CN101984692A - Method and device for preventing malicious software from transmitting data - Google Patents
Method and device for preventing malicious software from transmitting data Download PDFInfo
- Publication number
- CN101984692A CN101984692A CN2010105464057A CN201010546405A CN101984692A CN 101984692 A CN101984692 A CN 101984692A CN 2010105464057 A CN2010105464057 A CN 2010105464057A CN 201010546405 A CN201010546405 A CN 201010546405A CN 101984692 A CN101984692 A CN 101984692A
- Authority
- CN
- China
- Prior art keywords
- progress information
- obtains
- sending request
- data
- data sending
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/128—Anti-malware arrangements, e.g. protection against SMS fraud or mobile malware
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a method for preventing malicious software from transmitting data, which comprises the following steps: intercepting a data transmitting request, and acquiring the process information corresponding to the data transmitting request; and matching the acquired process information with the process information in a preset list database, and transmitting or discarding the intercepted data transmitting request according to the matching result. The invention simultaneously discloses a device for preventing the malicious software from transmitting data, and the method and device of the invention can prevent the malicious software from transmitting data in background, thereby reducing the expense loss and satisfying the user experience.
Description
Technical field
The present invention relates to the portable terminal technology, be meant that especially a kind of Malware that prevents sends the method and the device of data.
Background technology
Along with science and technology development, intelligent mobile terminal is popular gradually such as the use crowd of mobile phone, and smart mobile phone no longer is business people's a special love, and its customer group scale is rapidly expanded.A distinguishing feature of smart mobile phone is that application software can be installed flexibly, and along with the continuous expansion of customer group, these characteristics have also caused the concern of some Malwares, and the Malware that only just occurs had on computers begun to occur on smart mobile phone in the past.Because mobile phone involves the telephone expenses problem, that is: have economic interests, so on the Malware on the smart mobile phone and the computer to compare harm bigger.Generally, Malware can be bundled in some relatively popular normal software, utilizes normal software to induce the user to go to download, when user's download after those have bundled software kits of Malware and have installed, Malware will stealthily move on the backstage.
The behavior of Malware has number of different types, wherein a kind of is exactly to send note on the backstage, such as: the short message interface that utilizes smart mobile phone to provide, order some consumption services etc., perhaps, ceaselessly outer sending short messages, these operations all can cause a large amount of losses of user telephone fee, but also being difficult for being realized to have only and locate carefully to inquire about inventory to operator afterwards and could find some clues, economic loss is generally difficult to retrieve.Therefore, how in time to find, preferably can take precautions against the behavior of this class Malware in advance, and then prevent the telephone expenses loss, just seeming is even more important, and has become user's active demand.
At present, do not prevent that also Malware from sending the technical scheme of note.
Summary of the invention
In view of this, main purpose of the present invention is to provide a kind of Malware that prevents to send the method and the device of data, can stop Malware to send data on the backstage, reduces expenses.
For achieving the above object, technical scheme of the present invention is achieved in that
The invention provides a kind of Malware that prevents and send the method for data, this method comprises:
Data interception sends request, and obtains the progress information of described data sending request correspondence;
Progress information in progress information that obtains and the name single database that sets in advance is mated,, the data sending request of tackling is sent or discard processing accordingly according to matching result.
In the such scheme, described according to matching result, the data sending request of tackling is sent or discard processing accordingly, for:
When the described progress information that obtains and the progress information in the white list are complementary, then send the data sending request of described interception;
When the described progress information that obtains and the progress information in the blacklist are complementary, then abandon the data sending request of described interception;
When the progress information in described progress information that obtains and the name single database can not mate, the relative information displaying that will comprise data content and the described progress information that obtains was given the user.
In the such scheme, this method further comprises:
The relative information displaying that will comprise data content and the described progress information that obtains is made corresponding processing to behind the user according to the user's who receives order.
In the such scheme, corresponding processing is made in the user's that described basis is received order, for:
If the order of receiving is when agreeing the order of transmission, then sends the data sending request of described interception, and the described progress information that obtains is added in the progress information of white list;
If the order of receiving is when disagreeing with the order of transmission, then abandons the data sending request of described interception, and the described progress information that obtains is added in the progress information of blacklist.
In the such scheme, this method further comprises: will send recorded and stored in database of record.
In the such scheme, this method further comprises: the data sending request that will abandon is saved in the database of record.
The present invention also provides a kind of Malware that prevents to send the device of data, and this device comprises: data interception module, list judge module, and processing module; Wherein,
The data interception module is used for data interception and sends request, and obtain the progress information of described data sending request correspondence, and the progress information that obtains is sent to the list judge module;
The list judge module is used for after receiving the progress information that obtains that the data interception module sends, and the progress information in progress information that obtains and the name single database that sets in advance is mated, and matching result is sent to processing module;
Processing module is used for after receiving the matching result that the list judge module sends, and according to matching result, the data sending request of tackling is sent or discard processing accordingly.
In the such scheme, described processing module, specifically be used for: when the progress information of described progress information that obtains and white list is complementary, then send the data sending request of described interception, when the described progress information that obtains and the progress information in the blacklist are complementary, then abandon the data sending request of described interception, when the progress information in described progress information that obtains and the name single database can not mate, the relative information displaying that will comprise data content and the described progress information that obtains was given the user.
In the such scheme, described processing module also is used for sending the data sending request of described interception after the order of receiving is for the order of agreeing to send, and the described progress information that obtains is added in the progress information of white list; After the order of receiving is to disagree with the order of transmission, then abandons the data sending request of described interception, and the described progress information that obtains is added in the progress information of blacklist.
In the such scheme, this device further comprises: logging modle, be used for after receiving the transmission record that processing module sends, to send recorded and stored in database of record, perhaps, after receiving the data sending request that has abandoned that processing module sends, the data sending request that has abandoned also is saved in the database of record, and is marked as and is blocked;
Described processing module also is used for after the data sending request that sends described interception, will send record and send to logging modle, perhaps, after abandoning the data sending request of described interception, the data sending request that has abandoned is sent to logging modle.
The Malware that prevents provided by the invention sends the scheme of data, data interception sends request, and obtain corresponding progress information, progress information in progress information that obtains and the name single database that sets in advance is mated,, the data sending request of tackling is sent or discard processing accordingly according to matching result, so, can stop Malware to send data, and then can reduce expenses, satisfy user experience on the backstage.
In addition, can will send recorded and stored in database of record, so, can make things convenient for user inquiring to send historical record, further promote user experience.
Description of drawings
Fig. 1 sends the method flow schematic diagram of data for the present invention prevents Malware;
Fig. 2 sends the method flow schematic diagram of note for embodiment prevents Malware;
Fig. 3 sends the apparatus structure schematic diagram of data for the present invention prevents Malware.
Embodiment
The present invention is further described in more detail below in conjunction with drawings and the specific embodiments.
The present invention prevents that Malware from sending the method for data, as shown in Figure 1, may further comprise the steps:
Step 101: data interception sends request, and obtains the progress information of data sending request correspondence;
Here, described data sending request can be that note sends request, multimedia message sends request or other packet sends request;
If the data sending request of interception is a note when sending request, the note of interception sends destination address that request comprises short message content, note, and transmitting time etc.;
When reality is used, the data interception module of intelligent mobile terminal need be arranged at intelligent mobile terminal short message interface below, tackle each note and send request;
When application software such as Malware or normal note software send note, need call the short message interface of intelligent mobile terminal such as mobile phone, at this moment, in the process of smart mobile phone, can preserve the progress information of the short message interface of calling mobile phone, therefore, after the interception note sends request, obtain note in the progress information that can from the process of smart mobile phone, preserve and send the corresponding progress information of request;
If the data sending request of interception is multimedia message when sending request, the multimedia message of interception sends destination address that request comprises MMS content, multimedia message, and transmitting time etc.;
If the data sending request of interception is a packet when sending request, the data sending request of interception comprises purpose network address, packet content, and the transmitting time etc. of packet;
Same, when sending multimedia message or packet, need call the smart mobile phone corresponding interface, at this moment, in the process of smart mobile phone, can preserve the progress information of calling mobile phone corresponding interface, therefore, after data interception sends request, obtain the progress information of data sending request correspondence in the progress information that can from the process of smart mobile phone, preserve.
Step 102: the progress information in progress information that obtains and the name single database that sets in advance is mated,, the data sending request of tackling is sent or discard processing accordingly according to matching result;
Here, described name single database comprises the progress information of white list and the progress information of blacklist; Wherein, the progress information of white list is for outwards sending the progress information of data, and the progress information of blacklist is for can not outwards sending the progress information of data;
Described according to matching result, the data sending request of tackling is sent or discard processing accordingly, be specially:
When the described progress information that obtains and the progress information in the white list are complementary, then send the data sending request of described interception, when the described progress information that obtains and the progress information in the blacklist are complementary, then abandon the data sending request of described interception, when the progress information in described progress information that obtains and the name single database can not mate, the relative information displaying that will comprise data content and the described progress information that obtains was given the user;
Wherein, described data content can be short message content, MMS content or packet content; Described relevant information can also comprise purpose network address, transmitting time of destination address, transmitting time or the packet of note or multimedia message etc.; The relative information displaying that will comprise data content and the described progress information that obtains is to behind the user, make corresponding processing according to the user's who receives order, particularly, if the order of the order of receiving for agreeing to send, then send the data sending request of described interception, if the order of receiving is the order of disagreeing with transmission, then abandon the data sending request of described interception; At this moment, further, the described progress information that obtains can be added in the single database, particularly, if sent described data sending request, then the described progress information that obtains is added in the progress information of white list,, then the described progress information that obtains is added in the progress information of blacklist if abandoned the data sending request of described interception;
When the data sending request of described interception was note transmission request, the data sending request of the described interception of described transmission was specially:
Call the SMS module of portable terminal, send note by SMS module; Wherein, the concrete handling process and the existing handling process of SMS module transmission note are identical;
After the data sending request that sends described interception, this method may further include:
The user will send recorded and stored in database of record, so that can inquire about the transmission historical record afterwards; Further, the data sending request that has abandoned also can also be saved in the database of record, and be marked as and be blocked; Described transmission historical record comprises the contents such as progress information of data content, correspondence.
Be example below with the note, present embodiment prevents that Malware from sending the method for note, as shown in Figure 2, may further comprise the steps:
Step 201: the interception note sends request, and obtains the corresponding progress information of note transmission request;
Here, the note of described interception sends destination address that request comprises short message content, note, and transmitting time etc.
Step 202: judge whether the progress information obtain and progress information in the name single database that sets in advance can mate, described name single database comprises the progress information of white list and the progress information of blacklist, if described progress information that obtains and the progress information in the white list are complementary, execution in step 203a then, if described progress information that obtains and the progress information in the blacklist are complementary, execution in step 203b then, if the progress information in described progress information that obtains and the name single database can not mate, then execution in step 204.
Step 203a: the note that sends described interception sends request, and execution in step 207 afterwards.
Step 204: the relative information displaying that will comprise short message content and the described progress information that obtains is given the user, and after receiving the order of agreeing to send, execution in step 205, after receiving the order of disagreeing with transmission, execution in step 206;
Here, described relevant information comprises: the destination address of short message content, the described progress information that obtains, note, transmitting time etc.
Step 205: the note that sends described interception sends request, and the described progress information that obtains is added in the progress information of white list, and execution in step 207 afterwards.
Step 206: the note that abandons described interception sends request, and the described progress information that obtains is added in the progress information of blacklist, and execution in step 208 afterwards.
Step 207: will send recorded and stored in database of record, execution in step 209 afterwards.
Step 208: the note of the described interception that will abandon sends request and is saved in the database of record, and is marked as and is blocked, and execution in step 209 afterwards.
Step 209: finish current handling process.
Be to realize that said method, the present invention also provide a kind of Malware that prevents to send the device of data, as described in Figure 3, this device comprises: data interception module 31, list judge module 32, and processing module 33; Wherein,
Wherein, if when being used to tackle note, data interception module 31 be arranged at intelligent mobile terminal short message interface below, tackle each note and send request.
Described processing module 33 specifically is used for:
When the described progress information that obtains and the progress information in the white list are complementary, then send the data sending request of described interception, when the described progress information that obtains and the progress information in the blacklist are complementary, then abandon the data sending request of described interception, when the progress information in described progress information that obtains and the name single database can not mate, the relative information displaying that will comprise data content and the described progress information that obtains was given the user.
This device can further include: logging modle is used for will sending recorded and stored in database of record after receiving the transmission record that processing module 33 sends;
Described processing module 33 also is used for after the data sending request that sends described interception, will send record and send to logging modle.
Described processing module 33 also is used for after abandoning the data sending request of described interception the data sending request that has abandoned being sent to logging modle;
Logging modle also is used for after receiving the data sending request that has abandoned that processing module 33 sends the data sending request that has abandoned also being saved in the database of record, and is marked as and is blocked.
Described processing module 33 also is used for sending the data sending request of described interception after the order of receiving is for the order of agreeing to send, and the described progress information that obtains is added in the progress information of white list; After the order of receiving is to disagree with the order of transmission, then abandons the data sending request of described interception, and the described progress information that obtains is added in the progress information of blacklist.
The above is preferred embodiment of the present invention only, is not to be used to limit protection scope of the present invention, all any modifications of being done within the spirit and principles in the present invention, is equal to and replaces and improvement etc., all should be included within protection scope of the present invention.
Claims (10)
1. one kind prevents that Malware from sending the method for data, is characterized in that this method comprises:
Data interception sends request, and obtains the progress information of described data sending request correspondence;
Progress information in progress information that obtains and the name single database that sets in advance is mated,, the data sending request of tackling is sent or discard processing accordingly according to matching result.
2. method according to claim 1 is characterized in that, and is described according to matching result, the data sending request of tackling is sent or discard processing accordingly, for:
When the described progress information that obtains and the progress information in the white list are complementary, then send the data sending request of described interception;
When the described progress information that obtains and the progress information in the blacklist are complementary, then abandon the data sending request of described interception;
When the progress information in described progress information that obtains and the name single database can not mate, the relative information displaying that will comprise data content and the described progress information that obtains was given the user.
3. method according to claim 2 is characterized in that, this method further comprises:
The relative information displaying that will comprise data content and the described progress information that obtains is made corresponding processing to behind the user according to the user's who receives order.
4. method according to claim 3 is characterized in that corresponding processing is made in the user's that described basis is received order, for:
If the order of receiving is when agreeing the order of transmission, then sends the data sending request of described interception, and the described progress information that obtains is added in the progress information of white list;
If the order of receiving is when disagreeing with the order of transmission, then abandons the data sending request of described interception, and the described progress information that obtains is added in the progress information of blacklist.
5. according to each described method of claim 1 to 4, it is characterized in that this method further comprises:
To send recorded and stored in database of record.
6. according to each described method of claim 1 to 4, it is characterized in that this method further comprises:
The data sending request that has abandoned is saved in the database of record.
7. one kind prevents that Malware from sending the device of data, is characterized in that this device comprises: data interception module, list judge module, and processing module; Wherein,
The data interception module is used for data interception and sends request, and obtain the progress information of described data sending request correspondence, and the progress information that obtains is sent to the list judge module;
The list judge module is used for after receiving the progress information that obtains that the data interception module sends, and the progress information in progress information that obtains and the name single database that sets in advance is mated, and matching result is sent to processing module;
Processing module is used for after receiving the matching result that the list judge module sends, and according to matching result, the data sending request of tackling is sent or discard processing accordingly.
8. device according to claim 7 is characterized in that, described processing module specifically is used for:
When the described progress information that obtains and the progress information in the white list are complementary, then send the data sending request of described interception, when the described progress information that obtains and the progress information in the blacklist are complementary, then abandon the data sending request of described interception, when the progress information in described progress information that obtains and the name single database can not mate, the relative information displaying that will comprise data content and the described progress information that obtains was given the user.
9. device according to claim 8, it is characterized in that described processing module also is used for after the order of receiving is for the order of agreeing to send, send the data sending request of described interception, and the described progress information that obtains is added in the progress information of white list; After the order of receiving is to disagree with the order of transmission, then abandons the data sending request of described interception, and the described progress information that obtains is added in the progress information of blacklist.
10. according to each described device of claim 7 to 9, it is characterized in that, this device further comprises: logging modle, be used for after receiving the transmission record that processing module sends, to send recorded and stored in database of record, perhaps, after receiving the data sending request that has abandoned that processing module sends, the data sending request that has abandoned also is saved in the database of record, and is marked as and is blocked;
Described processing module also is used for after the data sending request that sends described interception, will send record and send to logging modle, perhaps, after abandoning the data sending request of described interception, the data sending request that has abandoned is sent to logging modle.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201010546405.7A CN101984692B (en) | 2010-11-15 | 2010-11-15 | A kind of method and device for preventing Malware from sending data |
PCT/CN2011/071428 WO2012065381A1 (en) | 2010-11-15 | 2011-03-01 | Method and apparatus for preventing malicious softwares from transmitting data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201010546405.7A CN101984692B (en) | 2010-11-15 | 2010-11-15 | A kind of method and device for preventing Malware from sending data |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101984692A true CN101984692A (en) | 2011-03-09 |
CN101984692B CN101984692B (en) | 2017-07-28 |
Family
ID=43641862
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201010546405.7A Expired - Fee Related CN101984692B (en) | 2010-11-15 | 2010-11-15 | A kind of method and device for preventing Malware from sending data |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN101984692B (en) |
WO (1) | WO2012065381A1 (en) |
Cited By (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102547713A (en) * | 2011-12-21 | 2012-07-04 | 成都三零瑞通移动通信有限公司 | Anti-activating method aiming at X undercover software |
CN102629909A (en) * | 2012-03-30 | 2012-08-08 | 奇智软件(北京)有限公司 | Traffic counting method and system based on processes |
CN102769703A (en) * | 2012-07-17 | 2012-11-07 | 青岛海信移动通信技术股份有限公司 | Mobile phone terminal and firewall monitoring method |
WO2012159474A1 (en) * | 2011-05-20 | 2012-11-29 | 北京中研瑞丰信息技术研究所(有限合伙) | Malicious behavior detection method and system based on smartphone radio interface layer |
CN103067923A (en) * | 2013-01-18 | 2013-04-24 | 浙江长天信息技术有限公司 | Secret short message detecting and alarming method |
CN103218552A (en) * | 2012-01-19 | 2013-07-24 | 华为终端有限公司 | Safety management method and device based on user behavior |
CN103220658A (en) * | 2012-01-19 | 2013-07-24 | 中国移动通信集团广东有限公司 | Fee deduction preventing method and method, device and system of fee deduction preventing detection |
CN103354540A (en) * | 2012-12-21 | 2013-10-16 | 北京安天电子设备有限公司 | Method and device for detecting malicious codes of android system |
CN103412793A (en) * | 2013-07-29 | 2013-11-27 | 北京奇虎科技有限公司 | Method, device and system for optimizing system resources |
CN104066090A (en) * | 2013-03-21 | 2014-09-24 | 联想(北京)有限公司 | Information processing method and electronic device |
CN104125546A (en) * | 2014-04-03 | 2014-10-29 | 上海粱江通信系统股份有限公司 | Short message subscription business type centralized management and control method and system |
CN104270763A (en) * | 2014-10-27 | 2015-01-07 | 中国建设银行股份有限公司 | Message protection method and system |
CN104331406A (en) * | 2013-12-20 | 2015-02-04 | 乐视网信息技术(北京)股份有限公司 | Database capacity control method and database capacity control device |
CN104639749A (en) * | 2015-02-04 | 2015-05-20 | 广东欧珀移动通信有限公司 | Short message sending control method and device |
CN106068014A (en) * | 2016-06-20 | 2016-11-02 | 广东欧珀移动通信有限公司 | Note monitor method and device |
CN106446675A (en) * | 2016-08-30 | 2017-02-22 | 维沃移动通信有限公司 | Short message processing method and mobile terminal |
CN106650447A (en) * | 2016-12-28 | 2017-05-10 | 北京安天电子设备有限公司 | Method and system for preventing PowerShell malicious code execution |
CN106778276A (en) * | 2016-12-29 | 2017-05-31 | 北京安天网络安全技术有限公司 | A kind of method and system for detecting incorporeity file malicious code |
CN107592314A (en) * | 2017-09-20 | 2018-01-16 | 郑州云海信息技术有限公司 | A kind of order line authority control method and device |
CN108229151A (en) * | 2016-12-09 | 2018-06-29 | 武汉安天信息技术有限责任公司 | A kind of anti-short message applied to mobile terminal kidnaps method and device |
CN112084502A (en) * | 2020-09-18 | 2020-12-15 | 珠海豹趣科技有限公司 | Software identification method and device, electronic equipment and storage medium |
CN112615961A (en) * | 2020-12-25 | 2021-04-06 | 珠海格力电器股份有限公司 | Method and device for processing short message sending request |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103874036A (en) * | 2012-12-13 | 2014-06-18 | 李卓桓 | Mobile phone message authentication method and apparatus |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101137100A (en) * | 2007-09-30 | 2008-03-05 | 中兴通讯股份有限公司 | Method of implementing handset multimedia message firewall |
US7640589B1 (en) * | 2009-06-19 | 2009-12-29 | Kaspersky Lab, Zao | Detection and minimization of false positives in anti-malware processing |
WO2010010060A2 (en) * | 2008-07-21 | 2010-01-28 | F-Secure Oyj | Telephony fraud prevention |
CN101771686A (en) * | 2009-12-31 | 2010-07-07 | 卓望数码技术(深圳)有限公司 | Communication method and network adapter |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1889423A (en) * | 2006-07-25 | 2007-01-03 | 华为技术有限公司 | Method for filtering short message and mobile terminal |
CN102088679A (en) * | 2009-12-08 | 2011-06-08 | 北京网秦天下科技有限公司 | Working method and system of intelligent short message firewall of self-learning mobile terminal |
-
2010
- 2010-11-15 CN CN201010546405.7A patent/CN101984692B/en not_active Expired - Fee Related
-
2011
- 2011-03-01 WO PCT/CN2011/071428 patent/WO2012065381A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101137100A (en) * | 2007-09-30 | 2008-03-05 | 中兴通讯股份有限公司 | Method of implementing handset multimedia message firewall |
WO2010010060A2 (en) * | 2008-07-21 | 2010-01-28 | F-Secure Oyj | Telephony fraud prevention |
US7640589B1 (en) * | 2009-06-19 | 2009-12-29 | Kaspersky Lab, Zao | Detection and minimization of false positives in anti-malware processing |
CN101771686A (en) * | 2009-12-31 | 2010-07-07 | 卓望数码技术(深圳)有限公司 | Communication method and network adapter |
Non-Patent Citations (2)
Title |
---|
北京信安易科技有限公司: "《信安易卫士2.0 For S60(大众版)用户手册》", 28 February 2009 * |
江广顺: "《中国优秀硕士学位论文全文数据库》", 15 September 2007 * |
Cited By (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2012159474A1 (en) * | 2011-05-20 | 2012-11-29 | 北京中研瑞丰信息技术研究所(有限合伙) | Malicious behavior detection method and system based on smartphone radio interface layer |
CN102547713A (en) * | 2011-12-21 | 2012-07-04 | 成都三零瑞通移动通信有限公司 | Anti-activating method aiming at X undercover software |
CN103218552B (en) * | 2012-01-19 | 2016-01-20 | 华为终端有限公司 | Based on method for managing security and the device of user behavior |
CN103218552A (en) * | 2012-01-19 | 2013-07-24 | 华为终端有限公司 | Safety management method and device based on user behavior |
CN103220658A (en) * | 2012-01-19 | 2013-07-24 | 中国移动通信集团广东有限公司 | Fee deduction preventing method and method, device and system of fee deduction preventing detection |
CN102629909B (en) * | 2012-03-30 | 2015-09-16 | 北京奇虎科技有限公司 | Based on flow statistical method and the system of process |
CN102629909A (en) * | 2012-03-30 | 2012-08-08 | 奇智软件(北京)有限公司 | Traffic counting method and system based on processes |
CN102769703A (en) * | 2012-07-17 | 2012-11-07 | 青岛海信移动通信技术股份有限公司 | Mobile phone terminal and firewall monitoring method |
CN103354540A (en) * | 2012-12-21 | 2013-10-16 | 北京安天电子设备有限公司 | Method and device for detecting malicious codes of android system |
CN103354540B (en) * | 2012-12-21 | 2016-05-18 | 北京安天电子设备有限公司 | A kind of malicious code detecting method of Android system and device |
CN103067923A (en) * | 2013-01-18 | 2013-04-24 | 浙江长天信息技术有限公司 | Secret short message detecting and alarming method |
CN104066090A (en) * | 2013-03-21 | 2014-09-24 | 联想(北京)有限公司 | Information processing method and electronic device |
CN104066090B (en) * | 2013-03-21 | 2018-12-14 | 联想(北京)有限公司 | A kind of information processing method and electronic equipment |
CN103412793A (en) * | 2013-07-29 | 2013-11-27 | 北京奇虎科技有限公司 | Method, device and system for optimizing system resources |
CN104331406A (en) * | 2013-12-20 | 2015-02-04 | 乐视网信息技术(北京)股份有限公司 | Database capacity control method and database capacity control device |
CN104125546A (en) * | 2014-04-03 | 2014-10-29 | 上海粱江通信系统股份有限公司 | Short message subscription business type centralized management and control method and system |
CN104125546B (en) * | 2014-04-03 | 2018-05-04 | 上海粱江通信系统股份有限公司 | Short message subscribing service type concentrate tube prosecutor method and system |
CN104270763A (en) * | 2014-10-27 | 2015-01-07 | 中国建设银行股份有限公司 | Message protection method and system |
CN104639749A (en) * | 2015-02-04 | 2015-05-20 | 广东欧珀移动通信有限公司 | Short message sending control method and device |
CN104639749B (en) * | 2015-02-04 | 2018-01-23 | 广东欧珀移动通信有限公司 | Short message sending control method and device |
CN106068014A (en) * | 2016-06-20 | 2016-11-02 | 广东欧珀移动通信有限公司 | Note monitor method and device |
CN106446675A (en) * | 2016-08-30 | 2017-02-22 | 维沃移动通信有限公司 | Short message processing method and mobile terminal |
CN108229151A (en) * | 2016-12-09 | 2018-06-29 | 武汉安天信息技术有限责任公司 | A kind of anti-short message applied to mobile terminal kidnaps method and device |
CN106650447A (en) * | 2016-12-28 | 2017-05-10 | 北京安天电子设备有限公司 | Method and system for preventing PowerShell malicious code execution |
CN106778276A (en) * | 2016-12-29 | 2017-05-31 | 北京安天网络安全技术有限公司 | A kind of method and system for detecting incorporeity file malicious code |
CN106778276B (en) * | 2016-12-29 | 2020-06-19 | 北京安天网络安全技术有限公司 | Method and system for detecting malicious codes of entity-free files |
CN107592314A (en) * | 2017-09-20 | 2018-01-16 | 郑州云海信息技术有限公司 | A kind of order line authority control method and device |
CN112084502A (en) * | 2020-09-18 | 2020-12-15 | 珠海豹趣科技有限公司 | Software identification method and device, electronic equipment and storage medium |
CN112615961A (en) * | 2020-12-25 | 2021-04-06 | 珠海格力电器股份有限公司 | Method and device for processing short message sending request |
Also Published As
Publication number | Publication date |
---|---|
WO2012065381A1 (en) | 2012-05-24 |
CN101984692B (en) | 2017-07-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101984692A (en) | Method and device for preventing malicious software from transmitting data | |
CN104113466A (en) | Harassing phone call identification method, client, server and system | |
CN101873259A (en) | SCTP (Stream Control Transmission Protocol) message identification method and device | |
CN103037062A (en) | Method and terminal and server used for intercepting crank calls | |
CN103218564A (en) | Mobile terminal protection method and mobile terminal protection device | |
US20120297031A1 (en) | Anonymous Signalling | |
CN105430747A (en) | Communication method, device and system | |
CN105791552B (en) | A kind of SMS processing method, device and mobile terminal | |
CN102355493B (en) | Data transmission system and data transmission method | |
CN104506743A (en) | Method and device for dynamically intercepting call | |
CN101082969A (en) | Method and system for categorized displaying multiple sets kalendar affair in unified kalendar views | |
CN104796519A (en) | Terminal | |
CN103841508A (en) | User information obtaining method and information aggregation platform | |
CN106912032B (en) | Information processing method, system, client and server | |
CN101827068A (en) | Business scenario reduction method and device | |
CN101753561A (en) | Business cluster processing method and cluster system | |
CN110493735B (en) | Short message processing method and device | |
CN103338315A (en) | Information processing method and device | |
CN103078901B (en) | Intelligent terminal's caller identification querying method | |
CN108347373B (en) | Method and system for realizing instant messaging of enterprise APP | |
CN104780252A (en) | Contact list management method | |
CN201682538U (en) | Mobile phone terminal and data provision platform | |
KR20060112597A (en) | Method and system for resetting memory of mobile terminal and mobile terminal having a memory reset function | |
CN104580719A (en) | Session control method and device | |
CN102970669A (en) | Phone bill sending and processing method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20170728 Termination date: 20201115 |