CN103246846A - Method and device for detecting safety of customized ROM (read only memory) - Google Patents

Method and device for detecting safety of customized ROM (read only memory) Download PDF

Info

Publication number
CN103246846A
CN103246846A CN2013101444594A CN201310144459A CN103246846A CN 103246846 A CN103246846 A CN 103246846A CN 2013101444594 A CN2013101444594 A CN 2013101444594A CN 201310144459 A CN201310144459 A CN 201310144459A CN 103246846 A CN103246846 A CN 103246846A
Authority
CN
China
Prior art keywords
rom
clouds
feature
portable terminal
firmware
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013101444594A
Other languages
Chinese (zh)
Inventor
张军
陈继
刘敏
安卫亚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Netqin Technology Co Ltd
Original Assignee
Beijing Netqin Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Netqin Technology Co Ltd filed Critical Beijing Netqin Technology Co Ltd
Priority to CN2013101444594A priority Critical patent/CN103246846A/en
Publication of CN103246846A publication Critical patent/CN103246846A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention provides a method, a device and a corresponding system for detecting safety of customized system updating firmware in a mobile terminal. The method includes: extracting features of system updating firmware; transmitting the extracted features to a cloud for comparison with a cloud feature database; and performing treatment according to comparison results returned by the cloud. The method can provide cloud ROM (read only memory) feature database. When a user installs a client program of the invention, features of a local machine can be compared with safe ROM features to guarantee ROM safety of the local machine.

Description

Detect the method and apparatus of the security of customization ROM
Technical field
The present invention relates to moving communicating field, more specifically, relate to the method, device and the corresponding system that in portable terminal, detect the security of custom-built system firmware updating (ROM).
Background technology
In recent years, the use of portable terminal was more and more universal.Wherein, the smart mobile phone of Android (Android) platform is because its increasing income property becomes and becomes more and more popular.For particular preferences and the demand that satisfies user self, the brush machine behavior of Android smart mobile phone is more and more.The quantity of the customization ROM of third party's exploitation increases considerably.The characteristic of third-party customization ROM is to add function and the feature of a lot of personalizations, has brought facility to the user.But at these increasing customization ROM, its safety issue begins to highlight.Such as, third party may be for various purposes in customization ROM built-in virus or Malware such as deduct fees.If Malware is built among the ROM, can obtain very high System Privileges, for example obtain root (Toot) authority etc. as power user (superuser).The potential destruction risk of built-in Malware is far longer than general malicious application among this customization ROM.
At present, more single at the detection means of ROM, only be the file of ROM being used as a kind of special format, based on traditional virus characteristic scan mode, detect whether comprise Malware among the ROM.But because the ROM its own particularity, this single means are difficult to find painstakingly hide the self built malicious application.For example, present a kind of outstanding situation is that malicious application is repacked among the ROM that is inserted into the issue of official of mobile phone producer.In this case, based on the detection means of virus characteristic, can think that probably this kind ROM is safe, thereby omit the malicious application that is inserted into.
Therefore, need a kind of mechanism that can detect the security of customization ROM effectively.
Summary of the invention
The invention provides the method, device and the corresponding system that in portable terminal, detect the security of custom-built system firmware (ROM).The method according to this invention can provide the feature database of secure ROM.The user can compare the feature of this machine and the feature of secure ROM after portable terminal has been installed according to client-side program of the present invention, thereby guarantees the safety of this machine ROM.
Particularly, according to a first aspect of the invention, provide a kind of method that in portable terminal, detects the security of custom-built system firmware updating, having comprised: the feature of extraction system firmware updating; The feature of the system upgrade firmware that extracts is sent to high in the clouds, to compare with the high in the clouds feature database; And according to the comparative result that high in the clouds is returned, carry out and handle.
According to a further aspect in the invention, provide a kind of for the device that detects the security of custom-built system firmware updating at portable terminal, having comprised: extraction unit, for the feature of extraction system firmware updating; Communication unit, the feature that is used for the system upgrade firmware that will extract sends to high in the clouds, comparing with the high in the clouds feature database, and receives the comparative result that high in the clouds is returned; And processing unit, for the comparative result that returns according to high in the clouds, carry out and handle.
According to some embodiments of the present invention, described high in the clouds feature database comprises the feature of a plurality of custom-built system firmware updatings that collect in high in the clouds.
According to some embodiments of the present invention, the feature of described system upgrade firmware comprises the digital digest algorithm values (SHA1) of system upgrade firmware.
According to some embodiments of the present invention, described portable terminal comprises the Android intelligent mobile phone.
According to some embodiments of the present invention, described processing comprises to the user provides dangerous prompting.
According to another aspect of the invention, a kind of system of security of the custom-built system firmware updating for detection of portable terminal is provided, has comprised: foregoing according to of the present invention for the device that detects the security of custom-built system firmware updating at portable terminal; And the high in the clouds server, it comprises described high in the clouds feature database.
Use method and system of the present invention, the user need not to use computing machine, and whether the ROM that can be directly detects this equipment at portable terminal safety, is convenient to the user and in time finds potential risks, protection privacy of user etc.
Description of drawings
By below in conjunction with description of drawings the preferred embodiments of the present invention, will make above-mentioned and other purpose of the present invention, feature and advantage clearer, wherein:
Fig. 1 shows according to an embodiment of the invention the system for detection of the security of the custom-built system firmware updating of portable terminal;
Fig. 2 shows the block diagram according to the high in the clouds server of the embodiment of the invention;
Fig. 3 shows the process flow diagram of creating the ROM feature database beyond the clouds according to the embodiment of the invention;
Fig. 4 shows the block diagram according to the portable terminal of the embodiment of the invention; And
Fig. 5 shows the process flow diagram according to the method for the security that detects customization ROM in portable terminal of the embodiment of the invention.
Embodiment
To a preferred embodiment of the present invention will be described in detail, having omitted in the description process is unnecessary details and function for the present invention with reference to the accompanying drawings, obscures to prevent that the understanding of the present invention from causing.
As used herein, term " system upgrade firmware " refers to the firmware of upgrading for to the operating system of portable terminal.In portable terminal, for the protection system file, operating system is stored in the ROM (read-only memory) (ROM) usually.ROM institute deposit data is generally finished writing before the machine of packing in advance, can only read during the machine normal running and can rewrite quickly and easily unlike random access memory.This data of finishing writing in advance such as operating system for the ROM that packs into are called as the system upgrade firmware, also can be called as the rom image file, or abbreviate ROM as.Be also referred to as brush machine (Recovery) or brush ROM by the instrument this program of finishing writing in advance or data are packed into the process of the rom chip in (or claim " programming ") portable terminal.Especially, in field of mobile terminals, official or third-party rom image file are commonly called brush machine or brush ROM by the instrument programming to the process in the rom chip.
Below will present invention is described as the example of system upgrade firmware with Android ROM.As used herein, term " Android ROM " refers to the rom image file of the machine of brushing for the ROM to the storage system file of Android portable terminal.Hereinafter, if no special instructions, ROM refers to the rom image file, rather than random access memory device itself.
Should be appreciated that the present invention is not limited to the Android portable terminal, also go for now and any portable terminal that can use third party ROM of following exploitation.
Be also to be understood that the present invention is not limited to the concrete communication protocol of each related mobile communication terminal, can include but not limited to 2G, 3G, 4G, 5G network, WCDMA, CDMA1100, TD-SCDMA system etc.
Fig. 1 shows according to an embodiment of the invention the system 100 for detection of the security of the custom-built system firmware updating of portable terminal.As shown in Figure 1, system 100 can comprise portable terminal 110 and high in the clouds server 130.Portable terminal 110 can link to each other with server 130 by communication network 120.
Portable terminal 110 comprises that the system upgrade firmware security that is installed in wherein detects the client (not shown).This security detects client and can be installed in voluntarily in the portable terminal 110 with the form of software by the user, perhaps can be installed in the portable terminal 110 with the form of hardware or firmware by portable terminal production firm.Portable terminal 110 for example can be the Android smart mobile phone.Under the situation of Android smart mobile phone, its custom-built system firmware updating can be the various Android ROM that the third party provides.As previously mentioned, the characteristic of third-party customization ROM is to add function and the feature of a lot of personalizations, has brought facility to the user.But, the third party may be for various purposes in customization ROM built-in virus or Malware such as deduct fees, form harm to the user.According to of the present invention mutual that portable terminal 110 that the security of system upgrade firmware detects client can be by with high in the clouds server 1300 be installed, detected these customizations ROM effectively and whether comprise Malware, thereby guarantee the safety of this machine.
High in the clouds server 130 comprises the high in the clouds feature database.Described high in the clouds server can comprise safe system upgrade firmware (as ROM) feature database or dangerous ROM feature database or the two.These high in the clouds databases can be that high in the clouds is passed through the various customization of Collection and analysis ROM and generated.For example, server can pass through the various customization ROM of approach collection such as reptile, exchange.Then, use safety analysis instruments such as backsmail, IDA to analyze whether safety of various customization ROM.Then, can extract the ROM feature at ROM known safety and/or unsafe, make up secure ROM feature database and/or dangerous ROM feature database.In these feature databases, for example can record title, security, feature list of ROM etc. relatedly.Described feature for example can be digital digest algorithm values (SHA1), feature program code, etc.
Communication network 120 can be any network of supporting that portable terminal 110 and high in the clouds server 130 communicate.For example, communication network 120 can include but not limited to: 2G, 3G, 4G, 5G mobile communications network, and as WCDMA, CDMA1100, TD-SCDMA, LTE, perhaps wireless lan (wlan), etc.
Fig. 2 shows the block diagram according to the high in the clouds server 130 of the embodiment of the invention.As shown in Figure 2, high in the clouds server 130 comprises collector unit 131, analytic unit 132, storage unit 133, communication unit 134, query unit 135.Collector unit 131 can be collected various customization ROM.These customizations ROM comprises the ROM of official of cell phone manufacturer issue, the ROM with customization function of bona fide third party issue, ROM that comprises malicious application of malice third party's issue (such as the ROM by malicious application such as in the ROM of official of cell phone manufacturer issue, embedding virus or deduct fees) etc.Collector unit 131 can realize by reptile instruments such as (crawler), also can by can with the networking on any entity of other devices exchange data realize.Analytic unit 132 can use the safety analysis instrument that the security of the collected various customization ROM of collector unit is analyzed.Analytic unit 132 for example can use backsmail, IDA etc. instrument.Analytic unit can also generate the ROM feature according to analysis result.For example, analytic unit can be at analysis result, determines the title, security (whether safety) of ROM and the tabulation of feature.For example, this feature can comprise the value that obtains at ROM combine digital digest algorithm.And for example, this feature can comprise feature code with the particular malicious association etc.Storage unit 133 can be stored the ROM feature database.Described ROM feature database can be to comprise the two comprehensive characteristics storehouse of secure ROM and dangerous ROM.Also can be independent secure ROM feature database or dangerous ROM feature database, perhaps can comprise these two simultaneously.Storage unit 133 can realize with any computer-readable medium, (for example include but not limited to magnetic storage apparatus (for example hard disk, floppy disk, tape etc.), CD, compact disk (CD), digital versatile disc (DVD) etc.), smart card and flash memory device (for example, card, band etc.).Server 130 can also by with network on other devices exchange information with stored ROM feature database in the updated stored unit 133.Communication unit 134 can send message to portable terminal 110, and receives message from portable terminal 110.Query unit 135 can be by will be to be judged the feature of ROM and storage unit 133 in the feature database of storage mate, with the ROM that finds this ROM feature correspondence safety whether.Should be appreciated that, although server 130 is depicted as independent equipment in Fig. 2, the invention is not restricted to this.Server 130 can be independent physical entity (as single computing machine), also can be a plurality of physical entities (as the computing machine of one group of networking) that are coupled communicatedly.The function of the individual unit that illustrates in the server 130 can be realized or be cooperated to realize by a plurality of equipment by individual equipment.Alternatively, a plurality of unit shown in the server 130 can be realized by individual equipment.In addition, should be appreciated that server 130 can comprise the unit more more or less than the unit that illustrates.
Fig. 3 shows the process flow diagram according to the method for creating the ROM feature database beyond the clouds 300 of the embodiment of the invention.As shown in the figure, the method 300 of high in the clouds establishment ROM feature database can comprise step S310, S320 and S330.In step S310, collector unit 130 is collected various customization ROM.Collector unit can use the reptile instrument to realize described collection.Alternatively, collector unit can receive from other equipment via network by communication unit 134 and collect the result.In step S320, can use various analysis tools (such as backsmail) analyze collected various customization ROM by analytic unit 132, with definite its safety whether.So, in step S330, can pass through the Macro or mass analysis result, create feature database.Should be appreciated that server 130 can be safeguarded this feature database constantly.For example, constantly add new ROM feature of collecting etc.Should be appreciated that the method 300 of creating the ROM feature database beyond the clouds of the present invention is not limited to concrete operations shown in Figure 3.For example, method 300 can also comprise other steps such as modification (or renewal) feature database.
Fig. 4 shows the block diagram according to the portable terminal 110 of the embodiment of the invention.As shown in the figure, portable terminal 110 comprises extraction unit 112, communication unit 114 and processing unit 116.Extraction unit 112 can extract the feature of the ROM of portable terminal 110, such as SHA1 value of ROM title, ROM etc.Communication unit 114 can send to the ROM feature of extracting the high in the clouds server to inquire about.Communication unit 114 can also receive the Query Result that returns from the high in the clouds server.Whether the ROM that processing unit 116 can be judged current device according to Query Result safety, makes corresponding processing then.As example, when judging that current device ROM is dangerous, can send alarm to the user.For example, by display text on display or icon and/or have potential safety hazard by voice or other caution sounds to user reminding ROM, perhaps remind the user to reinstall other safe ROM etc.When judging that current device ROM is safe, can send the safe prompting of expression etc. to the user, perhaps do not make any special prompting.
Fig. 5 shows the process flow diagram according to the method 500 of the security that detects customization ROM in portable terminal of the embodiment of the invention.As shown in the figure, the method 500 of the security of detection customization ROM can comprise step S510, S520, S530 and S540.
Below with reference to Fig. 1,2,4 and Fig. 5 the method and system according to the security of the custom-built system firmware updating of the detection portable terminal of the embodiment of the invention is described in detail.
In step S510, the extraction unit 112 of portable terminal extracts title and/or one or more feature of this machine ROM.This feature for example can be the digital digest algorithm values of calculating at ROM (SHA1).
Then, in step S520, portable terminal 110 sends to high in the clouds by communication unit 114 with title and/or one or more feature of the ROM that extracts.
High in the clouds server 130 receives title and/or one or more feature of the ROM of portable terminal transmission by communication unit 134.So the query unit 135 of server 130 is according to the feature database of storing in the title of the ROM that receives and/or one or more characteristic query storage unit.Query unit 135 can wait to carry out inquiry by matching operation.As mentioned above, can storage security ROM feature database in the server 130, dangerous ROM feature database or these two.Alternatively, server 130 can be stored the comprehensive characteristics storehouse that comprises safe and dangerous ROM.(for example, secure ROM feature database and dangerous ROM feature database under) the situation, query unit 135 can at first be carried out the coupling with a ROM feature database, carries out coupling with second feature database as required according to matching result then there being a plurality of feature databases.As example, if the ROM title that find to receive by coupling is consistent with the title of certain ROM that official of cell phone manufacturer issues, but it is that receive inconsistent with the feature (as the SHA1 value) of the ROM of this official's issue with feature (as the SHA1 value) this ROM names associate, can judge that then this ROM co-pending palms off, be unsafe therefore.Otherwise, if the ROM title that receives and linked character are consistent with title and the feature of the ROM of official issue, can judge that then this ROM co-pending is safe.The communication unit 134 of server 130 can return Query Result to portable terminal 110.
In step S530, the Query Result that the communication unit 114 in the portable terminal 110 can reception server 130 returns.
In step S540, the processing unit 116 of portable terminal 110 can be made corresponding processing according to Query Result.As example, when Query Result shows that current device ROM is dangerous, can send alarm to the user.For example, by display text on display or icon and/or have potential safety hazard by voice or other caution sounds to user reminding ROM, perhaps remind the user to reinstall other safe ROM etc.When Query Result shows that current device ROM is safe, can send the safe prompting of expression etc. to the user, perhaps do not make any special prompting.
So far invention has been described in conjunction with the preferred embodiments.It will be understood by those skilled in the art that the method and apparatus that illustrates above only is exemplary.The step that method of the present invention is not limited to illustrate above and order.Portable terminal of the present invention and server can comprise the parts more more or less than the parts that illustrate.Those skilled in the art can carry out many variations and modification according to the instruction of illustrated embodiment.
Equipment of the present invention and parts thereof can be by such as VLSI (very large scale integrated circuit) or gate array, realize such as the semiconductor of logic chip, transistor etc. or such as the hardware circuit of the programmable hardware device of field programmable gate array, programmable logic device etc., also can use the software of being carried out by various types of processors to realize, also can be realized by the combination of above-mentioned hardware circuit and software.
The present invention can realize plurality of advantages.When the user after portable terminal has been installed client of the present invention, the feature of this machine ROM and the ROM feature in the feature database of high in the clouds can be compared, thus this machine ROM of discriminating safety whether.Therefore, use method and system of the present invention, the user need not to use computing machine, and whether the ROM that can be directly detects this equipment at portable terminal safety, is convenient to the user and in time finds potential risks, protection privacy of user etc.
Although it should be appreciated by those skilled in the art that by specific embodiment and described the present invention, scope of the present invention is not limited to these specific embodiments.Scope of the present invention is limited by claims and any equivalents thereof.

Claims (11)

1. method that detects the security of custom-built system firmware updating (ROM) in portable terminal comprises:
The feature of extraction system firmware updating;
The feature of the system upgrade firmware that extracts is sent to high in the clouds, to compare with the high in the clouds feature database; And
According to the comparative result that high in the clouds is returned, carry out and handle.
2. method according to claim 1, wherein said high in the clouds feature database comprise the feature of a plurality of custom-built system firmware updatings that collect in high in the clouds.
3. method according to claim 1, the feature of wherein said system upgrade firmware comprises the digital digest algorithm values (SHA1) of system upgrade firmware.
4. method according to claim 1, wherein said portable terminal comprises the Android intelligent mobile phone.
5. method according to claim 1, described processing comprises to the user provides dangerous prompting.
6. device that is used for detecting at portable terminal the security of custom-built system firmware updating comprises:
Extraction unit is for the feature of extraction system firmware updating;
Communication unit, the feature that is used for the system upgrade firmware that will extract sends to high in the clouds, comparing with the high in the clouds feature database, and receives the comparative result that high in the clouds is returned; And
Processing unit for the comparative result that returns according to high in the clouds, is carried out and is handled.
7. device according to claim 6, wherein said high in the clouds feature database comprise the feature of a plurality of custom-built system firmware updatings that collect in high in the clouds.
8. device according to claim 6, the feature of wherein said system upgrade firmware comprises the digital digest algorithm values (SHA1) of system upgrade firmware.
9. device according to claim 6, wherein said portable terminal comprises the Android intelligent mobile phone.
10. device according to claim 6, wherein said processing unit also is configured to provide dangerous prompting to the user.
11. the system for detection of the security of the custom-built system firmware updating of portable terminal comprises:
Portable terminal comprises according to each described device among the claim 6-10; And
The high in the clouds server comprises described high in the clouds feature database.
CN2013101444594A 2013-04-24 2013-04-24 Method and device for detecting safety of customized ROM (read only memory) Pending CN103246846A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013101444594A CN103246846A (en) 2013-04-24 2013-04-24 Method and device for detecting safety of customized ROM (read only memory)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013101444594A CN103246846A (en) 2013-04-24 2013-04-24 Method and device for detecting safety of customized ROM (read only memory)

Publications (1)

Publication Number Publication Date
CN103246846A true CN103246846A (en) 2013-08-14

Family

ID=48926360

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013101444594A Pending CN103246846A (en) 2013-04-24 2013-04-24 Method and device for detecting safety of customized ROM (read only memory)

Country Status (1)

Country Link
CN (1) CN103246846A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103632089A (en) * 2013-12-16 2014-03-12 北京网秦天下科技有限公司 Security detection method, device and system of application installation package
CN104318160A (en) * 2014-10-29 2015-01-28 北京奇虎科技有限公司 Malware searching and killing method and device
CN107689975A (en) * 2016-08-05 2018-02-13 腾讯科技(深圳)有限公司 A kind of computer virus recognition methods and system based on cloud computing
CN108111928A (en) * 2016-11-25 2018-06-01 深圳市中兴微电子技术有限公司 A kind of method, first network equipment and second network equipment for identifying firmware
CN108494866A (en) * 2018-03-30 2018-09-04 北京小米移动软件有限公司 Information processing method and server, terminal device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102082802A (en) * 2011-03-01 2011-06-01 陈彪 Behavior-based mobile terminal security protection system and method
CN102685069A (en) * 2011-03-09 2012-09-19 北京网秦天下科技有限公司 Method and system using combination of subscriber identity module (SIM) card and cloud computing for killing viruses
CN102945347A (en) * 2012-09-29 2013-02-27 中兴通讯股份有限公司 Method, system and device for detecting Android malicious software
WO2013048492A1 (en) * 2011-09-30 2013-04-04 Intel Corporation Mechanism for providing a secure environment for acceleration of software applications at computing devices

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102082802A (en) * 2011-03-01 2011-06-01 陈彪 Behavior-based mobile terminal security protection system and method
CN102685069A (en) * 2011-03-09 2012-09-19 北京网秦天下科技有限公司 Method and system using combination of subscriber identity module (SIM) card and cloud computing for killing viruses
WO2013048492A1 (en) * 2011-09-30 2013-04-04 Intel Corporation Mechanism for providing a secure environment for acceleration of software applications at computing devices
CN102945347A (en) * 2012-09-29 2013-02-27 中兴通讯股份有限公司 Method, system and device for detecting Android malicious software

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
刘泽衡: "基于Android智能手机的安全检测系统的研究与实现", 《中国优秀硕士论文数据库》 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103632089A (en) * 2013-12-16 2014-03-12 北京网秦天下科技有限公司 Security detection method, device and system of application installation package
CN104318160A (en) * 2014-10-29 2015-01-28 北京奇虎科技有限公司 Malware searching and killing method and device
CN104318160B (en) * 2014-10-29 2017-12-26 北京奇虎科技有限公司 The method and apparatus of killing rogue program
CN107689975A (en) * 2016-08-05 2018-02-13 腾讯科技(深圳)有限公司 A kind of computer virus recognition methods and system based on cloud computing
CN107689975B (en) * 2016-08-05 2020-07-31 腾讯科技(深圳)有限公司 Cloud computing-based computer virus identification method and system
CN108111928A (en) * 2016-11-25 2018-06-01 深圳市中兴微电子技术有限公司 A kind of method, first network equipment and second network equipment for identifying firmware
CN108494866A (en) * 2018-03-30 2018-09-04 北京小米移动软件有限公司 Information processing method and server, terminal device

Similar Documents

Publication Publication Date Title
CN104221026B (en) Method for malicious activity detection in mobile station
US10147096B2 (en) Device diagnostic and data retrieval
CN101984691A (en) Upgrading method of system built-in software and mobile terminal
CN103259795A (en) Method for executing automatic register and login, mobile terminal and server
CN103246846A (en) Method and device for detecting safety of customized ROM (read only memory)
KR101582601B1 (en) Method for detecting malignant code of android by activity string analysis
CN103839005A (en) Malware detection method and malware detection system of mobile operating system
CN103473509A (en) Android platform malware automatic detecting method
EP2744244A1 (en) Method for managing charge security and mobile terminal
CN104579748B (en) The network analysis method and system that SCD is checked online
US11429698B2 (en) Method and apparatus for identity authentication, server and computer readable medium
CN102983609A (en) Method and device for charging and software update of intelligent hand-held terminal
CN103441848A (en) Application authentication method and system of mobile terminal
CN104301875A (en) Short message processing method and device
CN104881667A (en) Characteristic information extraction method and apparatus
WO2014075537A1 (en) Malicious website identifying method and system
CN103679016A (en) Method and system for processing malicious programs of mobile phone
CN111131221A (en) Interface checking device, method and storage medium
CN104751086A (en) Terminal anti-theft method
CN102682237B (en) Malicious method and system are sentenced for web download file
CN106709350B (en) Virus detection method and device
CN105320886A (en) Method for detecting malware in mobile terminal and mobile terminal
CN103780690A (en) Method and system for safely sharing user data
CN111353138A (en) Abnormal user identification method and device, electronic equipment and storage medium
CN102968588B (en) Intelligent terminal system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130814