Android malicious program detecting method, device and equipment

A malicious program and detection method technology, applied in the field of malicious program detection, can solve problems such as user loss, users cannot remove malicious applications, destroy data, etc., and achieve the effect of protecting security

Active Publication Date: 2014-09-10
KINGSOFT
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, once the operating system of the user's device is infected with such a malicious application virus, the user will not be able to remove the malicious application, and the user's device will beco

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Android malicious program detecting method, device and equipment
  • Android malicious program detecting method, device and equipment
  • Android malicious program detecting method, device and equipment

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0024] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.

[0025] Activity is one of the four most basic and most commonly used components in Android components (Activity, Service, ContentProvider, BroadcastReceiver).

[0026] All operations in Activity are closely related to the user, and are a component responsible for interacting with the user. In an android application, an Activity is usually a separate screen, which can display some controls, and can also monitor and process user events. Resp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an Android malicious program detecting method. The method includes the steps that a monitoring application program calls an ACTIVITY; whether the calling meets the preset rule requirement or not is judged, and if yes, the program is identified as a malicious program. The invention further discloses an Android malicious program detecting device and intelligent terminal equipment. According to the technical scheme, whether a malicious application aiming to blackmail users by controlling a user desktop and preventing user uninstalling is installed in a user mobile equipment operating system or not can be accurately detected, and therefore the security of the system is improved.

Description

Technical field [0001] The present invention relates to the technical field of mobile Internet information security, in particular to a malicious program detection method, device and equipment. Background technique [0002] With the development of the Android system, there are more and more applications in the Android system. Generally, in mobile terminal devices based on the Android system, all installed applications can be managed in the system settings, including applications Stop, uninstall, etc. of the program. [0003] Because the sources of Android system applications are relatively wide, users usually have no ability to distinguish whether the installed applications are malicious programs. Once a malicious application is installed, it will cause a lot of inconvenience to the user. A typical example is a malicious application such as Cryptolocker. This type of malicious application controls the user’s device desktop and constantly requires the user to pay a fine to unlock t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56
CPCG06F21/566
Inventor 陈章群沈江波张楠赵闵
Owner KINGSOFT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products