Malicious software interception method and device and terminal

A technology of malicious software and interception devices, which is applied in the field of network security to achieve the effect of requiring no human intervention and consuming less time

Inactive Publication Date: 2017-06-20
NUBIA TECHNOLOGY CO LTD
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Such attacks are often ve

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious software interception method and device and terminal
  • Malicious software interception method and device and terminal
  • Malicious software interception method and device and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0035] A mobile terminal implementing various embodiments of the present invention will now be described with reference to the accompanying drawings. In the following description, use of suffixes such as 'module', 'part' or 'unit' for denoting elements is only for facilitating description of the present invention and has no specific meaning by itself. Therefore, "module" and "component" may be used mixedly.

[0036] Mobile terminals may be implemented in various forms. For example, terminals described in the present invention may include devices such as mobile phones, smart phones, notebook computers, digital broadcast receivers, PDAs (Personal Digital Assistants), PADs (Tablet Computers), PMPs (Portable Multimedia Players), navigation devices, etc. mobile terminals and fixed terminals such as digital TVs, desktop c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a malicious software interception method and device and a terminal. The method comprises the steps of conducting static analysis or defense on a suspicious file, and obtaining a static analysis or defense result; if the static analysis or defense result is that the suspicious file is suspicious malicious software, triggering dynamic analysis of the suspicious file; obtaining a dynamic analysis result and uploading the dynamic analysis result to a cloud server; obtaining malicious software interception information sent by the cloud server, wherein the malicious software interception information is generated by comparing the uploaded dynamic analysis result with a stored malicious software sample through the cloud server. Through the malicious software interception method and device and the terminal, the malicious software can be intercepted on the terminal in which threat is found, and the malicious software is prevented from further spreading to other systems and causing serious damage to the terminal; a 'patient zero' is prevented from losing all materials in a system; meanwhile, the consumed time in the interception process is very short, and manual intervention is not needed.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a malicious software interception method, device and terminal. Background technique [0002] Program Static Analysis (Program Static Analysis) refers to scanning the program code through lexical analysis, syntax analysis, control flow, data flow analysis and other technologies without running the code to verify whether the code meets the normative, safe and reliable A code analysis technique for performance, maintainability and other indicators. At present, static analysis technology is developing towards simulation execution technology to be able to find more defects that can only be found by dynamic testing in the traditional sense, such as symbolic execution, abstract interpretation, value dependency analysis, etc., and use mathematical constraint solving tools for path reduction or reachability Sexual analysis to reduce false positives and increase efficiency. [0...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56G06F21/55
CPCG06F21/562G06F21/554G06F21/566G06F2221/033
Inventor 杨文峰
Owner NUBIA TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products