Nothing Special   »   [go: up one dir, main page]

CN101984692A - Method and device for preventing malicious software from transmitting data - Google Patents

Method and device for preventing malicious software from transmitting data Download PDF

Info

Publication number
CN101984692A
CN101984692A CN2010105464057A CN201010546405A CN101984692A CN 101984692 A CN101984692 A CN 101984692A CN 2010105464057 A CN2010105464057 A CN 2010105464057A CN 201010546405 A CN201010546405 A CN 201010546405A CN 101984692 A CN101984692 A CN 101984692A
Authority
CN
China
Prior art keywords
process information
data
sending
sending request
data sending
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2010105464057A
Other languages
Chinese (zh)
Other versions
CN101984692B (en
Inventor
马震宇
王冲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201010546405.7A priority Critical patent/CN101984692B/en
Priority to PCT/CN2011/071428 priority patent/WO2012065381A1/en
Publication of CN101984692A publication Critical patent/CN101984692A/en
Application granted granted Critical
Publication of CN101984692B publication Critical patent/CN101984692B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/128Anti-malware arrangements, e.g. protection against SMS fraud or mobile malware

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a method for preventing malicious software from transmitting data, which comprises the following steps: intercepting a data transmitting request, and acquiring the process information corresponding to the data transmitting request; and matching the acquired process information with the process information in a preset list database, and transmitting or discarding the intercepted data transmitting request according to the matching result. The invention simultaneously discloses a device for preventing the malicious software from transmitting data, and the method and device of the invention can prevent the malicious software from transmitting data in background, thereby reducing the expense loss and satisfying the user experience.

Description

Method and device for preventing malicious software from sending data
Technical Field
The present invention relates to mobile terminal technologies, and in particular, to a method and an apparatus for preventing malicious software from sending data.
Background
With the development of science and technology, the use population of intelligent mobile terminals such as mobile phones is gradually civilized, the smart phones are no longer the special love of business people, and the user population scale is rapidly expanded. The smart phone has a remarkable characteristic that application software can be flexibly installed, and the characteristic attracts attention of some malicious software along with the continuous expansion of user groups, so that the malicious software which only appears on a computer before appears on the smart phone is started to appear on the smart phone. Since the handset involves a charge problem, namely: there is an economic benefit so malware on smartphones is more harmful than on computers. Generally, the malicious software is bound in some popular normal software, the normal software is used for inducing a user to download, and when the user downloads and installs the software package bound with the malicious software, the malicious software can be operated in a background in a stealing mode.
There are many types of malware behavior, one of which is sending short messages in the background, such as: the short message interface provided by the smart phone is used for ordering some consumption services and the like, or the short message is sent out continuously, the operations cause a great amount of loss of the telephone charge of the user, the loss is not easy to be discovered, some terminals can be discovered only by carefully inquiring the list at the operator, and the economic loss is generally difficult to recover. Therefore, how to find and preferably prevent the behavior of such malicious software in advance in time is particularly important, and thus the loss of telephone charge is prevented, which becomes an urgent need of users.
At present, no technical scheme for preventing malicious software from sending short messages exists.
Disclosure of Invention
In view of the above, the main objective of the present invention is to provide a method and an apparatus for preventing malicious software from sending data, which can prevent the malicious software from sending data in the background and reduce the cost loss.
In order to achieve the purpose, the technical scheme of the invention is realized as follows:
the invention provides a method for preventing malicious software from sending data, which comprises the following steps:
intercepting a data sending request and acquiring process information corresponding to the data sending request;
and matching the acquired process information with the process information in a preset list database, and carrying out corresponding sending or discarding processing on the intercepted data sending request according to a matching result.
In the above scheme, the performing, according to the matching result, corresponding sending or discarding processing on the intercepted data sending request includes:
when the acquired process information is matched with the process information in the white list, the intercepted data sending request is sent;
when the acquired process information is matched with the process information in the blacklist, discarding the intercepted data sending request;
and when the acquired process information cannot be matched with the process information in the list database, displaying relevant information including data content and the acquired process information to a user.
In the above scheme, the method further comprises:
and after the relevant information containing the data content and the acquired process information is displayed to the user, corresponding processing is carried out according to the received command of the user.
In the above scheme, the performing corresponding processing according to the received user command includes:
if the received command is a command which is approved to be sent, sending the intercepted data sending request, and adding the acquired process information into the process information of the white list;
and if the received command is a command which is not approved to be sent, discarding the intercepted data sending request, and adding the acquired process information into the process information of the blacklist.
In the above scheme, the method further comprises: and saving the sending record in a record database.
In the above scheme, the method further comprises: and saving the discarded data sending request to a record database.
The invention also provides a device for preventing malicious software from sending data, which comprises: the system comprises a data interception module, a list judgment module and a processing module; wherein,
the data interception module is used for intercepting a data sending request, acquiring process information corresponding to the data sending request and sending the acquired process information to the list judgment module;
the list judging module is used for matching the acquired process information with the process information in a preset list database after receiving the acquired process information sent by the data intercepting module and sending a matching result to the processing module;
and the processing module is used for carrying out corresponding sending or discarding processing on the intercepted data sending request according to the matching result after receiving the matching result sent by the list judging module.
In the foregoing scheme, the processing module is specifically configured to: and when the acquired process information is matched with the process information in the white list, the intercepted data sending request is sent, when the acquired process information is matched with the process information in the black list, the intercepted data sending request is discarded, and when the acquired process information cannot be matched with the process information in the list database, the relevant information comprising the data content and the acquired process information is displayed to a user.
In the above scheme, the processing module is further configured to send the intercepted data sending request after the received command is a command that agrees to be sent, and add the obtained process information to the process information of the white list; and after the received command is a command which is not approved to be sent, discarding the intercepted data sending request, and adding the acquired process information into the process information of the blacklist.
In the above scheme, the apparatus further comprises: the recording module is used for storing the sending records into the record database after receiving the sending records sent by the processing module, or storing the discarded data sending requests into the record database after receiving the discarded data sending requests sent by the processing module and marking the discarded data sending requests as intercepted;
the processing module is further configured to send a sending record to the recording module after sending the intercepted data sending request, or send a discarded data sending request to the recording module after discarding the intercepted data sending request.
According to the scheme for preventing the malicious software from sending the data, the data sending request is intercepted, the corresponding process information is obtained, the obtained process information is matched with the process information in the preset list database, and the intercepted data sending request is correspondingly sent or discarded according to the matching result, so that the malicious software can be prevented from sending the data in the background, further the cost loss can be reduced, and the user experience can be met.
In addition, the sending records can be stored in the record database, so that the sending history records can be conveniently inquired by a user, and the user experience is further improved.
Drawings
FIG. 1 is a flowchart illustrating a method for preventing malicious software from sending data according to the present invention;
FIG. 2 is a flowchart illustrating a method for preventing malicious software from sending a short message according to an embodiment;
FIG. 3 is a schematic structural diagram of an apparatus for preventing malicious software from sending data according to the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and specific embodiments.
The method for preventing malicious software from sending data, as shown in fig. 1, includes the following steps:
step 101: intercepting a data sending request and acquiring process information corresponding to the data sending request;
here, the data sending request may be a short message sending request, a multimedia message sending request, or other data packet sending requests;
if the intercepted data transmission request is a short message transmission request, the intercepted short message transmission request comprises short message content, a destination address of the short message, transmission time and the like;
in actual use, a data interception module of the intelligent mobile terminal needs to be arranged below a short message interface of the intelligent mobile terminal to intercept each short message sending request;
when application software such as malicious software or normal short message software sends a short message, a short message interface of an intelligent mobile terminal such as a mobile phone needs to be called, at the moment, process information for calling the short message interface of the mobile phone is stored in the process of the intelligent mobile phone, and therefore after the short message sending request is intercepted, process information corresponding to the short message sending request can be obtained from the process information stored in the process of the intelligent mobile phone;
if the intercepted data sending request is a multimedia message sending request, the intercepted multimedia message sending request comprises multimedia message content, a destination address of the multimedia message, sending time and the like;
if the intercepted data transmission request is a data packet transmission request, the intercepted data transmission request comprises a destination website of the data packet, the content of the data packet, transmission time and the like;
similarly, when the multimedia message or the data packet is sent, the corresponding interface of the smart phone needs to be called, at this time, the process information for calling the corresponding interface of the smart phone is stored in the process of the smart phone, so that after the data sending request is intercepted, the process information corresponding to the data sending request can be obtained from the process information stored in the process of the smart phone.
Step 102: matching the acquired process information with the process information in a preset list database, and carrying out corresponding sending or discarding processing on the intercepted data sending request according to a matching result;
here, the list database includes process information of a white list and process information of a black list; the process information of the white list is process information which can send data outwards, and the process information of the black list is process information which can not send data outwards;
the corresponding sending or discarding processing is performed on the intercepted data sending request according to the matching result, and specifically includes:
when the acquired process information is matched with the process information in the white list, the intercepted data sending request is sent, when the acquired process information is matched with the process information in the black list, the intercepted data sending request is discarded, and when the acquired process information cannot be matched with the process information in the list database, the relevant information containing the data content and the acquired process information is displayed to a user;
wherein, the data content can be short message content, multimedia message content or data packet content; the related information can also comprise a destination address, sending time or a destination website of a data packet, sending time and the like of the short message or the multimedia message; after relevant information containing data content and the acquired process information is displayed to a user, corresponding processing is carried out according to a received command of the user, specifically, if the received command is a command which is approved to be sent, the intercepted data sending request is sent, and if the received command is a command which is not approved to be sent, the intercepted data sending request is discarded; at this time, further, the acquired process information may be added to a list database, specifically, if the data transmission request is sent, the acquired process information is added to the process information of a white list, and if the intercepted data transmission request is discarded, the acquired process information is added to the process information of a black list;
when the intercepted data transmission request is a short message transmission request, the sending of the intercepted data transmission request specifically comprises:
calling a short message module of the mobile terminal, and sending a short message by the short message module; the specific processing flow of the short message module for sending the short message is completely the same as the existing processing flow;
after transmitting the intercepted data transmission request, the method may further include:
storing the sending record in a record database so that a user can inquire the sending history record afterwards; further, the discarded data sending request can also be stored in a record database and marked as intercepted; the transmission history record contains data content, corresponding process information and other contents.
Taking the short message as an example, as shown in fig. 2, the method for preventing malicious software from sending the short message in the embodiment includes the following steps:
step 201: intercepting a short message sending request and acquiring process information corresponding to the short message sending request;
here, the intercepted short message sending request includes the content of the short message, the destination address of the short message, the sending time, and the like.
Step 202: judging whether the acquired process information can be matched with the process information in a preset list database, wherein the list database comprises the process information of a white list and the process information of a black list, executing a step 203a if the acquired process information is matched with the process information in the white list, executing a step 203b if the acquired process information is matched with the process information in the black list, and executing a step 204 if the acquired process information cannot be matched with the process information in the list database.
Step 203 a: and sending the intercepted short message sending request, and then executing step 207.
Step 203 b: the intercepted sms message transmission request is discarded, and then step 208 is executed.
Step 204: displaying relevant information containing short message content and the acquired process information to a user, executing step 205 after receiving a command of agreeing to send, and executing step 206 after receiving a command of not agreeing to send;
here, the related information includes: the content of the short message, the acquired process information, the destination address of the short message, the sending time and the like.
Step 205: and sending the intercepted short message sending request, adding the acquired process information into the process information of the white list, and then executing step 207.
Step 206: discarding the intercepted short message sending request, adding the acquired process information to the process information of the blacklist, and then executing step 208.
Step 207: the transmission record is saved to the record database, after which step 209 is performed.
Step 208: the discarded intercepted sms message sending request is saved in the record database and marked as intercepted, and then step 209 is executed.
Step 209: the current processing flow is ended.
In order to implement the foregoing method, the present invention further provides an apparatus for preventing malware from sending data, where as shown in fig. 3, the apparatus includes: a data interception module 31, a list judgment module 32, and a processing module 33; wherein,
the data intercepting module 31 is configured to intercept a data sending request, acquire process information corresponding to the data sending request, and send the acquired process information to the list judging module 32;
the list judgment module 32 is configured to match the acquired process information with process information in a preset list database after receiving the acquired process information sent by the data interception module 31, and send a matching result to the processing module 33;
and the processing module 33 is configured to, after receiving the matching result sent by the list judging module 32, perform corresponding sending or discarding processing on the intercepted data sending request according to the matching result.
If the data interception module is used for intercepting the short messages, the data interception module 31 is arranged below a short message interface of the intelligent mobile terminal and intercepts each short message sending request.
The processing module 33 is specifically configured to:
and when the acquired process information is matched with the process information in the white list, the intercepted data sending request is sent, when the acquired process information is matched with the process information in the black list, the intercepted data sending request is discarded, and when the acquired process information cannot be matched with the process information in the list database, the relevant information comprising the data content and the acquired process information is displayed to a user.
The apparatus may further comprise: the recording module is used for storing the sending record into the record database after receiving the sending record sent by the processing module 33;
the processing module 33 is further configured to send a sending record to the recording module after sending the intercepted data sending request.
The processing module 33 is further configured to, after discarding the intercepted data sending request, send the discarded data sending request to the recording module;
and the recording module is further configured to, after receiving the discarded data sending request sent by the processing module 33, store the discarded data sending request into the recording database, and mark the discarded data sending request as intercepted.
The processing module 33 is further configured to send the intercepted data sending request after the received command is a command that agrees to be sent, and add the acquired process information to the process information of the white list; and after the received command is a command which is not approved to be sent, discarding the intercepted data sending request, and adding the acquired process information into the process information of the blacklist.
The above description is only exemplary of the present invention and should not be taken as limiting the scope of the present invention, and any modifications, equivalents, improvements, etc. that are within the spirit and principle of the present invention should be included in the present invention.

Claims (10)

1. A method for preventing malware from sending data, the method comprising:
intercepting a data sending request and acquiring process information corresponding to the data sending request;
and matching the acquired process information with the process information in a preset list database, and carrying out corresponding sending or discarding processing on the intercepted data sending request according to a matching result.
2. The method according to claim 1, wherein said performing corresponding sending or discarding processing on the intercepted data sending request according to the matching result is:
when the acquired process information is matched with the process information in the white list, the intercepted data sending request is sent;
when the acquired process information is matched with the process information in the blacklist, discarding the intercepted data sending request;
and when the acquired process information cannot be matched with the process information in the list database, displaying relevant information including data content and the acquired process information to a user.
3. The method of claim 2, further comprising:
and after the relevant information containing the data content and the acquired process information is displayed to the user, corresponding processing is carried out according to the received command of the user.
4. The method according to claim 3, wherein the corresponding processing according to the received user command is:
if the received command is a command which is approved to be sent, sending the intercepted data sending request, and adding the acquired process information into the process information of the white list;
and if the received command is a command which is not approved to be sent, discarding the intercepted data sending request, and adding the acquired process information into the process information of the blacklist.
5. The method according to any one of claims 1 to 4, characterized in that the method further comprises:
and saving the sending record in a record database.
6. The method according to any one of claims 1 to 4, characterized in that the method further comprises:
and saving the discarded data sending request to a record database.
7. An apparatus for preventing malware from sending data, the apparatus comprising: the system comprises a data interception module, a list judgment module and a processing module; wherein,
the data interception module is used for intercepting a data sending request, acquiring process information corresponding to the data sending request and sending the acquired process information to the list judgment module;
the list judging module is used for matching the acquired process information with the process information in a preset list database after receiving the acquired process information sent by the data intercepting module and sending a matching result to the processing module;
and the processing module is used for carrying out corresponding sending or discarding processing on the intercepted data sending request according to the matching result after receiving the matching result sent by the list judging module.
8. The apparatus of claim 7, wherein the processing module is specifically configured to:
and when the acquired process information is matched with the process information in the white list, the intercepted data sending request is sent, when the acquired process information is matched with the process information in the black list, the intercepted data sending request is discarded, and when the acquired process information cannot be matched with the process information in the list database, the relevant information comprising the data content and the acquired process information is displayed to a user.
9. The apparatus according to claim 8, wherein the processing module is further configured to send the intercepted data sending request after the received command is a command that is approved to be sent, and add the obtained process information to process information of a white list; and after the received command is a command which is not approved to be sent, discarding the intercepted data sending request, and adding the acquired process information into the process information of the blacklist.
10. The apparatus of any one of claims 7 to 9, further comprising: the recording module is used for storing the sending records into the record database after receiving the sending records sent by the processing module, or storing the discarded data sending requests into the record database after receiving the discarded data sending requests sent by the processing module and marking the discarded data sending requests as intercepted;
the processing module is further configured to send a sending record to the recording module after sending the intercepted data sending request, or send a discarded data sending request to the recording module after discarding the intercepted data sending request.
CN201010546405.7A 2010-11-15 2010-11-15 A kind of method and device for preventing Malware from sending data Expired - Fee Related CN101984692B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201010546405.7A CN101984692B (en) 2010-11-15 2010-11-15 A kind of method and device for preventing Malware from sending data
PCT/CN2011/071428 WO2012065381A1 (en) 2010-11-15 2011-03-01 Method and apparatus for preventing malicious softwares from transmitting data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010546405.7A CN101984692B (en) 2010-11-15 2010-11-15 A kind of method and device for preventing Malware from sending data

Publications (2)

Publication Number Publication Date
CN101984692A true CN101984692A (en) 2011-03-09
CN101984692B CN101984692B (en) 2017-07-28

Family

ID=43641862

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010546405.7A Expired - Fee Related CN101984692B (en) 2010-11-15 2010-11-15 A kind of method and device for preventing Malware from sending data

Country Status (2)

Country Link
CN (1) CN101984692B (en)
WO (1) WO2012065381A1 (en)

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102547713A (en) * 2011-12-21 2012-07-04 成都三零瑞通移动通信有限公司 Anti-activating method aiming at X undercover software
CN102629909A (en) * 2012-03-30 2012-08-08 奇智软件(北京)有限公司 Traffic counting method and system based on processes
CN102769703A (en) * 2012-07-17 2012-11-07 青岛海信移动通信技术股份有限公司 Mobile phone terminal and firewall monitoring method
WO2012159474A1 (en) * 2011-05-20 2012-11-29 北京中研瑞丰信息技术研究所(有限合伙) Malicious behavior detection method and system based on smartphone radio interface layer
CN103067923A (en) * 2013-01-18 2013-04-24 浙江长天信息技术有限公司 Secret short message detecting and alarming method
CN103218552A (en) * 2012-01-19 2013-07-24 华为终端有限公司 Safety management method and device based on user behavior
CN103220658A (en) * 2012-01-19 2013-07-24 中国移动通信集团广东有限公司 Fee deduction preventing method and method, device and system of fee deduction preventing detection
CN103354540A (en) * 2012-12-21 2013-10-16 北京安天电子设备有限公司 Method and device for detecting malicious codes of android system
CN103412793A (en) * 2013-07-29 2013-11-27 北京奇虎科技有限公司 Method, device and system for optimizing system resources
CN104066090A (en) * 2013-03-21 2014-09-24 联想(北京)有限公司 Information processing method and electronic device
CN104125546A (en) * 2014-04-03 2014-10-29 上海粱江通信系统股份有限公司 Short message subscription business type centralized management and control method and system
CN104270763A (en) * 2014-10-27 2015-01-07 中国建设银行股份有限公司 Message protection method and system
CN104331406A (en) * 2013-12-20 2015-02-04 乐视网信息技术(北京)股份有限公司 Database capacity control method and database capacity control device
CN104639749A (en) * 2015-02-04 2015-05-20 广东欧珀移动通信有限公司 Short message sending control method and device
CN106068014A (en) * 2016-06-20 2016-11-02 广东欧珀移动通信有限公司 Note monitor method and device
CN106446675A (en) * 2016-08-30 2017-02-22 维沃移动通信有限公司 Short message processing method and mobile terminal
CN106650447A (en) * 2016-12-28 2017-05-10 北京安天电子设备有限公司 Method and system for preventing PowerShell malicious code execution
CN106778276A (en) * 2016-12-29 2017-05-31 北京安天网络安全技术有限公司 A kind of method and system for detecting incorporeity file malicious code
CN107592314A (en) * 2017-09-20 2018-01-16 郑州云海信息技术有限公司 A kind of order line authority control method and device
CN108229151A (en) * 2016-12-09 2018-06-29 武汉安天信息技术有限责任公司 A kind of anti-short message applied to mobile terminal kidnaps method and device
CN112084502A (en) * 2020-09-18 2020-12-15 珠海豹趣科技有限公司 Software identification method and device, electronic equipment and storage medium
CN112615961A (en) * 2020-12-25 2021-04-06 珠海格力电器股份有限公司 Method and device for processing short message sending request

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103874036A (en) * 2012-12-13 2014-06-18 李卓桓 Mobile phone message authentication method and apparatus

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101137100A (en) * 2007-09-30 2008-03-05 中兴通讯股份有限公司 Method of implementing handset multimedia message firewall
US7640589B1 (en) * 2009-06-19 2009-12-29 Kaspersky Lab, Zao Detection and minimization of false positives in anti-malware processing
WO2010010060A2 (en) * 2008-07-21 2010-01-28 F-Secure Oyj Telephony fraud prevention
CN101771686A (en) * 2009-12-31 2010-07-07 卓望数码技术(深圳)有限公司 Communication method and network adapter

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1889423A (en) * 2006-07-25 2007-01-03 华为技术有限公司 Method for filtering short message and mobile terminal
CN102088679A (en) * 2009-12-08 2011-06-08 北京网秦天下科技有限公司 Working method and system of intelligent short message firewall of self-learning mobile terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101137100A (en) * 2007-09-30 2008-03-05 中兴通讯股份有限公司 Method of implementing handset multimedia message firewall
WO2010010060A2 (en) * 2008-07-21 2010-01-28 F-Secure Oyj Telephony fraud prevention
US7640589B1 (en) * 2009-06-19 2009-12-29 Kaspersky Lab, Zao Detection and minimization of false positives in anti-malware processing
CN101771686A (en) * 2009-12-31 2010-07-07 卓望数码技术(深圳)有限公司 Communication method and network adapter

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
北京信安易科技有限公司: "《信安易卫士2.0 For S60(大众版)用户手册》", 28 February 2009 *
江广顺: "《中国优秀硕士学位论文全文数据库》", 15 September 2007 *

Cited By (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012159474A1 (en) * 2011-05-20 2012-11-29 北京中研瑞丰信息技术研究所(有限合伙) Malicious behavior detection method and system based on smartphone radio interface layer
CN102547713A (en) * 2011-12-21 2012-07-04 成都三零瑞通移动通信有限公司 Anti-activating method aiming at X undercover software
CN103218552B (en) * 2012-01-19 2016-01-20 华为终端有限公司 Based on method for managing security and the device of user behavior
CN103218552A (en) * 2012-01-19 2013-07-24 华为终端有限公司 Safety management method and device based on user behavior
CN103220658A (en) * 2012-01-19 2013-07-24 中国移动通信集团广东有限公司 Fee deduction preventing method and method, device and system of fee deduction preventing detection
CN102629909B (en) * 2012-03-30 2015-09-16 北京奇虎科技有限公司 Based on flow statistical method and the system of process
CN102629909A (en) * 2012-03-30 2012-08-08 奇智软件(北京)有限公司 Traffic counting method and system based on processes
CN102769703A (en) * 2012-07-17 2012-11-07 青岛海信移动通信技术股份有限公司 Mobile phone terminal and firewall monitoring method
CN103354540A (en) * 2012-12-21 2013-10-16 北京安天电子设备有限公司 Method and device for detecting malicious codes of android system
CN103354540B (en) * 2012-12-21 2016-05-18 北京安天电子设备有限公司 A kind of malicious code detecting method of Android system and device
CN103067923A (en) * 2013-01-18 2013-04-24 浙江长天信息技术有限公司 Secret short message detecting and alarming method
CN104066090A (en) * 2013-03-21 2014-09-24 联想(北京)有限公司 Information processing method and electronic device
CN104066090B (en) * 2013-03-21 2018-12-14 联想(北京)有限公司 A kind of information processing method and electronic equipment
CN103412793A (en) * 2013-07-29 2013-11-27 北京奇虎科技有限公司 Method, device and system for optimizing system resources
CN104331406A (en) * 2013-12-20 2015-02-04 乐视网信息技术(北京)股份有限公司 Database capacity control method and database capacity control device
CN104125546A (en) * 2014-04-03 2014-10-29 上海粱江通信系统股份有限公司 Short message subscription business type centralized management and control method and system
CN104125546B (en) * 2014-04-03 2018-05-04 上海粱江通信系统股份有限公司 Short message subscribing service type concentrate tube prosecutor method and system
CN104270763A (en) * 2014-10-27 2015-01-07 中国建设银行股份有限公司 Message protection method and system
CN104639749A (en) * 2015-02-04 2015-05-20 广东欧珀移动通信有限公司 Short message sending control method and device
CN104639749B (en) * 2015-02-04 2018-01-23 广东欧珀移动通信有限公司 Short message sending control method and device
CN106068014A (en) * 2016-06-20 2016-11-02 广东欧珀移动通信有限公司 Note monitor method and device
CN106446675A (en) * 2016-08-30 2017-02-22 维沃移动通信有限公司 Short message processing method and mobile terminal
CN108229151A (en) * 2016-12-09 2018-06-29 武汉安天信息技术有限责任公司 A kind of anti-short message applied to mobile terminal kidnaps method and device
CN106650447A (en) * 2016-12-28 2017-05-10 北京安天电子设备有限公司 Method and system for preventing PowerShell malicious code execution
CN106778276A (en) * 2016-12-29 2017-05-31 北京安天网络安全技术有限公司 A kind of method and system for detecting incorporeity file malicious code
CN106778276B (en) * 2016-12-29 2020-06-19 北京安天网络安全技术有限公司 Method and system for detecting malicious codes of entity-free files
CN107592314A (en) * 2017-09-20 2018-01-16 郑州云海信息技术有限公司 A kind of order line authority control method and device
CN112084502A (en) * 2020-09-18 2020-12-15 珠海豹趣科技有限公司 Software identification method and device, electronic equipment and storage medium
CN112615961A (en) * 2020-12-25 2021-04-06 珠海格力电器股份有限公司 Method and device for processing short message sending request

Also Published As

Publication number Publication date
WO2012065381A1 (en) 2012-05-24
CN101984692B (en) 2017-07-28

Similar Documents

Publication Publication Date Title
CN101984692B (en) A kind of method and device for preventing Malware from sending data
US8204484B2 (en) System and method for managing missed calls and unread messages
US20080268882A1 (en) Short message service enhancement techniques for added communication options
CN101651731A (en) Method and system for managing address book and mobile terminal
CN110381207B (en) Method and device for connecting communication terminal, computer equipment and storage medium
CN103345696A (en) Display method, device and mobile terminal of pushing information
CN101610314B (en) Communication event processing method and device thereof
US9531818B2 (en) Information notification methods, apparatuses and electronic devices
CN103580998A (en) Method and device for sharing communication behavior information
CN104113620A (en) Contact list updating method, updating device and user terminal
CN103024134B (en) A kind of for the information processing method of communicating terminal, device and terminal
CN104394280B (en) The menu option display methods and device of the communication information
CN104053132A (en) Method and apparatus for information number identification
CN106559766A (en) Reservation type calling, answering method and device and server based on mobile phone terminal
CN105516933A (en) Message processing method, message processing device, mobile terminal and server
CN103841172A (en) Application download operation statistic method and device based on user terminal identification comparison
CN102655690A (en) Information notifying method and device and electronic equipment
CN104796519A (en) Terminal
CN103338315A (en) Information processing method and device
CN103841508A (en) User information obtaining method and information aggregation platform
CN104506599A (en) Information processing method, server and terminal
CN101778152A (en) Method and terminal for protecting user privacy information
CN104780252A (en) Contact list management method
KR101669021B1 (en) Apparatus and method for managementing phonebook in portable terminal
KR20070041157A (en) Method for displaying letteering data in sending short message service and mobile communication switching system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170728

Termination date: 20201115