Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for processing software malicious behaviors

A processing method and technology of a processing device are applied in the field of computer information security, and can solve the problems that users cannot know the influence of mobile phone program users, malicious behaviors cannot be accurately known, and meanings cannot be accurately conveyed.

Inactive Publication Date: 2013-06-12
ZHUHAI JUNTIAN ELECTRONICS TECH +3
View PDF4 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

like figure 1 As shown, the existing security protection software can only tell whether a mobile phone program contains malicious behavior codes, and cannot accurately convey the meaning represented by the malicious behavior codes to customers. influences
Malicious behaviors generated by various mobile phone malicious programs cannot be accurately known

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for processing software malicious behaviors
  • Method and device for processing software malicious behaviors
  • Method and device for processing software malicious behaviors

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The present invention will be described in detail below in conjunction with the accompanying drawings and specific implementation methods. The schematic implementation and description of the present invention are used to explain the present invention, but are not intended to limit the present invention.

[0030] see figure 1 , which is an effect diagram of processing malicious behaviors by existing software.

[0031] see figure 2 , which is a flow chart of steps of a method for processing malicious software behavior described in the present invention, including the following steps:

[0032] S1: Scan the mobile phone program to obtain the scanning result.

[0033] Specifically, use the mobile phone security software to scan the mobile phone program, and obtain the scanning result that the mobile phone security software judges that the mobile phone program is a malicious mobile phone program or a normal mobile phone program.

[0034] S2: Analyze the malicious mobile p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a device for processing software malicious behaviors. The method comprises the following steps of: scanning software to obtain a scanning result; analyzing malicious software in the scanning result and classifying the malicious software according to malicious behavior types; and displaying all malicious behavior types and information of malicious software under the malicious behaviors. By classifying the malicious software and displaying names, icons and virus names of the displayed malicious software, users can know which type of software has malicious behaviors, the safety recognition of the users for mobile phone software is improved and processing of the malicious software by the users is further facilitated.

Description

technical field [0001] The invention relates to the field of computer information security, in particular to a method and device for processing malicious behaviors of software. Background technique [0002] With the continuous popularization of smart phones, mobile phone viruses have become the next target of virus development. A mobile phone virus is a destructive program that is as contagious and destructive as a computer virus (program). Mobile phone viruses can be spread by sending text messages, multimedia messages, emails, browsing websites, downloading ringtones, and Bluetooth. Mobile phone viruses may cause the user's mobile phone to crash, shut down, delete data, send spam, make calls, etc., and even damage SIM cards, chips and other hardware. With the development of mobile phones and the increase of mobile phone programs, mobile phone security has become more and more popular among people. [0003] At present, mobile phone viruses have various malicious behavior...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/56
Inventor 张康宗程君杨鹏博牛逢泉李敏怡傅盛徐鸣
Owner ZHUHAI JUNTIAN ELECTRONICS TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products