Mobile terminal, and system and method for suspicious behavior detection and judgment

A mobile terminal and determination method technology, applied in the field of communication, can solve the problems of inability to classify and control sensitive resources separately, small application program operation granularity, and high difficulty in use, and achieve the effect of reliable malicious behavior prevention and monitoring capabilities

Active Publication Date: 2013-10-23
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
View PDF4 Cites 53 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] (2) For users, the permission granularity is too small and difficult to use
However, a behavior that damages the interests of users requires access to several sensitive resources in a certain order in many cases, so allowing users to understand and control the behavior of applications through permissions will bring certain difficulties to users.
For users, the granularity of application operations represented by permissions is too small to reflect a complete behavior of the application
[0014] (3) For resource protection, the granularity of permissions is too large to allow separate control of more refined sensitive resource classifications

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile terminal, and system and method for suspicious behavior detection and judgment
  • Mobile terminal, and system and method for suspicious behavior detection and judgment
  • Mobile terminal, and system and method for suspicious behavior detection and judgment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0031] In the description of the present invention, it should be noted that unless otherwise specified and limited, the terms "installation", "connection" and "connection" should be understood in a broad sense, for example, it can be a mechanical connection or an electrical connection, or it can be two The internal communication of each element may be directly connected or indirectly connected through an intermediary. Those skilled in the art can understand the specific meanings of the above terms according to specific situations.

[003...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a mobile terminal which comprises a malicious behavior feature model base used for storing malicious behavior models; a sensitive resource monitoring module used for monitoring access of an application program to sensitive resource; an application behavior acquisition module used for acquiring a corresponding sensitive behavior according to monitored behavior data; an application behavior database used for storing the sensitive behavior; an application behavior analysis center used for receiving the sensitive behavior, invoking the malicious behavior models in the malicious behavior feature model base and judging whether a behavior corresponding to the sensitive behavior is a malicious behavior; and an application security center used for querying the sensitive behavior, sorting application program accesses corresponding to the sensitive behavior in order of malicious degree and setting warning levels of the application program accesses. The invention further provides a suspicious behavior detection and judgment system and a suspicious behavior detection and judgment method. The mobile terminal, the suspicious behavior detection and judgment system and the suspicious behavior detection and judgment method of the invention have the advantage of being capable of providing safety guarantee for application programs and preventing and monitoring malicious behaviors.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a mobile terminal, suspicious behavior detection and determination system and method. Background technique [0002] With the increasingly powerful functions of mobile smart terminals, the number of mobile smart terminal application software has increased sharply, and the number of mobile smart terminal users has increased rapidly. But what follows is that there are more and more applications with malicious behaviors, which is hard to detect. The malicious behaviors of these applications mainly include: maliciously deducting fees or consuming packages, stealing user privacy data, downloading software online without prompting, spreading malicious software in large quantities, etc. How to prevent these malicious programs has become an urgent problem to be solved. [0003] The techniques for resource access control of existing applications by each mobile operating sy...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04M1/725G06F17/30
Inventor 李厚辰乜聚虎
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products