CN102915415B - Safety control method and system of mobile terminal - Google Patents

Safety control method and system of mobile terminal Download PDF

Info

Publication number
CN102915415B
CN102915415B CN201110222535.XA CN201110222535A CN102915415B CN 102915415 B CN102915415 B CN 102915415B CN 201110222535 A CN201110222535 A CN 201110222535A CN 102915415 B CN102915415 B CN 102915415B
Authority
CN
China
Prior art keywords
password
mobile terminal
user
image file
described system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201110222535.XA
Other languages
Chinese (zh)
Other versions
CN102915415A (en
Inventor
刘欣房
贾兵
宋靖
林诗达
王淼
刘金萍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China the Great Wall science and technology group Limited by Share Ltd
Original Assignee
China Great Wall Computer Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Great Wall Computer Shenzhen Co Ltd filed Critical China Great Wall Computer Shenzhen Co Ltd
Priority to CN201110222535.XA priority Critical patent/CN102915415B/en
Publication of CN102915415A publication Critical patent/CN102915415A/en
Application granted granted Critical
Publication of CN102915415B publication Critical patent/CN102915415B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention is applied to the technical field of a mobile terminal, and provides a safety control method and a safety control system of the mobile terminal. The method comprises the following steps of: starting the system, locking the system after a mobile terminal system starts, detecting whether an accessed user identification card is effective or not, and unlocking the system when the accessed user identification card is effective; running the system, detecting whether an encrypted system image file exists or not if system refreshing operation is performed during running of the system, and performing system refreshing operation after unlocking the system image file when the encrypted system image file exists; and displaying a password input interface if system application software installation operation is performed, verifying an input password, and installing application software if the verification is passed. By the safety control method and the safety control system, the safety and the controllability of the mobile terminal system can be effectively improved.

Description

A kind of method of controlling security of mobile terminal and system
Technical field
The invention belongs to technical field of mobile terminals, particularly relate to a kind of method of controlling security and system of mobile terminal.
Background technology
Along with popularizing of mobile terminal device, the kind of mobile terminal operating system is also more and more.Android is a operating system developed by Google, and due to the increasing income property of its code, what be employed is more and more extensive.
But, because design philosophy that Android operation system is initial is a based on the operating system of leisure and amusement, therefore it also exists inborn defect in the security of terminal device, such as: in the refreshing of terminal device system, the system image file of required refreshing is placed in common TF by terminal user, after terminal user activates refresh mode, system image file in TF card is written in the memory device of terminal by terminal system automatically, completes the refreshing of terminal device system.There is obvious safety defect in this kind of method, though namely anyone, as long as when having system image file and TF card, the system of terminal device just can be refreshed, original system is caused to the destruction of essence.
Summary of the invention
The object of the embodiment of the present invention is the method for controlling security providing a kind of mobile terminal, is intended to the problem that the existing security of mobile terminal based on Android operation system of solution can not be high.
The embodiment of the present invention is achieved in that a kind of method of controlling security of mobile terminal, and described method comprises:
System setting up procedure, after mobile terminal system starts, locks described system, and whether the subscriber identification card detecting access is effective, when effective, unlocks described system;
System cloud gray model step, when described system cloud gray model, if what carry out is system flush operation, detects the system image file that whether there is encryption, when existing, being decrypted rear executive system refresh operation to described system image file;
If carry out be system software installation operation, display interface for password input, to input password verify, when being verified, described application software is installed.
Another object of the embodiment of the present invention is the safety control system providing a kind of mobile terminal, and described system comprises:
System start unit, for after mobile terminal system starts, locks described system, and whether the subscriber identification card detecting access is effective, when effective, unlocks described system;
System cloud gray model unit, for when described system cloud gray model, if what carry out is system flush operation, detects the system image file that whether there is encryption, when existing, being decrypted rear executive system refresh operation to described system image file;
If carry out be system software installation operation, display interface for password input, to input password verify, when being verified, described application software is installed.
An object again of the embodiment of the present invention is to provide a kind of mobile terminal comprising described mobile terminal safety control system.
In embodiments of the present invention, by the certification to identification card, can effectively prevent disabled user from using mobile terminal system when there is no identification card or identification card lost efficacy; By the certification to system refresh, can effectively prevent disabled user to mobile terminal operating system distort or transplant virus etc. rogue program; By the certification of installing application software, the installation of malice, illegal software effectively can be prevented; By above-mentioned method of controlling security, effectively improve security and the controllability of mobile terminal.
Accompanying drawing explanation
Fig. 1 is the realization flow figure of the mobile terminal safety control method that the embodiment of the present invention one provides;
Fig. 2 is the security control assembly schematic diagram that the embodiment of the present invention one provides;
Fig. 3 is the particular flow sheet of the system image file encryption that the embodiment of the present invention one provides;
Fig. 4 is the composition structural drawing of the mobile terminal safety control system that the embodiment of the present invention two provides.
Embodiment
In order to make object of the present invention, technical scheme and advantage clearly understand, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein only in order to explain the present invention, be not intended to limit the present invention.
The embodiment of the present invention, by the certification to identification card, can effectively prevent disabled user from using mobile terminal system when not having identification card or identification card lost efficacy; By the certification to system refresh, can effectively prevent disabled user to mobile terminal operating system distort or transplant virus etc. rogue program; By the certification of installing application software, the installation of malice, illegal software effectively can be prevented.In a word, by above-mentioned method of controlling security, security and the controllability of mobile terminal effectively can be improved.
In order to technical solutions according to the invention are described, be described below by specific embodiment.
embodiment one:
Fig. 1 shows the realization flow of the mobile terminal safety control method that the embodiment of the present invention one provides, and details are as follows for the method process:
In step S101, after mobile terminal system starts, described system is locked, and whether the subscriber identification card detecting access is effective, when effective, unlocks described system.
In the present embodiment, after mobile terminal (such as: mobile phone, panel computer etc.) system starts, for preventing the use of disabled user, described system is locked, user is only inserting identification card and when described identification card is effective or legal, could unlock institute's system.Wherein, effective or legal identification card is the identification card having carried out the operation such as registration, cipher key initialization in advance.
In the present embodiment, mobile terminal at least comprises an identification card interface, for the access of subscriber identification card.
In the present embodiment, complete the certification to identification card by the cooperation of the assemblies (as shown in Figure 2) such as the driving of the control of authority assembly (for password, authentication etc.) in mobile terminal system, subscriber identification card and DLL (dynamic link library), thus can effectively prevent disabled user from using mobile terminal system when there is no identification card or identification card lost efficacy.
In step s 102, when system cloud gray model, if what carry out is system flush operation, detects the system image file that whether there is encryption, when existing, rear executive system refresh operation being decrypted to described system image file.
In the present embodiment, when system cloud gray model, if when receiving the system refresh instruction of user, system boot loader (Bootloader), and detect user and whether select slip-stick artist's pattern, if yes then enter recovery (Recovery) module, and test assembly (comprising system cloud gray model unit etc.) by the For Solutions of Systems school closure in Recovery module and detect the system image file that whether there is encryption in described Recovery module, when existing, read described system image file, and described image file is decrypted (key that input pre-sets), executive system refresh operation after deciphering.Wherein, described system image file sends to mobile terminal after being encrypted by encryption personality card (such as: USB-KEY etc.) on management host.
In the present embodiment, what keeper used be provided with, and equipment that the system image file that uses when Windows operating system combining encryption personality card refreshes mobile terminal system manages is management host, by encrypting concrete steps that personality card is encrypted system image file as shown in Figure 3 on management host:
In step S301, when receiving the encrypted instruction of user, start up system image file management software;
In step s 302, detect whether access encryption personality card, when judged result is "Yes", perform step S304, when judged result is "No", perform step S303;
In step S303, prompting user accesses encryption personality card;
In step s 304, obtain the digital certificate in described encryption personality card, and input PIN code;
In step S305, whether effectively detect described digital certificate, when judged result is "Yes", perform step S306, when judged result is "No", returns and continue to perform step S302;
In the present embodiment, when judged result is "No", illustrate that this digital certificate is invalid, transfer to this encryption personality card, select other encryption specialty card again to access.
In step S306, select the system image file needing encryption, signed to needing the system image file of encryption by described digital certificate, and the system image file after signature is sent to mobile terminal.
In the present embodiment, test system in package assembly in assembly (as shown in Figure 2) and management host and encryption personality card etc. by the For Solutions of Systems school closure in Recovery module and combine certification to system refresh on mobile terminal, thus can effectively prevent disabled user to mobile terminal operating system distort or transplant virus wait rogue program, raising mobile terminal system security.
In step s 103, when system cloud gray model, if carry out be system software installation operation, display interface for password input, to input password verify, when being verified, described application software is installed.
In the present embodiment, described password comprises the password of password default and user's setting.System operationally, if when the installation operation of system software being detected, then by the control of authority assembly start up system application software of system, control of authority module (comprising detection module and display control module etc.) is installed, for detecting user, whether password was set, and when detecting that user arranged password, display interface for password input, when detecting that user did not arrange password, the interface for password input of display default password prompt text, and reminding user arranges password.Meanwhile, systematic difference software is installed the password of control of authority module to input and is verified, when being verified, just installs described application software, otherwise, forbid installing.
In the present embodiment, the certification of being installed application software by systematic difference software installation control of authority module, effectively can be prevented the installation of malice, illegal software, improve the security of mobile terminal and the satisfaction of user.
As another embodiment of the present invention, in order to improve the security of system further, described method is further comprising the steps of:
When system cloud gray model, whether the subscriber identification card of Real-Time Monitoring access is transferred to, and when transfering to, locks described system.
embodiment two:
Fig. 4 shows the composition structure of the mobile terminal safety control system that the embodiment of the present invention two provides, and for convenience of explanation, illustrate only the part relevant to the embodiment of the present invention.
This mobile terminal safety control system can be run on the unit that software unit, hardware cell or software and hardware in mobile terminal (such as mobile phone, panel computer etc.) combine.
This mobile terminal safety control system comprises system start unit 41 and system cloud gray model unit 42.Wherein, the concrete function of each unit is as follows:
System start unit 41, for after mobile terminal system starts, locks described system, and whether the subscriber identification card detecting access is effective, when effective, unlocks described system;
System cloud gray model unit 42, for when described system cloud gray model, if what carry out is system flush operation, detects the system image file that whether there is encryption, when existing, being decrypted rear executive system refresh operation to described system image file;
If carry out be system software installation operation, display interface for password input, to input password verify, when being verified, described application software is installed.
Preferably, in order to improve the security of system further, described system cloud gray model unit 42 also comprises monitoring modular 421:
Described monitoring modular 421 is for when described system cloud gray model, and whether the subscriber identification card of Real-Time Monitoring access is transferred to, and when transfering to, locks described system.
Wherein, described system image file is encrypted by encryption personality card on management host; Described password comprises the password of password default and user's setting.
Accordingly, described system cloud gray model unit 42 also comprises detection module 422 and display control module 423:
Whether described detection module 422 arranged password for detecting user;
Described display control module 423 is for when detecting that user arranged password, and display interface for password input, when detecting that user did not arrange password, show the interface for password input of default password prompt text, and reminding user arranges password.
The mobile terminal safety control system that the present embodiment provides can be used in the mobile terminal safety control method of aforementioned correspondence, and details, see the associated description of above-mentioned mobile terminal safety control method embodiment one, do not repeat them here.
In the present embodiment, by the certification to identification card, can effectively prevent disabled user from using mobile terminal system when there is no identification card or identification card lost efficacy; By the certification to system refresh, can effectively prevent disabled user to mobile terminal operating system distort or transplant virus etc. rogue program; By the certification of installing application software, the installation of malice, illegal software effectively can be prevented.In addition, whether the subscriber identification card accessed by Real-Time Monitoring is transferred to, and when transfering to, locking described system, can further improve the security of system.In a word, by above-mentioned method of controlling security, security and the controllability of mobile terminal effectively can be improved.
The foregoing is only preferred embodiment of the present invention, not in order to limit the present invention, all any amendments done within the spirit and principles in the present invention, equivalent replacement and improvement etc., all should be included within protection scope of the present invention.

Claims (7)

1. a method of controlling security for mobile terminal, is characterized in that, described method comprises:
System setting up procedure, after mobile terminal system starts, locks described system, and whether the subscriber identification card detecting access is effective, when effective, unlock described system, described mobile terminal at least comprises one for the identification card interface of access user identification card;
System cloud gray model step, when described system cloud gray model, if when receiving the system refresh instruction of user, boot loader, and detect user and whether select slip-stick artist's pattern, if yes then enter Recovery module, and the system image file that whether there is encryption in Recovery module described in component detection is tested by the For Solutions of Systems school closure in Recovery module, when existing, read described system image file, and described system image file is decrypted, executive system refresh operation after deciphering, wherein, described system image file sends to mobile terminal after being encrypted by encryption personality card on management host,
If what carry out is the installation operation of system software, display interface for password input, verifying to the password of input, when being verified, installing described application software, described password comprises the password that password default and user are arranged.
2. the method for claim 1, is characterized in that, described system cloud gray model step also comprises:
When described system cloud gray model, whether the subscriber identification card of Real-Time Monitoring access is transferred to, and when transfering to, locks described system.
3. the method for claim 1, is characterized in that, described display interface for password input specifically comprises:
Detect user and whether password was set;
If so, interface for password input is shown;
If not, the interface for password input of display default password prompt text, and reminding user arranges password.
4. a safety control system for mobile terminal, is characterized in that, described system comprises:
System start unit, for after mobile terminal system starts, described system is locked, and whether the subscriber identification card detecting access is effective, when effective, unlock described system, described mobile terminal at least comprises one for the identification card interface of access user identification card;
System cloud gray model unit, for when described system cloud gray model, if when receiving the system refresh instruction of user, boot loader, and detect user and whether select slip-stick artist's pattern, if yes then enter Recovery module, and the system image file that whether there is encryption in Recovery module described in component detection is tested by the For Solutions of Systems school closure in Recovery module, when existing, read described system image file, and described system image file is decrypted, executive system refresh operation after deciphering, wherein, described system image file sends to mobile terminal after being encrypted by encryption personality card on management host,
If what carry out is the installation operation of system software, display interface for password input, verifying to the password of input, when being verified, installing described application software, described password comprises the password that password default and user are arranged.
5. system as claimed in claim 4, it is characterized in that, described system cloud gray model unit comprises:
Monitoring modular, for when described system cloud gray model, whether the subscriber identification card of Real-Time Monitoring access is transferred to, and when transfering to, locks described system.
6. system as claimed in claim 4, it is characterized in that, described system cloud gray model unit also comprises:
Whether detection module, arranged password for detecting user;
Display control module, for when detecting that user arranged password, display interface for password input, when detecting that user did not arrange password, the interface for password input of display default password prompt text, and reminding user arranges password.
7. one kind comprises the mobile terminal of mobile terminal safety control system described in any one of claim 4 to 6.
CN201110222535.XA 2011-08-04 2011-08-04 Safety control method and system of mobile terminal Active CN102915415B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110222535.XA CN102915415B (en) 2011-08-04 2011-08-04 Safety control method and system of mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110222535.XA CN102915415B (en) 2011-08-04 2011-08-04 Safety control method and system of mobile terminal

Publications (2)

Publication Number Publication Date
CN102915415A CN102915415A (en) 2013-02-06
CN102915415B true CN102915415B (en) 2015-06-24

Family

ID=47613778

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110222535.XA Active CN102915415B (en) 2011-08-04 2011-08-04 Safety control method and system of mobile terminal

Country Status (1)

Country Link
CN (1) CN102915415B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103139391B (en) * 2013-02-27 2015-01-07 广东欧珀移动通信有限公司 Method and device of permission validating installation or unloading of application program in mobile phone
CN103458403A (en) * 2013-09-18 2013-12-18 北京网秦天下科技有限公司 Mobile terminal and code setting method used for mobile terminal
CN103530553A (en) * 2013-10-22 2014-01-22 山东神思电子技术股份有限公司 Mobile terminal with authorization card and authorization method
CN105631259A (en) * 2015-04-28 2016-06-01 宇龙计算机通信科技(深圳)有限公司 Power-on verification method, power-on verification device and terminal
CN105184142A (en) * 2015-09-09 2015-12-23 北京金山安全软件有限公司 Locking method and device of system switch and mobile terminal
CN105608369B (en) * 2015-10-30 2019-06-25 周奇 The installation method and device of application software
CN107958151A (en) * 2016-10-18 2018-04-24 深圳鼎智通讯股份有限公司 Fingerprint authentication installs the system and its application method with unloading application
CN109584421A (en) * 2018-12-07 2019-04-05 郭瑞东 A kind of intelligent door lock authentication administrative system based on domestic safety chip

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101043327A (en) * 2007-03-16 2007-09-26 中兴通讯股份有限公司 Anti-symmetric algorithmic based mobile terminal security lock network locking card protection and unlocking method
CN101673330A (en) * 2008-09-10 2010-03-17 中国瑞达系统装备公司 BIOS-based computer security protection method and system
CN101984691A (en) * 2010-10-25 2011-03-09 东莞宇龙通信科技有限公司 Upgrading method of system built-in software and mobile terminal
CN102033764A (en) * 2010-11-30 2011-04-27 公安部第三研究所 COS (Class of Service) firmware upgrading method of TF (T-Flash) card
CN102111477A (en) * 2011-02-25 2011-06-29 宇龙计算机通信科技(深圳)有限公司 Method, terminal and smart card for terminal security verification

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102687159A (en) * 2009-10-19 2012-09-19 杉中顺子 Terminal management system and terminal management method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101043327A (en) * 2007-03-16 2007-09-26 中兴通讯股份有限公司 Anti-symmetric algorithmic based mobile terminal security lock network locking card protection and unlocking method
CN101673330A (en) * 2008-09-10 2010-03-17 中国瑞达系统装备公司 BIOS-based computer security protection method and system
CN101984691A (en) * 2010-10-25 2011-03-09 东莞宇龙通信科技有限公司 Upgrading method of system built-in software and mobile terminal
CN102033764A (en) * 2010-11-30 2011-04-27 公安部第三研究所 COS (Class of Service) firmware upgrading method of TF (T-Flash) card
CN102111477A (en) * 2011-02-25 2011-06-29 宇龙计算机通信科技(深圳)有限公司 Method, terminal and smart card for terminal security verification

Also Published As

Publication number Publication date
CN102915415A (en) 2013-02-06

Similar Documents

Publication Publication Date Title
CN102915415B (en) Safety control method and system of mobile terminal
CN111723383B (en) Data storage and verification method and device
CN102508791B (en) Method and device for encrypting hard disk partition
EP2727040B1 (en) A secure hosted execution architecture
US10915656B2 (en) Rollback protection for login security policy
JP6422059B2 (en) Processing device, in-vehicle terminal device, processing device activation method, and processing device activation program
CN102184352A (en) Automatic protecting method for computer system based on Bluetooth device authentication
CN101523399A (en) Methods and systems for modifying an integrity measurement based on user athentication
CN102262599B (en) Trusted root-based portable hard disk fingerprint identification method
US10680814B2 (en) Device key security
CN102833745B (en) Method, communication equipment and communication system that a kind of software security is upgraded
CN107430658A (en) Fail-safe software certification and checking
CN111651748A (en) Safety access processing system and method for ECU in vehicle
CN105308610A (en) Method and system for platform and user application security on a device
KR20130114703A (en) Method and apparatus for managing security state transitions
CN106156607A (en) A kind of SElinux safety access method and POS terminal
CN101477603A (en) Computer security information card based on expanded BIOS technique and operation method thereof
CN102983969B (en) Security login system and security login method for operating system
CN104361298B (en) The method and apparatus of Information Security
CN103838997A (en) Single-chip microcomputer password verification method and device
CN102594815B (en) Before register system, user right is set and performs method, the device of corresponding operating
CN104346299A (en) Updating control method and device of mobile terminal
CN116226942A (en) Permission verification method and device for IC card, card reading equipment and storage medium
Schneider et al. Cyber Security in the Automotive Domain–An Overview
CN107743306B (en) Intelligent POS machine WIFI setting method based on multi-password control and intelligent POS machine

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: 518057 computer building of the Great Wall, Nanshan District science and Technology Park, Shenzhen, Guangdong

Patentee after: China the Great Wall science and technology group Limited by Share Ltd

Address before: 518057 computer building of the Great Wall, Nanshan District science and Technology Park, Shenzhen, Guangdong

Patentee before: China Changcheng Computer Shenzhen Co., Ltd.

CP01 Change in the name or title of a patent holder