Android system malicious program processing method and device

A technology for malicious programs and processing methods, which is applied in electrical digital data processing, computer security devices, instruments, etc., and can solve the problems of inability to deactivate the device manager, inability to effectively remove stubborn Trojan horses, etc.

Active Publication Date: 2014-10-08
KINGSOFT
View PDF3 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method is effective for general Trojan horses that register device managers, but some Trojan horses will take a series of countermeasures such as locking the screen, forcing back to the desktop, calling other interfaces to cover d...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Android system malicious program processing method and device
  • Android system malicious program processing method and device
  • Android system malicious program processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0026] In the technical solution of the present invention, the stubborn Trojan horse refers to a class of malicious programs that cannot be directly removed (uninstalled); in the present invention, after the application program is registered as a device manager, the application program cannot be directly uninstalled, and the device management needs to be canceled manually. The controller can then realize the uninstallation of the application.

[0027] figure ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an Android system malicious program processing method. The method comprises the steps as follows: receiving a malicious program processing instruction; executing a device manger canceling operation; executing a malicious program cleaning operation after a device manager is canceled successfully. The invention further discloses an Android system malicious program processing device. Stubborn Trojan horse programs can be effectively eliminated on the basis of the method.

Description

technical field [0001] The invention relates to the technical field of mobile Internet security, in particular to a method and device for processing malicious programs in an Android system. Background technique [0002] With the continuous popularization of the Android system, the number of Android Trojan horses is on the rise, and the means of Trojan horses against security software are also constantly being strengthened. The Android system provides a device called device manager. When the user activates the application as the device manager, functions such as locking the screen and erasing user data can be realized, and the user cannot use the conventional uninstall method to uninstall it. At this time, the user Device Manager needs to be deactivated first. [0003] At present, major security vendors have the following solutions for removing the above-mentioned stubborn Trojans: call the dialog box of deactivating the device manager of the system, let the user manually cl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56
CPCG06F21/568
Inventor 陈章群沈江波
Owner KINGSOFT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products