Method for solving phishing attack of Android platform

A phishing attack and solution technology, applied in the software field, can solve problems such as affecting system performance, unable to intercept phishing applications, losing monitoring effects, etc., to achieve the effect of ensuring security

Active Publication Date: 2015-02-18
XIDIAN UNIV
View PDF6 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The way to implement identification and interception at the application layer is similar to the first step in the implementation of phishing attacks. The name of the currently running application is monitored in real time through the system background service and displayed to the user through a floating window or notification. However, there are three steps to implement identification and interception at the application layer. One shortcoming: first, in the real-time monitoring part, real-time monitoring of background services needs to regularly obtain the currently running application information. If the monitoring interval is set too long, the monitoring effect may be lost, and if it is too short, it will seriously affect system performance; Second, the interception function, the interception of phishing applications cannot be achieved at the application layer, because the startup of all applications is the responsibility of the activity management service (Activity Manager Service, AMS) of the framework layer, and the application layer has no authority to interfere with the AMS process; , user experience, real-time display through the floating window will seriously affect the user experience, and prompts through Toast are easily ignored by users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for solving phishing attack of Android platform
  • Method for solving phishing attack of Android platform
  • Method for solving phishing attack of Android platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The present invention will be further described below in conjunction with the accompanying drawings. It should be noted that this embodiment is based on the technical solution and provides detailed implementation steps and specific operation methods, but the scope of protection of the present invention is not limited to this Examples.

[0050] In the Android platform, the activation of all applications is handled by the activity management service AMS at the framework layer, and the application layer has no authority to interfere with the AMS process. One solution to phishing attacks on the Android platform is to set up an identification and interception module in AMS. Specifically include the following process:

[0051] According to the security sensitivity of the application, the user divides the applications in the mobile phone into three categories except for the system applications: the first type of protected application, the second type of protected application, and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for solving a phishing attack of an Android platform. The method comprises the steps of classifying a mobile phone application except for a system application into a plurality types of protection applications by a user according to the safe and sensitive degree; when the user starts one application, firstly judging whether one protected application is started by the system, starting a recognition and interception module according to the judgment result and the category of a to-be-started application and determining whether the application is permitted to be started, if so, carrying out identity recognition on the application, arranging a protective flag bit according to the category of the application, and determining whether the application is protected by the system according to the protective flag bit. According to the method, the recognition and interception module is additionally arranged to an application management system (AMS) of a system framework layer, so that the problem that as the application layer cannot intervene with the AMS flow, the phishing application cannot be intercepted is solved; meanwhile, a multi-level protection scheme is provided for the user to customize; the safety of the mobile phone during use of the user is effectively ensured.

Description

Technical field [0001] The invention relates to a software technology, in particular to a method for solving phishing attacks on the Android platform. Background technique [0002] According to data released by the IDC (International Data Corporation) market research company in April, the Android system accounts for 78.1% of the global smartphone market. In China, the share of Android system is as high as 80%. With the continuous promotion of mobile phone applications, the accompanying data security issues have become increasingly prominent. Mobile phones store a large amount of data in people's daily life, such as address books, short messages, and application usage. Malicious applications have long been targeting the mobile market. Attacks by these malicious applications can lead to various serious consequences. Among them, privacy theft, malicious deductions, and tariff consumption account for as much as 96%. The seriousness of phishing attacks lies in the fact that they can ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/51G06F21/57
CPCG06F21/51G06F21/57
Inventor 李兴华薛飞洁李鑫王涛张树超马建峰
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products