CN105451223A - Information monitoring method and device, and mobile terminal - Google Patents

Information monitoring method and device, and mobile terminal Download PDF

Info

Publication number
CN105451223A
CN105451223A CN201410387437.5A CN201410387437A CN105451223A CN 105451223 A CN105451223 A CN 105451223A CN 201410387437 A CN201410387437 A CN 201410387437A CN 105451223 A CN105451223 A CN 105451223A
Authority
CN
China
Prior art keywords
information
deleted
database
modified
backup
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410387437.5A
Other languages
Chinese (zh)
Other versions
CN105451223B (en
Inventor
唐虹刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Banma Zhixing Network Hongkong Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201410387437.5A priority Critical patent/CN105451223B/en
Priority to PCT/CN2015/084307 priority patent/WO2016019793A1/en
Publication of CN105451223A publication Critical patent/CN105451223A/en
Priority to HK16109293.7A priority patent/HK1221846A1/en
Application granted granted Critical
Publication of CN105451223B publication Critical patent/CN105451223B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/06Arrangements for sorting, selecting, merging, or comparing data on individual record carriers
    • G06F7/20Comparing separate sets of record carriers arranged in the same sequence to determine whether at least some of the data in one set is identical with that in the other set or sets

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses an information monitoring method and device, and a mobile terminal. The information monitoring method includes the following steps of: receiving a notification of information change; reading information from an information database and a backup database, comparing the information from the information database and the information from the backup database, and identifying deleted information or modified information; and sending a prompt message that the information is deleted or modified, or restoring the deleted information or the modified information if it is determined that the deleted information or the modified information is from a credible source. According to the information monitoring method and device, and the mobile terminal, through comparison of the information from the information database and the information from the backup database, the deleted information or the modified information can be identified; the information can be restored when it is determined that the information is from the credible source; and the problem that the information is maliciously deleted and modified can be solved, the security of the information in the mobile terminal can be improved, and the property loss can be avoided.

Description

The method for supervising of information, device and mobile terminal
Technical field
The present invention relates to field of information security technology, particularly relate to a kind of method for supervising of information, device and mobile terminal.
Background technology
Along with the high speed development of science and technology, the function of smart mobile phone is increasingly powerful, and increasing user selects the note being managed oneself in smart mobile phone by some application software.When user receives a note, application software can carry out scanner uni safety verification to this note, thus tackles note.
But, if mobile phone is poisoning, or application software offering question, the note of some keys is by malicious intercepted, and cause loss or the amendment of crucial note possibly, fail safe is low, cause user cannot know content in crucial note, a lot of inconvenience is brought to user, or even property loss, cause poor user experience.
Summary of the invention
The present invention is intended to solve one of technical problem in correlation technique at least to a certain extent.For this reason, one object of the present invention is the method for supervising proposing a kind of information.The method can solve the problem that information is deleted by malice, revised, and improves the fail safe of information in mobile terminal.
Second object of the present invention is the supervising device proposing a kind of information.
3rd object of the present invention is to propose a kind of mobile terminal.
To achieve these goals, the method for supervising of the information of first aspect present invention embodiment, comprising: the notice receiving information change; From information database and backup database, read information respectively, and by from described information database information with contrast from the information in described backup database, identify information that is deleted or that be modified; And if determine that the described deleted or information that is modified is from trusted sources, then deleted the or information that is modified of the information that sends is or/and reduce information that is deleted or that be modified.
The method for supervising of the information of the embodiment of the present invention, by the information in information database and the information in backup database are contrasted, identify information that is deleted or that be modified, when determining this information from trusted sources, reminding user or this information of direct-reduction, the information that solves is deleted by malice, the problem of amendment, improves the fail safe of information in mobile terminal, avoids producing property loss.
To achieve these goals, the supervising device of the information of second aspect present invention embodiment, comprising: processing module, for sending the notice of information change to monitoring module; Described monitoring module, for after the described notice of reception, from information database and backup database, read information respectively, and by from described information database information with contrast from the information in described backup database, identify information that is deleted or that be modified; And warning prompting module, if for determine that described monitoring module identifies described deleted or the information that is modified from trusted sources, then deleted the or information that is modified of the information that sends is or/and reduce information that is deleted or that be modified.
The supervising device of the information of the embodiment of the present invention, by the information in information database and the information in backup database are contrasted, identify information that is deleted or that be modified, when determining this information from trusted sources, reminding user or this information of direct-reduction, the information that solves is deleted by malice, the problem of amendment, improves the fail safe of information in mobile terminal, avoids producing property loss.
The embodiment of the present invention proposes a kind of mobile terminal, this mobile terminal comprises housing, processor, memory, circuit board and power circuit, wherein, described circuit board is placed in the interior volume that described housing surrounds, and described processor and described memory are arranged on described circuit board; Described power circuit, for powering for each circuit of described mobile terminal or device; Described memory is used for stores executable programs code; Described processor runs the program corresponding with described executable program code by reading the executable program code stored in described memory, for performing following steps: the notice receiving information change; From information database and backup database, read information respectively, and by from described information database information with contrast from the information in described backup database, identify information that is deleted or that be modified; And if determine that the described deleted or information that is modified is from trusted sources, then deleted the or information that is modified of the information that sends is or/and reduce information that is deleted or that be modified.
The mobile terminal of the information of the embodiment of the present invention, by the information in information database and the information in backup database are contrasted, identify information that is deleted or that be modified, when determining this information from trusted sources, reminding user or this information of direct-reduction, the information that solves is deleted by malice, the problem of amendment, improves the fail safe of information in mobile terminal, avoids producing property loss.
Accompanying drawing explanation
Fig. 1 is the flow chart of the method for supervising of information according to an embodiment of the invention.
Fig. 2 is the flow chart of the method for supervising of information according to the present invention's specific embodiment.
Fig. 3 is the structural representation of the supervising device of information according to an embodiment of the invention.
Fig. 4 is the structural representation of the supervising device of information in accordance with another embodiment of the present invention.
Embodiment
Be described below in detail embodiments of the invention, the example of described embodiment is shown in the drawings, and wherein same or similar label represents same or similar element or has element that is identical or similar functions from start to finish.Be exemplary below by the embodiment be described with reference to the drawings, be intended to for explaining the present invention, and can not limitation of the present invention be interpreted as.
Below with reference to the accompanying drawings the method for supervising of the information of the embodiment of the present invention, device and mobile terminal are described.
Fig. 1 is the flow chart of the method for supervising of information according to an embodiment of the invention.
As shown in Figure 1, the method for supervising of information comprises:
S101, receives the notice of information change.
In an embodiment of the present invention, there is information database and backup database in mobile terminal.After mobile terminal receives information, the information received can be saved in information database by mobile terminal.Meanwhile, the information received also is saved in backup database.It should be noted that to improve fail safe, mobile terminal can directly from RIL (radiointerfacelayer, radio interface layer) obtaining information, by this mode, guarantee information just can be got information by before malicious intercepted, and be saved to backup database.That is, the information of preserving in this backup database is raw information, once information is by malicious intercepted, can be recovered by this backup database.Then mobile terminal can according to user or third party application to the operation lastest imformation database of information.If the information in information database changes, then the notice of mobile terminal accessible information change.Above-mentioned information can be short message, is called for short note.
S102, reads information respectively from information database and backup database, and in the future self information database information with contrast from the information in backup database, identify information that is deleted or that be modified.
In an embodiment of the present invention, after receiving the notice of information change, mobile terminal can read all information respectively from information database and backup database, and in the future self information database information with contrast from the information in backup database, identify information that is deleted or that be modified.For example, after mobile phone receives note, if there is no the interception of malicious virus or application software, information database in mobile phone and backup database are consistent, but when having malicious virus malicious intercepted or the interception of mobile phone application software mistake, revising note, then information database and backup database can produce inconsistent.All notes in information data of mobile phone storehouse and backup database are contrasted, finally obtains note that is deleted or that be modified.
S103, if determine, information that is deleted or that be modified is from trusted sources, then deleted the or information that is modified of the information that sends is or/and reduce information that is deleted or that be modified.
In an embodiment of the present invention, mobile terminal can have trusted sources database, for preserving number of sender trusty, as short message sending sides such as Alipay, banks; Also insincere source database can be had.After identifying information that is deleted or that be modified, if determine that information that is deleted or that be modified is from trusted sources, then mobile terminal can send the information that information is deleted or be modified, and also can reduce information that is deleted or that be modified.Particularly, mobile terminal can check whether the sender number of information that is deleted or that be modified is arranged in trusted sources database.If be arranged in trusted sources database, then can determine that information that is deleted or that be modified is from trusted sources.Mobile terminal also can check that the sender number of information that is deleted or that be modified is whether in insincere source database.If not, then can determine that information that is deleted or that be modified is from trusted sources.
Particularly, note that is deleted or that be modified can be read and be reduced to information database from backup database, also corresponding note can be read from backup database, and be reduced to information database, and send information, and show corresponding note based on the operation that user performs according to information.
Certainly, this information database support shows note by the mode of message list.Such as: after reducing to information that is deleted or that be modified, send information, then user checks this note by message list, knows content.
The method for supervising of the information of the embodiment of the present invention, by the information in information database and the information in backup database are contrasted, identify information that is deleted or that be modified, when determining this information from trusted sources, reduce this information, the information that solves is deleted by malice, the problem of amendment, improves the fail safe of information in mobile terminal, avoids producing property loss.
Fig. 2 is the flow chart of the method for supervising of information according to the present invention's specific embodiment.
As shown in Figure 2, the method for supervising of information comprises:
S201, monitoring short message data variation.
Particularly, there is note data storehouse and backup database in mobile phone.After mobile phone receives note, the information received can be saved in note data storehouse and backup database by mobile phone respectively.Now, when finding that the note in note data storehouse changes, as malicious virus interception or amendment, then show that SMS changes.
S202, contrast backup database, obtains note that is deleted or that be modified.
After receiving the vicissitudinous notice of note, all notes in note data storehouse and all notes in backup database can be contrasted, obtain note that is deleted or that be modified.
S203, judges whether from trusted sources, if this note is from trusted sources, then jumps to step S204.If this note from can not information source, then terminates.
After obtaining note that is deleted or that be modified, can judge that whether this note is from trusted sources according to trusted sources storehouse.Trusted sources database for preserving number of sender trusty, as short message sending sides such as Alipay, banks.
S204, reminding user, and reduce note that is deleted or that be modified.
After determining that note that is deleted or that be modified is from trusted sources, can the note from trusted sources be had deleted or be modified by reminding user, then reduce note that is deleted or that be modified.
The method for supervising of the information of the embodiment of the present invention; by monitoring short message data variation; obtain note that is deleted or that be modified; when determining this note from trusted sources, user is reminded, and reduce this note; solve the problem that note is deleted by malice, revised; improve the fail safe of userspersonal information in mobile phone, effectively protect the privacy of user, avoid property loss.
In order to realize above-described embodiment, the present invention also proposes a kind of supervising device of information.
Fig. 3 is the structural representation of the supervising device of information according to an embodiment of the invention.
As shown in Figure 3, the supervising device of information comprises: processing module 110, monitoring module 120 and warning prompting module 130.
Processing module 110 is for sending the notice of information change to monitoring module 120.
In an embodiment of the present invention, there is information database and backup database in mobile terminal.Processing module 110 for according to user or third party application to the operation lastest imformation database of information.When the information in information database changes, processing module 110 can send the notice of information change to monitoring module 120.Above-mentioned information can be short message, is called for short note.
Monitoring module 120, for after reception notification, reads information respectively from information database and backup database, and in the future self information database information with contrast from the information in backup database, identify information that is deleted or that be modified.
Warning prompting module 130 is for when determine that monitoring module 120 identifies deleted or the information that is modified are from trusted sources, and the deleted or information that is modified of the information that sends is or/and reduce information that is deleted or that be modified.Particularly, prompting module 130 is warned can to check whether the sender number of information that is deleted or that be modified is arranged in trusted sources database.If be arranged in trusted sources database, then can determine that information that is deleted or that be modified is from trusted sources.Warning prompting module 130 also can check that the sender number of information that is deleted or that be modified is whether in insincere source database.If not, then can determine that information that is deleted or that be modified is from trusted sources.
After determining that information that is deleted or that be modified is from trusted sources, warning prompting module 130 can send the information that information is deleted or be modified, and also can reduce information that is deleted or that be modified.Particularly, note that is deleted or that be modified can be read and be reduced to information database from backup database, also corresponding note can be read from backup database, and be reduced to information database, and send information, and show corresponding note based on the operation that user performs according to information.
Certainly, this information database support shows note by the mode of message list.Such as: after reducing to information that is deleted or that be modified, send information, then user checks this note by message list, knows content.
In addition, the supervising device of the information of the present embodiment also can comprise receiver module 140.
Receiver module 140, for after receiving information, sends backup instruction respectively to monitoring module 120 and sends renewal instruction to processing module 110.
Monitoring module 120, after the backup instruction receiving receiver module 140 transmission, according to backup instruction, can receive information from radio interface layer RIL, and be saved to backup database.
The information received, after the renewal instruction receiving receiver module 140 transmission, according to renewal instruction, can be saved in information database by processing module 110.
In an embodiment of the present invention, Fig. 4 is the structural representation of the supervising device of information in accordance with another embodiment of the present invention.As shown in Figure 4, can comprise:
S401, phone bottom receives note, is then sent to RIL.Wherein, phone bottom and RIL are arranged in receiver module 140.
S402, RIL notifying messages monitoring process receives note.Wherein, message monitoring process is arranged in monitoring module 120.
S403, message monitoring process by the short message backup that receives in backup database.
S404, RIL notifying messages processing block bridge joint receives note.Wherein note process framework is in processing module 110.
S405, the note after the process of note process framework is saved in note data storehouse.
S406, when there being note by malicious intercepted or amendment, note process framework sends the notice of information change to message monitoring process.
S407, all notes in message monitoring process short message reading database.
S408, message monitoring process reads all notes in backup database.
S409, all notes in note data storehouse and all notes in backup database contrast by message monitoring process, identify note that is deleted or that be modified.
S410, message monitoring process reads the number of trusted sender from trusted sources database, identifies note that is deleted or that be modified from trusted sources.
S411, warning prompting module 130 reminding user has the note from trusted sources deleted or be modified, and reduces note that is deleted or that be modified.
The supervising device of the information of the embodiment of the present invention, by the note in note data storehouse and the note in backup database are contrasted, identify note that is deleted or that be modified, when determining this note from trusted sources, reduce this note, solve the problem that note is deleted by malice, revised, improve the fail safe of information in mobile terminal, avoid producing property loss.
In order to realize above-described embodiment, the present invention also proposes a kind of mobile terminal, this mobile terminal comprises housing, processor, memory, circuit board and power circuit, wherein, foregoing circuit plate is placed in the interior volume that above-mentioned housing surrounds, and above-mentioned processor and above-mentioned memory are arranged on foregoing circuit plate; Above-mentioned power circuit, for powering for each circuit of above-mentioned mobile terminal or device; Above-mentioned memory is used for stores executable programs code; Above-mentioned processor runs the program corresponding with above-mentioned executable program code by reading the executable program code stored in above-mentioned memory, for execution following steps:
S101 ', receives the notice of information change.
In an embodiment of the present invention, there is information database and backup database in mobile terminal.After mobile terminal receives information, the information received can be saved in information database by mobile terminal.Meanwhile, the information received also is saved in backup database.It should be noted that mobile terminal can directly from RIL obtaining information.Then mobile terminal can according to user or third party application to the operation lastest imformation database of information.If the information in information database changes, then the notice of mobile terminal accessible information change.Above-mentioned information can be short message, is called for short note.
S102 ', reads information respectively from information database and backup database, and in the future self information database information with contrast from the information in backup database, identify information that is deleted or that be modified.
In an embodiment of the present invention, after receiving the notice of information change, mobile terminal can read all information respectively from information database and backup database, and in the future self information database information with contrast from the information in backup database, identify information that is deleted or that be modified.For example, after mobile phone receives note, if there is no the interception of malicious virus or application software, information database in mobile phone and backup database are consistent, but when having malicious virus malicious intercepted or the interception of mobile phone application software mistake, revising note, then information database and backup database can produce inconsistent.All notes in information data of mobile phone storehouse and backup database are contrasted, finally obtains note that is deleted or that be modified.
S103 ', if determine, information that is deleted or that be modified is from trusted sources, then deleted the or information that is modified of the information that sends is or/and reduce information that is deleted or that be modified.
In an embodiment of the present invention, mobile terminal can have trusted sources database, for preserving number of sender trusty, as short message sending sides such as Alipay, banks; Also insincere source database can be had.After identifying information that is deleted or that be modified, if determine that information that is deleted or that be modified is from trusted sources, then mobile terminal can send the information that information is deleted or be modified, and also can reduce information that is deleted or that be modified.Particularly, mobile terminal can check whether the sender number of information that is deleted or that be modified is arranged in trusted sources database.If be arranged in trusted sources database, then can determine that information that is deleted or that be modified is from trusted sources.Mobile terminal also can check that the sender number of information that is deleted or that be modified is whether in insincere source database.If not, then can determine that information that is deleted or that be modified is from trusted sources.
After determining that information that is deleted or that be modified is from trusted sources, note that is deleted or that be modified can be read and be reduced to information database from backup database, also corresponding note can be read from backup database, and be reduced to information database, and send information, and show corresponding note based on the operation that user performs according to information.
Certainly, this information database support shows note by the mode of message list.Such as: after reducing to information that is deleted or that be modified, send information, then user checks this note by message list, knows content.
The mobile terminal of the embodiment of the present invention, by the information in information database and the information in backup database are contrasted, identify information that is deleted or that be modified, when determining this information from trusted sources, reduce this information, the information that solves is deleted by malice, the problem of amendment, improves the fail safe of information in mobile terminal, avoids producing property loss.
In the description of this specification, specific features, structure, material or feature that the description of reference term " embodiment ", " some embodiments ", " example ", " concrete example " or " some examples " etc. means to describe in conjunction with this embodiment or example are contained at least one embodiment of the present invention or example.In this manual, to the schematic representation of above-mentioned term not must for be identical embodiment or example.And the specific features of description, structure, material or feature can combine in one or more embodiment in office or example in an appropriate manner.In addition, when not conflicting, the feature of the different embodiment described in this specification or example and different embodiment or example can carry out combining and combining by those skilled in the art.
In addition, term " first ", " second " only for describing object, and can not be interpreted as instruction or hint relative importance or imply the quantity indicating indicated technical characteristic.Thus, be limited with " first ", the feature of " second " can express or impliedly comprise at least one this feature.In describing the invention, the implication of " multiple " is at least two, such as two, three etc., unless otherwise expressly limited specifically.
Describe and can be understood in flow chart or in this any process otherwise described or method, represent and comprise one or more for realizing the module of the code of the executable instruction of the step of specific logical function or process, fragment or part, and the scope of the preferred embodiment of the present invention comprises other realization, wherein can not according to order that is shown or that discuss, comprise according to involved function by the mode while of basic or by contrary order, carry out n-back test, this should understand by embodiments of the invention person of ordinary skill in the field.
In flow charts represent or in this logic otherwise described and/or step, such as, the sequencing list of the executable instruction for realizing logic function can be considered to, may be embodied in any computer-readable medium, for instruction execution system, device or equipment (as computer based system, comprise the system of processor or other can from instruction execution system, device or equipment instruction fetch and perform the system of instruction) use, or to use in conjunction with these instruction execution systems, device or equipment.With regard to this specification, " computer-readable medium " can be anyly can to comprise, store, communicate, propagate or transmission procedure for instruction execution system, device or equipment or the device that uses in conjunction with these instruction execution systems, device or equipment.The example more specifically (non-exhaustive list) of computer-readable medium comprises following: the electrical connection section (electronic installation) with one or more wiring, portable computer diskette box (magnetic device), random access memory (RAM), read-only memory (ROM), erasablely edit read-only memory (EPROM or flash memory), fiber device, and portable optic disk read-only memory (CDROM).In addition, computer-readable medium can be even paper or other suitable media that can print described program thereon, because can such as by carrying out optical scanner to paper or other media, then carry out editing, decipher or carry out process with other suitable methods if desired and electronically obtain described program, be then stored in computer storage.
Should be appreciated that each several part of the present invention can realize with hardware, software, firmware or their combination.In the above-described embodiment, multiple step or method can with to store in memory and the software performed by suitable instruction execution system or firmware realize.Such as, if realized with hardware, the same in another embodiment, can realize by any one in following technology well known in the art or their combination: the discrete logic with the logic gates for realizing logic function to data-signal, there is the application-specific integrated circuit (ASIC) of suitable combinational logic gate circuit, programmable gate array (PGA), field programmable gate array (FPGA) etc.
Those skilled in the art are appreciated that realizing all or part of step that above-described embodiment method carries is that the hardware that can carry out instruction relevant by program completes, described program can be stored in a kind of computer-readable recording medium, this program perform time, step comprising embodiment of the method one or a combination set of.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing module, also can be that the independent physics of unit exists, also can be integrated in a module by two or more unit.Above-mentioned integrated module both can adopt the form of hardware to realize, and the form of software function module also can be adopted to realize.If described integrated module using the form of software function module realize and as independently production marketing or use time, also can be stored in a computer read/write memory medium.
The above-mentioned storage medium mentioned can be read-only memory, disk or CD etc.Although illustrate and describe embodiments of the invention above, be understandable that, above-described embodiment is exemplary, can not be interpreted as limitation of the present invention, and those of ordinary skill in the art can change above-described embodiment within the scope of the invention, revises, replace and modification.

Claims (11)

1. a method for supervising for information, is characterized in that, comprising:
Receive the notice of information change;
From information database and backup database, read information respectively, and by from described information database information with contrast from the information in described backup database, identify information that is deleted or that be modified; And
If determine, the described deleted or information that is modified is from trusted sources, then deleted the or information that is modified of the information that sends is or/and reduce information that is deleted or that be modified.
2. method according to claim 1, is characterized in that, before reading information, also comprises respectively described from information database and backup database:
Receive described information from radio interface layer RIL, and be saved to described backup database.
3. method according to claim 1, is characterized in that, before reading information, also comprises respectively described from information database and backup database:
The information received is saved in described information database, and the operation to information upgrades described information database according to user or third party application.
4. the method according to the arbitrary claim of claim 1-3, is characterized in that, describedly determines that the described deleted or information that is modified is from trusted sources, comprising:
Check the described deleted or sender number of information that is modified whether in trusted sources database, if so, then determine that the described deleted or information that is modified is from trusted sources; Or
Check the described deleted or sender number of information that is modified whether in insincere source database, if not, then determine that the described deleted or information that is modified is from trusted sources.
5. method according to claim 1, is characterized in that, the deleted or information that is modified of described reduction, comprising:
From described backup database, read corresponding note, and be reduced to described information database; Or
From described backup database, read corresponding note, and be reduced to described information database, and send information, and show corresponding note based on the operation that user performs according to described information.
6. a supervising device for information, is characterized in that, comprising:
Processing module, for sending the notice of information change to monitoring module;
Described monitoring module, for after the described notice of reception, from information database and backup database, read information respectively, and by from described information database information with contrast from the information in described backup database, identify information that is deleted or that be modified; And
Warning prompting module, if for determine that described monitoring module identifies described deleted or the information that is modified from trusted sources, then deleted the or information that is modified of the information that sends is or/and reduce information that is deleted or that be modified.
7. device according to claim 6, is characterized in that, also comprises:
Receiver module, for after receiving information, sends backup instruction respectively to described monitoring module and sends renewal instruction to described processing module.
8. device according to claim 7, is characterized in that, described monitoring module, also for: according to described backup instruction, receive described information from radio interface layer RIL, and be saved to described backup database;
Described processing module, also for: according to described renewal instruction, described information is saved in described information database.
9. device according to claim 8, is characterized in that, described processing module, also for: according to user or third party application, the operation to information upgrades described information database.
10. the device according to the arbitrary claim of claim 6-9, it is characterized in that, described warning prompting module, specifically for: check whether the described sender number of information that is deleted or that be modified is arranged in trusted sources database, if so, then determine that the described deleted or information that is modified is from trusted sources; Or
Check the described deleted or sender number of information that is modified whether in insincere source database, if not, then determine that the described deleted or information that is modified is from trusted sources.
11. 1 kinds of mobile terminals, is characterized in that, comprising: housing, processor, memory, circuit board and power circuit, and wherein, described circuit board is placed in the interior volume that described housing surrounds, and described processor and described memory are arranged on described circuit board; Described power circuit, for powering for each circuit of described mobile terminal or device; Described memory is used for stores executable programs code; Described processor runs the program corresponding with described executable program code by reading the executable program code stored in described memory, for:
Receive the notice of information change;
From information database and backup database, read information respectively, and by from described information database information with contrast from the information in described backup database, identify information that is deleted or that be modified; And
If determine, the described deleted or information that is modified is from trusted sources, then deleted the or information that is modified of the information that sends is or/and reduce information that is deleted or that be modified.
CN201410387437.5A 2014-08-07 2014-08-07 Monitoring method, device and the mobile terminal of information Active CN105451223B (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN201410387437.5A CN105451223B (en) 2014-08-07 2014-08-07 Monitoring method, device and the mobile terminal of information
PCT/CN2015/084307 WO2016019793A1 (en) 2014-08-07 2015-07-17 Information monitoring method and apparatus and mobile terminal
HK16109293.7A HK1221846A1 (en) 2014-08-07 2016-08-04 Method and device for monitoring information and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410387437.5A CN105451223B (en) 2014-08-07 2014-08-07 Monitoring method, device and the mobile terminal of information

Publications (2)

Publication Number Publication Date
CN105451223A true CN105451223A (en) 2016-03-30
CN105451223B CN105451223B (en) 2019-03-15

Family

ID=55263122

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410387437.5A Active CN105451223B (en) 2014-08-07 2014-08-07 Monitoring method, device and the mobile terminal of information

Country Status (3)

Country Link
CN (1) CN105451223B (en)
HK (1) HK1221846A1 (en)
WO (1) WO2016019793A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105824595A (en) * 2016-03-31 2016-08-03 北京金山安全软件有限公司 Space management method and device and mobile terminal
CN109584087A (en) * 2018-11-12 2019-04-05 泰康保险集团股份有限公司 Information processing method, device and storage medium
CN109857720A (en) * 2018-12-20 2019-06-07 中国平安人寿保险股份有限公司 Database table monitoring method, device, computer installation and readable storage medium storing program for executing
CN110175090A (en) * 2019-05-29 2019-08-27 数字中融信息技术河北有限公司 A kind of data managing method handled with comparison and be capable of backup and reduction
CN111459722A (en) * 2020-04-08 2020-07-28 江西博微新技术有限公司 Data processing method, system, readable storage medium and computer equipment

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111859036B (en) * 2020-08-19 2024-02-13 深圳市富之富信息科技有限公司 Short message data detection method and device, computer equipment and storage medium

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101068217A (en) * 2006-06-16 2007-11-07 腾讯科技(深圳)有限公司 Method and device for simplifying E-mail operation
US20080059545A1 (en) * 2004-03-03 2008-03-06 International Business Machines Corporation Method to maintain the integrity of remote data by making it disposable
CN101193148A (en) * 2006-11-22 2008-06-04 乐金电子(昆山)电脑有限公司 Personal information management method for mobile phone
CN101370305A (en) * 2008-09-23 2009-02-18 中兴通讯股份有限公司 Method and system for protecting data traffic security
CN101540704A (en) * 2009-05-05 2009-09-23 北京神舟航天软件技术有限公司 Unreliable DBMS malicious intrusion detection system and method
CN101848274A (en) * 2010-03-12 2010-09-29 深圳市同洲电子股份有限公司 Methods and devices for backup and recovery of records in mobile terminal
US20110208849A1 (en) * 2010-02-25 2011-08-25 General Electric Company Method and system for security maintenance in a network
CN102236764A (en) * 2011-06-30 2011-11-09 北京邮电大学 Method and monitoring system for Android system to defend against desktop information attack
CN102495771A (en) * 2011-09-30 2012-06-13 奇智软件(北京)有限公司 Terminal object classified backup and recovery methods based on cloud architecture
CN103838589A (en) * 2012-11-20 2014-06-04 腾讯科技(深圳)有限公司 Plug-in unit deleting and recovering method and client side

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060212439A1 (en) * 2005-03-21 2006-09-21 Microsoft Corporation System and method of efficient data backup in a networking environment
CN100504905C (en) * 2007-11-16 2009-06-24 中国科学院软件研究所 Data-base malevolence transaction method and system thereof
JP2010224964A (en) * 2009-03-24 2010-10-07 Sony Corp Device and method for reproducing content

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080059545A1 (en) * 2004-03-03 2008-03-06 International Business Machines Corporation Method to maintain the integrity of remote data by making it disposable
CN101068217A (en) * 2006-06-16 2007-11-07 腾讯科技(深圳)有限公司 Method and device for simplifying E-mail operation
CN101193148A (en) * 2006-11-22 2008-06-04 乐金电子(昆山)电脑有限公司 Personal information management method for mobile phone
CN101370305A (en) * 2008-09-23 2009-02-18 中兴通讯股份有限公司 Method and system for protecting data traffic security
CN101540704A (en) * 2009-05-05 2009-09-23 北京神舟航天软件技术有限公司 Unreliable DBMS malicious intrusion detection system and method
US20110208849A1 (en) * 2010-02-25 2011-08-25 General Electric Company Method and system for security maintenance in a network
CN101848274A (en) * 2010-03-12 2010-09-29 深圳市同洲电子股份有限公司 Methods and devices for backup and recovery of records in mobile terminal
CN102236764A (en) * 2011-06-30 2011-11-09 北京邮电大学 Method and monitoring system for Android system to defend against desktop information attack
CN102495771A (en) * 2011-09-30 2012-06-13 奇智软件(北京)有限公司 Terminal object classified backup and recovery methods based on cloud architecture
CN103838589A (en) * 2012-11-20 2014-06-04 腾讯科技(深圳)有限公司 Plug-in unit deleting and recovering method and client side

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105824595A (en) * 2016-03-31 2016-08-03 北京金山安全软件有限公司 Space management method and device and mobile terminal
CN109584087A (en) * 2018-11-12 2019-04-05 泰康保险集团股份有限公司 Information processing method, device and storage medium
CN109584087B (en) * 2018-11-12 2021-04-13 泰康保险集团股份有限公司 Information processing method, device and storage medium
CN109857720A (en) * 2018-12-20 2019-06-07 中国平安人寿保险股份有限公司 Database table monitoring method, device, computer installation and readable storage medium storing program for executing
CN109857720B (en) * 2018-12-20 2024-02-02 中国平安人寿保险股份有限公司 Database table monitoring method, device, computer device and readable storage medium
CN110175090A (en) * 2019-05-29 2019-08-27 数字中融信息技术河北有限公司 A kind of data managing method handled with comparison and be capable of backup and reduction
CN111459722A (en) * 2020-04-08 2020-07-28 江西博微新技术有限公司 Data processing method, system, readable storage medium and computer equipment
CN111459722B (en) * 2020-04-08 2023-04-14 江西博微新技术有限公司 Data processing method, system, readable storage medium and computer equipment

Also Published As

Publication number Publication date
HK1221846A1 (en) 2017-06-09
CN105451223B (en) 2019-03-15
WO2016019793A1 (en) 2016-02-11

Similar Documents

Publication Publication Date Title
CN105451223A (en) Information monitoring method and device, and mobile terminal
CN103313216B (en) Message prompt method, system and device for communication account
CN110266505B (en) Method and equipment for managing session group
CN104123490A (en) Method and device for processing malicious bundled software and mobile terminal
CN109564598A (en) A kind of endpoint detection methods and terminal
CN104021342A (en) Method and device for processing application program
CN108647317B (en) Incremental file generation method and device, storage medium and electronic equipment
CN104391716A (en) Plug-in-based application program implementing method and device
CN104036194B (en) Vulnerability detection method and device for revealing private data in application program
CN108984234B (en) Calling prompt method for mobile terminal and camera device
CN105262792A (en) Vehicle abnormality processing method and vehicle-mounted terminal
US9430638B2 (en) Authentication method, authentication apparatus and authentication device
CN104346410A (en) Method and equipment for monitoring terminal equipment
KR102213460B1 (en) System and method for generating software whistlist using machine run
CN106453571A (en) Data migration method and terminal
KR20200030980A (en) Apparatus, system, and method for secure smart platform to manage concurrent enabling of secondary platform bundles
CN104038552A (en) Information updating method and device
CN109871294B (en) Method and device for checking data and processing request
CN112017330B (en) Intelligent lock parameter configuration method and device, intelligent lock and storage medium
CN104091116A (en) Method, device and terminal for monitoring website vulnerability information
CN112688861B (en) Method and equipment for sending session information in social application
CN114285657B (en) Firewall security policy change verification method and device
CN105809056A (en) Communication message management method, device and related equipment
CN113449269B (en) Core module activation method and device and storage medium
CN112637821B (en) Management platform and management method of vehicle communication chip and vehicle communication management system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1221846

Country of ref document: HK

GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20201218

Address after: Room 603, 6 / F, Roche Plaza, 788 Cheung Sha Wan Road, Kowloon, China

Patentee after: Zebra smart travel network (Hong Kong) Limited

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Patentee before: Alibaba Group Holding Ltd.

TR01 Transfer of patent right