Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, device and system for checking and killing malicious application programs

A malicious application and killing technology, applied in the computer field, can solve the problems of no stubborn Trojan killing method, inability to detect and kill, and inability to operate mobile terminals.

Inactive Publication Date: 2015-03-25
BEIJING QIHOO TECH CO LTD +1
View PDF3 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, recent Trojan horse updates are more stubborn, and mobile terminals cannot be scanned and killed after being hit by some Trojan horse programs
For example, the existing Trojan program "lock screen Trojan".
[0005] At present, there is no effective method of killing the above-mentioned stubborn Trojans

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for checking and killing malicious application programs
  • Method, device and system for checking and killing malicious application programs
  • Method, device and system for checking and killing malicious application programs

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0118] The embodiment of the present invention provides a method for checking and killing malicious applications. The method is applied to the PC terminal side. By connecting with the mobile terminal, when the mobile terminal is locked and cannot be operated, the malicious application program on the mobile terminal is completed. The killing.

[0119] figure 1 It is a flowchart of a method for checking and killing malicious applications according to an embodiment of the present invention. The method is applied to the PC terminal side and includes steps S102 to S106:

[0120] S102: When the mobile terminal is locked, connect the PC terminal and the mobile terminal.

[0121] S104: Scan the mobile terminal for malicious applications through the PC terminal.

[0122] S106: When there is a malicious application in the mobile terminal, complete the removal of the malicious application by sending a control instruction to the mobile terminal.

[0123] The embodiment of the present invention pro...

Embodiment 2

[0125] The embodiment of the present invention provides a method for detecting and killing malicious applications. The method is applied to the mobile terminal side and is connected with the PC terminal to complete the detection of malicious applications on the mobile terminal when the mobile terminal is locked and cannot be operated. The killing.

[0126] In the present invention, the mobile terminal may be a mobile phone, a tablet computer and other devices.

[0127] figure 2 It is a flowchart of a method for detecting and killing malicious applications provided by an embodiment of the present invention. The method is applied to a mobile terminal and includes steps S202 to S204:

[0128] S202: Connect the mobile terminal and the PC terminal.

[0129] S204: Receive a control instruction sent by the PC terminal.

[0130] Wherein, the aforementioned control instruction is used to complete the removal of malicious applications.

[0131] The embodiment of the present invention provides a ...

Embodiment 3

[0133] The method for detecting and killing malicious applications provided by the present invention is realized by the cooperation of a PC terminal and a mobile terminal. The first embodiment is to describe the method for detecting and killing malicious applications on the PC terminal side. The terminal side explains the method of checking and killing malicious applications.

[0134] The third embodiment is a specific application scenario of the first and second embodiments above, and is described in conjunction with the PC terminal and the mobile terminal side. Through this embodiment, the method provided by the present invention can be explained more clearly and specifically.

[0135] image 3 It is a flowchart of a specific method for checking and killing malicious applications provided by an embodiment of the present invention, including step S301 to step S304.

[0136] In step S301, when the mobile terminal is locked, a connection between the PC terminal and the mobile termina...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method, device and system for checking and killing malicious application programs and relates to the technical field of computers. The method is characterized in that when a mobile terminal is locked, connection between the mobile terminal and a PC terminal is built, the mobile terminal is scanned through the PC terminal to determine whether the malicious application programs exist in the mobile terminal or not, and if so, the PC terminal transmits a control instruction to the mobile terminal to eliminate the malicious application programs. By the method, the problem that the malicious application programs cannot be eliminated due to the fact that the mobile terminal cannot be operated when the mobile terminal is locked is solved.

Description

Technical field [0001] The present invention relates to the field of computer technology, in particular to a method, device and system for checking and killing malicious applications. Background technique [0002] At present, mobile terminals such as mobile phones and tablet computers are increasingly used. Android is a mobile terminal operating system based on an open source protocol. After years of development, it has become quite mature and can provide many functions. [0003] During the development of Android, there are more and more Trojan horse programs targeting Android. These Trojan horse programs can steal user privacy and cause loss of user phone bills. At present, in order to detect and kill Trojan horse programs, you can use Trojan horse detection tools or software. After downloading the Trojan horse detection tool to the mobile terminal for installation, the Trojan horse program existing in the mobile terminal can be scanned and killed. [0004] However, recent Trojan...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/568
Inventor 董清李伟
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products