Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Identifying method and apparatus for malicious process in user terminal and user terminal

A technology of user terminal and identification method, applied in computer security devices, instruments, electrical digital data processing and other directions, can solve the problems of identification lag, etc., and achieve the effect of improving interception efficiency

Active Publication Date: 2016-02-03
ZHUHAI BAOQU TECH CO LTD
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when malware is identified, it has been widely disseminated, resulting in a certain lag in identifying malware or its running process and cleaning it up by collecting samples

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identifying method and apparatus for malicious process in user terminal and user terminal
  • Identifying method and apparatus for malicious process in user terminal and user terminal
  • Identifying method and apparatus for malicious process in user terminal and user terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0062] Embodiments of the present invention will be described below with reference to the accompanying drawings. Among them, the user terminal described in the embodiment of the present invention may include mobile phones, tablet computers, notebook computers and other terminals capable of running applications and identifying malicious processes and processing them, wherein the identification device may be configured in the user terminal , can als...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the invention disclose an identifying method and apparatus for a malicious process in a user terminal and the user terminal. The method comprises: determining that a first sub-process started in a first running process in a system is the malicious process; obtaining starting features of the first running process when starting the first sub-process; and if a second running process contains the starting features when starting a second sub-process, identifying the second sub-process as the malicious process. With the adoption of the embodiments of the invention, the malicious process can be identified before a malicious sample is acquired, and the malicious process can be identified in time, so that the malicious process can be intercepted in time, and the interception efficiency is improved.

Description

technical field [0001] The present invention relates to the field of software technology, in particular to a method and device for identifying malicious processes in a user terminal and the user terminal. Background technique [0002] At present, with the development of the Internet, software products provided to users are becoming more and more diverse. For example, when a user terminal is downloading a certain software, the software may include malicious software for promotion, etc. Malware can refer to software that is installed and executed without the user's permission and will affect and harm the operation of the user and the system, including viruses , worms, Trojan horses, backdoors, password stealers, and other software that function as malware listed above. At the same time, the above-mentioned malicious software has a high update frequency and changes in various forms, making it difficult to be identified. Currently, when identifying the running process of malwa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/566G06F2221/033
Inventor 谭昱
Owner ZHUHAI BAOQU TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products