Characteristic extraction method and device

A feature extraction and file technology, applied in the field of network security, can solve problems such as personal data security

Active Publication Date: 2014-04-30
BEIJING QIHOO TECH CO LTD
View PDF3 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, an increasing variety of malicious code attacks on mobile phones and increasingly serious personal data security issues have followed, and more and more mobile phone viruses have caused smartphone users to suffer.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Characteristic extraction method and device
  • Characteristic extraction method and device
  • Characteristic extraction method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] Hereinafter, exemplary embodiments of the present disclosure will be described in more detail with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be implemented in various forms and should not be limited by the embodiments set forth herein. On the contrary, these embodiments are provided to enable a more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0046] Taking the Android operating system as an example, it includes an application program layer (app layer) and a system framework layer (framework layer). As for other layers that may be included in the functional division, the present invention will not be discussed. Among them, usually the app layer can be understood as the upper layer, which is responsible for the interface with the user, such as appli...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a characteristic extraction method and device. The characteristic extraction method comprises obtaining a group of black sample files and white sample files from an application program layer of an intelligent terminal operating system; performing resolution on every file to obtain information structures of functions contained in every file and calculating a check code of every function; determining whether the files comprise the functions corresponding to the check codes or not so as to perform statistics on the number of times of every function appearing in the black sample files and the white sample files; extracting out the black sample characteristics according to the functions which only appear in the black sample files and do not appear in the white sample files and extracting out the white sample characteristics in the same way. Accordingly, the statistics of the number of times of every function check code appearing in the files is performed through analysis and calculation on the obtained black sample files and white sample files and the functions which only appear in the black sample files and do not appear in the white sample files serve as the basis of the extraction of the black sample characteristics.

Description

Technical field [0001] The invention relates to the technical field of network security, in particular to a method and device for feature extraction. Background technique [0002] With the development of technology, smart terminals have more and more functions. For example, people's mobile phones have changed from traditional GSM and TDMA digital mobile phones to smart phones that can handle multimedia resources, provide web browsing, conference calls, e-commerce and other information services. However, the increasing variety of mobile phone malicious code attacks and the increasingly severe personal data security problems have also followed, and more and more mobile phone viruses have caused smartphone users to suffer. [0003] Mobile phone malicious code protection technology protects against malicious code. There are many ways to protect mobile phone malicious code. For example, feature value scanning methods, malicious code protection based on virtual machine technology, heu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/562G06F21/56G06F21/566Y04S40/20G06F21/563H04L63/1425
Inventor 杨康陈卓唐海
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products