protection of mobile terminals of users.

[0039] Malicious codes intercepting text messages will cause inconsistencies between the text messages actually received by the system and the text message list presented to the user by the system's built-in text message program. The present invention utilizes this differenc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a detection method of mobile terminal short message intercepting type malicious code, comprising: registering a broadcast receiver in the mobile terminal system; using the broadcast processing function of the broadcast receiver to record all short messages newly received by the mobile terminal; After the set time, use all the short messages in the inbox of the mobile terminal to match all the short messages recorded by the broadcast processing function one by one; if the short messages recorded by the broadcast processing function fail to match the short messages in the inbox, the broadcast processing function The recorded short messages with unsuccessful matching are intercepted by malicious codes, and there are short message intercepting malicious codes in the mobile terminal system. The invention also discloses a detection system of mobile terminal short message interception type malicious code. The method and system can automatically run dynamic monitoring, detect malicious codes immediately when the interception occurs, and have more accurate detection and judgment results, and at the same time, the running cost is smaller, and the performance of the system is hardly affected.

Description

technical field [0001] The invention relates to mobile terminal malicious code detection technology, in particular to a method and system for detecting malicious codes with short message interception behavior in an Android system. Background technique [0002] In recent years, the Android system has gradually become one of the main platforms for smart mobile terminals. As the market share continues to expand, malicious code has also spread to this system. Relevant statistics show that in the first quarter of 2011 alone, 101 new viruses and 1014 types of malware were added to the domestic Android platform, accumulatively infecting more than 2.5 million users. 45% of viruses and malicious software (hereinafter collectively referred to as "malicious code") have malicious deduction behaviors, of which more than 53% of malicious deduction software trick users or send service subscription SMS directly to mobile value-added service providers in the background, And intercept the c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/14H04W12/12H04W12/128
Inventor 肖梓航李柏松肖新光
Owner SHENZHEN ANZHITIAN INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products