Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and device for locating suspected mobile phone malware

A mobile phone software and malware technology, applied in the field of communication, can solve the problems of heavy analysis workload, low efficiency of mobile phone malware, and untargeted analysis, and achieve the effect of improving pertinence

Inactive Publication Date: 2016-12-21
HUAWEI TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The inventors of the present invention found in the process of realizing the present invention that this method of the prior art needs to crawl massive network data, and the analysis workload is heavy, and the analysis is not targeted, and the efficiency of finding mobile phone malware very low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for locating suspected mobile phone malware
  • A method and device for locating suspected mobile phone malware
  • A method and device for locating suspected mobile phone malware

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] Embodiments of the present invention provide a method and device for locating suspected mobile phone malware, which are used to improve the pertinence of locating suspected mobile phone malware without user participation.

[0053] In order to make the purpose, features and advantages of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the following The described embodiments are only some, not all, embodiments of the present invention. All other embodiments obtained by those skilled in the art based on the embodiments of the present invention belong to the protection scope of the present invention.

[0054] The location method of suspected mobile phone malicious software that the embodiment of the present invention provides, such as figure 1 shown, in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a method and a device for locating suspected mobile phone malware, which are used to improve the pertinence of locating suspected mobile phone malicious software without user participation. The method includes: according to the suspicious behavior screening rules, carry out rule matching, analysis and statistics on the mobile phone user's online log retained in the online log server, and filter out the suspicious user's online behavior log; combine the suspicious user's online behavior log with the mobile gateway Correlate the IP allocation log of the mobile Internet Internet Protocol to obtain the suspected infected user's mobile phone; obtain the mobile phone software downloaded by the suspected infected user's mobile phone within a preset time, and the preset time is recorded in the suspicious user's online behavior log A period of time before the suspicious user's online behavior; analyze the downloaded mobile phone software, and locate the suspected mobile phone malware, so that the virus analysis tool can judge whether there is malicious behavior on the suspected mobile phone malware.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a method and device for locating suspected mobile phone malicious software. Background technique [0002] With the evolution of wireless networks, the rapid growth of mobile data services, and the intelligence of mobile terminals, the mobile Internet has developed rapidly, and mobile broadband has gradually replaced fixed-line broadband to occupy a dominant position. Various data services, such as browsing news, sending and receiving multimedia messages, sending and receiving emails, online payment, chatting, games, etc. [0003] However, with the development of the mobile Internet, the mobile phone malware industry has also risen, attracting or tempting users to download and install through malicious software, and then obtain the private information of mobile phone users, which has caused serious information security threats to mobile phone users. [0004] In order to pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/12H04W88/02H04W12/128
Inventor 张子芳姚允元郭辉
Owner HUAWEI TECH CO LTD