Method and device for capturing malicious code of mobile terminal

A malicious code and mobile terminal technology, which is applied in the field of mobile terminal malicious code capture, can solve the problem that mobile terminal malicious code is difficult to capture, and achieve the effect of making up for the untimely capture and response

Inactive Publication Date: 2010-12-29
BEIJING ANTIY NETWORK SAFETY TECH CO LTD
View PDF2 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In view of the above problems, considering the current situation that the unique transmission path of mobile terminals and the traditional computer malicious code capture method cannot be applied, the technical problem to be solved by the present invention is to design a capture system and equipment for the spread of mobile terminal malicious codes, and to solve the problem of mobile terminal malicious codes. elusive status quo
a. Capture the malicious code of pseudo-terminals for mobile data services

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for capturing malicious code of mobile terminal
  • Method and device for capturing malicious code of mobile terminal
  • Method and device for capturing malicious code of mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a device for capturing a malicious code of a mobile terminal. The method comprises the following steps of: capturing a malicious code of a pseudo terminal of a mobile telephone data service; capturing a malicious code of a mobile telephone Bluetooth; and updating a terminal virus database by adopting PUSH technology. The device comprises mobile terminal analog equipment and malicious code analytical equipment. The problem of untimely capturing the malicious code of mobile terminal equipment is solved to effectively solve the problems of slow capturing and response of the malicious code of the current mobile terminal, and provide strong support for better solving the propagation event of the malicious code of the mobile terminal.

Description

technical field The invention relates to the technical field of network security, in particular to a method and device for capturing malicious codes of a mobile terminal. Background technique Malicious code is a program with malicious intent that may harm the machine on which it executes or the network over which it propagates. The damage caused by malicious code has increased dramatically in recent years. Therefore, malicious code detection is an important aspect of software security. With the development of communication technology, mobile phones have become indispensable for work and life. The expansion of mobile entertainment and business functions requires that mobile phone functions become increasingly complex and intelligent. The processor performance and storage capacity of mobile phones are all moving towards PC. At the same time, there is also a trend of the mobile phone operating system from a number of independent companies working behind closed doors to the u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00G06F21/56
Inventor 潘宣辰肖新光
Owner BEIJING ANTIY NETWORK SAFETY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products