A kind of method and device for identifying Trojan horse virus
A Trojan horse, virus technology, applied in transmission systems, electrical components, etc., can solve the problems of attracting fees, stealing user information, extortion and deception, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0065] In order to understand the characteristics and technical contents of the embodiments of the present invention in more detail, the implementation of the embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. The attached drawings are only for reference and description, and are not intended to limit the embodiments of the present invention.
[0066] The technical solution of the embodiment of the present invention is mainly based on information such as user business behavior data collected in the mobile communication network, billing system data, user package data, etc., and identifies whether the mobile phone of the user is attacked by a Trojan horse virus through the user's behavior.
[0067] figure 1 It is a schematic flow diagram of the method for identifying a Trojan horse virus in an embodiment of the present invention, as figure 1 As shown, the method for identifying Trojan horse virus may further compr...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


