CN107153790A - Mobile terminal safety means of defence, device and mobile terminal - Google Patents
Mobile terminal safety means of defence, device and mobile terminal Download PDFInfo
- Publication number
- CN107153790A CN107153790A CN201610125785.4A CN201610125785A CN107153790A CN 107153790 A CN107153790 A CN 107153790A CN 201610125785 A CN201610125785 A CN 201610125785A CN 107153790 A CN107153790 A CN 107153790A
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- information
- risk status
- network address
- state
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/034—Test or assess a computer or a system
Abstract
The invention discloses a kind of mobile terminal safety means of defence, device and mobile terminal, methods described includes:Obtain the safe condition of mobile terminal;The safe condition is matched with default risk status, mobile terminal is in risk status as described in determination if matching;When the mobile terminal is in risk status, then carry out corresponding operation to carry out security protection.The technical scheme of the present embodiment is by obtaining the safe condition of mobile terminal, safe condition is matched with default risk status type, so that it is determined that whether mobile terminal is in risk status, and the type of the risk status according to mobile terminal, mobile terminal is used prevents the operation of risk accordingly, from without changing mobile terminal, the security of mobile terminal system can be just improved in all directions.
Description
Technical field
The present invention relates to terminal security technical field, more particularly to a kind of mobile terminal safety protection
Method, device and mobile terminal.
Background technology
At present, various mobile terminals, such as mobile phone, tablet personal computer, notebook computer into
For a part indispensable in people's Working Life.By taking mobile phone as an example, the development of mobile phone is also
It experienced from low side to high-end, from simulating mobile terminal to Digital Global mobile communcations system
(Global System for Mobile Communications, GSM) terminal, then to general point
Group wireless service technology (General Packet Radio Service, GPRS) terminal, then to the
3 g mobile communication technology (3rd-generation, 3G) terminal, then to Long Term Evolution (Long Term
Evolution, LTE) terminal, the function of mobile phone from making a phone call, send short messages to can surf the Net, send out
Mail, take pictures, play game etc., its function and intellectuality are stronger and stronger.High-end mobile terminal
Enjoy fast happy convenient while worrying that its security, particularly mobile terminal are deposited again in people
The information of storage is more, and security is more important.
The need for meeting people for security of mobile terminal, many businessmans release encryption movement
Terminal.However, encryption mobile terminal will realize communication, it is necessary to which communicating pair is multi-party all necessary
Also encipherment protection can just be obtained using the encryption mobile terminal with money, is moved so as to be unfavorable for encryption
The popularization of dynamic terminal.
The content of the invention
In view of this, the feelings of mobile terminal can be changed without it is an object of the invention to provide a kind of
The mobile terminal safety means of defence, device and movement of the security of mobile terminal are improved under condition eventually
End.
To achieve these goals, the invention provides a kind of mobile terminal safety means of defence,
Including:
Obtain the safe condition of mobile terminal;
The safe condition is matched with default risk status, if matching as described in determination
Mobile terminal is in risk status;
When the mobile terminal is in risk status, then carry out corresponding operation to carry out safety
Protection.
Preferably, before carrying out operating accordingly, methods described also includes:
The type of the risk status residing for the mobile terminal is determined, wherein, the risk status
The utilization rate of processor of type including the mobile terminal exceed predetermined threshold value state, net purchase
State, come electricity condition, come information state, access personal information state.
Preferably, when the mobile terminal is in risk status, then according to the risk status
Type operated accordingly, including:
If the risk status of the mobile terminal surpasses for the utilization rate of the processor of the mobile terminal
Predetermined threshold value state is crossed, then closes and takes processor highest non-systemic process;And
If the risk status of the mobile terminal is net purchase state, the network address of the net purchase is judged
Whether it is legal network address, if not legal network address, then prevent net described in the mobile terminal accessing
Location;And
If the risk status of the mobile terminal is to carry out electricity condition, judge it is described incoming call whether be
Harassing call, if so, then intercepting the incoming call;And
If the risk status of the mobile terminal is to carry out information state, judge it is described come information be
It is no for harassing and wrecking information, if so, then intercept it is described come information;And
If the risk status of the mobile terminal judges to access individual to access personal information state
Whether the program of people's information is rogue program, if so, then intercepting the rogue program.
Preferably, whether the network address for judging the net purchase is legal network address, including:
Obtain the data flow that the mobile terminal is sent;
Obtain the network address of the net purchase included in the data flow;
The network address is sent to Cloud Server;
The response message that the Cloud Server is sent is received, wherein the response message is comprising described
Network address whether be legal network address information;
Correspondingly, judge whether the incoming call is harassing call, including:
Obtain the incoming call;
Telephone number in the incoming call is sent to the Cloud Server;
The response message that the Cloud Server is sent is received, wherein the response message is comprising described
Incoming call whether be harassing call information;
Correspondingly, judge it is described come information whether be harassing and wrecking information, including:
Obtain it is described come information;
By it is described come information content send to the Cloud Server;
The response message that the Cloud Server is sent is received, wherein the response message is comprising described
Whether carry out information is the information for harassing information.
Based on same inventive concept, the present invention also provides a kind of mobile terminal safety protector,
Including:
Acquisition module, the safe condition for obtaining mobile terminal;
Matching module, for the safe condition to be matched with default risk status, such as phase
Matching then determines that the mobile terminal is in risk status;
Processing module, for when the mobile terminal is in risk status, then carrying out corresponding
Operate to carry out security protection.
Preferably, before carrying out operating accordingly, described device also includes:
Determining module, the type for determining the risk status residing for the mobile terminal, wherein,
The utilization rate that the type of the risk status includes the processor of the mobile terminal exceedes default threshold
State of value, net purchase state, come electricity condition, come information state, access personal information state.
Preferably, the processing module specifically for:
If the risk status of the mobile terminal surpasses for the utilization rate of the processor of the mobile terminal
Predetermined threshold value state is crossed, then closes and takes processor highest non-systemic process;And
If the risk status of the mobile terminal is net purchase state, the network address of the net purchase is judged
Whether it is legal network address, if not legal network address, then prevent net described in the mobile terminal accessing
Location;And
If the risk status of the mobile terminal is to carry out electricity condition, judge it is described incoming call whether be
Harassing call, if so, then intercepting the incoming call;And
If the risk status of the mobile terminal is to carry out information state, judge it is described come information be
It is no for harassing and wrecking information, if so, then intercept it is described come information;And
If the risk status of the mobile terminal judges to access individual to access personal information state
Whether the program of people's information is rogue program, if so, then intercepting the rogue program.
Preferably, the processing module also particularly useful for:
Obtain the data flow that the mobile terminal is sent;
Obtain the network address of the net purchase included in the data flow;
The network address is sent to Cloud Server;
The response message that the Cloud Server is sent is received, wherein the response message is comprising described
Network address whether be legal network address information;
The processing module also particularly useful for:
Obtain the incoming call;
Telephone number in the incoming call is sent to the Cloud Server;
The response message that the Cloud Server is sent is received, wherein the response message is comprising described
Incoming call whether be harassing call information;
The processing module also particularly useful for:
Obtain it is described come information;
By it is described come information content send to the Cloud Server;
The response message that the Cloud Server is sent is received, wherein the response message is comprising described
Come come information whether be harass information information.
Based on same inventive concept, the present invention also provides a kind of mobile terminal, including as described above
Device, to realize method as described above.
Compared with prior art, the invention has the advantages that:The technical side of the present embodiment
Case by obtaining the safe condition of mobile terminal, according to the safe condition of mobile terminal with it is default
Risk status type is matched, so that it is determined that whether mobile terminal is in risk status, and root
According to the type of the risk status of mobile terminal, mobile terminal is used prevents the behaviour of risk accordingly
Make, from without changing mobile terminal, the peace of mobile terminal system can be just improved in all directions
Quan Xing.
Brief description of the drawings
Fig. 1 is the flow chart of the embodiment one of the mobile terminal safety means of defence of the present invention;
Fig. 2 is the flow chart of the embodiment two of the mobile terminal safety means of defence of the present invention;
Fig. 3 judges mobile terminal for the embodiment two of the mobile terminal safety means of defence of the present invention
Whether the utilization rate of processor exceedes the flow chart of predetermined threshold value;
Fig. 4 judges the net of net purchase for the embodiment two of the mobile terminal safety means of defence of the present invention
The whether legal flow chart in location;
Whether Fig. 5 judges incoming call for the embodiment two of the mobile terminal safety means of defence of the present invention
For the flow chart of harassing call;
Fig. 6 judges to access personal for the embodiment two of the mobile terminal safety means of defence of the present invention
The program of information whether be rogue program flow chart;
Fig. 7 is the schematic diagram of the embodiment one of the mobile terminal safety protector of the present invention;
Fig. 8 is the schematic diagram of the embodiment two of the mobile terminal safety protector of the present invention.
Embodiment
With reference to the accompanying drawings and examples, the embodiment to the present invention makees further detailed
Description.Following examples are used to illustrate the present invention, but are not limited to the scope of the present invention.
Mobile terminal has provided the user stronger security mechanism, and the security mechanism to apply journey
The access rights of the system of ordered pair mobile terminal in general can by strict control
The security of guarantee system, for example, in the presence of security mechanism, application program can only access public affairs
Storage region under common storage region, such as SD card, and the catalogue oneself installed.But in spy
In the case of different, the security mechanism of mobile terminal be able to may also be destroyed.With Android (Android)
Exemplified by the security mechanism of smart mobile phone, cell phone managing software is visited in the resource to Android system
Ask during configuration, it is necessary to obtain authority, i.e., Android system is seized power (root), this just breaks through
The security mechanism of Android system.Issuable influence includes:1, destroy the safety of system
Property, provide convenient for rogue program intrusion system;2, authority of the cell phone managing software based on itself
Advantage, obtains system sensitive information, and reveal sensitive information;3rd, cell phone managing software itself is deposited
In leak, utilized by other rogue programs and system mounts are attacked.
In the prior art, to overcome problem above, the safe machine that current mobile terminal is used
System includes;1, system supervisor is arranged under system directory, possesses system platform signature, peace
Full property is higher than common applications, and platform signature is right for the system using open signature
The security of system is obviously improved;2, the management software that system is provided is typically by more strict
Detection, and preferable first floor system service support can be obtained, system can not destroyed
Under conditions of security mechanism, system is managed;3, can be with to avoid privacy of user from revealing
In the following ways:(1) the high access rights and communication resource authority of compartment system;(2) when
When program is agreed to open network connection privately without user, reminder message is sent to user;(3)
Determine access rights of the installed software to sensitive resource (such as contacts list, short message etc.);
(4) sensitive data avoids being stored in public storage area.
Fig. 1 is the flow chart of the embodiment one of the mobile terminal safety means of defence of the present invention, such as
Shown in Fig. 1, the mobile terminal safety means of defence of the present embodiment can specifically include following step
Suddenly:
S101, obtains the safe condition of mobile terminal.
Mobile terminal in the present embodiment includes mobile phone, tablet personal computer, notebook computer etc..Move
The safe condition and the current action type of mobile terminal of dynamic terminal are consistent.By taking mobile phone as an example,
If mobile phone is also not turned on any application program, processor (CPU) currently without connection network
Utilization rate it is relatively low, also do not send a telegram here or information and other operation, then it is considered that mobile phone work as
Preceding state is safety, and user just carries out net purchase using mobile phone, then the safe condition of mobile phone is net
Purchase state.The safe condition of mobile phone can include:The use of safety, the processor of mobile terminal
Rate exceedes predetermined threshold value state, net purchase state, carrys out electricity condition, carry out information state, access personal
Information state etc..
S102, safe condition is matched with default risk status, determines to move if matching
Dynamic terminal is in risk status.
Specifically, by the safe condition of mobile terminal acquired in step S101 and default risk
State is matched, for example, mobile terminal is mobile phone, the safe condition of mobile phone is safety, and
Without safety in default risk status, therefore the safe condition of mobile phone and default risk status
Do not match that, then mobile phone is not on risk status;For another example the safe condition of mobile phone is net
Purchase state, by contrast, matches with the net purchase state in default risk status, then can be true
Determine mobile terminal and be in risk status.
S103, when mobile terminal is in risk status, is then carried out according to the type of risk status
Corresponding operation.
Because mobile terminal may carry out network connection, other different operations can also be carried out,
That is mobile terminal is likely to be at different risk status types, so should be according to movement
The type of risk status residing for terminal carries out the different operations averted risks to mobile terminal.
For example, when the utilization rate of the processor of mobile terminal exceedes predetermined threshold value, then can close
Some non-systemic processes;For another example when mobile terminal receives incoming call, movement can be verified
Whether the incoming call of terminal is harassing call, if so, then sending reminder message to user, prompting disappears
The information that incoming call is probably harassing call is included in breath.
The technical scheme of the present embodiment by obtaining the safe condition of mobile terminal, according to it is mobile eventually
The safe condition at end is matched with default risk status type, so that it is determined that mobile terminal is
It is no to be in risk status, and the type of the risk status according to mobile terminal, mobile terminal is adopted
With the operation of risk is prevented accordingly, from without changing mobile terminal, it can just carry in all directions
The high security of mobile terminal system.
Fig. 2 is the flow chart of the embodiment two of the mobile terminal safety means of defence of the present invention, this
The mobile terminal safety means of defence of embodiment is on the basis of above-described embodiment one, further more
Plus technical scheme is introduced in detail.As shown in Fig. 2 the mobile terminal of the present embodiment
Safety protecting method, specifically may include steps of:
S201, obtains the safe condition of mobile terminal.
Mobile terminal in the present embodiment includes mobile phone, tablet personal computer, notebook computer etc..Move
The safe condition and the current action type of mobile terminal of dynamic terminal are consistent.By taking mobile phone as an example,
If mobile phone is also not turned on any application program, processor (CPU) currently without connection network
Utilization rate it is relatively low, also do not send a telegram here or information and other operation, then it is considered that mobile phone work as
Preceding state is safety, and user just carries out net purchase using mobile phone, then the safe condition of mobile phone is net
Purchase state.The safe condition of mobile phone can include:The use of safety, the processor of mobile terminal
Rate exceedes predetermined threshold value state, net purchase state, carrys out electricity condition, carry out information state, access personal
Information state etc..
S202, safe condition is matched with default risk status, determines to move if matching
Dynamic terminal is in risk status.
Specifically, by the safe condition of mobile terminal acquired in step S201 and default risk
State is matched, for example, mobile terminal is mobile phone, the safe condition of mobile phone is safety, and
Without safety in default risk status, therefore the safe condition of mobile phone and default risk status
Do not match that, then mobile terminal is not on risk status;For another example the safe condition of mobile phone
For net purchase state, by contrast, match with the net purchase state in default risk status, then may be used
To determine that mobile terminal is in risk status.
S203, determines the type of the risk status residing for mobile terminal, wherein, risk status
The utilization rate of the processor of type including mobile terminal exceed predetermined threshold value state, net purchase state,
Carry out electricity condition, carry out information state, access personal information state.
In the specific implementation, the type of the risk status residing for mobile terminal is only determined in advance,
Corresponding protection could be taken to arrange according to the type of the risk status of mobile terminal mobile terminal
Apply.The method for determining the type of the risk status residing for mobile terminal can be by mobile terminal
Safe condition is compared with default risk status one by one, when mobile terminal safe condition with
When default risk status is consistent, the risk status be risk shape residing for mobile terminal
State.By taking mobile phone as an example, when the safe condition of mobile phone is net purchase state, with default risk shape
State is compared one by one, display net purchase state and the net purchase state consistency in default risk status, then may be used
To determine, the risk status residing for mobile phone is net purchase state.
S204, if the risk status of mobile terminal exceedes for the utilization rate of the processor of mobile terminal
Predetermined threshold value state, then close and take processor highest non-systemic process;And
If the risk status of mobile terminal is net purchase state, whether the network address for judging net purchase is conjunction
Method network address, if not legal network address, then prevent mobile terminal accessing network address;And
If the risk status of mobile terminal is to carry out electricity condition, judge whether incoming call is harassing call,
If so, then intercepting incoming call;And
If the risk status of mobile terminal is to carry out information state, judge to come whether information is harassing and wrecking
Information, information is carried out if so, then intercepting;And
If the risk status of mobile terminal judges to access personal letter to access personal information state
Whether the program of breath is rogue program, if so, then intercepting rogue program.
For example, as shown in figure 3, mobile terminal is mobile phone, the default threshold of the utilization rate of processor
It is worth for 80%, is closed when the utilization rate of the processor of mobile terminal more than 80%, then and take processor
Highest non-systemic process;Otherwise, it is continuing with processor.
Wherein, whether the network address for judging net purchase is legal network address, including:A, obtains mobile terminal
The data flow of transmission;B, obtains the network address of the net purchase included in data flow;C, network address is sent
To Cloud Server;D, receives the response message that Cloud Server is sent, and wherein response message includes net
Location whether be legal network address information.Whether the network address for judging net purchase is legal flow chart such as Fig. 4
It is shown.
Wherein, judge whether incoming call is harassing call, including:E, obtains incoming call;F, in the future
Telephone number in electricity is sent to Cloud Server;G, receives the response message that Cloud Server is sent,
Wherein response message comprising incoming call whether be harassing call information.Judge whether incoming call is harassing and wrecking
The flow chart of phone is as shown in Figure 5.
Wherein, judge to come whether information is harassing and wrecking information, including:H, obtains information;I, will
The content of information is sent to Cloud Server;J, receives the response message that Cloud Server is sent, wherein
Response message, which is included, comes whether information is the information for harassing information.Whether its flow is with judging incoming call
It is basically identical for the flow of harassing call.
Judge access personal information program whether be rogue program flow chart it is as shown in Figure 6.
The technical scheme of the present embodiment by obtaining the safe condition of mobile terminal, according to it is mobile eventually
The safe condition at end is matched with default risk status type, so that it is determined that mobile terminal is
It is no to be in risk status, and the type of the risk status according to mobile terminal, for different risks
The type of state, in detail to mobile terminal using the measure of risk is prevented accordingly, so as to enter
One step improves the security of the system of mobile terminal.
Fig. 7 is the schematic diagram of the embodiment one of the mobile terminal safety protector of the present invention, such as
Shown in Fig. 7, the mobile terminal safety protector of the present embodiment can specifically include obtaining mould
Block 71, matching module 72 and processing module 73.
Acquisition module 71, the safe condition for obtaining mobile terminal;
Matching module 72, for the safe condition to be matched with default risk status, such as
Match, determine that the mobile terminal is in risk status;
Processing module 73, for when the mobile terminal is in risk status, then carrying out corresponding
Operation to carry out security protection.
The mobile terminal safety protector of the present embodiment, by using above-mentioned module to mobile whole
End carries out the realization mechanism of security protection and prevented with the mobile terminal safety of above-mentioned embodiment illustrated in fig. 1
The realization mechanism of maintaining method is identical, and the record of above-mentioned embodiment illustrated in fig. 1 is may be referred in detail,
It will not be repeated here.
Fig. 8 is the schematic diagram of the embodiment two of the mobile terminal safety protector of the present invention, this
The mobile terminal safety protector of embodiment on the basis of embodiment one as shown in Figure 7,
Technical scheme is further introduced in further detail.As shown in figure 8, the present embodiment
Mobile terminal safety protector, further can include determining that module 81.
Device also includes:
Determining module 81, for before being operated accordingly, determining the wind residing for mobile terminal
The type of dangerous state, wherein, the type of the risk status includes the processing of the mobile terminal
The utilization rate of device exceed predetermined threshold value state, net purchase state, come electricity condition, come information state,
Access personal information state.
Further, processing module 73 specifically for:
If the risk status of mobile terminal exceedes default threshold for the utilization rate of the processor of mobile terminal
State of value, then close and take processor highest non-systemic process;And
If the risk status of mobile terminal is net purchase state, whether the network address for judging net purchase is conjunction
Method network address, if not legal network address, then prevent mobile terminal accessing network address;And
If the risk status of mobile terminal is to carry out electricity condition, judge whether incoming call is harassing call,
If so, then intercepting incoming call;And
If the risk status of mobile terminal is to carry out information state, judge to come whether information is harassing and wrecking
Information, information is carried out if so, then intercepting;And
If the risk status of mobile terminal judges to access personal letter to access personal information state
Whether the program of breath is rogue program, if so, then intercepting rogue program.
Further, processing module 73 also particularly useful for:
Obtain the data flow that mobile terminal is sent;
Obtain the network address of the net purchase included in data flow;
Network address is sent to Cloud Server;
The response message that Cloud Server is sent is received, whether wherein response message is conjunction comprising network address
The information of method network address;
Further, processing module 73 also particularly useful for:
Obtain incoming call;
Telephone number in incoming call is sent to Cloud Server;
The response message that Cloud Server is sent is received, whether wherein response message is to disturb comprising incoming call
Disturb the information of phone;
Further, processing module 73 also particularly useful for:
Obtain and carry out information;
Future, the content of information was sent to Cloud Server;
Receive Cloud Server send response message, wherein response message include come information whether be
Harass the information of information.
The mobile terminal safety protector of the present embodiment, by using above-mentioned module to mobile whole
End carries out the realization mechanism of security protection and prevented with the mobile terminal safety of above-mentioned embodiment illustrated in fig. 2
The realization mechanism of maintaining method is identical, and the record of above-mentioned embodiment illustrated in fig. 2 is may be referred in detail,
It will not be repeated here.
The present invention also provides a kind of mobile terminal, and the mobile terminal is included as shown in Fig. 7 or Fig. 8
Device, the method that any embodiment as shown in Figures 1 to 6 can be realized.
Above example is only the exemplary embodiment of the present invention, is not used in the limitation present invention, this
The protection domain of invention is defined by the claims.Those skilled in the art can be the present invention's
In essence and protection domain, make various modifications or equivalent substitution to the present invention, this modification or
Equivalent substitution also should be regarded as being within the scope of the present invention.
Claims (9)
1. a kind of mobile terminal safety means of defence, it is characterised in that including:
Obtain the safe condition of mobile terminal;
The safe condition is matched with default risk status, if matching as described in determination
Mobile terminal is in risk status;
When the mobile terminal is in risk status, then carry out corresponding operation to carry out safety
Protection.
2. according to the method described in claim 1, it is characterised in that operated it accordingly
Before, methods described also includes:
The type of the risk status residing for the mobile terminal is determined, wherein, the risk status
The utilization rate of processor of type including the mobile terminal exceed predetermined threshold value state, net purchase
State, come electricity condition, come information state, access personal information state.
3. method according to claim 2, it is characterised in that at the mobile terminal
When risk status, then operated accordingly according to the type of the risk status, including:
If the risk status of the mobile terminal surpasses for the utilization rate of the processor of the mobile terminal
Predetermined threshold value state is crossed, then closes and takes processor highest non-systemic process;And
If the risk status of the mobile terminal is net purchase state, the network address of the net purchase is judged
Whether it is legal network address, if not legal network address, then prevent net described in the mobile terminal accessing
Location;And
If the risk status of the mobile terminal is to carry out electricity condition, judge it is described incoming call whether be
Harassing call, if so, then intercepting the incoming call;And
If the risk status of the mobile terminal is to carry out information state, judge it is described come information be
It is no for harassing and wrecking information, if so, then intercept it is described come information;And
If the risk status of the mobile terminal judges to access individual to access personal information state
Whether the program of people's information is rogue program, if so, then intercepting the rogue program.
4. method according to claim 3, it is characterised in that judge the net of the net purchase
Whether location is legal network address, including:
Obtain the data flow that the mobile terminal is sent;
Obtain the network address of the net purchase included in the data flow;
The network address is sent to Cloud Server;
The response message that the Cloud Server is sent is received, wherein the response message is comprising described
Network address whether be legal network address information;
Correspondingly, judge whether the incoming call is harassing call, including:
Obtain the incoming call;
Telephone number in the incoming call is sent to the Cloud Server;
The response message that the Cloud Server is sent is received, wherein the response message is comprising described
Incoming call whether be harassing call information;
Correspondingly, judge it is described come information whether be harassing and wrecking information, including:
Obtain it is described come information;
By it is described come information content send to the Cloud Server;
The response message that the Cloud Server is sent is received, wherein the response message is comprising described
Whether carry out information is the information for harassing information.
5. a kind of mobile terminal safety protector, it is characterised in that including:
Acquisition module, the safe condition for obtaining mobile terminal;
Matching module, for the safe condition to be matched with default risk status, such as phase
Matching then determines that the mobile terminal is in risk status;
Processing module, for when the mobile terminal is in risk status, then carrying out corresponding
Operate to carry out security protection.
6. device according to claim 5, it is characterised in that operated it accordingly
Before, described device also includes:
Determining module, the type for determining the risk status residing for the mobile terminal, wherein,
The utilization rate that the type of the risk status includes the processor of the mobile terminal exceedes default threshold
State of value, net purchase state, come electricity condition, come information state, access personal information state.
7. device according to claim 6, it is characterised in that the processing module is specific
For:
If the risk status of the mobile terminal surpasses for the utilization rate of the processor of the mobile terminal
Predetermined threshold value state is crossed, then closes and takes processor highest non-systemic process;And
If the risk status of the mobile terminal is net purchase state, the network address of the net purchase is judged
Whether it is legal network address, if not legal network address, then prevent net described in the mobile terminal accessing
Location;And
If the risk status of the mobile terminal is to carry out electricity condition, judge it is described incoming call whether be
Harassing call, if so, then intercepting the incoming call;And
If the risk status of the mobile terminal is to carry out information state, judge it is described come information be
It is no for harassing and wrecking information, if so, then intercept it is described come information;And
If the risk status of the mobile terminal judges to access individual to access personal information state
Whether the program of people's information is rogue program, if so, then intercepting the rogue program.
8. device according to claim 7, it is characterised in that the processing module also has
Body is used for:
Obtain the data flow that the mobile terminal is sent;
Obtain the network address of the net purchase included in the data flow;
The network address is sent to Cloud Server;
The response message that the Cloud Server is sent is received, wherein the response message is comprising described
Network address whether be legal network address information;
The processing module also particularly useful for:
Obtain the incoming call;
Telephone number in the incoming call is sent to the Cloud Server;
The response message that the Cloud Server is sent is received, wherein the response message is comprising described
Incoming call whether be harassing call information;
The processing module also particularly useful for:
Obtain it is described come information;
By it is described come information content send to the Cloud Server;
The response message that the Cloud Server is sent is received, wherein the response message is comprising described
Come come information whether be harass information information.
9. a kind of mobile terminal, it is characterised in that including as described in claim any one of 5-8
Device, to realize method as described in claim any one of 1-4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610125785.4A CN107153790A (en) | 2016-03-04 | 2016-03-04 | Mobile terminal safety means of defence, device and mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610125785.4A CN107153790A (en) | 2016-03-04 | 2016-03-04 | Mobile terminal safety means of defence, device and mobile terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107153790A true CN107153790A (en) | 2017-09-12 |
Family
ID=59791453
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610125785.4A Pending CN107153790A (en) | 2016-03-04 | 2016-03-04 | Mobile terminal safety means of defence, device and mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107153790A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112583979A (en) * | 2019-09-30 | 2021-03-30 | 奇安信科技集团股份有限公司 | Application environment sensing method and device of mobile terminal |
CN112583978A (en) * | 2019-09-30 | 2021-03-30 | 奇安信科技集团股份有限公司 | Method and device for evaluating operating environment of mobile terminal |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009124483A1 (en) * | 2008-04-07 | 2009-10-15 | 华为技术有限公司 | Method and system for authenticating security when a mobile terminal accesses a network, and the equipment therefore |
CN103117893A (en) * | 2013-01-22 | 2013-05-22 | 北京奇虎科技有限公司 | Monitor method and device of network accessing behaviour and client device |
CN103116723A (en) * | 2013-02-06 | 2013-05-22 | 北京奇虎科技有限公司 | Method, device and system of web site interception process |
CN103152739A (en) * | 2013-02-06 | 2013-06-12 | 北京奇虎科技有限公司 | Method, device and system for processing calling request information of mobile terminal |
CN103634268A (en) * | 2012-08-20 | 2014-03-12 | 中国联合网络通信集团有限公司 | A safety control method and an apparatus |
CN104066065A (en) * | 2014-07-02 | 2014-09-24 | 深圳市中兴移动通信有限公司 | Anti harassment incoming call/ information mobile terminal and anti harassment incoming call/ information method |
CN104182687A (en) * | 2014-08-01 | 2014-12-03 | 北京奇虎科技有限公司 | Security detecting method and security detecting device for mobile terminal input window |
CN104361282A (en) * | 2014-10-31 | 2015-02-18 | 中国联合网络通信集团有限公司 | Mobile terminal security protecting method and device |
CN105049592A (en) * | 2015-05-27 | 2015-11-11 | 中国科学院信息工程研究所 | Voice safety protection method and system for mobile intelligent terminal |
CN106330851A (en) * | 2015-07-10 | 2017-01-11 | 腾讯科技(深圳)有限公司 | Mobile terminal security information obtaining method and device and mobile terminal security information issuing method and device based on cloud service |
-
2016
- 2016-03-04 CN CN201610125785.4A patent/CN107153790A/en active Pending
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009124483A1 (en) * | 2008-04-07 | 2009-10-15 | 华为技术有限公司 | Method and system for authenticating security when a mobile terminal accesses a network, and the equipment therefore |
CN103634268A (en) * | 2012-08-20 | 2014-03-12 | 中国联合网络通信集团有限公司 | A safety control method and an apparatus |
CN103117893A (en) * | 2013-01-22 | 2013-05-22 | 北京奇虎科技有限公司 | Monitor method and device of network accessing behaviour and client device |
CN103116723A (en) * | 2013-02-06 | 2013-05-22 | 北京奇虎科技有限公司 | Method, device and system of web site interception process |
CN103152739A (en) * | 2013-02-06 | 2013-06-12 | 北京奇虎科技有限公司 | Method, device and system for processing calling request information of mobile terminal |
CN104066065A (en) * | 2014-07-02 | 2014-09-24 | 深圳市中兴移动通信有限公司 | Anti harassment incoming call/ information mobile terminal and anti harassment incoming call/ information method |
CN104182687A (en) * | 2014-08-01 | 2014-12-03 | 北京奇虎科技有限公司 | Security detecting method and security detecting device for mobile terminal input window |
CN104361282A (en) * | 2014-10-31 | 2015-02-18 | 中国联合网络通信集团有限公司 | Mobile terminal security protecting method and device |
CN105049592A (en) * | 2015-05-27 | 2015-11-11 | 中国科学院信息工程研究所 | Voice safety protection method and system for mobile intelligent terminal |
CN106330851A (en) * | 2015-07-10 | 2017-01-11 | 腾讯科技(深圳)有限公司 | Mobile terminal security information obtaining method and device and mobile terminal security information issuing method and device based on cloud service |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112583979A (en) * | 2019-09-30 | 2021-03-30 | 奇安信科技集团股份有限公司 | Application environment sensing method and device of mobile terminal |
CN112583978A (en) * | 2019-09-30 | 2021-03-30 | 奇安信科技集团股份有限公司 | Method and device for evaluating operating environment of mobile terminal |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8732827B1 (en) | Smartphone security system | |
US10375116B2 (en) | System and method to provide server control for access to mobile client data | |
Jeon et al. | A practical analysis of smartphone security | |
CN109460660B (en) | Mobile device safety management system | |
JP5813884B2 (en) | System and method for providing a threshold level for privilege use in a mobile network environment | |
CN103491056B (en) | The control method and device of application permission | |
KR101651808B1 (en) | Network assisted fraud detection apparatus and methods | |
US9344882B2 (en) | Apparatus and methods for preventing information disclosure | |
CN105068974B (en) | Information processing method and electronic equipment | |
US11392708B2 (en) | Method and system for embedding security in a mobile communications device | |
CN106921799A (en) | A kind of mobile terminal safety means of defence and mobile terminal | |
EP2562667A1 (en) | Apparatus and method for providing security information on background process | |
CN112799750A (en) | Terminal equipment information display method and terminal equipment | |
CN103532927A (en) | Financial cloud safety service platform based on mobile terminal and data protection method | |
CN110622539A (en) | Detecting a fake cell tower | |
CN105975867B (en) | A kind of data processing method | |
CN107466041B (en) | Method and device for identifying pseudo base station and mobile terminal | |
CN106022101B (en) | application management method and terminal | |
CN104346560A (en) | Security authentication method and security authentication device | |
Oh et al. | Best security practices for android, blackberry, and iOS | |
WO2018049564A1 (en) | Anti-theft method and device for mobile terminal | |
CN103619001A (en) | Short message processing method, device and mobile terminal | |
US9047470B2 (en) | Secure provisioning of commercial off-the-shelf (COTS) devices | |
US11516654B2 (en) | Method for automatically encrypting short message, storage device and mobile terminal | |
CN106791171B (en) | Card locking method and device of mobile terminal and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170912 |
|
RJ01 | Rejection of invention patent application after publication |