Unlock instant, AI-driven research and patent intelligence for your innovation.

Android malicious program detecting and processing method and device as well as equipment

A technology of malicious programs and detection methods, applied in the field of mobile Internet information security, can solve problems such as destruction, user loss, and inability to remove users, and achieve the effect of accurate detection and processing, and protection of security.

Active Publication Date: 2016-02-17
BEIJING KINGSOFT INTERNET SECURITY SOFTWARE CO LTD
View PDF5 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Usually once the operating system of the user device is infected with such a malicious application virus, the user will not be able to remove the malicious application, and the user device will become completely unusable. The only solution is to send it back to the original factory for reset, and reset The behavior will completely destroy the data stored by the user and bring irreparable losses to the user
Further, even if the user uninstalls the malicious program, the files encrypted by the malicious program still cannot be used normally, and the user data can only be processed as useless files, which also brings a lot of trouble to the user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Android malicious program detecting and processing method and device as well as equipment
  • Android malicious program detecting and processing method and device as well as equipment
  • Android malicious program detecting and processing method and device as well as equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0031] Activity is one of the most basic and most commonly used four components in Android components (Activity, Service service, ContentProvider content provider, BroadcastReceiver broadcast receiver).

[0032] All operations in the Activity are closely related to the user. It is a component responsible for interacting with the user. In an Android application, an Activity is usually a separate screen, which can display some controls, and can also listen to and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an Android malicious program detecting method. The method comprises the following steps: monitoring whether the call, carried out by an application program, of CTIVITY accords with a preset rule or not, and monitoring whether a specific type file corresponding to the application program exists in the system or not; and determining whether the application program is a malicious program or not on the basis of the monitoring result. The invention furthermore discloses an Android malicious program detecting device, an Android malicious program processing method and device as well as intelligent terminal equipment. Through implementing the technical scheme, the malicious applications which are installed in operation systems of mobile equipment of users to blackmail the users through controlling the desktops of the users, stopping the uninstallation of the users and encrypting the files of the users can be correctly detected and processed, so that the system security is improved.

Description

technical field [0001] The invention relates to the technical field of mobile internet information security, in particular to a malicious virus detection and processing method, device and equipment. Background technique [0002] With the development of the Android system, there are more and more applications in the Android system. Usually, in mobile terminal devices based on the Android system, all installed applications can be managed in the system settings, including application Program stop, uninstall, etc. [0003] Due to the wide range of sources of Android system application programs, users usually have no ability to distinguish whether the installed application program is a malicious program, and once the malicious application program is installed, it will bring a lot of inconvenience to the user. A typical example is a malicious application such as Cryptolocker. This type of malicious application will control the desktop of the user's device and continuously ask the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/56
Inventor 沈江波陈章群张楠陈勇
Owner BEIJING KINGSOFT INTERNET SECURITY SOFTWARE CO LTD