Unlock instant, AI-driven research and patent intelligence for your innovation.

Mobile terminal malware detection method and device

A mobile terminal and malware technology, applied in computer security devices, instruments, computing, etc., can solve the problems of long malware perception period, high dependence, and high limitations, and achieve the effect of improving the detection accuracy and recognition range.

Active Publication Date: 2019-04-23
CHINA MOBILE GROUP DESIGN INST +1
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In order to solve the above-mentioned technical problems, the present invention provides a mobile terminal malware perception method and device, which solves the problems in the prior art that the mobile terminal malware perception cycle is long, has high dependence and high limitations, and can Quickly perceive the occurrence of malware problems on mobile terminals, make full use of various internal and external data resources of mobile communication operators, and improve the detection accuracy and identification range of users suspected of being victimized by malware

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile terminal malware detection method and device
  • Mobile terminal malware detection method and device
  • Mobile terminal malware detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is only some embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0055] figure 2 It shows a schematic flowchart of a method for detecting malware in a mobile terminal provided by an embodiment of the present invention, as shown in figure 2 As shown, the mobile terminal malware detection method in this embodiment is as follows.

[0056] 201. Obtain the multi-dimensional full data of mobile terminal users and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and an apparatus for perceiving malicious software in a mobile terminal. The method comprises the steps of obtaining multi-dimensional total data of mobile terminal users and data of users affected by known malicious software every a preset time, and establishing a classifier used for identifying suspected affected users and normal users according to the data; and if triggering operation on the classifier is detected, obtaining features of the mobile terminal users currently collected by a mobile communication operator, inputting the features to the classifier, and extracting the suspected affected users in the mobile terminal users currently collected by the mobile communication operator. According to the method and the apparatus, the problems of relatively long perceptive cycle, relatively high dependency and relatively high limitation of the malicious software in the mobile terminal in the prior art are solved; the occurrence of the malicious software problem of the mobile terminal can be quickly perceived; various data resources inside and outside the mobile communication operator can be fully utilized; and the discovery precision and identification range of the suspected affected users of the malicious software can be improved.

Description

technical field [0001] The invention relates to the technical fields of mobile communication and information security, in particular to a method and device for detecting malicious software in a mobile terminal. Background technique [0002] Malware is used to collectively refer to any variety of malicious programs including viruses, worms, Trojan horses, and spyware. In recent years, with the rapid development of broadband networks and mobile communications, mobile terminals and their applications have become more common and play an important role in various fields of daily life. More and more criminals invade users' mobile terminals through malicious software to achieve profit and steal information. Therefore, malware is often attributed to the source of multiple threats and is one of the more serious threats today. [0003] At present, the existing mobile communication operators’ monitoring of mobile terminal malware is mainly based on software sample detection. The prem...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56
CPCG06F21/562
Inventor 丁志刚
Owner CHINA MOBILE GROUP DESIGN INST