CN102509054A - Mobile terminal and application program control method for mobile terminal - Google Patents
Mobile terminal and application program control method for mobile terminal Download PDFInfo
- Publication number
- CN102509054A CN102509054A CN2011102915001A CN201110291500A CN102509054A CN 102509054 A CN102509054 A CN 102509054A CN 2011102915001 A CN2011102915001 A CN 2011102915001A CN 201110291500 A CN201110291500 A CN 201110291500A CN 102509054 A CN102509054 A CN 102509054A
- Authority
- CN
- China
- Prior art keywords
- application program
- attribute
- user
- trusted
- monitoring
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Telephone Function (AREA)
- Stored Programmes (AREA)
Abstract
The invention provides a mobile terminal, which comprises a detecting unit and a control unit, wherein the detecting unit is used for detecting potential communication data monitoring and/or reading actions of application programs in the mobile terminal, and the control unit is used for controlling the monitoring and/or reading actions of the application programs according to attributes of the application programs when the actions are detected by the detecting unit. The invention further provides an application program control method for the mobile terminal. According to the technical scheme, the application programs of the mobile terminal can be effectively managed to prevent vicious actions of monitoring communication data by untrusted application programs or restricted application programs and protect privacy of users.
Description
Technical field
The present invention relates to moving communicating field, in particular to portable terminal and the application control method that is used for portable terminal.
Background technology
Existing application is in the system (for example Android system) of portable terminal; All allow the user to download and set up applications from the third party website; In case install successfully, these application programs just can arbitrarily be used the authority of being declared and not receive any restriction or monitoring.This means that as long as the user oneself has installed a Malware because of carelessness, no matter whenever use it, this application program can optionally be monitored or read speech communication, network data, global satellite system locator data etc.User's privacy because system is the behavior that possibly jeopardize privacy of user such as the monitoring of monitoring application program, detection well not, even all do not have, so will be invaded to user's warm tip.
Therefore, need the technology of a kind of monitoring and management and application program behavior, protect user's privacy.
Summary of the invention
Technical matters to be solved by this invention is, a kind of portable terminal and a kind of application control method that is used for portable terminal are provided, monitoring that can monitoring application program and/or read action, protection user's privacy.
According to an aspect of the present invention, a kind of portable terminal is provided, can have comprised: detecting unit, detect the action that the application program in the portable terminal attempts to monitor and/or read communication data; Control module, when said detection when the said action, according to the monitoring of the said application program of property control of said application program and/or read action.Through this technical scheme; In case when finding that application program has monitoring and/or reads the motivation of communication data; Just judge the attribute (whether trusted or not restricted) of this application program; Come the behavior of controlling application program according to the attribute of judging, if trusted or unrestricted application program then allow the monitoring of application program and/or read behavior.
In technique scheme; Preferably; Can also comprise: preset unit, the preset attribute tabulation, said attribute comprises trusted and restricted; Said attribute list comprises trusted tabulation and restricted tabulation, and said trusted has been stored in tabulating and to have been stored attribute in sign and the said restricted tabulation of application program that attribute is a trusted is the sign of restricted application program.Like this, can preset trusted and restricted application program, preestablishing which application program is trusted, and which application program is restricted.
In technique scheme; Preferably, said control module is according to said attribute list, when the attribute of judging said application program is trusted; Allow the monitoring of said application program and/or read action; According to said attribute list, when the attribute of judging said application program was restricted, this program of prompting user was restricted application program and forbids the monitoring of said application program and/or read action and when not judging the attribute of said application program; Then point out the user to select control item, control the monitoring of said application program and/or read action according to said user's selection.When an application program that does not have an attribute is attempted to monitor and/or is read communication data, can point out the user, according to user's selection this application program is controlled.
In technique scheme, preferably, the control item that said control module is selected said user when allowing always; The sign of said application program is added said trusted tabulation, and the control item of selecting said user adds said restricted tabulation with the sign of said application program when forbidding forever; When the control item of said user's selection allows for this; Allow this monitoring of said application program and/or read action, and when the control item that said user selects is forbidden for this, forbid this monitoring of said application program and/or read action; And when the control item that said user selects is unloading, unload said application program.Offer user's multiple choices, adapt to user's various demands.
In technique scheme, preferably, can also comprise: ciphering unit, said attribute list is encrypted, forbid the said attribute list of said application access; Revise the unit, receive the instruction of said user's modification attribute, revise the attribute of the application program in the said attribute list, said modification comprises deletion, change.This attribute list of limits application visit avoids application program to distort attribute list, allows this attribute list of user's modification simultaneously, the application program of script trusted is deleted, or restricted application program is changed to trusted applications program etc.
Pass through technique scheme; When the malicious act of non-trusted applications program intercept communications channel is arranged on the portable terminal; Can point out this non-trusted applications program of user to have risk, and give the user initiative and select, thereby make privacy of user exempt from infringement well.
According to another aspect of the invention, a kind of application control method that is used for portable terminal is provided, can have comprised: step 202, detect the action that the application program in the portable terminal attempts to monitor and/or read communication data; Step 204 is when detecting said action, according to the monitoring of the said application program of property control of said application program and/or read action.Through this technical scheme; In case when finding that application program has monitoring and/or reads the motivation of communication data; Just judge the attribute (whether trusted or not restricted) of this application program; Come the behavior of controlling application program according to the attribute of judging, if trusted or unrestricted application program then allow the monitoring of application program and/or read behavior.
In technique scheme; Preferably; Before said step 202, can also comprise, the preset attribute tabulation, said attribute comprises trusted and restricted; Said attribute list comprises trusted tabulation and restricted tabulation, and said trusted has been stored in tabulating and to have been stored attribute in sign and the said restricted tabulation of application program that attribute is a trusted is the sign of restricted application program.Like this, can preset trusted and restricted application program, preestablishing which application program is trusted, and which application program is restricted.
In technique scheme; Preferably, said step 204 specifically can comprise: when according to said attribute list, when the attribute of judging said application program is trusted; Then allow the monitoring of said application program and/or read action; When according to said attribute list, when the attribute of judging said application program is restricted, then forbids the monitoring of said application program and/or read action and when not judging the attribute of said application program; Then point out the user to select control item, control the monitoring of said application program and/or read action according to said user's selection.When an application program that does not have an attribute is attempted to monitor and/or is read communication data, can point out the user, according to user's selection this application program is controlled.
In technique scheme, preferably, if the control item that said user selects is for allow always; Then the sign with said application program adds said trusted tabulation, if the control item that said user selects is for forbidding that forever then the sign with said application program adds said restricted tabulation; If the control item that said user selects is this permission; Then allow this monitoring of said application program and/or read action, and if the control item selected of said user forbid for this, then forbid this monitoring of said application program and/or read action; And if the control item that said user selects then unloads said application program for unloading.Offer user's multiple choices, adapt to user's various demands.
In technique scheme, preferably, can also comprise: said attribute list is encrypted, forbidden the said attribute list of said application access; Allow the said attribute list of said user capture, revise the attribute of said application program, said modification comprises deletion, change.This attribute list of limits application visit avoids application program to distort attribute list, allows this attribute list of user's modification simultaneously, the application program of script trusted is deleted, or restricted application program is changed to trusted applications program etc.
Pass through technique scheme; When the malicious act of non-trusted applications program intercept communications channel is arranged on the portable terminal; Can point out this non-trusted applications program of user to have risk, and give the user initiative and select, thereby make privacy of user exempt from infringement well.
Description of drawings
Fig. 1 shows the block diagram of portable terminal according to an embodiment of the invention;
Fig. 2 shows the process flow diagram of the application control method that is used for portable terminal of portable terminal according to an embodiment of the invention; And
Fig. 3 shows the process flow diagram of the application control method that is used for portable terminal according to an embodiment of the invention.
Embodiment
In order more to be expressly understood above-mentioned purpose of the present invention, feature and advantage, the present invention is further described in detail below in conjunction with accompanying drawing and embodiment.
Set forth a lot of details in the following description so that make much of the present invention, still, the present invention can also adopt other to be different from other modes described here and implement, and therefore, the present invention is not limited to the restriction of following disclosed specific embodiment.
Fig. 1 shows the block diagram of portable terminal according to an embodiment of the invention.
As shown in Figure 1, portable terminal 100 can comprise according to an embodiment of the invention: detecting unit 102, detect the action that the application program in the portable terminal attempts to monitor and/or read communication data; Control module 104 is when detecting unit 102 detects when action, according to the monitoring of the property control application program of application program and/or read action.Through this technical scheme; In case when finding that application program has monitoring and/or reads the motivation of communication data; Just judge the attribute (whether trusted or not restricted) of this application program; Come the behavior of controlling application program according to the attribute of judging, if trusted or unrestricted application program then allow the monitoring of application program and/or read behavior.Communication data comprises voice call data, network data (for example, WIFI communication data, Bluetooth communication data) etc.
In technique scheme; Preferably; Can also comprise: preset unit 106, the preset attribute tabulation, attribute comprises trusted and restricted; Attribute list comprises trusted tabulation and restricted tabulation, and trusted has been stored in tabulating and to have been stored attribute in sign and the restricted tabulation of application program that attribute is a trusted is the sign of restricted application program.Like this, can preset trusted and restricted application program, preestablishing which application program is trusted, and which application program is restricted.
In technique scheme; Preferably, control module 104 is according to attribute list, when the attribute of judging application program is trusted; Allow the monitoring of application program and/or read action; According to attribute list, when the attribute of judging application program was restricted, this program of prompting user was restricted application program and forbids the monitoring of application program and/or read action and when not judging the attribute of application program; Then point out the user to select control item, according to the monitoring of user's selection controlling application program and/or read action.When an application program that does not have an attribute is attempted to monitor and/or is read communication data, can point out the user, according to user's selection this application program is controlled.
In technique scheme, preferably, the control item that control module 104 is selected the user when allowing always; The sign of application program is added the trusted tabulation, and the control item of selecting the user adds restricted tabulation with the sign of application program when forbidding forever; When the control item of user's selection allows for this; Allow this monitoring of application program and/or read action, and when the control item that the user selects is forbidden for this, forbid this monitoring of application program and/or read action; And when the control item that the user selects is unloading, the unloading application program.Offer user's multiple choices, adapt to user's various demands.
In technique scheme, preferably, can also comprise: ciphering unit 108, attribute list is encrypted, forbid the application access attribute list; Revise unit 110, receive the instruction of user's modification attribute, revise the attribute of the application program in the attribute list, modification comprises deletion, change.This attribute list of limits application visit avoids application program to distort attribute list, allows this attribute list of user's modification simultaneously, the application program of script trusted is deleted, or restricted application program is changed to trusted applications program etc.
At this, should be appreciated that, even if do not have ciphering unit, modification unit, preset unit in the portable terminal shown in Fig. 1, also can reach the desired purpose of the present invention, be the concrete implementation of another kind according to the present invention.
Pass through technique scheme; When the malicious act of non-trusted applications program intercept communications channel is arranged on the portable terminal; Can point out this non-trusted applications program of user to have risk, and give the user initiative and select, thereby make privacy of user exempt from infringement well.
After having explained, specify the application control method that is used for portable terminal according to of the present invention below in conjunction with Fig. 2 and Fig. 3 according to portable terminal of the present invention.
Fig. 2 shows the process flow diagram of the application control method that is used for portable terminal of portable terminal according to an embodiment of the invention.
As shown in Figure 2, be used for the application control method of portable terminal according to an embodiment of the invention, can comprise: step 202, detect the action that the application program in the portable terminal attempts to monitor and/or read communication data; Step 204 is when detecting when action, according to the monitoring of the property control application program of application program and/or read action.Through this technical scheme; In case when finding that application program has monitoring and/or reads the motivation of communication data; Just judge the attribute (whether trusted or not restricted) of this application program; Come the behavior of controlling application program according to the attribute of judging, if trusted or unrestricted application program then allow the monitoring of application program and/or read behavior.
In technique scheme; Preferably; Before step 202, can also comprise, the preset attribute tabulation, attribute comprises trusted and restricted; Attribute list comprises trusted tabulation and restricted tabulation, and trusted has been stored in tabulating and to have been stored attribute in sign and the restricted tabulation of application program that attribute is a trusted is the sign of restricted application program.Like this, can preset trusted and restricted application program, preestablishing which application program is trusted, and which application program is restricted.
In technique scheme; Preferably, step 204 specifically can comprise: when according to attribute list, when the attribute of judging application program is trusted; Then allow the monitoring of application program and/or read action; When according to attribute list, when the attribute of judging application program is restricted, then forbids the monitoring of application program and/or read action and when not judging the attribute of application program; Then point out the user to select control item, according to the monitoring of user's selection controlling application program and/or read action.When an application program that does not have an attribute is attempted to monitor and/or is read communication data, can point out the user, according to user's selection this application program is controlled.
In technique scheme, preferably, if the control item that the user selects is for allow always; Then the sign with application program adds the trusted tabulation, if the control item that the user selects is for forbidding that forever then the sign with application program adds restricted tabulation; If the control item that the user selects is this permission; Then allow this monitoring of application program and/or read action, and if the control item selected of user forbid for this, then forbid this monitoring of application program and/or read action; And if the control item that the user selects then unloads application program for unloading.Offer user's multiple choices, adapt to user's various demands.
In technique scheme, preferably, can also comprise: attribute list is encrypted, forbidden the application access attribute list; Allow the user capture attribute list, revise the attribute of application program, modification comprises deletion, change.This attribute list of limits application visit avoids application program to distort attribute list, allows this attribute list of user's modification simultaneously, the application program of script trusted is deleted, or restricted application program is changed to trusted applications program etc.
Pass through technique scheme; When the malicious act of non-trusted applications program intercept communications channel is arranged on the portable terminal; Can point out this non-trusted applications program of user to have risk, and give the user initiative and select, thereby make privacy of user exempt from infringement well.
Fig. 3 shows the process flow diagram of the application control method that is used for portable terminal according to still another embodiment of the invention.
Portable terminal is safeguarded an attribute list, and this attribute list comprises trusted applications tabulation and limited applications tabulation.Can dispatch from the factory and preset this attribute list; Stored the sign of application program in the attribute list; When the sign of application program is positioned at the trusted tabulation, represent that this application program is the trusted applications program, when the sign of application program is positioned at the limited applications tabulation; Represent that this application program is the limited applications program, this attribute list has been realized the effect of management and application program.The visit of other Any Application is forbidden in the encrypted preservation of attribute list information, can be provided with to have only the terminal user can revise this attribute list, and the deletion application program is perhaps changed the attribute of application program, satisfies user's needs.Non-trusted applications program is meant that not by the application program that system trusted, restricted application program is meant the application program of being forbidden monitoring action by system.And the application that provider of system dispatches from the factory on pre-installed applications, official of provider of the system application program website can belong to trusted applications, and the sign with them is arranged in the trusted tabulation in the attribute list in advance.The application control method that is used for portable terminal in the present embodiment is specific as follows:
In step 302, detect the action that application program attempts to monitor and/or read communication data, for example monitor voice call, network data or global satellite system Location Request etc.
In step 304, judge whether application program has and attempt the action of monitoring and/or reading, if judged result then gets into step 306 for being, if judged result then gets into step 302 for not.
In step 306,, check whether this application program belongs to trusted, restricted application program according to attribute list.
In step 308, at first judge whether it is the application program of trusted, if judged result then gets into step 320 for being, allow the monitoring of application program and/or read action, if judged result then gets into step 310 for not.
In step 310, judge whether it is restricted application program, if judged result then gets into step 322 for being, forbid the monitoring of application program and/or read action, can point out this application program of user restricted; If judged result then gets into step 312 for not.
In step 312, this application program of prompting user has risk, and lets the user select the control corresponding item.Control item comprises " this permission ", " allowing ", " this is forbidden ", " forbidding forever " and " complete discharge " always.
When the user selects " this permission ", then get into step 320, allow the monitoring of application program and/or read action; When the user selects " allowing " always, then get into step 314; When the user selects " complete discharge ", then get into step 316; When the user selects " forbidding forever ", then get into step 318; When the user selects " this is forbidden ", then get into step 322, forbid the monitoring of application program and/or read action.
Certainly, when selecting " this permission ", only allow this monitoring and/or read action; Detect this application program next time when attempting to monitor and/or read the action of communication data, still need point out the user, control according to user's selection; Likewise; When the user selects " this is forbidden ", only forbid this monitoring and/or read action, detect this application program next time when attempting to monitor and/or read the action of communication data; Still need point out the user, control according to user's selection.
In step 314, the trusted tabulation with in the sign adding attribute list of this application program gets into step 320 then, allows the monitoring of application program and/or reads action.
In step 316, end the operation of this application program by force, and unload this application program, after application program is unloaded, deletion in the sign dependency tabulation of this application program.
In step 318, the restricted tabulation with in the sign adding attribute list of this application program gets into step 322 then, forbids the monitoring of application program and/or reads action.
In addition, through the online upgrading function of manufacturer oneself, system can upgrade above-mentioned attribute list, and the identification renewal of the application program that provider is provided is in the trusted tabulation.
Portable terminal among above-mentioned each embodiment comprises mobile phone, Portable, personal utility appliance etc.
Pass through technique scheme; Detect the action that application program attempts to monitor and/or read communication data; When detecting this action, judge the attribute of application program according to attribute list, and come the monitoring of controlling application program and/or read action according to the attribute of application program; When the malicious act of non-trusted applications program intercept communications data is arranged on the portable terminal; Can point out this non-trusted applications program of user to have risk, and give the user initiative and select, thereby make privacy of user exempt from infringement well.
The above is merely the preferred embodiments of the present invention, is not limited to the present invention, and for a person skilled in the art, the present invention can have various changes and variation.All within spirit of the present invention and principle, any modification of being done, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.
Claims (10)
1. a portable terminal is characterized in that, comprising:
Detecting unit detects the action that the application program in the portable terminal attempts to monitor and/or read communication data;
Control module, when said detection when the said action, according to the monitoring of the said application program of property control of said application program and/or read action.
2. portable terminal according to claim 1; It is characterized in that; Also comprise: preset unit, the preset attribute tabulation, said attribute comprises trusted and restricted; Said attribute list comprises trusted tabulation and restricted tabulation, and said trusted has been stored in tabulating and to have been stored attribute in sign and the said restricted tabulation of application program that attribute is a trusted is the sign of restricted application program.
3. portable terminal according to claim 2; It is characterized in that said control module is according to said attribute list, when the attribute of judging said application program is trusted; Allow the monitoring of said application program and/or read action; According to said attribute list, when the attribute of judging said application program is restricted, forbids the monitoring of said application program and/or read action and when not judging the attribute of said application program; Then point out the user to select control item, control the monitoring of said application program and/or read action according to said user's selection.
4. portable terminal according to claim 3; It is characterized in that the control item that said control module is selected said user adds said trusted with the sign of said application program and tabulates when allowing always; The control item of selecting said user is when forbidding forever; The sign of said application program is added said restricted tabulation, when the control item of said user's selection allows for this, allow this monitoring of said application program and/or read action; And when the control item that said user selects is forbidden for this; Forbid this monitoring of said application program and/or read action, and when the control item that said user selects is unloading, unload said application program.
5. according to each described portable terminal in the claim 1 to 4, it is characterized in that, also comprise: ciphering unit, said attribute list is encrypted, forbid the said attribute list of said application access;
Revise the unit, receive the operational order of said user's modification attribute, revise the attribute of the application program in the said attribute list, said modification comprises deletion, change.
6. an application control method that is used for portable terminal is characterized in that, comprising:
Step 202 detects the action that the application program in the portable terminal attempts to monitor and/or read communication data;
Step 204 is when detecting said action, according to the monitoring of the said application program of property control of said application program and/or read action.
7. application control method according to claim 6; It is characterized in that; Before said step 202, also comprise, the preset attribute tabulation, said attribute comprises trusted and restricted; Said attribute list comprises trusted tabulation and restricted tabulation, and said trusted has been stored in tabulating and to have been stored attribute in sign and the said restricted tabulation of application program that attribute is a trusted is the sign of restricted application program.
8. application control method according to claim 7; It is characterized in that said step 204 specifically comprises: when according to said attribute list, when the attribute of judging said application program is trusted; Then allow the monitoring of said application program and/or read action; When according to said attribute list, when the attribute of judging said application program is restricted, then forbids the monitoring of said application program and/or read action and when not judging the attribute of said application program; Then point out the user to select control item, control the monitoring of said application program and/or read action according to said user's selection.
9. application control method according to claim 8; It is characterized in that if the control item that said user selects is permission always, then the sign with said application program adds said trusted tabulation; If the control item that said user selects is for forbid forever; Then the sign with said application program adds said restricted tabulation, if the control item that said user selects then allows this monitoring of said application program and/or reads action for this allows; And if the control item that said user selects is forbidden for this; Then forbid this monitoring of said application program and/or read action, and if the control item selected of said user for unloading, then unload said application program.
10. according to each described application control method in the claim 6 to 9, it is characterized in that, also comprise: said attribute list is encrypted, forbidden the said attribute list of said application access;
Allow the said attribute list of said user capture, receive the operational order of said user's modification attribute, the attribute of said application program is made amendment, said modification comprises deletion, change.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011102915001A CN102509054A (en) | 2011-09-30 | 2011-09-30 | Mobile terminal and application program control method for mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011102915001A CN102509054A (en) | 2011-09-30 | 2011-09-30 | Mobile terminal and application program control method for mobile terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102509054A true CN102509054A (en) | 2012-06-20 |
Family
ID=46221135
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2011102915001A Pending CN102509054A (en) | 2011-09-30 | 2011-09-30 | Mobile terminal and application program control method for mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102509054A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103002163A (en) * | 2012-11-15 | 2013-03-27 | 深圳市金立通信设备有限公司 | Mobile terminal background program control method and mobile terminal |
CN103116716A (en) * | 2013-01-25 | 2013-05-22 | 复旦大学 | Immediate access conferring method aiming at low interference of mobile platform |
CN103631586A (en) * | 2013-11-15 | 2014-03-12 | 北京奇虎科技有限公司 | Method and system for carrying out contextualization interactive processing |
CN103699835A (en) * | 2013-12-11 | 2014-04-02 | 西安交通大学 | Access control method of resources of Android system |
CN103810432A (en) * | 2014-02-24 | 2014-05-21 | 珠海市君天电子科技有限公司 | Data processing method and device |
CN104021062A (en) * | 2013-03-01 | 2014-09-03 | 联想(北京)有限公司 | Information processing method and electronic device |
CN104462964A (en) * | 2014-11-06 | 2015-03-25 | 东莞宇龙通信科技有限公司 | Data acquiring method, data acquiring device and terminal |
CN104850776A (en) * | 2014-02-18 | 2015-08-19 | 中国电信股份有限公司 | Method and device for controlling API (Application Program Interface) call, and mobile terminal |
CN114035870A (en) * | 2021-10-13 | 2022-02-11 | 青岛海信移动通信技术股份有限公司 | Terminal device, application resource control method and storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20010051916A1 (en) * | 2000-05-26 | 2001-12-13 | Masashi Shiomi | Server device, terminal device, application communication system, application communication method and recording medium for recording application communication program, for proper communication of application divided into portions |
CN102045712A (en) * | 2011-01-04 | 2011-05-04 | 奇智软件(北京)有限公司 | Anti-monitoring method and system for mobile terminal |
CN102136956A (en) * | 2010-01-21 | 2011-07-27 | 宏碁股份有限公司 | Monitoring method and system for detecting network communication behaviors |
-
2011
- 2011-09-30 CN CN2011102915001A patent/CN102509054A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20010051916A1 (en) * | 2000-05-26 | 2001-12-13 | Masashi Shiomi | Server device, terminal device, application communication system, application communication method and recording medium for recording application communication program, for proper communication of application divided into portions |
CN102136956A (en) * | 2010-01-21 | 2011-07-27 | 宏碁股份有限公司 | Monitoring method and system for detecting network communication behaviors |
CN102045712A (en) * | 2011-01-04 | 2011-05-04 | 奇智软件(北京)有限公司 | Anti-monitoring method and system for mobile terminal |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103002163A (en) * | 2012-11-15 | 2013-03-27 | 深圳市金立通信设备有限公司 | Mobile terminal background program control method and mobile terminal |
CN103002163B (en) * | 2012-11-15 | 2015-09-16 | 深圳市金立通信设备有限公司 | A kind of mobile terminal background program control method and mobile terminal |
CN103116716A (en) * | 2013-01-25 | 2013-05-22 | 复旦大学 | Immediate access conferring method aiming at low interference of mobile platform |
CN104021062A (en) * | 2013-03-01 | 2014-09-03 | 联想(北京)有限公司 | Information processing method and electronic device |
CN103631586A (en) * | 2013-11-15 | 2014-03-12 | 北京奇虎科技有限公司 | Method and system for carrying out contextualization interactive processing |
CN103699835A (en) * | 2013-12-11 | 2014-04-02 | 西安交通大学 | Access control method of resources of Android system |
CN103699835B (en) * | 2013-12-11 | 2016-08-17 | 西安交通大学 | A kind of access control method towards android system resource |
CN104850776A (en) * | 2014-02-18 | 2015-08-19 | 中国电信股份有限公司 | Method and device for controlling API (Application Program Interface) call, and mobile terminal |
CN103810432A (en) * | 2014-02-24 | 2014-05-21 | 珠海市君天电子科技有限公司 | Data processing method and device |
CN104462964A (en) * | 2014-11-06 | 2015-03-25 | 东莞宇龙通信科技有限公司 | Data acquiring method, data acquiring device and terminal |
CN114035870A (en) * | 2021-10-13 | 2022-02-11 | 青岛海信移动通信技术股份有限公司 | Terminal device, application resource control method and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102509054A (en) | Mobile terminal and application program control method for mobile terminal | |
EP3375159B1 (en) | Dynamic honeypot system | |
EP2562673B1 (en) | Apparatus and method for securing mobile terminal | |
JP5813884B2 (en) | System and method for providing a threshold level for privilege use in a mobile network environment | |
US9226145B1 (en) | Verification of mobile device integrity during activation | |
Jeon et al. | A practical analysis of smartphone security | |
US8387141B1 (en) | Smartphone security system | |
CN107133498B (en) | Privacy application management method and device and mobile terminal | |
KR101206740B1 (en) | Mobile terminal for controling execution of application and method thereof | |
US20120137369A1 (en) | Mobile terminal with security functionality and method of implementing the same | |
KR20070099200A (en) | Apparatus for restricting access to application module in mobile wireless device and method of restricting access to application module using the same | |
KR20130023656A (en) | Portable multifunction device and method for controlling permission of application | |
CN103403669A (en) | Securing and managing APPs on a device | |
CN101577907B (en) | Method and device for managing mobile terminal | |
KR20130022490A (en) | Apparatus and method for controlling permission in mobile terminal | |
CN103455520A (en) | Method and device for accessing Android database | |
CN107122655B (en) | Trust management based mobile application security setting recommendation system | |
US9693233B2 (en) | Intelligent agent for privacy and security application | |
CN103218552A (en) | Safety management method and device based on user behavior | |
US20160330239A1 (en) | Hacking prevention system for mobile terminal and method therefor | |
Perakovic et al. | Research of security threats in the use of modern terminal devices | |
Alkindi et al. | Android Application Permission Model | |
CN104412274A (en) | Portable terminal, program, and control method | |
CN109547998B (en) | Management method, device and storage medium for virtual user identity identification card | |
Jeong et al. | SafeGuard: a behavior based real-time malware detection scheme for mobile multimedia applications in android platform |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20120620 |