Malicious application program scanning method, device and system

A technology of malicious application program and scanning method, applied in the field of scanning method, device and system of malicious application program, capable of solving the problems of consuming user traffic, traffic charges, etc.

Active Publication Date: 2015-03-25
三六零数字安全科技集团有限公司
View PDF5 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] It is necessary to upload the file characteristics of all files that need to be scanned in the mobile terminal to the cloud server before cloud scanning can be performed. In the absence of free wireless network, it will consume a lot of traffic for users and cause users to generate a lot of traffic charges

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious application program scanning method, device and system
  • Malicious application program scanning method, device and system
  • Malicious application program scanning method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0099] The embodiment of the present invention provides a method for scanning malicious applications, which is applied to the PC terminal side, and completes the cloud scanning and killing of malicious applications on the mobile terminal by connecting with the mobile terminal to save traffic.

[0100] figure 1 It is a flow chart of a method for scanning malicious applications provided by an embodiment of the present invention, the method is applied to a PC terminal with network transmission capability, and includes steps S102 to S108:

[0101] S102: Connect the PC terminal and the mobile terminal.

[0102] S104: Using the PC terminal to acquire the file characteristics of the file to be scanned in the mobile terminal.

[0103] Specifically, specified features can be extracted from the Android installation package for detection, such as package name, version number, digital signature, etc., as specified features. Compared with the traditional antivirus engine on the Internet,...

Embodiment 2

[0118] An embodiment of the present invention provides a method for scanning malicious applications. The method is applied to the mobile terminal side, and through the connection with the PC terminal, it completes cloud scanning and killing of possible malicious applications in itself to save traffic.

[0119] In the present invention, the mobile terminal may be a mobile phone, a tablet computer and other devices.

[0120] figure 2 It is a flow chart of a scanning method for a malicious application provided by an embodiment of the present invention, the method is applied to a mobile terminal, and includes steps S202 to S206:

[0121] S202: Connect the mobile terminal and the PC terminal.

[0122] S204: Calculate and obtain the file feature of the local file to be scanned.

[0123] S206: Send the file feature to the PC terminal.

[0124] Wherein, the file feature is used for the PC terminal to upload to the cloud scanning and killing server for the cloud scanning and killin...

Embodiment 3

[0128] The method for scanning malicious application programs provided by the present invention is implemented through the cooperation of PC terminals and mobile terminals, wherein, the first embodiment describes the scanning method for malicious application programs on the side of the PC terminal, and the second embodiment describes the method for scanning malicious application programs on the side of the mobile terminal. This section describes how to scan malicious applications.

[0129] Embodiment 3 is a specific application scenario of Embodiment 1 and Embodiment 2 above, and will be described in combination with PC terminal and mobile terminal side. Through this embodiment, the method provided by the present invention can be described more clearly and specifically.

[0130] Such as image 3 As shown, it is a specific flowchart of a scanning method for a malicious application provided by an embodiment of the present invention, including steps S301 to S308.

[0131] In step...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a malicious application program scanning method, device and system and relates to the field of computers. The method includes connecting a PC terminal with a mobile terminal; acquiring the file characteristics of files to be scanned of the mobile terminal through the PC terminal; transmitting the file characteristics to a cloud searching and killing server to scan the malicious application program characteristics through the network transmitting capability of the PC terminal; receiving and outputting the scanning results returned by the cloud searching and killing server, and transmitting the scanning results to the mobile terminal. Since the connection of the PC terminal and mobile terminal is established, the file characteristics of the files to be scanned of the mobile terminal are acquired, the file characteristics are transmitted to the cloud searching and killing server to scan the malicious application program characteristics through the network transmitting capability of the PC terminal, the flow of the mobile terminal is not consumed when the files of the mobile terminal malicious application program are scanned in a cloud searching and killing manner, and the flow loss is avoided for users.

Description

technical field [0001] The invention relates to the field of computers, in particular to a scanning method, device and system for malicious application programs. Background technique [0002] At present, mobile terminals such as mobile phones and tablet computers are widely used. Android is a mobile terminal operating system based on an open source protocol. After years of development, it has become quite mature and can provide many functions. [0003] During the development of Android, there are more and more malicious programs targeting Android. At present, the method for identifying malicious programs is mainly by extracting file features of application programs, and then identifying them through a local antivirus engine. However, due to the limitation that the local virus database cannot take up too much storage space, and the virus database in the antivirus engine is usually not updated in time, the local detection and killing method does not have a high degree of rec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/562G06F21/568
Inventor 董清李伟
Owner 三六零数字安全科技集团有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products