CN102236764B - Method and monitoring system for Android system to defend against desktop information attack - Google Patents

Method and monitoring system for Android system to defend against desktop information attack Download PDF

Info

Publication number
CN102236764B
CN102236764B CN2011101813725A CN201110181372A CN102236764B CN 102236764 B CN102236764 B CN 102236764B CN 2011101813725 A CN2011101813725 A CN 2011101813725A CN 201110181372 A CN201110181372 A CN 201110181372A CN 102236764 B CN102236764 B CN 102236764B
Authority
CN
China
Prior art keywords
malicious attack
monitoring
data
desktop
desktop information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2011101813725A
Other languages
Chinese (zh)
Other versions
CN102236764A (en
Inventor
卞佳丽
孟洁
戴志涛
邝坚
孟现青
张成文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing University of Posts and Telecommunications
Original Assignee
Beijing University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Posts and Telecommunications filed Critical Beijing University of Posts and Telecommunications
Priority to CN2011101813725A priority Critical patent/CN102236764B/en
Publication of CN102236764A publication Critical patent/CN102236764A/en
Application granted granted Critical
Publication of CN102236764B publication Critical patent/CN102236764B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Telephone Function (AREA)

Abstract

The invention discloses a method and monitoring system for Android system to defend against a desktop information attack. The method comprises the following steps: backing up: backing up a database storing desktop information data; data monitoring: monitoring to judge whether the operation is a suspectable hostile attack; judgment: when judging the operation is the suspectable hostile attack, judging whether the operation is a hostile attack according to the number of times of the repeated modification onto the desktop information data; and result processing: when judging the operation is the hostile attack, recovering the desktop information data according to the backup. The method and monitoring system disclosed by the invention can prompt prewarning when a third party application program tries to modify desktop icons and other information of the mobile intelligent terminal operating system or carries out irrational modification, and can actively defend against the attack and recover the hostile attack after the system is started.

Description

Method and the supervisory system that DESKTOP INFORMATION is attacked of resisting that is used for the Android system
Technical field
The present invention relates to the intelligent terminal system security fields, be specifically related to a kind of method and supervisory system of resisting the desktop icons attack in the Android system.
Background technology
Along with the development of infotech, the rapid growth of especially recent various mobile intelligent terminals is more and more higher to stability and the security requirement of mobile intelligent terminal operating system.
Android (trade mark) system is one of current comparatively popular mobile intelligent terminal operating system, the mobile intelligent terminal operating system of increasing income based on linux kernel by OHA (Open Handset Alliance opens mobile phone alliance) cooperative development.Native system adopts software lamination (Software Stack has another name called software heap layer) framework, and mainly consist of the following components: bottom is the core system service that is provided by Linux2.6, hides the particular hardware details, for the upper strata unification provides service; The Android Runtime of core library and the Dalvik virtual machine that depends on the Linux bottom (Java Virtual Machine of Google company exploitation) formation; The set in C/C++ storehouse provides respective service for the upper strata; The superiors are system framework layer and application layer, are write by Java language.
The Android system is an opening that truly provides for mobile intelligent terminal and complete operating system platform, both supported the user by all kinds of means software install and use, provide free operation system technology Core Feature details for the developer again.Fully the increasing income property of Android system makes its development environment compare greater flexibility and convenience with the traditional mobile terminal system, but meanwhile, also has many potential safety hazards in this system.
From the some months time at the beginning of the end of the year to 2,007 2006, the virus of a kind of " Panda burning incense " (having another name called " WH boy ") by name causes domestic 1,000,000 grades of personal computer user to infect, and causes the direct economic loss more than 5,000,000,000.And the feature of this viral master is exactly to make the executable file in the computer can change to " Panda burning incense " pattern.
And the same PI Android system of the virus of similar " Panda burning incense ".Issued in the market and possessed the software issue of revising the desktop personalized customization function.And the use of the malice of this kind software just causes DESKTOP INFORMATION by malicious attack most probably.
In the prior art, also there are not a kind of effective ways to be implemented in that the malicious attack to DESKTOP INFORMATION detects and takes precautions against in the Android system.
Summary of the invention
The technical problem to be solved in the present invention is in the situation of not making amendment at the source code of Android cell phone system platform, a kind of method and system of resisting of DESKTOP INFORMATION malicious attack is provided, whether it utilizes the data monitoring module of Android operating platform, realize being detected and processing by third party application malicious attack for the DESKTOP INFORMATION data.
In order to solve the problems of the technologies described above, the invention provides and a kind ofly resist the method that DESKTOP INFORMATION is attacked in the Android system, it is characterized in that comprise: backup-step is used for the database of storage table surface information data to described Android system and backs up; The data monitoring step monitors to judge whether the operation that described DESKTOP INFORMATION data are made amendment is doubtful malicious attack; Determining step, when described data monitoring step is judged as described operation and is doubtful malicious attack, according to described operation to the DESKTOP INFORMATION data repeat revise number of times and judge whether described operation is malicious attack, and the affirmation information of perhaps having done based on the prompting that detects doubtful malicious attack according to the user judges whether described operation is malicious attack; The result treatment step when described determining step is judged as described operation and is malicious attack, is recovered the DESKTOP INFORMATION data according to described backup.
Preferably, in the described data monitoring step, if the time interval of described operation is lower than Preset Time, judge that then described operation is doubtful malicious attack.
Preferably, in the described determining step, calculate in the following way the described number of times that repeats to revise: will carry out record to the retouching operation that icon name data and/or icon image data are made amendment, with the duplicate record number of times of retouching operation as revising number of times with corresponding the repeating of this retouching operation.
Preferably, if when being judged as described operation being malicious attack in described determining step, prompting user detects malicious attack.
Preferably, described desktop data message comprises desktop icons title and desktop icons image.
Preferably, the registerContentObserver () interface that provides in the system class by described Android operating system connects, and wherein onChange () function is carried out method cover, to carry out described backup and described monitoring.
Preferably, pilot switch is set, comes On/Off to the monitoring of DESKTOP INFORMATION by described pilot switch.
The present invention also provides the supervisory system that DESKTOP INFORMATION is attacked of resisting of a kind of Android of being applicable to system, it is characterized in that, comprise: the data monitoring module, be used for that described Android system is used for the database of storage table surface information data and back up, monitor to judge whether the operation that described DESKTOP INFORMATION data are made amendment is doubtful malicious attack; The operation identification module, be used for when described data monitoring module is judged as described operation and is doubtful malicious attack, according to described operation to the DESKTOP INFORMATION data repeat revise number of times and judge whether described operation is malicious attack, perhaps by the user according to judging about the prompting that detects doubtful malicious attack whether described operation is malicious attack; The result treatment module is used for according to described backup the DESKTOP INFORMATION data being recovered when described determining step is judged as described operation and is malicious attack.
Preferably, also comprise: Subscriber Interface Module SIM is used for sending the request of opening the monitoring DESKTOP INFORMATION and closes monitoring-controlling system signal to described monitoring closing module to described data monitoring module and for sending; The monitoring closing module is used for the monitoring-controlling system signal of closing according to described Subscriber Interface Module SIM transmission, so that described supervisory system is out of service.
Preferably, when described data monitoring module backs up the database of storage table surface information data, the registerContentObserver () interface that provides in the system class by Android operating system connects, and wherein onChange () function is carried out method cover to realize monitoring.
Compared with prior art, the present invention has the following advantages:
The present invention utilizes the interface of monitoring DESKTOP INFORMATION in the Android mobile intelligent terminal operating system, when third party application attempts to revise the unreasonable modification that the information such as desktop icons of mobile intelligent terminal operating system carry out, point out early warning, and in the situation that system opens resist attack and the malicious attack that has caused recovered initiatively.
In addition, preservation state information in real time when third party application carries out the legal modifications of DESKTOP INFORMATION like this can be for DESKTOP INFORMATION provides safe and reliable Backup Data, thereby the recovery when occuring for malicious attack provides rational basis.In the situation of system closing, the modification of system desktop information is not had any impact.
Other features and advantages of the present invention will be set forth in the following description, and, partly from instructions, become apparent, perhaps understand by implementing the present invention.Purpose of the present invention and other advantages can realize and obtain by specifically noted structure in instructions, claims and accompanying drawing.
Description of drawings
Accompanying drawing is used to provide a further understanding of the present invention, and consists of the part of instructions, is used for together with embodiments of the present invention explaining the present invention, is not construed as limiting the invention.In the accompanying drawings:
Fig. 1 is based on the schematic flow sheet of the method for resisting the DESKTOP INFORMATION attack in the Android system of embodiment one;
Fig. 2 is the list structure in the DESKTOP INFORMATION data storage file;
Fig. 3 is based on the structural representation of the supervisory system of resisting the DESKTOP INFORMATION attack in the Android system of embodiment two.
Fig. 4 is based on another preferred structure synoptic diagram of supervisory system of resisting the DESKTOP INFORMATION attack in the Android system of embodiment two.
Embodiment
Describe embodiments of the present invention in detail below with reference to drawings and Examples, how the application technology means solve technical matters to the present invention whereby, and the implementation procedure of reaching technique effect can fully understand and implements according to this.Need to prove that only otherwise consist of conflict, each embodiment among the present invention and each feature among each embodiment can mutually combine, formed technical scheme is all within protection scope of the present invention.
In addition, can in the intelligent mobile terminal such as one group of executable instruction, carry out in the step shown in the process flow diagram of accompanying drawing, and, although there is shown logical order in flow process, but in some cases, can carry out step shown or that describe with the order that is different from herein.
The first embodiment
Fig. 1 illustrates the schematic flow sheet according to the method for resisting DESKTOP INFORMATION attack of present embodiment in the Android system, and each step of present embodiment is described below with reference to Fig. 1.
Step 110: Android operating system is used for the first database of storage table surface information data backs up.
Preferably, before backup, carry out initialization step: accept to open the request of monitoring DESKTOP INFORMATION, connect the system database of monitor component and storage table surface information, the registration monitor component.
DESKTOP INFORMATION data in the Android system are stored in the favorite table of database (hereinafter claiming the first database) of the system-level application of android.Launcher, in this table, store position, the type of desktop icons, the field informations such as icon source.When receiving the request of opening the monitoring DESKTOP INFORMATION, open pilot switch, preferably, " On/Off system operative position " in the storage file (Flag) is set to 1.List structure in the storage file as shown in Figure 2, simultaneously, carry out the initialization of data monitoring, set up the DESKTOP INFORMATION database (hereinafter claiming the second database) of new spacing at storage space, this storage space can be local storage or outside extended memory, the field of favorite table is basic identical in this second wide area information server literary name section and the first database, and " the last time running time " of storage organization (preTime) field initialization be storage current time value.When connecting the second database, the registerContentObserver () interface that provides in can the system class by Android operating system connects; And wherein onChange () function is carried out method cover (heavy duty), to realize in order to realize the monitor-interface of present embodiment method.This action need obtains the application layer program to the operating right of the first database, and generic resource identifier URI and the use_permission (Android rights of using) of the first database is set.
Step 120 monitors to judge whether the operation that the DESKTOP INFORMATION data are made amendment is doubtful malicious attack.
Preferably, when existence makes described DESKTOP INFORMATION data that the operation of change occur, judge whether the time interval of described operation is lower than a Preset Time, if be lower than described Preset Time, then judge the described doubtful malicious attack that is operating as.
When third party's application operates the DESKTOP INFORMATION data, can call change () function.The onChange () function that realize in the program this moment will monitor modification information.Program will be obtained system operating time, and this time and last time running time (by being connected storage file in the SharedPreferences.Editor class) in the storage file compared, if the difference between two time is lower than the reasonable time (for example 3ms), be doubtful malicious attack with this operation judges that DESKTOP INFORMATION data are made amendment then, and in system, send doubtful malicious attack signal.
Preferably, can directly be carried out by the user judgement of doubtful malicious attack, for example: prompting user detects doubtful malicious attack, when the user according to the information of having grasped or knowledge, when having reason to suspect that there be malicious attack possible in current operation, can directly send doubtful malicious attack signal by the user by operation interface.
Preferably, can be by judging whether the application program that current operation relates to is that the distrust program determines whether doubtful malicious attack.For example, judge whether the type of application program or title are in the distrust tabulation.
Step 130: when the data monitoring step is doubtful malicious attack with this operation judges that DESKTOP INFORMATION data are made amendment, according to this operation to these DESKTOP INFORMATION data repeat revise number of times and judge whether this operation is malicious attack, perhaps by the user according to judging about the prompting that detects doubtful malicious attack whether this operation is malicious attack.
The user initiatively can change the first database equally to the retouching operation that desktop icons carry out, but the manual change according to the user, have certain time interval, present embodiment has just proposed the judgement of doubtful malicious operation according to this principle, just think that in the situation of the first database manipulation that does not meet the reasonable time interval third party uses the renewal operation of making.This kind upgraded operation as the prerequisite of malicious operation, afterwards by judging whether this operation is to be the modification that repeats of the projects such as desktop icons or icon title, and whether identify this operation is malicious attack.
After receiving doubtful malicious attack information, system records (such as 5 operations carrying out) to the number of operations of within a certain period of time the first database update in 1 minute, the first database manipulation modification of initiatively carrying out being judged to be non-user, title in the first database (icon title) and icon (icon image) data are carried out record, if entry repeats, judge that this is operating as the malicious attack that third party software carries out, by form prompting users such as dialog box or notices; Icon image and the icon title that will repeat to upgrade during the dialog box prompting together be presented on the user interface.
Preferably, can whether be the judgement of malicious attack directly by the user: after the information that receives doubtful malicious attack, can point out the user, the user can according to the information of having grasped or knowledge, directly judge by operation interface whether this operation is malicious attack by the user.
Step 140: when being judged as this operation in the step 130 and being malicious attack, according to the information that backs up in the second database the DESKTOP INFORMATION data are recovered, preferably, can be forbidden in the given time the DESKTOP INFORMATION data are changed.
The information that backs up in the second database is generally a safe condition before the malicious attack, therefore the result who the DESKTOP INFORMATION data is recovered namely malicious attack to be caused returns to previous safe condition, and to next forbidding the DESKTOP INFORMATION data are changed in a period of time, when this was operating as legal operation, the current state of saved system was to allow the change of DESKTOP INFORMATION data.
Concrete, receive whether be the judged result of malicious attack after, according to result's difference operation is divided into two kinds of processing modes:
If malicious attack, then according to program the second database in the storage space externally, favorite in the first database table is carried out overlapping operation: first the first database is all emptied, afterwards the data in the second database are all inserted, the interface that inserted mode can utilize the Android system to provide: SQLitedatabase.insert, or by carrying out the sql statement; Simultaneously, the flag field in the storage organization need to be set to 0, system for monitoring opening again after operation is finished is in case major structure becomes the infinite loop of supervisory system.And for icon field information in the favorite table because the singularity of its data structure, need to be by inserting behind the bitmap object again dump, and storage file emptied, again it is the time of this service data to the Data Update to the preTime field after its initialization, it is opening that pilot switch is set, and opens monitoring the first database (Flag is set to 1).(in 10 minutes) forbid the retouching operation to the first database in a period of time after this.
Can legally operate if be judged as, then carry out relevant deletion and the update of the first database manipulation, after this second database is backed up again: first the second database is emptied, afterwards the data in the first database are all write in the second database.Identical when being judged as malicious operation to the operation of storage organization.
Preferably, also comprise the step of closing supervisory system, discharge monitor component and be connected the connection of the first database with the storage table surface information, the monitor component of the monitoring DESKTOP INFORMATION in the cancellation system.This step has allowed the user independently to monitor, to provide certain customers to system's icon or the unified demand of title.Receive and close monitoring-controlling system signal, system's pilot switch is set to close, and preferably, the Flag field in the storage file is set to 0.
Embodiment two
Fig. 3 illustrates the structural representation according to the supervisory system of resisting DESKTOP INFORMATION attack of present embodiment in the Android system, illustrates that below with reference to Fig. 3 the each several part of present embodiment forms.
The data monitoring module is used for that described Android system is used for the database of storage table surface information data and backs up, and monitors to judge whether the operation that described DESKTOP INFORMATION data are made amendment is doubtful malicious attack.Preferably, this module also can be set to, directly carried out the judgement of doubtful malicious attack by the user, for example: the user is according to the information of having grasped or knowledge, have reason to suspect that there is the possibility of malicious attack in current operation, can directly send doubtful malicious attack signal by the user by operation interface.Preferably, this module also can be set to, and by judging that the application program that current operation relates to is that the distrust program is sent doubtful malicious attack signal, for example, judges whether the type of application program or title are in the distrust tabulation.
The operation identification module, the operation identification module, be used for when described data monitoring module is judged as described operation and is doubtful malicious attack, according to described operation to the DESKTOP INFORMATION data repeat revise number of times and judge whether described operation is malicious attack, perhaps by the user according to judging about the prompting that detects doubtful malicious attack whether described operation is malicious attack.Preferably, this module also can be set to, whether be the judgement of malicious attack directly by the user: after the information that receives doubtful malicious attack, can point out the user, the user can according to the information of having grasped or knowledge, directly judge by operation interface whether this operation is malicious attack by the user.
The result treatment module is used for according to described backup the DESKTOP INFORMATION data being recovered when described determining step is judged as described operation and is malicious attack, preferably, forbids in the given time the DESKTOP INFORMATION data are changed.
Preferably, as shown in Figure 4, the supervisory system of present embodiment can also comprise with lower module:
Subscriber Interface Module SIM, be used for sending the request of opening the monitoring DESKTOP INFORMATION and close monitoring-controlling system signal to described monitoring closing module to data monitoring module and transmission, by control pilot switch unlatching or close to realize the unlatching of monitoring or close, preferably, (Flag) being set to 1 or 0 by " On/Off system operative position " in the storage file realizes.
The monitoring closing module is used for closing monitoring-controlling system signal according to what Subscriber Interface Module SIM sent, discharges being connected between monitor component and the system database, nullifies the monitor component of monitoring DESKTOP INFORMATION.Receive and close monitoring-controlling system signal, system's pilot switch is set to close, and preferably, the Flag field in the storage file is set to 0.
The present invention is based on embedded OS Android1.5 as the systemic software development platform, carried out system simulation according to mentality of designing and attacked experiment, experiment shows that the present invention can resist the attack to DESKTOP INFORMATION, and prompting user.
Those skilled in the art should be understood that, above-mentioned each module of the present invention or each step can realize with general mobile intelligent terminal device, they can concentrate on the single mobile intelligent terminal device, perhaps be distributed on the network that a plurality of mobile intelligent terminal devices form, alternatively, they can be realized with the executable program code of mobile intelligent terminal device (for example operating system of mobile intelligent terminal), thereby, they can be stored in the memory storage and be carried out by the mobile intelligent terminal device, perhaps they are made into respectively each integrated circuit modules, perhaps a plurality of modules in them or step are made into the single integrated circuit module and realize.Like this, the present invention is not restricted to any specific hardware and software combination.
Although the disclosed embodiment of the present invention as above, the embodiment that described content just adopts for the ease of understanding the present invention is not to limit the present invention.Technician in any the technical field of the invention; under the prerequisite that does not break away from the disclosed spirit and scope of the present invention; can do any modification and variation in the details that reaches of implementing in form; but scope of patent protection of the present invention still must be as the criterion with the scope that appending claims was defined.

Claims (9)

1. the method that DESKTOP INFORMATION is attacked of resisting that is used for the Android system is characterized in that, comprising:
Backup-step is used for the database of storage table surface information data to described Android system and backs up;
The data monitoring step monitors to judge whether the operation that described DESKTOP INFORMATION data are made amendment is doubtful malicious attack, and wherein, if the time interval of described operation is lower than Preset Time, then being judged as described operation is doubtful malicious attack;
Determining step, when described data monitoring step is judged as described operation and is doubtful malicious attack, according to described operation to the DESKTOP INFORMATION data repeat revise number of times and judge whether described operation is malicious attack, and the affirmation information of perhaps having done based on the prompting that detects doubtful malicious attack according to the user judges whether described operation is malicious attack;
The result treatment step when described determining step is judged as described operation and is malicious attack, is recovered the DESKTOP INFORMATION data according to described backup.
2. method according to claim 1 is characterized in that,
In the described determining step, calculate in the following way the described number of times that repeats to revise: will carry out record to the retouching operation that icon name data and/or icon image data are made amendment, with the duplicate record number of times of retouching operation as revising number of times with corresponding the repeating of this retouching operation.
3. method according to claim 2 is characterized in that,
If when being judged as described operation being malicious attack in described determining step, prompting user detects malicious attack.
4. according to claim 1 to 2 each described methods, it is characterized in that described desktop data message comprises desktop icons title and desktop icons image.
5. according to claim 1 to 3 each described methods, it is characterized in that,
Connect by the registerContentObserver () interface that provides in the described Android system of systems class, wherein onChange () function is covered, to carry out described backup and described monitoring.
6. according to claim 1 to 4 each described methods, it is characterized in that,
Pilot switch is set, comes On/Off to the monitoring of DESKTOP INFORMATION by described pilot switch.
7. the supervisory system that DESKTOP INFORMATION is attacked of resisting that is used for the Android system is characterized in that, comprising:
The data monitoring module, being used for that described Android system is used for the database of storage table surface information data backs up, monitor to judge whether the operation that described DESKTOP INFORMATION data are made amendment is doubtful malicious attack, wherein, if the time interval of described operation is lower than Preset Time, then being judged as described operation is doubtful malicious attack;
The operation identification module, be used for when described data monitoring module is judged as described operation and is doubtful malicious attack, according to described operation to the DESKTOP INFORMATION data repeat revise number of times and judge whether described operation is malicious attack, perhaps by the user according to judging about the prompting that detects doubtful malicious attack whether described operation is malicious attack;
The result treatment module is used for according to described backup the DESKTOP INFORMATION data being recovered when described operation identification module is judged as described operation and is malicious attack.
8. supervisory system according to claim 7 is characterized in that, also comprises Subscriber Interface Module SIM and monitoring closing module:
Subscriber Interface Module SIM is used for sending the request of opening the monitoring DESKTOP INFORMATION and closes monitoring-controlling system signal to described monitoring closing module to described data monitoring module and for sending;
The monitoring closing module is used for the monitoring-controlling system signal of closing according to described Subscriber Interface Module SIM transmission, so that described supervisory system is out of service.
9. according to claim 8 or 7 described supervisory systems, it is characterized in that,
When described data monitoring module backs up the database of storage table surface information data, connect by the registerContentObserver () interface that provides in the Android system of systems class, wherein onChange () function is carried out method cover to realize monitoring.
CN2011101813725A 2011-06-30 2011-06-30 Method and monitoring system for Android system to defend against desktop information attack Expired - Fee Related CN102236764B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011101813725A CN102236764B (en) 2011-06-30 2011-06-30 Method and monitoring system for Android system to defend against desktop information attack

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011101813725A CN102236764B (en) 2011-06-30 2011-06-30 Method and monitoring system for Android system to defend against desktop information attack

Publications (2)

Publication Number Publication Date
CN102236764A CN102236764A (en) 2011-11-09
CN102236764B true CN102236764B (en) 2013-10-30

Family

ID=44887406

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011101813725A Expired - Fee Related CN102236764B (en) 2011-06-30 2011-06-30 Method and monitoring system for Android system to defend against desktop information attack

Country Status (1)

Country Link
CN (1) CN102236764B (en)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5868514B2 (en) * 2012-09-19 2016-02-24 三菱電機株式会社 Information processing apparatus, information processing method, and program
CN103399805A (en) * 2013-07-08 2013-11-20 天津三星通信技术研究有限公司 Method for managing mobile terminal standby interface and mobile terminal
CN103455924A (en) * 2013-08-28 2013-12-18 小米科技有限责任公司 Method and device for verifying transaction requests and server
CN105451223B (en) * 2014-08-07 2019-03-15 阿里巴巴集团控股有限公司 Monitoring method, device and the mobile terminal of information
CN104267981B (en) * 2014-09-18 2017-12-29 青岛海信移动通信技术股份有限公司 A kind of method and device of application layout on loading desktop
CN107688477B (en) * 2016-08-04 2021-08-20 北京搜狗科技发展有限公司 Setting item processing method and device for setting item processing
US10614042B2 (en) * 2016-08-08 2020-04-07 Microsoft Technology Licensing, Llc Detection of bulk operations associated with remotely stored content
WO2018032188A1 (en) * 2016-08-14 2018-02-22 阮元 Method and server for pushing information to vehicle-mounted device according to user habit
WO2018032170A1 (en) * 2016-08-14 2018-02-22 阮元 Method and server for matching user habit with information push mode
CN107797841B (en) * 2017-11-21 2021-11-05 Oppo广东移动通信有限公司 Window control method and device, terminal equipment and storage medium
CN108170105A (en) * 2017-11-22 2018-06-15 东莞理工学院 A kind of industrial control network guard system and method
CN113688392A (en) * 2021-09-07 2021-11-23 南方电网科学研究院有限责任公司 Malicious code attack resisting method based on power Internet of things and related device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1103893A2 (en) * 1999-11-24 2001-05-30 Deutsche Telekom AG Method and system for the remote monitoring of data processing devices
CN1320862A (en) * 2000-03-29 2001-11-07 富士胶片株式会社 Distribution data processing system and method for processing data in said system
CN101795261A (en) * 2009-12-31 2010-08-04 暨南大学 Information protection system and method based on mobile data safety

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1103893A2 (en) * 1999-11-24 2001-05-30 Deutsche Telekom AG Method and system for the remote monitoring of data processing devices
CN1320862A (en) * 2000-03-29 2001-11-07 富士胶片株式会社 Distribution data processing system and method for processing data in said system
CN101795261A (en) * 2009-12-31 2010-08-04 暨南大学 Information protection system and method based on mobile data safety

Also Published As

Publication number Publication date
CN102236764A (en) 2011-11-09

Similar Documents

Publication Publication Date Title
CN102236764B (en) Method and monitoring system for Android system to defend against desktop information attack
CN101187867B (en) Operating system monitoring setting information generating apparatus and operating system monitoring apparatus
EP3036623B1 (en) Method and apparatus for modifying a computer program in a trusted manner
CN104679534B (en) System application installation package loading processing method, apparatus and terminal
CN104102882B (en) Protection method and device for privacy data of application program
CN103530563B (en) For updating the system and method for authorized software
CN102630320B (en) Information processing device and method for preventing unauthorized application cooperation
CN103902265B (en) One kind applies implementation method and relevant apparatus
CN104885092A (en) Security system and method for operating systems
US7774771B2 (en) Method and system for managing and organizing software package installations
CN102521548A (en) Method for managing using rights of function and mobile terminal
CN103761114A (en) Method and device for loading extensions and/or plugins on browser side
CN102426639B (en) Information safety monitoring method and device
CN106406944A (en) Control method and system for forbidding self-starting of application
CN105843653A (en) TA (trusted application) configuration method and device
CN104715209A (en) Outgoing document encryption protection method
CN101895883B (en) Smart card supporting authentication arithmetic update and method for updating authentication arithmetic
CN105825131A (en) Computer security startup protection method on basis of UEFI (Unified Extensible Firmware Interface)
CN102054041B (en) Method and system for upgrading metadata
CN105893847A (en) Method and device for protecting safety protection application program file and electronic equipment
CN110908730A (en) Cloud platform configuration file management method and management system
CN112052045A (en) Equipment control method and system based on IRP hook
JP2014517376A (en) Secure data storage method and device
CN110750805B (en) Application program access control method and device, electronic equipment and readable storage medium
CN106407790A (en) A privacy protection method and a privacy protection device for application programs

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20131030

Termination date: 20210630