CN105426761A - Identification method for illegal application and mobile terminal - Google Patents

Identification method for illegal application and mobile terminal Download PDF

Info

Publication number
CN105426761A
CN105426761A CN201510799189.XA CN201510799189A CN105426761A CN 105426761 A CN105426761 A CN 105426761A CN 201510799189 A CN201510799189 A CN 201510799189A CN 105426761 A CN105426761 A CN 105426761A
Authority
CN
China
Prior art keywords
information
application
target signature
mobile terminal
intended application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510799189.XA
Other languages
Chinese (zh)
Other versions
CN105426761B (en
Inventor
林志泳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201510799189.XA priority Critical patent/CN105426761B/en
Publication of CN105426761A publication Critical patent/CN105426761A/en
Application granted granted Critical
Publication of CN105426761B publication Critical patent/CN105426761B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software

Abstract

Embodiments of the invention disclose an identification method for an illegal application and a mobile terminal. The method comprises the following steps that the mobile terminal obtains an application identifier of a target application and detects whether target feature information matched with the application identifier exists in a feature information database, wherein the target feature information is used for showing exception of the target application and an illegal type to which the target application belongs, and if the target feature information matched with the application identifier exists in the feature information database, a prompt message used for indicating the exception of the target application is output, wherein the prompt message comprises the target feature information. Through the embodiments of the invention, the mobile terminal can identify the installing application or the installed application, if the application is illegal, the mobile terminal can prompt a user to adopt an appropriate processing measure to the application, so that the use safety of the mobile terminal is improved to a certain extent.

Description

A kind of recognition methods of illegal application and mobile terminal
Technical field
The present invention relates to electronic technology field, be specifically related to a kind of recognition methods and mobile terminal of illegal application.
Background technology
Because the function ratio of single application is more single, user is for meeting various demand, general meeting above installs more application at mobile terminal (as smart mobile phone, panel computer etc.), particularly like the user had a taste of a delicacy a large amount of application can be installed on mobile terminals especially, to experience the most modish application.Along with the increase of number of applications of installing, often there are some and illegally apply, as carry advertisement application, carry virulent application and the application of userspersonal information can be obtained.These illegal application in use bring puzzlement not only can to user, also can steal the personal information of user, reduce the security that mobile terminal uses.
Summary of the invention
The embodiment of the invention discloses a kind of recognition methods and mobile terminal of illegal application, the security that mobile terminal uses can be improved.
The embodiment of the invention discloses a kind of recognition methods of illegal application, comprising:
Obtain the application identities of intended application;
Detect in characteristic information data storehouse and whether there is the target signature information mated with described application identities, described target signature information is for representing the illegal type of described intended application belonging to illegal application and described intended application;
If exist, then export and be used to indicate the information that described intended application is illegal application, described information comprises described target signature information.
As a kind of feasible embodiment, when described illegal type is Virus Type, whether described information also unloads described intended application for prompting, and described method also comprises:
When receiving the unloading command being used to indicate and unloading described intended application, responding described unloading command and unloading described intended application.
As the embodiment that another kind is feasible, whether there is the target signature information mated with described application identities in described detection characteristic information data storehouse, comprising:
Detect in the local data base of mobile terminal and whether there is the fisrt feature information of mating with described application identities;
If there is described fisrt feature information in described local data base, then described fisrt feature information is defined as target signature information, and determines to there is described target signature information in described characteristic information data storehouse;
If there is not described fisrt feature information in described local data base, then detect in cloud database whether there is the second feature information of mating with described application identities;
If there is described second feature information in described cloud database, then described second feature information is defined as target signature information, and determines to there is described target signature information in described characteristic information data storehouse;
If there is not described second feature information in described cloud database, then determine to there is not target signature information in described characteristic information data storehouse.
As the embodiment that another is feasible, described method also comprises:
If there is not described fisrt feature information in described local data base, then judge whether described mobile terminal connects with wifi hotspot, if so, the step that whether there is the second feature information of mating with described application identities in described detection cloud database is then performed.
As the embodiment that another is feasible, described method also comprises:
If there is not described target signature information in described characteristic information data storehouse, then at the display interface output characteristic information input frame of described mobile terminal;
Be received in the characteristic information inputted in described characteristic information input frame, and using the target signature information of described characteristic information as described intended application;
Described target signature information and described application identities are stored in described local data base, and are uploaded to described cloud database.
Accordingly, the embodiment of the invention discloses a kind of mobile terminal, comprising:
Acquiring unit, for obtaining the application identities of intended application;
Detecting unit, for detecting in characteristic information data storehouse the target signature information whether existing and mate with described application identities, described target signature information is for representing the illegal type of described intended application belonging to illegal application and described intended application;
Output unit, when there is described target signature information for detecting at described detecting unit in described characteristic information data storehouse, export and be used to indicate the information that described intended application is illegal application, described information comprises described target signature information.
As a kind of feasible embodiment, when described illegal type is Virus Type, whether described information also unloads described intended application for prompting, and described mobile terminal also comprises:
Unloading unit, for when receiving the unloading command being used to indicate and unloading described intended application, responding described unloading command and unloading described intended application.
As the embodiment that another kind is feasible, described detecting unit comprises detection sub-unit and determines subelement, wherein:
Described detection sub-unit, for detect mobile terminal local data base in whether there is the fisrt feature information of mating with described application identities;
Describedly determine subelement, when there is described fisrt feature information for detecting in described local data base in described detection sub-unit, described fisrt feature information is defined as target signature information, and determines to there is described target signature information in described characteristic information data storehouse;
Described detection sub-unit, also for detect in described local data base there is not described fisrt feature information time, detect in cloud database whether there is the second feature information of mating with described application identities;
Describedly determine subelement, also for detect in described cloud database in described detection sub-unit there is described second feature information time, described second feature information is defined as target signature information, and determines to there is described target signature information in described characteristic information data storehouse;
Describedly determine subelement, also for detect in described cloud database in described detection sub-unit there is not described second feature information time, determine to there is not target signature information in described characteristic information data storehouse.
As the embodiment that another is feasible, described detecting unit also comprises:
Judgment sub-unit, when there is not described fisrt feature information for detecting in described local data base in described detection sub-unit, judge whether described mobile terminal connects with wifi hotspot, if so, then trigger described detection sub-unit and perform the operation that whether there is the second feature information of mating with described application identities in described detection cloud database.
As the embodiment that another is feasible, described output unit, also for detect at described detecting unit there is not described target signature information in described characteristic information data storehouse time, at the display interface output characteristic information input frame of described mobile terminal;
Described mobile terminal also comprises:
Receiving element, for being received in the characteristic information inputted in described characteristic information input frame, and using the target signature information of described characteristic information as described intended application;
Storage unit, for being stored in described local data base by described target signature information and described application identities;
Uploading unit, for being uploaded to described cloud database by described target signature information and described application identities.
Implement the embodiment of the present invention, there is following beneficial effect:
In the embodiment of the present invention, mobile terminal can obtain the application identities of intended application, and detect in characteristic information data storehouse the target signature information whether existing and mate with this application identities, wherein, target signature information, for representing the illegal type of this intended application extremely and belonging to this intended application, if existed, just exports the information being used to indicate this intended application exception, wherein, this information comprises this target signature information.Pass through the embodiment of the present invention, mobile terminal can identify the application of installing or mounted application, if this is applied as illegal application, so will point out user to take suitable treatment measures to this application, the security that mobile terminal uses can be improved so to a certain extent.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme in the embodiment of the present invention, below the accompanying drawing used required in describing embodiment is briefly described, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is the schematic flow sheet of the recognition methods of a kind of illegal application disclosed in the embodiment of the present invention;
Fig. 2 is the schematic flow sheet of the recognition methods of the disclosed another kind of illegal application of the embodiment of the present invention;
Fig. 3 is the structural representation of a kind of mobile terminal disclosed in the embodiment of the present invention;
Fig. 4 is the structural representation of another kind of mobile terminal disclosed in the embodiment of the present invention;
Fig. 5 is the structural representation of the embodiment of the present invention another mobile terminal disclosed.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
The embodiment of the invention discloses a kind of recognition methods and mobile terminal of illegal application, the security that mobile terminal uses can be improved.Below be described in detail respectively.
Refer to Fig. 1, Fig. 1 is the schematic flow sheet of the recognition methods of a kind of illegal application disclosed in the embodiment of the present invention.Wherein, method shown in Fig. 1 can be applied to smart mobile phone (as Android phone, iOS mobile phone etc.), panel computer, palm PC, personal digital assistant (PersonalDigitalAssistant, PDA), the mobile terminal such as mobile internet device (MobileInternetDevice, MID) and Intelligent worn device.As shown in Figure 1, this recognition methods of illegally applying can comprise the following steps:
The application identities of S101, acquisition for mobile terminal intended application.
In the embodiment of the present invention, intended application can be the current new opplication installed of mobile terminal, and also can be that user is installing one or more application of specifying in application, the embodiment of the present invention limit.Application identities is for characterizing this intended application, the Apply Names of this intended application, application icon, application signature information and application file information can be comprised, wherein, this application file information can comprise quantity of documents, message digest algorithm the 5th edition (MessageDigestAlgorithm5 of this intended application, MD5) and file size etc., the embodiment of the present invention does not limit.Therefore, the application identities of each application is distinct, and for same application, if downloaded or different versions from different channel, respective application identities also may be distinct.Therefore, the mobile terminal application identities that can get by obtaining this intended application represents the identity characteristic of this intended application.
S102, mobile terminal detect in characteristic information data storehouse whether there is the target signature information mated with this application identities, if exist, perform step S103; If do not exist, process ends.
In the embodiment of the present invention, characteristic information data storehouse can be the local data base of mobile terminal, also can be cloud database, the application identities that can store each application in this characteristic information data storehouse and the characteristic information mated with this application identities, the embodiment of the present invention limit.Wherein, characteristic information is applied as illegal application for what represent that the application identities matched marks.
Therefore, mobile terminal, after the application identities getting intended application, can detect in characteristic information data storehouse the target signature information whether existing and mate with this application identities.So this target signature information is just for representing that this intended application is for illegal application, and can represent the illegal type belonging to this intended application.
It should be noted that, what illegal application represented is carry virus, advertisement, can obtain privacy information or flow of in use escaping, can distort this class application such as personal information of user.Therefore, illegal type refers to virus type, commercial paper, acquisition privacy class, class of traffic of escaping, distorts info class etc., and can comprise one or more in these types in characteristic information.Wherein, what virus type and commercial paper showed is a certainly is applied as the application of carrying virulent application and carrying advertisement, and the embodiment of the present invention does not limit.
As a kind of feasible embodiment, mobile terminal detects the concrete mode that whether there is the target signature information mated with this application identities in characteristic information data storehouse and can comprise the following steps:
Step 11) detect in the local data base of mobile terminal whether there is the fisrt feature information of mating with this application identities;
Step 12) when there is this fisrt feature information in this local data base, this fisrt feature information is defined as target signature information, and determine to there is this target signature information in this characteristic information data storehouse;
Step 13) when there is not this fisrt feature information in this local data base, detect in cloud database whether there is the second feature information of mating with this application identities;
Step 14) when there is this second feature information in this cloud database, this second feature information is defined as target signature information, and determine to there is this target signature information in this characteristic information data storehouse;
Step 15) when there is not this second feature information in this cloud database, determine to there is not target signature information in this characteristic information data storehouse.
In specific implementation, the application identities that can store certain applications in the local data base of mobile terminal and the characteristic information mated with this application identities, these information are user-defined, also can be mobile terminal down loading updating from cloud database, so, the application identities storing each application in cloud database too and the characteristic information mated with this application identities.Wherein, the information stored in cloud database can be that other users' correspondences are uploaded after making characteristic information mark.
Therefore, mobile terminal is after the application identities getting intended application, first the fisrt feature information whether being present in this application identities coupling can be searched from local data base, if existed, just using the target signature information of this fisrt feature information as this intended application, if there is no, the information may deposited in the local database does not upgrade in time, so will detect in cloud database the second feature information whether existing and mate with this application identities.Wherein, fisrt feature information and second feature information can be identical characteristic informations, but local data base may be there is do not upgrade in time, so fisrt feature information and second feature information also can be different characteristic informations, the embodiment of the present invention only for distinguishing characteristics information be find from local data base or find from cloud database, the particular content represented by both is not limited in any way.
It should be noted that, mobile terminal detects the major way that whether there is the second feature information of mating with this application identities in cloud database: the characteristic information sending the application identities carrying this intended application to cloud database obtains asks, cloud database searches the target signature information whether existing and mate with this application identities again, if existed, just return this target signature information to mobile terminal.
That is, if there is the target signature information mated with this application identities in any one database in local data base or cloud database, so just show to there is target signature information in characteristic information data storehouse, if and all there is not the target signature information mated with this application identities in local data base and cloud database, just show to there is not target signature information in characteristic information data storehouse.
As the embodiment that another kind is feasible, when there is not this fisrt feature information in this local data base, the method first can also perform following steps:
Step 16) judge whether this mobile terminal connects with wifi hotspot, if connected, then performs step 13 ~ step 15.
In specific implementation, mobile terminal detects in cloud database whether there is the second feature information of mating with this application identities, can be to detect when connecting wifi network.Therefore, detect in local data base there is not fisrt feature information time, can first judge whether to be connected with wifi hotspot, if connected, just by detecting in cloud database with the connection that wifi hotspot is set up the second feature brain wash whether existing and mate with this application identities.
In addition, if this mobile terminal does not connect with any wifi hotspot, mobile terminal can the wifi hotspot of safety around autoscan, then connects with the wifi hotspot that can connect, thus can reduce the consumption of mobile terminal flow.
S103, mobile terminal export and are used to indicate the information that this intended application is illegal application, and process ends.
In the embodiment of the present invention, if mobile terminal detects in characteristic information data storehouse when there is this target signature information, just show that this intended application is for illegal application, therefore can export and be used to indicate the information that this intended application is illegal application.Wherein, mobile terminal exports and is used to indicate this intended application is that the concrete form of the information of illegal application can comprise: eject prompting frame when installing this intended application, points out this intended application to be the illegal application of which kind of type; When starting this intended application, ejecting prompting frame at startup interface, pointing out this intended application to be the illegal application of which kind of type; The mark that can represent illegal application is added in the application icon of this intended application, this mark can be user-defined, also can mobile terminal default setting, when user views the mark in this intended application, just can determine that this intended application is for illegal application, the mark of different illegal type that concrete can also be is different; Pointed out by the mode of voice.
For example, when user downloads a new opplication from internet, before the mounting, mobile terminal just can obtain the application identities of this application, then the characteristic information whether having this application in local data base or cloud database is searched, if had, and suppose that this characteristic information represents that this application carries advertisement, so in installation process, mobile terminal just can export this application of prompting and carry advertisement, so that user can understand this application in time, then determine whether unload this application according to the demand of self.
Again for example, user can choose an application in the application management interface of mobile terminal, then certain terminal will obtain the application identities of this application, then the characteristic information whether having this application in local data base or cloud database is searched, if had, and suppose that this characteristic information represents that this application is in use often escaped flow, and this application can obtain the privacy information of user, so mobile terminal just can export this application of prompting and to escape flow and can obtain privacy information, specifically can indicate this application and can obtain which kind of privacy information (as address list, message registration, note, geographic position, picture etc.), so that user takes suitable measure in time.
Visible, in the method described by Fig. 1, mobile terminal can obtain the application identities of intended application, and detect in characteristic information data storehouse the target signature information whether existing and mate with this application identities, wherein, target signature information is for representing the illegal type of this intended application extremely and belonging to this intended application, if existed, just export the information being used to indicate this intended application exception, wherein, this information comprises this target signature information.Pass through the embodiment of the present invention, mobile terminal can identify the application of installing or mounted application, if this is applied as illegal application, so will point out user to take suitable treatment measures to this application, the security that mobile terminal uses can be improved so to a certain extent.
Refer to Fig. 2, Fig. 2 is the schematic flow sheet of the recognition methods of the disclosed another kind of illegal application of the embodiment of the present invention.Wherein, the method shown in Fig. 2 can be applied to the mobile terminal such as smart mobile phone (as Android phone, iOS mobile phone etc.), panel computer, palm PC, personal digital assistant, mobile internet device and Intelligent worn device.As shown in Figure 2, this recognition methods of illegally applying can comprise the following steps:
The application identities of S201, acquisition for mobile terminal intended application.
S202, mobile terminal detect in characteristic information data storehouse whether there is the target signature information mated with this application identities, if exist, perform step S203; If do not exist, perform step S204 ~ S206.
S203, mobile terminal export and are used to indicate the information that this intended application is illegal application.
As a kind of feasible embodiment, when this illegal type is Virus Type, whether this information also unloads this intended application for prompting, and so the method can also comprise the following steps:
Step 21) receive the confirmation instruction inputted for this information;
Step 22) when this confirmation instruction be instruction carry the unloading command of this intended application time, respond this unloading command and unload this intended application.
In specific implementation, if this target signature information represents that illegal application type belonging to this intended application is for carrying virus, so this mobile terminal in output information with while pointing out this intended application to be illegal application, user also can be pointed out whether will to unload this intended application, if user confirms to unload this intended application, so mobile terminal is when receiving unloading command, will unload this intended application.If user does not temporarily need to unload this intended application, so mobile terminal is when receiving cancellation instruction, would not do any operation to this intended application.Such as, when user is installing a certain application, if mobile terminal detects that this application carries virus, so user will be pointed out, and prompting is the need of this application of unloading, if user confirms unloading, mobile terminal just unloads this application, if user confirms not unload, so mobile terminal will continue to install this application.
S204, mobile terminal are at the display interface output characteristic information input frame of this mobile terminal.
In the embodiment of the present invention, if mobile terminal detects in characteristic information data storehouse the target signature information not existing and mate with this application identities, mobile terminal can eject characteristic information input frame at display interface, therefore, user can according to the experience using this intended application, determine whether this intended application is illegal application, if be illegal application, and can show that this intended application specifically belongs to any illegal application.Therefore, user can add the description of the characteristic information to this intended application in characteristic information input frame.If user does not in use discover this intended application for illegal application, so just can not be used in characteristic information input frame and add characteristic information.
In addition, if the target signature information not existing and mate with this application identities detected in characteristic information data storehouse, mobile terminal can also be detected this intended application by the Viral diagnosis application of installation, safety applications and management application etc.If detect that this intended application is for illegal application, so testing result can also be added into characteristic information input frame by mobile terminal automatically.If do not detect that this intended application is for illegal application, so would not input any information in characteristic information input frame.
S205, mobile terminal are received in the characteristic information inputted in this characteristic information input frame, and using the target signature information of this characteristic information as this intended application.
In the embodiment of the present invention, when user is according to the experience using this intended application, input feature vector information in characteristic information input frame, or according to above-mentioned application, mobile terminal detects which kind of this intended application is specially and illegally applies, and when testing result is input in characteristic information input frame, mobile terminal just may be received in the characteristic information inputted in this characteristic information input frame, when user clicks submission or confirms, this mobile terminal will using the target signature information of this characteristic information as this intended application.
This target signature information and this application identities are stored in local data base by S206, mobile terminal, and are uploaded to cloud database.
In the embodiment of the present invention, the application identities of this target signature information and this intended application can be bound by this mobile terminal, and this target signature information and this application identities is stored in the local database.If mobile terminal and internet connect, this target signature information and this application identities can also be uploaded in cloud database, so that other users provide reference when installing this intended application for it.
Visible, in the method described by Fig. 2, when all there is not the target signature information mated with the application identities of intended application in local data base and cloud database, user can detect this intended application according to using the experience of this intended application or the application of mobile terminal use safety class, determine whether this intended application is illegal application, if, the application identities of the illegal type belonging to this intended application and this intended application can be uploaded to cloud database, to reach the effect that illegal application is shared mutually.
Refer to Fig. 3, Fig. 3 is the structural representation of a kind of mobile terminal disclosed in the embodiment of the present invention.Wherein, the mobile terminal 300 shown in Fig. 3 can include but not limited to smart mobile phone (as Android phone, iOS mobile phone etc.), panel computer, palm PC, personal digital assistant, mobile internet device and Intelligent worn device etc.As shown in Figure 3, this mobile terminal 300 can comprise with lower unit:
Acquiring unit 301, for obtaining the application identities of intended application.
Detecting unit 302, for detecting in characteristic information data storehouse the target signature information whether existing and mate with this application identities, wherein, this target signature information is for representing the illegal type of this intended application belonging to illegal application and this intended application.
Output unit 303, when there is this target signature information for detecting at above-mentioned detecting unit 302 in this characteristic information data storehouse, export and be used to indicate the information that this intended application is illegal application, wherein, this information comprises this target signature information.
See also Fig. 4, Fig. 4 is the structural representation of another kind of mobile terminal disclosed in the embodiment of the present invention.Wherein, the mobile terminal 300 shown in Fig. 4 optimizes to obtain on the basis of the mobile terminal 300 shown in Fig. 3.As shown in Figure 4, when this illegal type is Virus Type, whether the information that above-mentioned output unit 303 exports also unloads this intended application for prompting, and therefore, this mobile terminal 300 can also comprise with lower unit:
Unloading unit 304, during for receiving the unloading command being used to indicate this intended application of unloading at receiving element 305, responds this unloading command and unloads this intended application.
As a kind of feasible embodiment, above-mentioned detecting unit 302 just can comprise detection sub-unit 3021, determine subelement 3022 and judgment sub-unit 3023, wherein:
Detection sub-unit 3021, for detect mobile terminal 300 local data base in whether there is the fisrt feature information of mating with this application identities.
Determine subelement 3022, when there is this fisrt feature information for detecting in this local data base in above-mentioned detection sub-unit 3021, this fisrt feature information being defined as target signature information, and determining to there is this target signature information in this characteristic information data storehouse.
Judgment sub-unit 3023, when there is not this fisrt feature information for detecting in this local data base in above-mentioned detection sub-unit 3021, judges whether this mobile terminal 300 connects with wifi hotspot.
Above-mentioned detection sub-unit 3021, time also for judging that in above-mentioned judgment sub-unit 3023 this mobile terminal 300 connects with wifi hotspot, detects in cloud database whether there is the second feature information of mating with this application identities.
Above-mentionedly determine subelement 3022, also for detect in this cloud database in above-mentioned detection sub-unit 3021 there is this second feature information time, this second feature information is defined as target signature information, and determines to there is this target signature information in this characteristic information data storehouse.
Above-mentionedly determine subelement 3022, also for detect in this cloud database in above-mentioned detection sub-unit 3021 there is not this second feature information time, determine to there is not target signature information in this characteristic information data storehouse.
As the embodiment that another kind is feasible,
Above-mentioned output unit 303, also for detect at above-mentioned detecting unit 302 there is not target signature information in this characteristic information data storehouse time, at the display interface output characteristic information input frame of this mobile terminal 300.
This mobile terminal 300 can also comprise receiving element 305, storage unit 306 and uploading unit 307, wherein:
Receiving element 305, for being received in the characteristic information inputted in this characteristic information input frame, and using the target signature information of this characteristic information as this intended application.
Storage unit 306, the application identities obtained for the target signature information that received by above-mentioned receiving element 305 and above-mentioned acquiring unit 301 is stored in local data base.
Uploading unit 307, the application identities obtained for the target signature information that received by above-mentioned receiving element 305 and above-mentioned acquiring unit 301 is uploaded to cloud database.
Visible, in the mobile terminal described by Fig. 3 and Fig. 4, mobile terminal can obtain the application identities of intended application, and detect in characteristic information data storehouse the target signature information whether existing and mate with this application identities, wherein, target signature information is for representing the illegal type of this intended application extremely and belonging to this intended application, if existed, just export the information being used to indicate this intended application exception, wherein, this information comprises this target signature information; If there is no, user can detect this intended application according to using the experience of this intended application or the application of mobile terminal use safety class, determine whether this intended application is illegal application, if, the application identities of the illegal type belonging to this intended application and this intended application can be uploaded to cloud database, to reach the effect that illegal application is shared mutually.Pass through the embodiment of the present invention, mobile terminal can identify the application of installing or mounted application, if this is applied as illegal application, so will point out user to take suitable treatment measures to this application, the security that mobile terminal uses can be improved so to a certain extent.
Refer to Fig. 5, Fig. 5 is the structural representation of the embodiment of the present invention another mobile terminal disclosed.Wherein, the mobile terminal 500 shown in Fig. 5 can include but not limited to smart mobile phone (as Android phone, iOS mobile phone etc.), panel computer, palm PC, personal digital assistant, mobile internet device and Intelligent worn device etc.This mobile terminal 500 can comprise at least one processor 501, as CPU, communication interface 502, storer 503 and at least one communication bus 504, storer 503 can be high-speed RAM storer, also can be nonvolatile memory (non-volatilememory), as at least one magnetic disk memory, optionally, storer 503 can also be that at least one is positioned at the memory storage away from aforementioned processor 501.Wherein:
Communication bus 504 is for realizing the connection communication between these assemblies such as processor 501, communication interface 502 and storer 503.
Store batch processing code in storer 503, and processor 501 is for calling the program code stored in storer 503, performs following operation:
Obtain the application identities of intended application;
Detect in characteristic information data storehouse and whether there is the target signature information mated with this application identities, wherein, this target signature information is for representing the illegal type of this intended application belonging to illegal application and this intended application;
If exist, then exported by communication interface 502 and be used to indicate the information that this intended application is illegal application, wherein, this information comprises this target signature information.
As a kind of feasible embodiment, when this illegal type is Virus Type, whether this information also unloads this intended application for prompting, and so processor 501 is also for calling the program code stored in storer 503, performs following operation:
Receive the unloading command being used to indicate this intended application of unloading;
Respond this unloading command and unload this intended application.
As the embodiment that another kind is feasible, processor 501 detects in characteristic information data storehouse the concrete mode that whether there is the target signature information mated with this application identities and can be:
Detect in the local data base of mobile terminal 500 and whether there is the fisrt feature information of mating with this application identities;
If there is this fisrt feature information in this local data base, then this fisrt feature information is defined as target signature information, and determines to there is this target signature information in this characteristic information data storehouse;
If there is not this fisrt feature information in this local data base, then detected in cloud database the second feature information whether existing and mate with this application identities by communication interface 502;
If there is this second feature information in this cloud database, then this second feature information is defined as target signature information, and determines to there is this target signature information in this characteristic information data storehouse;
If there is not this second feature information in this cloud database, then determine to there is not target signature information in this characteristic information data storehouse.
As the embodiment that another is feasible, if there is not this fisrt feature information in this local data base, so processor 501 can also call the program code stored in storer 503, performs following operation:
Judge whether this mobile terminal 500 connects with wifi hotspot, if connected, is just detected in cloud database the second feature information whether existing and mate with this application identities by communication interface 502.
As the embodiment that another is feasible, processor 501, also for calling the program code stored in storer 503, performs following operation:
If when there is not target signature information in this characteristic information data storehouse, by the display interface output characteristic information input frame of communication interface 502 at this mobile terminal 500;
The characteristic information inputted in this characteristic information input frame is received in by communication interface 502, and using the target signature information of this characteristic information as this intended application;
This target signature information and this application identities are stored in local data base, and are uploaded to cloud database by communication interface 502.
Visible, in the mobile terminal described by Fig. 5, mobile terminal can obtain the application identities of intended application, and detect in characteristic information data storehouse the target signature information whether existing and mate with this application identities, wherein, target signature information is for representing the illegal type of this intended application extremely and belonging to this intended application, if existed, just export the information being used to indicate this intended application exception, wherein, this information comprises this target signature information; If there is no, user can detect this intended application according to using the experience of this intended application or the application of mobile terminal use safety class, determine whether this intended application is illegal application, if, the application identities of the illegal type belonging to this intended application and this intended application can be uploaded to cloud database, to reach the effect that illegal application is shared mutually.Pass through the embodiment of the present invention, mobile terminal can identify the application of installing or mounted application, if this is applied as illegal application, so will point out user to take suitable treatment measures to this application, the security that mobile terminal uses can be improved so to a certain extent.
One of ordinary skill in the art will appreciate that all or part of flow process realized in above-described embodiment method, that the hardware that can carry out instruction relevant by computer program has come, described program can be stored in a computer read/write memory medium, this program, when performing, can comprise the flow process of the embodiment as above-mentioned each side method.Wherein, described storage medium can be magnetic disc, CD, read-only store-memory body (Read-OnlyMemory, ROM) or random store-memory body (RandomAccessMemory, RAM) etc.
Above disclosedly be only present pre-ferred embodiments, certainly can not limit the interest field of the present invention with this, therefore according to the equivalent variations that the claims in the present invention are done, still belong to the scope that the present invention is contained.

Claims (10)

1. a recognition methods for illegal application, is characterized in that, comprising:
Obtain the application identities of intended application;
Detect in characteristic information data storehouse and whether there is the target signature information mated with described application identities, described target signature information is for representing the illegal type of described intended application belonging to illegal application and described intended application;
If exist, then export and be used to indicate the information that described intended application is illegal application, described information comprises described target signature information.
2. method according to claim 1, is characterized in that, when described illegal type is Virus Type, whether described information also unloads described intended application for prompting, and described method also comprises:
When receiving the unloading command being used to indicate and unloading described intended application, responding described unloading command and unloading described intended application.
3. method according to claim 1 and 2, is characterized in that, whether there is the target signature information mated with described application identities, comprising in described detection characteristic information data storehouse:
Detect in the local data base of mobile terminal and whether there is the fisrt feature information of mating with described application identities;
If there is described fisrt feature information in described local data base, then described fisrt feature information is defined as target signature information, and determines to there is described target signature information in described characteristic information data storehouse;
If there is not described fisrt feature information in described local data base, then detect in cloud database whether there is the second feature information of mating with described application identities;
If there is described second feature information in described cloud database, then described second feature information is defined as target signature information, and determines to there is described target signature information in described characteristic information data storehouse;
If there is not described second feature information in described cloud database, then determine to there is not target signature information in described characteristic information data storehouse.
4. method according to claim 3, is characterized in that, described method also comprises:
If there is not described fisrt feature information in described local data base, then judge whether described mobile terminal connects with wifi hotspot, if so, the step that whether there is the second feature information of mating with described application identities in described detection cloud database is then performed.
5. method according to claim 1, is characterized in that, described method also comprises:
If there is not described target signature information in described characteristic information data storehouse, then at the display interface output characteristic information input frame of described mobile terminal;
Be received in the characteristic information inputted in described characteristic information input frame, and using the target signature information of described characteristic information as described intended application;
Described target signature information and described application identities are stored in described local data base, and are uploaded to described cloud database.
6. a mobile terminal, is characterized in that, comprising:
Acquiring unit, for obtaining the application identities of intended application;
Detecting unit, for detecting in characteristic information data storehouse the target signature information whether existing and mate with described application identities, described target signature information is for representing the illegal type of described intended application belonging to illegal application and described intended application;
Output unit, when there is described target signature information for detecting at described detecting unit in described characteristic information data storehouse, export and be used to indicate the information that described intended application is illegal application, described information comprises described target signature information.
7. mobile terminal according to claim 6, is characterized in that, when described illegal type is Virus Type, whether described information also unloads described intended application for prompting, and described mobile terminal also comprises:
Unloading unit, for when receiving the unloading command being used to indicate and unloading described intended application, responding described unloading command and unloading described intended application.
8. the mobile terminal according to claim 6 or 7, is characterized in that, described detecting unit comprises detection sub-unit and determines subelement, wherein:
Described detection sub-unit, for detect mobile terminal local data base in whether there is the fisrt feature information of mating with described application identities;
Describedly determine subelement, when there is described fisrt feature information for detecting in described local data base in described detection sub-unit, described fisrt feature information is defined as target signature information, and determines to there is described target signature information in described characteristic information data storehouse;
Described detection sub-unit, also for detect in described local data base there is not described fisrt feature information time, detect in cloud database whether there is the second feature information of mating with described application identities;
Describedly determine subelement, also for detect in described cloud database in described detection sub-unit there is described second feature information time, described second feature information is defined as target signature information, and determines to there is described target signature information in described characteristic information data storehouse;
Describedly determine subelement, also for detect in described cloud database in described detection sub-unit there is not described second feature information time, determine to there is not target signature information in described characteristic information data storehouse.
9. mobile terminal according to claim 8, is characterized in that, described detecting unit also comprises:
Judgment sub-unit, when there is not described fisrt feature information for detecting in described local data base in described detection sub-unit, judge whether described mobile terminal connects with wifi hotspot, if so, then trigger described detection sub-unit and perform the operation that whether there is the second feature information of mating with described application identities in described detection cloud database.
10. mobile terminal according to claim 6, is characterized in that,
Described output unit, also for detect at described detecting unit there is not described target signature information in described characteristic information data storehouse time, at the display interface output characteristic information input frame of described mobile terminal;
Described mobile terminal also comprises:
Receiving element, for being received in the characteristic information inputted in described characteristic information input frame, and using the target signature information of described characteristic information as described intended application;
Storage unit, for being stored in described local data base by described target signature information and described application identities;
Uploading unit, for being uploaded to described cloud database by described target signature information and described application identities.
CN201510799189.XA 2015-11-18 2015-11-18 A kind of recognition methods of illegal application and mobile terminal Active CN105426761B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510799189.XA CN105426761B (en) 2015-11-18 2015-11-18 A kind of recognition methods of illegal application and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510799189.XA CN105426761B (en) 2015-11-18 2015-11-18 A kind of recognition methods of illegal application and mobile terminal

Publications (2)

Publication Number Publication Date
CN105426761A true CN105426761A (en) 2016-03-23
CN105426761B CN105426761B (en) 2018-06-29

Family

ID=55504965

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510799189.XA Active CN105426761B (en) 2015-11-18 2015-11-18 A kind of recognition methods of illegal application and mobile terminal

Country Status (1)

Country Link
CN (1) CN105426761B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106557688A (en) * 2016-11-17 2017-04-05 广东欧珀移动通信有限公司 The method and device of management default application
CN106693366A (en) * 2016-12-06 2017-05-24 北京奇虎科技有限公司 Method to verify legitimacy ofoperation and equipment and installation package reinforcement method and device
CN106971106A (en) * 2017-03-30 2017-07-21 维沃移动通信有限公司 A kind of method, mobile terminal and server for recognizing unauthorized applications
CN107357591A (en) * 2017-07-25 2017-11-17 努比亚技术有限公司 Interface method for implantation, mobile terminal and the storage medium of application program
CN107579993A (en) * 2017-09-29 2018-01-12 北京云杉世纪网络科技有限公司 The security processing and device of a kind of network data flow
CN108322418A (en) * 2017-01-16 2018-07-24 深圳兆日科技股份有限公司 The detection method and device of unauthorized access
CN110008687A (en) * 2019-02-19 2019-07-12 阿里巴巴集团控股有限公司 The processing method and processing device of risk application
CN111163066A (en) * 2019-12-16 2020-05-15 苏州哈度软件有限公司 Network security software system based on cloud computing

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103632089A (en) * 2013-12-16 2014-03-12 北京网秦天下科技有限公司 Security detection method, device and system of application installation package
CN103684872A (en) * 2013-12-26 2014-03-26 深圳数字电视国家工程实验室股份有限公司 Control method and device for application programs
CN104423976A (en) * 2013-08-22 2015-03-18 卓易畅想(北京)科技有限公司 Method and device for identifying mobile application at network terminal
CN104700029A (en) * 2013-12-04 2015-06-10 中国移动通信集团广东有限公司 On-line detecting method, device and server for software

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104423976A (en) * 2013-08-22 2015-03-18 卓易畅想(北京)科技有限公司 Method and device for identifying mobile application at network terminal
CN104700029A (en) * 2013-12-04 2015-06-10 中国移动通信集团广东有限公司 On-line detecting method, device and server for software
CN103632089A (en) * 2013-12-16 2014-03-12 北京网秦天下科技有限公司 Security detection method, device and system of application installation package
CN103684872A (en) * 2013-12-26 2014-03-26 深圳数字电视国家工程实验室股份有限公司 Control method and device for application programs

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106557688A (en) * 2016-11-17 2017-04-05 广东欧珀移动通信有限公司 The method and device of management default application
CN106693366A (en) * 2016-12-06 2017-05-24 北京奇虎科技有限公司 Method to verify legitimacy ofoperation and equipment and installation package reinforcement method and device
CN106693366B (en) * 2016-12-06 2020-04-21 北京奇虎科技有限公司 Method and device for verifying operation validity and method and device for reinforcing installation package
CN108322418A (en) * 2017-01-16 2018-07-24 深圳兆日科技股份有限公司 The detection method and device of unauthorized access
CN106971106A (en) * 2017-03-30 2017-07-21 维沃移动通信有限公司 A kind of method, mobile terminal and server for recognizing unauthorized applications
CN107357591A (en) * 2017-07-25 2017-11-17 努比亚技术有限公司 Interface method for implantation, mobile terminal and the storage medium of application program
CN107579993A (en) * 2017-09-29 2018-01-12 北京云杉世纪网络科技有限公司 The security processing and device of a kind of network data flow
CN107579993B (en) * 2017-09-29 2020-09-25 北京云杉世纪网络科技有限公司 Network data flow safety processing method and device
CN110008687A (en) * 2019-02-19 2019-07-12 阿里巴巴集团控股有限公司 The processing method and processing device of risk application
CN110008687B (en) * 2019-02-19 2023-05-05 创新先进技术有限公司 Risk application processing method and apparatus
CN111163066A (en) * 2019-12-16 2020-05-15 苏州哈度软件有限公司 Network security software system based on cloud computing

Also Published As

Publication number Publication date
CN105426761B (en) 2018-06-29

Similar Documents

Publication Publication Date Title
CN105426761A (en) Identification method for illegal application and mobile terminal
US20200112851A1 (en) Apparatuses, methods and systems for implementing a system-on-chip with integrated reprogrammable cellular network connectivity
CN105338515B (en) Data service transmission method and mobile communication equipment
CN109564598A (en) A kind of endpoint detection methods and terminal
CN104850301A (en) Method and system for classifying application icons on system desktop
WO2016061966A1 (en) Ui loading method, apparatus and related device, and computer storage medium
CN108733797B (en) File processing method and related device
CN106227585A (en) Application program starting method, device and equipment
CN105357204B (en) Method and device for generating terminal identification information
CN109375937A (en) Method for upgrading system, device, terminal device and storage medium
CN105530130A (en) Method and device for upgrading Over-The-Air downloading technology
CN106550031A (en) The method and device of data backup
CN111372249A (en) System and method for testing consistency of code number downloading process of eSIM (embedded subscriber identity Module) terminal of Internet of things
CN108112010A (en) Access method, apparatus, terminal and the computer readable storage medium of network
US20150350812A1 (en) Method and system for transferring address book based on bluetooth
CN105718788B (en) A kind of malicious application processing method, device and terminal
CN104484206A (en) Method, terminal and system for setting up application program
CN109246280B (en) Address book cloud processing method and device, computer equipment and readable storage medium
CN108241515B (en) Application shortcut establishing method and terminal
CN103399788A (en) Cross-application control method and system for intelligent terminal
KR20150020183A (en) Method and device for upgrading telephone number in wireless terminal self-adaptive network upgrade
CN110401934B (en) Method for managing equipment, management equipment and computer readable storage medium
CN103268443A (en) Symbol-based Android malicious code detection method and system
CN105430738A (en) Method and device for initiating registration
CN105975321A (en) Application program installation package icon replacing method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Patentee after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Patentee before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.