Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for detecting blackmail application under Android platform

An Android platform and detection method technology, applied in the field of information security, can solve problems such as failure of normal operation, failure of mobile phone functions, and removal of ransomware, so as to improve detection efficiency and detection rate, meet batch detection requirements, and occupy small memory Effect

Inactive Publication Date: 2018-05-22
WUHAN ANTIY MOBILE SECURITY
View PDF9 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, mobile phone ransomware applications have become a major new security threat. Ransomware software will induce users to install and run it. After running, a certain ransomware interface will be placed on the top of the mobile phone screen, and the user will not be able to operate normally by pressing any button on the mobile phone, resulting in failure of mobile phone functions. Unable to use the phone normally
Existing technology mostly detects ransomware applications by detecting the top of the Activity. This detection method is highly targeted, but with the advancement of technology, many new ransomware cleverly avoid this method of extortion, using the Android component WindowManager.LayoutParams A method of customizing the interface to cover the screen can block shutdown and other operations, resulting in the mobile phone with a non-removable battery cannot be shut down by removing the battery. The ransomware can be cleared in other ways, and the battery can only be exhausted.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for detecting blackmail application under Android platform
  • Method and system for detecting blackmail application under Android platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to enable those skilled in the art to better understand the technical solutions in the embodiments of the present invention, and to make the above-mentioned purposes, features and advantages of the present invention more obvious and easy to understand, the technical solutions in the present invention will be further detailed below in conjunction with the accompanying drawings illustrate.

[0025] The present invention provides an embodiment of a detection method for blackmail applications under the Android platform, such as figure 1 shown, including:

[0026] S101: Obtain feature information of the installation package file.

[0027] Extract the installation package files in the Android system, without distinguishing between uninstalled and installed installation package files. Feature information includes static information such as installation package format, file information, function information, and permission information.

[0028] S102: Determine wheth...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for detecting a blackmail application under an Android platform. Through detailed analysis of installation package files of large quantity of blackmail applications, amethod of assigned authority and assigned code segment parameter is used to detect. Compared with a conventional detection method, the method and the system occupy little memory and consume few resources, and can satisfy batch detection requirements. The method and the system effectively improve detection efficiency and detection rate. The invention also discloses a system for detecting a blackmail application under an Android platform.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method and system for detecting blackmail applications on an Android platform. Background technique [0002] With the rise of smartphone platforms such as the Android system, malicious codes on mobile terminals have gradually become another major threat in the field of information security. In recent years, the types of malicious code forms have increased dramatically, leading to greater pressure in malicious code detection, and diversified and precise detection methods will become a new choice. [0003] At present, mobile phone ransomware applications have become a major new security threat. Ransomware software will induce users to install and run it. After running, a certain ransomware interface will be placed on the top of the mobile phone screen, and the user will not be able to operate normally by pressing any button on the mobile phone, resulting in failure o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/56
CPCG06F21/563
Inventor 余欣洋乐东马志远
Owner WUHAN ANTIY MOBILE SECURITY
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More