CN107153790A - Mobile terminal safety means of defence, device and mobile terminal - Google Patents

Mobile terminal safety means of defence, device and mobile terminal Download PDF

Info

Publication number
CN107153790A
CN107153790A CN201610125785.4A CN201610125785A CN107153790A CN 107153790 A CN107153790 A CN 107153790A CN 201610125785 A CN201610125785 A CN 201610125785A CN 107153790 A CN107153790 A CN 107153790A
Authority
CN
China
Prior art keywords
mobile terminal
information
risk status
network address
state
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610125785.4A
Other languages
Chinese (zh)
Inventor
张宏伟
车刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING ZONSIM INFORMATION TECHNOLOGY Ltd
Original Assignee
BEIJING ZONSIM INFORMATION TECHNOLOGY Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING ZONSIM INFORMATION TECHNOLOGY Ltd filed Critical BEIJING ZONSIM INFORMATION TECHNOLOGY Ltd
Priority to CN201610125785.4A priority Critical patent/CN107153790A/en
Publication of CN107153790A publication Critical patent/CN107153790A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/034Test or assess a computer or a system

Abstract

The invention discloses a kind of mobile terminal safety means of defence, device and mobile terminal, methods described includes:Obtain the safe condition of mobile terminal;The safe condition is matched with default risk status, mobile terminal is in risk status as described in determination if matching;When the mobile terminal is in risk status, then carry out corresponding operation to carry out security protection.The technical scheme of the present embodiment is by obtaining the safe condition of mobile terminal, safe condition is matched with default risk status type, so that it is determined that whether mobile terminal is in risk status, and the type of the risk status according to mobile terminal, mobile terminal is used prevents the operation of risk accordingly, from without changing mobile terminal, the security of mobile terminal system can be just improved in all directions.

Description

Mobile terminal safety means of defence, device and mobile terminal
Technical field
The present invention relates to terminal security technical field, more particularly to a kind of mobile terminal safety protection Method, device and mobile terminal.
Background technology
At present, various mobile terminals, such as mobile phone, tablet personal computer, notebook computer into For a part indispensable in people's Working Life.By taking mobile phone as an example, the development of mobile phone is also It experienced from low side to high-end, from simulating mobile terminal to Digital Global mobile communcations system (Global System for Mobile Communications, GSM) terminal, then to general point Group wireless service technology (General Packet Radio Service, GPRS) terminal, then to the 3 g mobile communication technology (3rd-generation, 3G) terminal, then to Long Term Evolution (Long Term Evolution, LTE) terminal, the function of mobile phone from making a phone call, send short messages to can surf the Net, send out Mail, take pictures, play game etc., its function and intellectuality are stronger and stronger.High-end mobile terminal Enjoy fast happy convenient while worrying that its security, particularly mobile terminal are deposited again in people The information of storage is more, and security is more important.
The need for meeting people for security of mobile terminal, many businessmans release encryption movement Terminal.However, encryption mobile terminal will realize communication, it is necessary to which communicating pair is multi-party all necessary Also encipherment protection can just be obtained using the encryption mobile terminal with money, is moved so as to be unfavorable for encryption The popularization of dynamic terminal.
The content of the invention
In view of this, the feelings of mobile terminal can be changed without it is an object of the invention to provide a kind of The mobile terminal safety means of defence, device and movement of the security of mobile terminal are improved under condition eventually End.
To achieve these goals, the invention provides a kind of mobile terminal safety means of defence, Including:
Obtain the safe condition of mobile terminal;
The safe condition is matched with default risk status, if matching as described in determination Mobile terminal is in risk status;
When the mobile terminal is in risk status, then carry out corresponding operation to carry out safety Protection.
Preferably, before carrying out operating accordingly, methods described also includes:
The type of the risk status residing for the mobile terminal is determined, wherein, the risk status The utilization rate of processor of type including the mobile terminal exceed predetermined threshold value state, net purchase State, come electricity condition, come information state, access personal information state.
Preferably, when the mobile terminal is in risk status, then according to the risk status Type operated accordingly, including:
If the risk status of the mobile terminal surpasses for the utilization rate of the processor of the mobile terminal Predetermined threshold value state is crossed, then closes and takes processor highest non-systemic process;And
If the risk status of the mobile terminal is net purchase state, the network address of the net purchase is judged Whether it is legal network address, if not legal network address, then prevent net described in the mobile terminal accessing Location;And
If the risk status of the mobile terminal is to carry out electricity condition, judge it is described incoming call whether be Harassing call, if so, then intercepting the incoming call;And
If the risk status of the mobile terminal is to carry out information state, judge it is described come information be It is no for harassing and wrecking information, if so, then intercept it is described come information;And
If the risk status of the mobile terminal judges to access individual to access personal information state Whether the program of people's information is rogue program, if so, then intercepting the rogue program.
Preferably, whether the network address for judging the net purchase is legal network address, including:
Obtain the data flow that the mobile terminal is sent;
Obtain the network address of the net purchase included in the data flow;
The network address is sent to Cloud Server;
The response message that the Cloud Server is sent is received, wherein the response message is comprising described Network address whether be legal network address information;
Correspondingly, judge whether the incoming call is harassing call, including:
Obtain the incoming call;
Telephone number in the incoming call is sent to the Cloud Server;
The response message that the Cloud Server is sent is received, wherein the response message is comprising described Incoming call whether be harassing call information;
Correspondingly, judge it is described come information whether be harassing and wrecking information, including:
Obtain it is described come information;
By it is described come information content send to the Cloud Server;
The response message that the Cloud Server is sent is received, wherein the response message is comprising described Whether carry out information is the information for harassing information.
Based on same inventive concept, the present invention also provides a kind of mobile terminal safety protector, Including:
Acquisition module, the safe condition for obtaining mobile terminal;
Matching module, for the safe condition to be matched with default risk status, such as phase Matching then determines that the mobile terminal is in risk status;
Processing module, for when the mobile terminal is in risk status, then carrying out corresponding Operate to carry out security protection.
Preferably, before carrying out operating accordingly, described device also includes:
Determining module, the type for determining the risk status residing for the mobile terminal, wherein, The utilization rate that the type of the risk status includes the processor of the mobile terminal exceedes default threshold State of value, net purchase state, come electricity condition, come information state, access personal information state.
Preferably, the processing module specifically for:
If the risk status of the mobile terminal surpasses for the utilization rate of the processor of the mobile terminal Predetermined threshold value state is crossed, then closes and takes processor highest non-systemic process;And
If the risk status of the mobile terminal is net purchase state, the network address of the net purchase is judged Whether it is legal network address, if not legal network address, then prevent net described in the mobile terminal accessing Location;And
If the risk status of the mobile terminal is to carry out electricity condition, judge it is described incoming call whether be Harassing call, if so, then intercepting the incoming call;And
If the risk status of the mobile terminal is to carry out information state, judge it is described come information be It is no for harassing and wrecking information, if so, then intercept it is described come information;And
If the risk status of the mobile terminal judges to access individual to access personal information state Whether the program of people's information is rogue program, if so, then intercepting the rogue program.
Preferably, the processing module also particularly useful for:
Obtain the data flow that the mobile terminal is sent;
Obtain the network address of the net purchase included in the data flow;
The network address is sent to Cloud Server;
The response message that the Cloud Server is sent is received, wherein the response message is comprising described Network address whether be legal network address information;
The processing module also particularly useful for:
Obtain the incoming call;
Telephone number in the incoming call is sent to the Cloud Server;
The response message that the Cloud Server is sent is received, wherein the response message is comprising described Incoming call whether be harassing call information;
The processing module also particularly useful for:
Obtain it is described come information;
By it is described come information content send to the Cloud Server;
The response message that the Cloud Server is sent is received, wherein the response message is comprising described Come come information whether be harass information information.
Based on same inventive concept, the present invention also provides a kind of mobile terminal, including as described above Device, to realize method as described above.
Compared with prior art, the invention has the advantages that:The technical side of the present embodiment Case by obtaining the safe condition of mobile terminal, according to the safe condition of mobile terminal with it is default Risk status type is matched, so that it is determined that whether mobile terminal is in risk status, and root According to the type of the risk status of mobile terminal, mobile terminal is used prevents the behaviour of risk accordingly Make, from without changing mobile terminal, the peace of mobile terminal system can be just improved in all directions Quan Xing.
Brief description of the drawings
Fig. 1 is the flow chart of the embodiment one of the mobile terminal safety means of defence of the present invention;
Fig. 2 is the flow chart of the embodiment two of the mobile terminal safety means of defence of the present invention;
Fig. 3 judges mobile terminal for the embodiment two of the mobile terminal safety means of defence of the present invention Whether the utilization rate of processor exceedes the flow chart of predetermined threshold value;
Fig. 4 judges the net of net purchase for the embodiment two of the mobile terminal safety means of defence of the present invention The whether legal flow chart in location;
Whether Fig. 5 judges incoming call for the embodiment two of the mobile terminal safety means of defence of the present invention For the flow chart of harassing call;
Fig. 6 judges to access personal for the embodiment two of the mobile terminal safety means of defence of the present invention The program of information whether be rogue program flow chart;
Fig. 7 is the schematic diagram of the embodiment one of the mobile terminal safety protector of the present invention;
Fig. 8 is the schematic diagram of the embodiment two of the mobile terminal safety protector of the present invention.
Embodiment
With reference to the accompanying drawings and examples, the embodiment to the present invention makees further detailed Description.Following examples are used to illustrate the present invention, but are not limited to the scope of the present invention.
Mobile terminal has provided the user stronger security mechanism, and the security mechanism to apply journey The access rights of the system of ordered pair mobile terminal in general can by strict control The security of guarantee system, for example, in the presence of security mechanism, application program can only access public affairs Storage region under common storage region, such as SD card, and the catalogue oneself installed.But in spy In the case of different, the security mechanism of mobile terminal be able to may also be destroyed.With Android (Android) Exemplified by the security mechanism of smart mobile phone, cell phone managing software is visited in the resource to Android system Ask during configuration, it is necessary to obtain authority, i.e., Android system is seized power (root), this just breaks through The security mechanism of Android system.Issuable influence includes:1, destroy the safety of system Property, provide convenient for rogue program intrusion system;2, authority of the cell phone managing software based on itself Advantage, obtains system sensitive information, and reveal sensitive information;3rd, cell phone managing software itself is deposited In leak, utilized by other rogue programs and system mounts are attacked.
In the prior art, to overcome problem above, the safe machine that current mobile terminal is used System includes;1, system supervisor is arranged under system directory, possesses system platform signature, peace Full property is higher than common applications, and platform signature is right for the system using open signature The security of system is obviously improved;2, the management software that system is provided is typically by more strict Detection, and preferable first floor system service support can be obtained, system can not destroyed Under conditions of security mechanism, system is managed;3, can be with to avoid privacy of user from revealing In the following ways:(1) the high access rights and communication resource authority of compartment system;(2) when When program is agreed to open network connection privately without user, reminder message is sent to user;(3) Determine access rights of the installed software to sensitive resource (such as contacts list, short message etc.); (4) sensitive data avoids being stored in public storage area.
Fig. 1 is the flow chart of the embodiment one of the mobile terminal safety means of defence of the present invention, such as Shown in Fig. 1, the mobile terminal safety means of defence of the present embodiment can specifically include following step Suddenly:
S101, obtains the safe condition of mobile terminal.
Mobile terminal in the present embodiment includes mobile phone, tablet personal computer, notebook computer etc..Move The safe condition and the current action type of mobile terminal of dynamic terminal are consistent.By taking mobile phone as an example, If mobile phone is also not turned on any application program, processor (CPU) currently without connection network Utilization rate it is relatively low, also do not send a telegram here or information and other operation, then it is considered that mobile phone work as Preceding state is safety, and user just carries out net purchase using mobile phone, then the safe condition of mobile phone is net Purchase state.The safe condition of mobile phone can include:The use of safety, the processor of mobile terminal Rate exceedes predetermined threshold value state, net purchase state, carrys out electricity condition, carry out information state, access personal Information state etc..
S102, safe condition is matched with default risk status, determines to move if matching Dynamic terminal is in risk status.
Specifically, by the safe condition of mobile terminal acquired in step S101 and default risk State is matched, for example, mobile terminal is mobile phone, the safe condition of mobile phone is safety, and Without safety in default risk status, therefore the safe condition of mobile phone and default risk status Do not match that, then mobile phone is not on risk status;For another example the safe condition of mobile phone is net Purchase state, by contrast, matches with the net purchase state in default risk status, then can be true Determine mobile terminal and be in risk status.
S103, when mobile terminal is in risk status, is then carried out according to the type of risk status Corresponding operation.
Because mobile terminal may carry out network connection, other different operations can also be carried out, That is mobile terminal is likely to be at different risk status types, so should be according to movement The type of risk status residing for terminal carries out the different operations averted risks to mobile terminal.
For example, when the utilization rate of the processor of mobile terminal exceedes predetermined threshold value, then can close Some non-systemic processes;For another example when mobile terminal receives incoming call, movement can be verified Whether the incoming call of terminal is harassing call, if so, then sending reminder message to user, prompting disappears The information that incoming call is probably harassing call is included in breath.
The technical scheme of the present embodiment by obtaining the safe condition of mobile terminal, according to it is mobile eventually The safe condition at end is matched with default risk status type, so that it is determined that mobile terminal is It is no to be in risk status, and the type of the risk status according to mobile terminal, mobile terminal is adopted With the operation of risk is prevented accordingly, from without changing mobile terminal, it can just carry in all directions The high security of mobile terminal system.
Fig. 2 is the flow chart of the embodiment two of the mobile terminal safety means of defence of the present invention, this The mobile terminal safety means of defence of embodiment is on the basis of above-described embodiment one, further more Plus technical scheme is introduced in detail.As shown in Fig. 2 the mobile terminal of the present embodiment Safety protecting method, specifically may include steps of:
S201, obtains the safe condition of mobile terminal.
Mobile terminal in the present embodiment includes mobile phone, tablet personal computer, notebook computer etc..Move The safe condition and the current action type of mobile terminal of dynamic terminal are consistent.By taking mobile phone as an example, If mobile phone is also not turned on any application program, processor (CPU) currently without connection network Utilization rate it is relatively low, also do not send a telegram here or information and other operation, then it is considered that mobile phone work as Preceding state is safety, and user just carries out net purchase using mobile phone, then the safe condition of mobile phone is net Purchase state.The safe condition of mobile phone can include:The use of safety, the processor of mobile terminal Rate exceedes predetermined threshold value state, net purchase state, carrys out electricity condition, carry out information state, access personal Information state etc..
S202, safe condition is matched with default risk status, determines to move if matching Dynamic terminal is in risk status.
Specifically, by the safe condition of mobile terminal acquired in step S201 and default risk State is matched, for example, mobile terminal is mobile phone, the safe condition of mobile phone is safety, and Without safety in default risk status, therefore the safe condition of mobile phone and default risk status Do not match that, then mobile terminal is not on risk status;For another example the safe condition of mobile phone For net purchase state, by contrast, match with the net purchase state in default risk status, then may be used To determine that mobile terminal is in risk status.
S203, determines the type of the risk status residing for mobile terminal, wherein, risk status The utilization rate of the processor of type including mobile terminal exceed predetermined threshold value state, net purchase state, Carry out electricity condition, carry out information state, access personal information state.
In the specific implementation, the type of the risk status residing for mobile terminal is only determined in advance, Corresponding protection could be taken to arrange according to the type of the risk status of mobile terminal mobile terminal Apply.The method for determining the type of the risk status residing for mobile terminal can be by mobile terminal Safe condition is compared with default risk status one by one, when mobile terminal safe condition with When default risk status is consistent, the risk status be risk shape residing for mobile terminal State.By taking mobile phone as an example, when the safe condition of mobile phone is net purchase state, with default risk shape State is compared one by one, display net purchase state and the net purchase state consistency in default risk status, then may be used To determine, the risk status residing for mobile phone is net purchase state.
S204, if the risk status of mobile terminal exceedes for the utilization rate of the processor of mobile terminal Predetermined threshold value state, then close and take processor highest non-systemic process;And
If the risk status of mobile terminal is net purchase state, whether the network address for judging net purchase is conjunction Method network address, if not legal network address, then prevent mobile terminal accessing network address;And
If the risk status of mobile terminal is to carry out electricity condition, judge whether incoming call is harassing call, If so, then intercepting incoming call;And
If the risk status of mobile terminal is to carry out information state, judge to come whether information is harassing and wrecking Information, information is carried out if so, then intercepting;And
If the risk status of mobile terminal judges to access personal letter to access personal information state Whether the program of breath is rogue program, if so, then intercepting rogue program.
For example, as shown in figure 3, mobile terminal is mobile phone, the default threshold of the utilization rate of processor It is worth for 80%, is closed when the utilization rate of the processor of mobile terminal more than 80%, then and take processor Highest non-systemic process;Otherwise, it is continuing with processor.
Wherein, whether the network address for judging net purchase is legal network address, including:A, obtains mobile terminal The data flow of transmission;B, obtains the network address of the net purchase included in data flow;C, network address is sent To Cloud Server;D, receives the response message that Cloud Server is sent, and wherein response message includes net Location whether be legal network address information.Whether the network address for judging net purchase is legal flow chart such as Fig. 4 It is shown.
Wherein, judge whether incoming call is harassing call, including:E, obtains incoming call;F, in the future Telephone number in electricity is sent to Cloud Server;G, receives the response message that Cloud Server is sent, Wherein response message comprising incoming call whether be harassing call information.Judge whether incoming call is harassing and wrecking The flow chart of phone is as shown in Figure 5.
Wherein, judge to come whether information is harassing and wrecking information, including:H, obtains information;I, will The content of information is sent to Cloud Server;J, receives the response message that Cloud Server is sent, wherein Response message, which is included, comes whether information is the information for harassing information.Whether its flow is with judging incoming call It is basically identical for the flow of harassing call.
Judge access personal information program whether be rogue program flow chart it is as shown in Figure 6.
The technical scheme of the present embodiment by obtaining the safe condition of mobile terminal, according to it is mobile eventually The safe condition at end is matched with default risk status type, so that it is determined that mobile terminal is It is no to be in risk status, and the type of the risk status according to mobile terminal, for different risks The type of state, in detail to mobile terminal using the measure of risk is prevented accordingly, so as to enter One step improves the security of the system of mobile terminal.
Fig. 7 is the schematic diagram of the embodiment one of the mobile terminal safety protector of the present invention, such as Shown in Fig. 7, the mobile terminal safety protector of the present embodiment can specifically include obtaining mould Block 71, matching module 72 and processing module 73.
Acquisition module 71, the safe condition for obtaining mobile terminal;
Matching module 72, for the safe condition to be matched with default risk status, such as Match, determine that the mobile terminal is in risk status;
Processing module 73, for when the mobile terminal is in risk status, then carrying out corresponding Operation to carry out security protection.
The mobile terminal safety protector of the present embodiment, by using above-mentioned module to mobile whole End carries out the realization mechanism of security protection and prevented with the mobile terminal safety of above-mentioned embodiment illustrated in fig. 1 The realization mechanism of maintaining method is identical, and the record of above-mentioned embodiment illustrated in fig. 1 is may be referred in detail, It will not be repeated here.
Fig. 8 is the schematic diagram of the embodiment two of the mobile terminal safety protector of the present invention, this The mobile terminal safety protector of embodiment on the basis of embodiment one as shown in Figure 7, Technical scheme is further introduced in further detail.As shown in figure 8, the present embodiment Mobile terminal safety protector, further can include determining that module 81.
Device also includes:
Determining module 81, for before being operated accordingly, determining the wind residing for mobile terminal The type of dangerous state, wherein, the type of the risk status includes the processing of the mobile terminal The utilization rate of device exceed predetermined threshold value state, net purchase state, come electricity condition, come information state, Access personal information state.
Further, processing module 73 specifically for:
If the risk status of mobile terminal exceedes default threshold for the utilization rate of the processor of mobile terminal State of value, then close and take processor highest non-systemic process;And
If the risk status of mobile terminal is net purchase state, whether the network address for judging net purchase is conjunction Method network address, if not legal network address, then prevent mobile terminal accessing network address;And
If the risk status of mobile terminal is to carry out electricity condition, judge whether incoming call is harassing call, If so, then intercepting incoming call;And
If the risk status of mobile terminal is to carry out information state, judge to come whether information is harassing and wrecking Information, information is carried out if so, then intercepting;And
If the risk status of mobile terminal judges to access personal letter to access personal information state Whether the program of breath is rogue program, if so, then intercepting rogue program.
Further, processing module 73 also particularly useful for:
Obtain the data flow that mobile terminal is sent;
Obtain the network address of the net purchase included in data flow;
Network address is sent to Cloud Server;
The response message that Cloud Server is sent is received, whether wherein response message is conjunction comprising network address The information of method network address;
Further, processing module 73 also particularly useful for:
Obtain incoming call;
Telephone number in incoming call is sent to Cloud Server;
The response message that Cloud Server is sent is received, whether wherein response message is to disturb comprising incoming call Disturb the information of phone;
Further, processing module 73 also particularly useful for:
Obtain and carry out information;
Future, the content of information was sent to Cloud Server;
Receive Cloud Server send response message, wherein response message include come information whether be Harass the information of information.
The mobile terminal safety protector of the present embodiment, by using above-mentioned module to mobile whole End carries out the realization mechanism of security protection and prevented with the mobile terminal safety of above-mentioned embodiment illustrated in fig. 2 The realization mechanism of maintaining method is identical, and the record of above-mentioned embodiment illustrated in fig. 2 is may be referred in detail, It will not be repeated here.
The present invention also provides a kind of mobile terminal, and the mobile terminal is included as shown in Fig. 7 or Fig. 8 Device, the method that any embodiment as shown in Figures 1 to 6 can be realized.
Above example is only the exemplary embodiment of the present invention, is not used in the limitation present invention, this The protection domain of invention is defined by the claims.Those skilled in the art can be the present invention's In essence and protection domain, make various modifications or equivalent substitution to the present invention, this modification or Equivalent substitution also should be regarded as being within the scope of the present invention.

Claims (9)

1. a kind of mobile terminal safety means of defence, it is characterised in that including:
Obtain the safe condition of mobile terminal;
The safe condition is matched with default risk status, if matching as described in determination Mobile terminal is in risk status;
When the mobile terminal is in risk status, then carry out corresponding operation to carry out safety Protection.
2. according to the method described in claim 1, it is characterised in that operated it accordingly Before, methods described also includes:
The type of the risk status residing for the mobile terminal is determined, wherein, the risk status The utilization rate of processor of type including the mobile terminal exceed predetermined threshold value state, net purchase State, come electricity condition, come information state, access personal information state.
3. method according to claim 2, it is characterised in that at the mobile terminal When risk status, then operated accordingly according to the type of the risk status, including:
If the risk status of the mobile terminal surpasses for the utilization rate of the processor of the mobile terminal Predetermined threshold value state is crossed, then closes and takes processor highest non-systemic process;And
If the risk status of the mobile terminal is net purchase state, the network address of the net purchase is judged Whether it is legal network address, if not legal network address, then prevent net described in the mobile terminal accessing Location;And
If the risk status of the mobile terminal is to carry out electricity condition, judge it is described incoming call whether be Harassing call, if so, then intercepting the incoming call;And
If the risk status of the mobile terminal is to carry out information state, judge it is described come information be It is no for harassing and wrecking information, if so, then intercept it is described come information;And
If the risk status of the mobile terminal judges to access individual to access personal information state Whether the program of people's information is rogue program, if so, then intercepting the rogue program.
4. method according to claim 3, it is characterised in that judge the net of the net purchase Whether location is legal network address, including:
Obtain the data flow that the mobile terminal is sent;
Obtain the network address of the net purchase included in the data flow;
The network address is sent to Cloud Server;
The response message that the Cloud Server is sent is received, wherein the response message is comprising described Network address whether be legal network address information;
Correspondingly, judge whether the incoming call is harassing call, including:
Obtain the incoming call;
Telephone number in the incoming call is sent to the Cloud Server;
The response message that the Cloud Server is sent is received, wherein the response message is comprising described Incoming call whether be harassing call information;
Correspondingly, judge it is described come information whether be harassing and wrecking information, including:
Obtain it is described come information;
By it is described come information content send to the Cloud Server;
The response message that the Cloud Server is sent is received, wherein the response message is comprising described Whether carry out information is the information for harassing information.
5. a kind of mobile terminal safety protector, it is characterised in that including:
Acquisition module, the safe condition for obtaining mobile terminal;
Matching module, for the safe condition to be matched with default risk status, such as phase Matching then determines that the mobile terminal is in risk status;
Processing module, for when the mobile terminal is in risk status, then carrying out corresponding Operate to carry out security protection.
6. device according to claim 5, it is characterised in that operated it accordingly Before, described device also includes:
Determining module, the type for determining the risk status residing for the mobile terminal, wherein, The utilization rate that the type of the risk status includes the processor of the mobile terminal exceedes default threshold State of value, net purchase state, come electricity condition, come information state, access personal information state.
7. device according to claim 6, it is characterised in that the processing module is specific For:
If the risk status of the mobile terminal surpasses for the utilization rate of the processor of the mobile terminal Predetermined threshold value state is crossed, then closes and takes processor highest non-systemic process;And
If the risk status of the mobile terminal is net purchase state, the network address of the net purchase is judged Whether it is legal network address, if not legal network address, then prevent net described in the mobile terminal accessing Location;And
If the risk status of the mobile terminal is to carry out electricity condition, judge it is described incoming call whether be Harassing call, if so, then intercepting the incoming call;And
If the risk status of the mobile terminal is to carry out information state, judge it is described come information be It is no for harassing and wrecking information, if so, then intercept it is described come information;And
If the risk status of the mobile terminal judges to access individual to access personal information state Whether the program of people's information is rogue program, if so, then intercepting the rogue program.
8. device according to claim 7, it is characterised in that the processing module also has Body is used for:
Obtain the data flow that the mobile terminal is sent;
Obtain the network address of the net purchase included in the data flow;
The network address is sent to Cloud Server;
The response message that the Cloud Server is sent is received, wherein the response message is comprising described Network address whether be legal network address information;
The processing module also particularly useful for:
Obtain the incoming call;
Telephone number in the incoming call is sent to the Cloud Server;
The response message that the Cloud Server is sent is received, wherein the response message is comprising described Incoming call whether be harassing call information;
The processing module also particularly useful for:
Obtain it is described come information;
By it is described come information content send to the Cloud Server;
The response message that the Cloud Server is sent is received, wherein the response message is comprising described Come come information whether be harass information information.
9. a kind of mobile terminal, it is characterised in that including as described in claim any one of 5-8 Device, to realize method as described in claim any one of 1-4.
CN201610125785.4A 2016-03-04 2016-03-04 Mobile terminal safety means of defence, device and mobile terminal Pending CN107153790A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610125785.4A CN107153790A (en) 2016-03-04 2016-03-04 Mobile terminal safety means of defence, device and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610125785.4A CN107153790A (en) 2016-03-04 2016-03-04 Mobile terminal safety means of defence, device and mobile terminal

Publications (1)

Publication Number Publication Date
CN107153790A true CN107153790A (en) 2017-09-12

Family

ID=59791453

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610125785.4A Pending CN107153790A (en) 2016-03-04 2016-03-04 Mobile terminal safety means of defence, device and mobile terminal

Country Status (1)

Country Link
CN (1) CN107153790A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112583979A (en) * 2019-09-30 2021-03-30 奇安信科技集团股份有限公司 Application environment sensing method and device of mobile terminal
CN112583978A (en) * 2019-09-30 2021-03-30 奇安信科技集团股份有限公司 Method and device for evaluating operating environment of mobile terminal

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009124483A1 (en) * 2008-04-07 2009-10-15 华为技术有限公司 Method and system for authenticating security when a mobile terminal accesses a network, and the equipment therefore
CN103117893A (en) * 2013-01-22 2013-05-22 北京奇虎科技有限公司 Monitor method and device of network accessing behaviour and client device
CN103116723A (en) * 2013-02-06 2013-05-22 北京奇虎科技有限公司 Method, device and system of web site interception process
CN103152739A (en) * 2013-02-06 2013-06-12 北京奇虎科技有限公司 Method, device and system for processing calling request information of mobile terminal
CN103634268A (en) * 2012-08-20 2014-03-12 中国联合网络通信集团有限公司 A safety control method and an apparatus
CN104066065A (en) * 2014-07-02 2014-09-24 深圳市中兴移动通信有限公司 Anti harassment incoming call/ information mobile terminal and anti harassment incoming call/ information method
CN104182687A (en) * 2014-08-01 2014-12-03 北京奇虎科技有限公司 Security detecting method and security detecting device for mobile terminal input window
CN104361282A (en) * 2014-10-31 2015-02-18 中国联合网络通信集团有限公司 Mobile terminal security protecting method and device
CN105049592A (en) * 2015-05-27 2015-11-11 中国科学院信息工程研究所 Voice safety protection method and system for mobile intelligent terminal
CN106330851A (en) * 2015-07-10 2017-01-11 腾讯科技(深圳)有限公司 Mobile terminal security information obtaining method and device and mobile terminal security information issuing method and device based on cloud service

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009124483A1 (en) * 2008-04-07 2009-10-15 华为技术有限公司 Method and system for authenticating security when a mobile terminal accesses a network, and the equipment therefore
CN103634268A (en) * 2012-08-20 2014-03-12 中国联合网络通信集团有限公司 A safety control method and an apparatus
CN103117893A (en) * 2013-01-22 2013-05-22 北京奇虎科技有限公司 Monitor method and device of network accessing behaviour and client device
CN103116723A (en) * 2013-02-06 2013-05-22 北京奇虎科技有限公司 Method, device and system of web site interception process
CN103152739A (en) * 2013-02-06 2013-06-12 北京奇虎科技有限公司 Method, device and system for processing calling request information of mobile terminal
CN104066065A (en) * 2014-07-02 2014-09-24 深圳市中兴移动通信有限公司 Anti harassment incoming call/ information mobile terminal and anti harassment incoming call/ information method
CN104182687A (en) * 2014-08-01 2014-12-03 北京奇虎科技有限公司 Security detecting method and security detecting device for mobile terminal input window
CN104361282A (en) * 2014-10-31 2015-02-18 中国联合网络通信集团有限公司 Mobile terminal security protecting method and device
CN105049592A (en) * 2015-05-27 2015-11-11 中国科学院信息工程研究所 Voice safety protection method and system for mobile intelligent terminal
CN106330851A (en) * 2015-07-10 2017-01-11 腾讯科技(深圳)有限公司 Mobile terminal security information obtaining method and device and mobile terminal security information issuing method and device based on cloud service

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112583979A (en) * 2019-09-30 2021-03-30 奇安信科技集团股份有限公司 Application environment sensing method and device of mobile terminal
CN112583978A (en) * 2019-09-30 2021-03-30 奇安信科技集团股份有限公司 Method and device for evaluating operating environment of mobile terminal

Similar Documents

Publication Publication Date Title
US8732827B1 (en) Smartphone security system
US10375116B2 (en) System and method to provide server control for access to mobile client data
Jeon et al. A practical analysis of smartphone security
CN109460660B (en) Mobile device safety management system
JP5813884B2 (en) System and method for providing a threshold level for privilege use in a mobile network environment
CN103491056B (en) The control method and device of application permission
KR101651808B1 (en) Network assisted fraud detection apparatus and methods
US9344882B2 (en) Apparatus and methods for preventing information disclosure
CN105068974B (en) Information processing method and electronic equipment
US11392708B2 (en) Method and system for embedding security in a mobile communications device
CN106921799A (en) A kind of mobile terminal safety means of defence and mobile terminal
EP2562667A1 (en) Apparatus and method for providing security information on background process
CN112799750A (en) Terminal equipment information display method and terminal equipment
CN103532927A (en) Financial cloud safety service platform based on mobile terminal and data protection method
CN110622539A (en) Detecting a fake cell tower
CN105975867B (en) A kind of data processing method
CN107466041B (en) Method and device for identifying pseudo base station and mobile terminal
CN106022101B (en) application management method and terminal
CN104346560A (en) Security authentication method and security authentication device
Oh et al. Best security practices for android, blackberry, and iOS
WO2018049564A1 (en) Anti-theft method and device for mobile terminal
CN103619001A (en) Short message processing method, device and mobile terminal
US9047470B2 (en) Secure provisioning of commercial off-the-shelf (COTS) devices
US11516654B2 (en) Method for automatically encrypting short message, storage device and mobile terminal
CN106791171B (en) Card locking method and device of mobile terminal and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170912

RJ01 Rejection of invention patent application after publication