CN101984692A - Method and device for preventing malicious software from transmitting data - Google Patents

Method and device for preventing malicious software from transmitting data Download PDF

Info

Publication number
CN101984692A
CN101984692A CN2010105464057A CN201010546405A CN101984692A CN 101984692 A CN101984692 A CN 101984692A CN 2010105464057 A CN2010105464057 A CN 2010105464057A CN 201010546405 A CN201010546405 A CN 201010546405A CN 101984692 A CN101984692 A CN 101984692A
Authority
CN
China
Prior art keywords
progress information
described
obtains
data
sending request
Prior art date
Application number
CN2010105464057A
Other languages
Chinese (zh)
Other versions
CN101984692B (en
Inventor
马震宇
王冲
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Priority to CN201010546405.7A priority Critical patent/CN101984692B/en
Publication of CN101984692A publication Critical patent/CN101984692A/en
Application granted granted Critical
Publication of CN101984692B publication Critical patent/CN101984692B/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
    • H04W12/12Fraud detection or prevention
    • H04W12/1208Anti-malware arrangements, e.g. protecting against SMS fraud or mobile malware

Abstract

The invention discloses a method for preventing malicious software from transmitting data, which comprises the following steps: intercepting a data transmitting request, and acquiring the process information corresponding to the data transmitting request; and matching the acquired process information with the process information in a preset list database, and transmitting or discarding the intercepted data transmitting request according to the matching result. The invention simultaneously discloses a device for preventing the malicious software from transmitting data, and the method and device of the invention can prevent the malicious software from transmitting data in background, thereby reducing the expense loss and satisfying the user experience.

Description

A kind of Malware that prevents sends the method and the device of data

Technical field

The present invention relates to the portable terminal technology, be meant that especially a kind of Malware that prevents sends the method and the device of data.

Background technology

Along with science and technology development, intelligent mobile terminal is popular gradually such as the use crowd of mobile phone, and smart mobile phone no longer is business people's a special love, and its customer group scale is rapidly expanded.A distinguishing feature of smart mobile phone is that application software can be installed flexibly, and along with the continuous expansion of customer group, these characteristics have also caused the concern of some Malwares, and the Malware that only just occurs had on computers begun to occur on smart mobile phone in the past.Because mobile phone involves the telephone expenses problem, that is: have economic interests, so on the Malware on the smart mobile phone and the computer to compare harm bigger.Generally, Malware can be bundled in some relatively popular normal software, utilizes normal software to induce the user to go to download, when user's download after those have bundled software kits of Malware and have installed, Malware will stealthily move on the backstage.

The behavior of Malware has number of different types, wherein a kind of is exactly to send note on the backstage, such as: the short message interface that utilizes smart mobile phone to provide, order some consumption services etc., perhaps, ceaselessly outer sending short messages, these operations all can cause a large amount of losses of user telephone fee, but also being difficult for being realized to have only and locate carefully to inquire about inventory to operator afterwards and could find some clues, economic loss is generally difficult to retrieve.Therefore, how in time to find, preferably can take precautions against the behavior of this class Malware in advance, and then prevent the telephone expenses loss, just seeming is even more important, and has become user's active demand.

At present, do not prevent that also Malware from sending the technical scheme of note.

Summary of the invention

In view of this, main purpose of the present invention is to provide a kind of Malware that prevents to send the method and the device of data, can stop Malware to send data on the backstage, reduces expenses.

For achieving the above object, technical scheme of the present invention is achieved in that

The invention provides a kind of Malware that prevents and send the method for data, this method comprises:

Data interception sends request, and obtains the progress information of described data sending request correspondence;

Progress information in progress information that obtains and the name single database that sets in advance is mated,, the data sending request of tackling is sent or discard processing accordingly according to matching result.

In the such scheme, described according to matching result, the data sending request of tackling is sent or discard processing accordingly, for:

When the described progress information that obtains and the progress information in the white list are complementary, then send the data sending request of described interception;

When the described progress information that obtains and the progress information in the blacklist are complementary, then abandon the data sending request of described interception;

When the progress information in described progress information that obtains and the name single database can not mate, the relative information displaying that will comprise data content and the described progress information that obtains was given the user.

In the such scheme, this method further comprises:

The relative information displaying that will comprise data content and the described progress information that obtains is made corresponding processing to behind the user according to the user's who receives order.

In the such scheme, corresponding processing is made in the user's that described basis is received order, for:

If the order of receiving is when agreeing the order of transmission, then sends the data sending request of described interception, and the described progress information that obtains is added in the progress information of white list;

If the order of receiving is when disagreeing with the order of transmission, then abandons the data sending request of described interception, and the described progress information that obtains is added in the progress information of blacklist.

In the such scheme, this method further comprises: will send recorded and stored in database of record.

In the such scheme, this method further comprises: the data sending request that will abandon is saved in the database of record.

The present invention also provides a kind of Malware that prevents to send the device of data, and this device comprises: data interception module, list judge module, and processing module; Wherein,

The data interception module is used for data interception and sends request, and obtain the progress information of described data sending request correspondence, and the progress information that obtains is sent to the list judge module;

The list judge module is used for after receiving the progress information that obtains that the data interception module sends, and the progress information in progress information that obtains and the name single database that sets in advance is mated, and matching result is sent to processing module;

Processing module is used for after receiving the matching result that the list judge module sends, and according to matching result, the data sending request of tackling is sent or discard processing accordingly.

In the such scheme, described processing module, specifically be used for: when the progress information of described progress information that obtains and white list is complementary, then send the data sending request of described interception, when the described progress information that obtains and the progress information in the blacklist are complementary, then abandon the data sending request of described interception, when the progress information in described progress information that obtains and the name single database can not mate, the relative information displaying that will comprise data content and the described progress information that obtains was given the user.

In the such scheme, described processing module also is used for sending the data sending request of described interception after the order of receiving is for the order of agreeing to send, and the described progress information that obtains is added in the progress information of white list; After the order of receiving is to disagree with the order of transmission, then abandons the data sending request of described interception, and the described progress information that obtains is added in the progress information of blacklist.

In the such scheme, this device further comprises: logging modle, be used for after receiving the transmission record that processing module sends, to send recorded and stored in database of record, perhaps, after receiving the data sending request that has abandoned that processing module sends, the data sending request that has abandoned also is saved in the database of record, and is marked as and is blocked;

Described processing module also is used for after the data sending request that sends described interception, will send record and send to logging modle, perhaps, after abandoning the data sending request of described interception, the data sending request that has abandoned is sent to logging modle.

The Malware that prevents provided by the invention sends the scheme of data, data interception sends request, and obtain corresponding progress information, progress information in progress information that obtains and the name single database that sets in advance is mated,, the data sending request of tackling is sent or discard processing accordingly according to matching result, so, can stop Malware to send data, and then can reduce expenses, satisfy user experience on the backstage.

In addition, can will send recorded and stored in database of record, so, can make things convenient for user inquiring to send historical record, further promote user experience.

Description of drawings

Fig. 1 sends the method flow schematic diagram of data for the present invention prevents Malware;

Fig. 2 sends the method flow schematic diagram of note for embodiment prevents Malware;

Fig. 3 sends the apparatus structure schematic diagram of data for the present invention prevents Malware.

Embodiment

The present invention is further described in more detail below in conjunction with drawings and the specific embodiments.

The present invention prevents that Malware from sending the method for data, as shown in Figure 1, may further comprise the steps:

Step 101: data interception sends request, and obtains the progress information of data sending request correspondence;

Here, described data sending request can be that note sends request, multimedia message sends request or other packet sends request;

If the data sending request of interception is a note when sending request, the note of interception sends destination address that request comprises short message content, note, and transmitting time etc.;

When reality is used, the data interception module of intelligent mobile terminal need be arranged at intelligent mobile terminal short message interface below, tackle each note and send request;

When application software such as Malware or normal note software send note, need call the short message interface of intelligent mobile terminal such as mobile phone, at this moment, in the process of smart mobile phone, can preserve the progress information of the short message interface of calling mobile phone, therefore, after the interception note sends request, obtain note in the progress information that can from the process of smart mobile phone, preserve and send the corresponding progress information of request;

If the data sending request of interception is multimedia message when sending request, the multimedia message of interception sends destination address that request comprises MMS content, multimedia message, and transmitting time etc.;

If the data sending request of interception is a packet when sending request, the data sending request of interception comprises purpose network address, packet content, and the transmitting time etc. of packet;

Same, when sending multimedia message or packet, need call the smart mobile phone corresponding interface, at this moment, in the process of smart mobile phone, can preserve the progress information of calling mobile phone corresponding interface, therefore, after data interception sends request, obtain the progress information of data sending request correspondence in the progress information that can from the process of smart mobile phone, preserve.

Step 102: the progress information in progress information that obtains and the name single database that sets in advance is mated,, the data sending request of tackling is sent or discard processing accordingly according to matching result;

Here, described name single database comprises the progress information of white list and the progress information of blacklist; Wherein, the progress information of white list is for outwards sending the progress information of data, and the progress information of blacklist is for can not outwards sending the progress information of data;

Described according to matching result, the data sending request of tackling is sent or discard processing accordingly, be specially:

When the described progress information that obtains and the progress information in the white list are complementary, then send the data sending request of described interception, when the described progress information that obtains and the progress information in the blacklist are complementary, then abandon the data sending request of described interception, when the progress information in described progress information that obtains and the name single database can not mate, the relative information displaying that will comprise data content and the described progress information that obtains was given the user;

Wherein, described data content can be short message content, MMS content or packet content; Described relevant information can also comprise purpose network address, transmitting time of destination address, transmitting time or the packet of note or multimedia message etc.; The relative information displaying that will comprise data content and the described progress information that obtains is to behind the user, make corresponding processing according to the user's who receives order, particularly, if the order of the order of receiving for agreeing to send, then send the data sending request of described interception, if the order of receiving is the order of disagreeing with transmission, then abandon the data sending request of described interception; At this moment, further, the described progress information that obtains can be added in the single database, particularly, if sent described data sending request, then the described progress information that obtains is added in the progress information of white list,, then the described progress information that obtains is added in the progress information of blacklist if abandoned the data sending request of described interception;

When the data sending request of described interception was note transmission request, the data sending request of the described interception of described transmission was specially:

Call the SMS module of portable terminal, send note by SMS module; Wherein, the concrete handling process and the existing handling process of SMS module transmission note are identical;

After the data sending request that sends described interception, this method may further include:

The user will send recorded and stored in database of record, so that can inquire about the transmission historical record afterwards; Further, the data sending request that has abandoned also can also be saved in the database of record, and be marked as and be blocked; Described transmission historical record comprises the contents such as progress information of data content, correspondence.

Be example below with the note, present embodiment prevents that Malware from sending the method for note, as shown in Figure 2, may further comprise the steps:

Step 201: the interception note sends request, and obtains the corresponding progress information of note transmission request;

Here, the note of described interception sends destination address that request comprises short message content, note, and transmitting time etc.

Step 202: judge whether the progress information obtain and progress information in the name single database that sets in advance can mate, described name single database comprises the progress information of white list and the progress information of blacklist, if described progress information that obtains and the progress information in the white list are complementary, execution in step 203a then, if described progress information that obtains and the progress information in the blacklist are complementary, execution in step 203b then, if the progress information in described progress information that obtains and the name single database can not mate, then execution in step 204.

Step 203a: the note that sends described interception sends request, and execution in step 207 afterwards.

Step 203b: the note that abandons described interception sends request, and execution in step 208 afterwards.

Step 204: the relative information displaying that will comprise short message content and the described progress information that obtains is given the user, and after receiving the order of agreeing to send, execution in step 205, after receiving the order of disagreeing with transmission, execution in step 206;

Here, described relevant information comprises: the destination address of short message content, the described progress information that obtains, note, transmitting time etc.

Step 205: the note that sends described interception sends request, and the described progress information that obtains is added in the progress information of white list, and execution in step 207 afterwards.

Step 206: the note that abandons described interception sends request, and the described progress information that obtains is added in the progress information of blacklist, and execution in step 208 afterwards.

Step 207: will send recorded and stored in database of record, execution in step 209 afterwards.

Step 208: the note of the described interception that will abandon sends request and is saved in the database of record, and is marked as and is blocked, and execution in step 209 afterwards.

Step 209: finish current handling process.

Be to realize that said method, the present invention also provide a kind of Malware that prevents to send the device of data, as described in Figure 3, this device comprises: data interception module 31, list judge module 32, and processing module 33; Wherein,

Data interception module 31 is used for data interception and sends request, and obtain the progress information of data sending request correspondence, and the progress information that obtains is sent to list judge module 32;

List judge module 32 is used for after receiving the progress information that obtains that data interception module 31 sends, and the progress information in progress information that obtains and the name single database that sets in advance is mated, and matching result is sent to processing module 33;

Processing module 33 is used for according to matching result, the data sending request of tackling being sent or discard processing accordingly after receiving the matching result that list judge module 32 sends.

Wherein, if when being used to tackle note, data interception module 31 be arranged at intelligent mobile terminal short message interface below, tackle each note and send request.

Described processing module 33 specifically is used for:

When the described progress information that obtains and the progress information in the white list are complementary, then send the data sending request of described interception, when the described progress information that obtains and the progress information in the blacklist are complementary, then abandon the data sending request of described interception, when the progress information in described progress information that obtains and the name single database can not mate, the relative information displaying that will comprise data content and the described progress information that obtains was given the user.

This device can further include: logging modle is used for will sending recorded and stored in database of record after receiving the transmission record that processing module 33 sends;

Described processing module 33 also is used for after the data sending request that sends described interception, will send record and send to logging modle.

Described processing module 33 also is used for after abandoning the data sending request of described interception the data sending request that has abandoned being sent to logging modle;

Logging modle also is used for after receiving the data sending request that has abandoned that processing module 33 sends the data sending request that has abandoned also being saved in the database of record, and is marked as and is blocked.

Described processing module 33 also is used for sending the data sending request of described interception after the order of receiving is for the order of agreeing to send, and the described progress information that obtains is added in the progress information of white list; After the order of receiving is to disagree with the order of transmission, then abandons the data sending request of described interception, and the described progress information that obtains is added in the progress information of blacklist.

The above is preferred embodiment of the present invention only, is not to be used to limit protection scope of the present invention, all any modifications of being done within the spirit and principles in the present invention, is equal to and replaces and improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1. one kind prevents that Malware from sending the method for data, is characterized in that this method comprises:
Data interception sends request, and obtains the progress information of described data sending request correspondence;
Progress information in progress information that obtains and the name single database that sets in advance is mated,, the data sending request of tackling is sent or discard processing accordingly according to matching result.
2. method according to claim 1 is characterized in that, and is described according to matching result, the data sending request of tackling is sent or discard processing accordingly, for:
When the described progress information that obtains and the progress information in the white list are complementary, then send the data sending request of described interception;
When the described progress information that obtains and the progress information in the blacklist are complementary, then abandon the data sending request of described interception;
When the progress information in described progress information that obtains and the name single database can not mate, the relative information displaying that will comprise data content and the described progress information that obtains was given the user.
3. method according to claim 2 is characterized in that, this method further comprises:
The relative information displaying that will comprise data content and the described progress information that obtains is made corresponding processing to behind the user according to the user's who receives order.
4. method according to claim 3 is characterized in that corresponding processing is made in the user's that described basis is received order, for:
If the order of receiving is when agreeing the order of transmission, then sends the data sending request of described interception, and the described progress information that obtains is added in the progress information of white list;
If the order of receiving is when disagreeing with the order of transmission, then abandons the data sending request of described interception, and the described progress information that obtains is added in the progress information of blacklist.
5. according to each described method of claim 1 to 4, it is characterized in that this method further comprises:
To send recorded and stored in database of record.
6. according to each described method of claim 1 to 4, it is characterized in that this method further comprises:
The data sending request that has abandoned is saved in the database of record.
7. one kind prevents that Malware from sending the device of data, is characterized in that this device comprises: data interception module, list judge module, and processing module; Wherein,
The data interception module is used for data interception and sends request, and obtain the progress information of described data sending request correspondence, and the progress information that obtains is sent to the list judge module;
The list judge module is used for after receiving the progress information that obtains that the data interception module sends, and the progress information in progress information that obtains and the name single database that sets in advance is mated, and matching result is sent to processing module;
Processing module is used for after receiving the matching result that the list judge module sends, and according to matching result, the data sending request of tackling is sent or discard processing accordingly.
8. device according to claim 7 is characterized in that, described processing module specifically is used for:
When the described progress information that obtains and the progress information in the white list are complementary, then send the data sending request of described interception, when the described progress information that obtains and the progress information in the blacklist are complementary, then abandon the data sending request of described interception, when the progress information in described progress information that obtains and the name single database can not mate, the relative information displaying that will comprise data content and the described progress information that obtains was given the user.
9. device according to claim 8, it is characterized in that described processing module also is used for after the order of receiving is for the order of agreeing to send, send the data sending request of described interception, and the described progress information that obtains is added in the progress information of white list; After the order of receiving is to disagree with the order of transmission, then abandons the data sending request of described interception, and the described progress information that obtains is added in the progress information of blacklist.
10. according to each described device of claim 7 to 9, it is characterized in that, this device further comprises: logging modle, be used for after receiving the transmission record that processing module sends, to send recorded and stored in database of record, perhaps, after receiving the data sending request that has abandoned that processing module sends, the data sending request that has abandoned also is saved in the database of record, and is marked as and is blocked;
Described processing module also is used for after the data sending request that sends described interception, will send record and send to logging modle, perhaps, after abandoning the data sending request of described interception, the data sending request that has abandoned is sent to logging modle.
CN201010546405.7A 2010-11-15 2010-11-15 A kind of method and device for preventing Malware from sending data CN101984692B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201010546405.7A CN101984692B (en) 2010-11-15 2010-11-15 A kind of method and device for preventing Malware from sending data

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201010546405.7A CN101984692B (en) 2010-11-15 2010-11-15 A kind of method and device for preventing Malware from sending data
PCT/CN2011/071428 WO2012065381A1 (en) 2010-11-15 2011-03-01 Method and apparatus for preventing malicious softwares from transmitting data

Publications (2)

Publication Number Publication Date
CN101984692A true CN101984692A (en) 2011-03-09
CN101984692B CN101984692B (en) 2017-07-28

Family

ID=43641862

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010546405.7A CN101984692B (en) 2010-11-15 2010-11-15 A kind of method and device for preventing Malware from sending data

Country Status (2)

Country Link
CN (1) CN101984692B (en)
WO (1) WO2012065381A1 (en)

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102547713A (en) * 2011-12-21 2012-07-04 成都三零瑞通移动通信有限公司 Anti-activating method aiming at X undercover software
CN102629909A (en) * 2012-03-30 2012-08-08 奇智软件(北京)有限公司 Traffic counting method and system based on processes
CN102769703A (en) * 2012-07-17 2012-11-07 青岛海信移动通信技术股份有限公司 Mobile phone terminal and firewall monitoring method
WO2012159474A1 (en) * 2011-05-20 2012-11-29 北京中研瑞丰信息技术研究所(有限合伙) Malicious behavior detection method and system based on smartphone radio interface layer
CN103067923A (en) * 2013-01-18 2013-04-24 浙江长天信息技术有限公司 Secret short message detecting and alarming method
CN103218552A (en) * 2012-01-19 2013-07-24 华为终端有限公司 Safety management method and device based on user behavior
CN103220658A (en) * 2012-01-19 2013-07-24 中国移动通信集团广东有限公司 Fee deduction preventing method and method, device and system of fee deduction preventing detection
CN103354540A (en) * 2012-12-21 2013-10-16 北京安天电子设备有限公司 Method and device for detecting malicious codes of android system
CN103412793A (en) * 2013-07-29 2013-11-27 北京奇虎科技有限公司 Method, device and system for optimizing system resources
CN104066090A (en) * 2013-03-21 2014-09-24 联想(北京)有限公司 Information processing method and electronic device
CN104125546A (en) * 2014-04-03 2014-10-29 上海粱江通信系统股份有限公司 Short message subscription business type centralized management and control method and system
CN104270763A (en) * 2014-10-27 2015-01-07 中国建设银行股份有限公司 Message protection method and system
CN104331406A (en) * 2013-12-20 2015-02-04 乐视网信息技术(北京)股份有限公司 Database capacity control method and database capacity control device
CN104639749A (en) * 2015-02-04 2015-05-20 广东欧珀移动通信有限公司 Short message sending control method and device
CN106068014A (en) * 2016-06-20 2016-11-02 广东欧珀移动通信有限公司 Note monitor method and device
CN106446675A (en) * 2016-08-30 2017-02-22 维沃移动通信有限公司 Short message processing method and mobile terminal
CN106650447A (en) * 2016-12-28 2017-05-10 北京安天电子设备有限公司 Method and system for preventing PowerShell malicious code execution
CN106778276A (en) * 2016-12-29 2017-05-31 北京安天网络安全技术有限公司 A kind of method and system for detecting incorporeity file malicious code
CN107592314A (en) * 2017-09-20 2018-01-16 郑州云海信息技术有限公司 A kind of order line authority control method and device

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103874036A (en) * 2012-12-13 2014-06-18 李卓桓 Mobile phone message authentication method and apparatus

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101137100A (en) * 2007-09-30 2008-03-05 中兴通讯股份有限公司 Method of implementing handset multimedia message firewall
US7640589B1 (en) * 2009-06-19 2009-12-29 Kaspersky Lab, Zao Detection and minimization of false positives in anti-malware processing
WO2010010060A2 (en) * 2008-07-21 2010-01-28 F-Secure Oyj Telephony fraud prevention
CN101771686A (en) * 2009-12-31 2010-07-07 卓望数码技术(深圳)有限公司 Communication method and network adapter

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1889423A (en) * 2006-07-25 2007-01-03 华为技术有限公司 Method for filtering short message and mobile terminal
CN102088679A (en) * 2009-12-08 2011-06-08 北京网秦天下科技有限公司 Working method and system of intelligent short message firewall of self-learning mobile terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101137100A (en) * 2007-09-30 2008-03-05 中兴通讯股份有限公司 Method of implementing handset multimedia message firewall
WO2010010060A2 (en) * 2008-07-21 2010-01-28 F-Secure Oyj Telephony fraud prevention
US7640589B1 (en) * 2009-06-19 2009-12-29 Kaspersky Lab, Zao Detection and minimization of false positives in anti-malware processing
CN101771686A (en) * 2009-12-31 2010-07-07 卓望数码技术(深圳)有限公司 Communication method and network adapter

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
北京信安易科技有限公司: "《信安易卫士2.0 For S60(大众版)用户手册》", 28 February 2009 *
江广顺: "《中国优秀硕士学位论文全文数据库》", 15 September 2007 *

Cited By (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012159474A1 (en) * 2011-05-20 2012-11-29 北京中研瑞丰信息技术研究所(有限合伙) Malicious behavior detection method and system based on smartphone radio interface layer
CN102547713A (en) * 2011-12-21 2012-07-04 成都三零瑞通移动通信有限公司 Anti-activating method aiming at X undercover software
CN103218552B (en) * 2012-01-19 2016-01-20 华为终端有限公司 Based on method for managing security and the device of user behavior
CN103218552A (en) * 2012-01-19 2013-07-24 华为终端有限公司 Safety management method and device based on user behavior
CN103220658A (en) * 2012-01-19 2013-07-24 中国移动通信集团广东有限公司 Fee deduction preventing method and method, device and system of fee deduction preventing detection
CN102629909A (en) * 2012-03-30 2012-08-08 奇智软件(北京)有限公司 Traffic counting method and system based on processes
CN102629909B (en) * 2012-03-30 2015-09-16 北京奇虎科技有限公司 Based on flow statistical method and the system of process
CN102769703A (en) * 2012-07-17 2012-11-07 青岛海信移动通信技术股份有限公司 Mobile phone terminal and firewall monitoring method
CN103354540A (en) * 2012-12-21 2013-10-16 北京安天电子设备有限公司 Method and device for detecting malicious codes of android system
CN103354540B (en) * 2012-12-21 2016-05-18 北京安天电子设备有限公司 A kind of malicious code detecting method of Android system and device
CN103067923A (en) * 2013-01-18 2013-04-24 浙江长天信息技术有限公司 Secret short message detecting and alarming method
CN104066090A (en) * 2013-03-21 2014-09-24 联想(北京)有限公司 Information processing method and electronic device
CN104066090B (en) * 2013-03-21 2018-12-14 联想(北京)有限公司 A kind of information processing method and electronic equipment
CN103412793A (en) * 2013-07-29 2013-11-27 北京奇虎科技有限公司 Method, device and system for optimizing system resources
CN104331406A (en) * 2013-12-20 2015-02-04 乐视网信息技术(北京)股份有限公司 Database capacity control method and database capacity control device
CN104125546A (en) * 2014-04-03 2014-10-29 上海粱江通信系统股份有限公司 Short message subscription business type centralized management and control method and system
CN104125546B (en) * 2014-04-03 2018-05-04 上海粱江通信系统股份有限公司 Short message subscribing service type concentrate tube prosecutor method and system
CN104270763A (en) * 2014-10-27 2015-01-07 中国建设银行股份有限公司 Message protection method and system
CN104639749A (en) * 2015-02-04 2015-05-20 广东欧珀移动通信有限公司 Short message sending control method and device
CN104639749B (en) * 2015-02-04 2018-01-23 广东欧珀移动通信有限公司 Short message sending control method and device
CN106068014A (en) * 2016-06-20 2016-11-02 广东欧珀移动通信有限公司 Note monitor method and device
CN106446675A (en) * 2016-08-30 2017-02-22 维沃移动通信有限公司 Short message processing method and mobile terminal
CN106650447A (en) * 2016-12-28 2017-05-10 北京安天电子设备有限公司 Method and system for preventing PowerShell malicious code execution
CN106778276A (en) * 2016-12-29 2017-05-31 北京安天网络安全技术有限公司 A kind of method and system for detecting incorporeity file malicious code
CN107592314A (en) * 2017-09-20 2018-01-16 郑州云海信息技术有限公司 A kind of order line authority control method and device

Also Published As

Publication number Publication date
CN101984692B (en) 2017-07-28
WO2012065381A1 (en) 2012-05-24

Similar Documents

Publication Publication Date Title
EP3169047B1 (en) Information processing method and information processing device
CN101159778B (en) System for multimedia communication based on virtual number
US7028263B2 (en) User interface and method for viewing short messages on a wireless device
CN102882963B (en) A kind of data transmission method, associated terminal and system
CN102202289B (en) Method and system for remote calling software and hardware resources through mobile terminal
US20150334679A1 (en) System and method for detecting mutually supported capabilities between mobile devices
CN1729468B (en) Data synchronization
US6928479B1 (en) System computer product and method for providing a private communication portal
CN103975320A (en) Contextual and location awareness for device interaction
US9143512B2 (en) Communication devices, computer readable storage devices, and methods for secure multi-path communication
US20090298468A1 (en) System and method for deleting data in a communication device
JP4778708B2 (en) Communication device management via GPRS and GSM connections
CN201594916U (en) Contact information management system based on cloud computing
CN104244254A (en) Method and device for detecting pseudo base station based on short message center number
CN103733601A (en) Attaching multiple phone lines to a single mobile or landline phone
CN102957781A (en) Do not disturb control method for mobile terminal
CN103220637A (en) Mobile phone anti-theft protection method and mobile phone anti-theft protection device
KR101093440B1 (en) Mobile telecommunication terminal capable of preventing spam calls and method there-of
EP1372321A3 (en) Voicemail user interface for mobile communication devices
EP2710776B1 (en) Anonymous signalling
CN103347137B (en) A kind of customer service is handled processing method and the device of data
CN101854424A (en) Method and device for filtering incoming call and information of mobile terminal
US20080081617A1 (en) Method and Apparatus for Providing Virtual Mobile Phone Number
CN102970362A (en) Method and device for sharing cloud data
JP4940304B2 (en) Database management in wireless communication systems

Legal Events

Date Code Title Description
PB01 Publication
C06 Publication
SE01 Entry into force of request for substantive examination
C10 Entry into substantive examination
GR01 Patent grant
GR01 Patent grant