Unlock instant, AI-driven research and patent intelligence for your innovation.

A kind of method and device for identifying Trojan horse virus

A Trojan horse, virus technology, applied in transmission systems, electrical components, etc., can solve the problems of attracting fees, stealing user information, extortion and deception, etc.

Active Publication Date: 2019-12-10
CHINA MOBILE GRP FUJIAN CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] 2. Steal user information and carry out extortion and deception
[0009] 3. Illegal customization of various service provider (sp, service provider) services
The harm caused by mobile phone Trojan horses, such as charging fees and consuming traffic, will generally cause adverse effects on operators indirectly through user complaints and off-network
If the operator cannot find out the reason in time, it needs to compensate the user's complaint about the loss of tariff, resulting in the loss of economy and brand satisfaction
For such problems, existing solutions are more difficult to solve

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A kind of method and device for identifying Trojan horse virus
  • A kind of method and device for identifying Trojan horse virus
  • A kind of method and device for identifying Trojan horse virus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] In order to understand the characteristics and technical contents of the embodiments of the present invention in more detail, the implementation of the embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. The attached drawings are only for reference and description, and are not intended to limit the embodiments of the present invention.

[0066] The technical solution of the embodiment of the present invention is mainly based on information such as user business behavior data collected in the mobile communication network, billing system data, user package data, etc., and identifies whether the mobile phone of the user is attacked by a Trojan horse virus through the user's behavior.

[0067] figure 1 It is a schematic flow diagram of the method for identifying a Trojan horse virus in an embodiment of the present invention, as figure 1 As shown, the method for identifying Trojan horse virus may further compr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and apparatus for identifying Trojan virus. The method comprises the following steps: collecting core network data and charging data, wherein the core network data comprise signaling data and service data; performing historical habit analysis and periodic behavior analysis on periodic service data, and identifying a suspected infected user in combination with the charging data; when it is judged that the service information corresponding to the service data does not belong to a white list library and belongs to a blacklist library, adding the service data to a suspected Trojan behavior event list; when it is judged that the service information corresponding to the service data does not belong to the white list library and does not belong to the blacklist library, adding the service data satisfying a screening strategy to the suspected Trojan behavior event list; and performing centralized analysis on the service data in the suspected Trojan behavior event list, determining the service data belonging to the Trojan, and adding the service information of the service data belonging to the Trojan to the blacklist library.

Description

technical field [0001] The invention relates to the field of mobile communication, in particular to a method and device for identifying mobile phone Trojan horse viruses through user behavior on the network. Background technique [0002] With the development of the mobile Internet and the popularization of mobile terminals, especially smart terminals, mobile phone viruses or malicious programs on mobile phones are about to cause a lot of harm. Among all virus types, Trojan horse viruses for the purpose of consuming tariffs, stealing user identity information, transaction information, and payment information account for more than 75%, becoming the most important aspect affecting user information security and economic security. [0003] Mobile phone viruses originated from computer viruses. Following the definition of computer Trojan horses, mobile phone Trojan horses can be defined as: Trojan horses are hidden and spontaneous programs that can be used to perform malicious ac...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/101H04L63/1408H04L63/145
Inventor 杨慰民谢璨罗卫鸿万伟雄李灵慧傅子僖卢宇辰蔡鸿祥潘延涛
Owner CHINA MOBILE GRP FUJIAN CO LTD