CN104978543A - Mobile terminal information safety protection system and method - Google Patents

Mobile terminal information safety protection system and method Download PDF

Info

Publication number
CN104978543A
CN104978543A CN201510401462.9A CN201510401462A CN104978543A CN 104978543 A CN104978543 A CN 104978543A CN 201510401462 A CN201510401462 A CN 201510401462A CN 104978543 A CN104978543 A CN 104978543A
Authority
CN
China
Prior art keywords
file
module
mobile terminal
information
decryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510401462.9A
Other languages
Chinese (zh)
Inventor
黄凯锋
李莉
周岩
王旭辉
孟庆超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201510401462.9A priority Critical patent/CN104978543A/en
Publication of CN104978543A publication Critical patent/CN104978543A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention discloses a mobile terminal information safety protection system and method. The system comprises a monitoring module, a file encryption module, a file decryption module, an information access control module, a file access control module and a log recording module. The system is automatically started along with startup of a mobile terminal system; the monitoring module monitors an operation when the mobile terminal system accesses an information system in real time; the file encryption module carries out encryption processing on a file stored from the information system; the file decryption module carries out the decryption operation on a designated file and opens the file after successfully carrying out decryption; the information access control module implements control on the operation when a mobile terminal accesses the information system; the file access control module implements authority control on the access operation of a decrypted file object; and the log recording module implements log recording on all operations. By applying the mobile terminal information safety protection system and method, encryption protection is provided, protection is comprehensive, expandability is high, safety is high, the system resource occupation rate is high and user experience is good.

Description

A kind of information of mobile terminal security protection system and method
Technical field
The invention belongs to field of information security technology, particularly relate to a kind of information of mobile terminal security protection system and method.
Background technology
Along with the development of IT application in enterprises, enterprise, by building information system, easily for enterprise customer provides a large amount of information datas, is wherein no lack of the information data having enterprise's contract information, corporate client information etc. responsive.When using these information systems, user is by computing machine or intelligent mobile terminal (comprising smart mobile phone and panel computer) access information system, and obtaining information data.Information system in internal system by nusrmgr.cpl, user authority management, can take precautions against the leakage of information; But these information are once arrive user's access terminal (computing machine or intelligent mobile terminal); then no longer be controlled by the protection of information system; such as user obtains the information data be presented on access terminal screen by print screen; user can by legal data unload function; information data is downloaded in access terminal and stores, etc.Therefore the information leakage event caused due to the access of access terminal occurs again and again.For the at present comparative maturity of the information leakage protection on computing machine, but still without preventive means and method effectively on intelligent mobile terminal.
Existing mobile phone safe software, is all realize based on data storage security, for the information leakage problem that visit information system faces, there is following serious loss:
1, cannot manage operation during visit information system.Intelligent mobile terminal is when visit information system, information data is by after Internet Transmission to intelligent mobile terminal, do not store with file mode, but being directly shown on screen by application software, information data obtains by the means such as stickup that copy that now user can carry out such as screen copy, content.
2, the data file downloaded from information system or derive only being encrypted, can effectively preventing because losing the information leakage caused.But, because cannot rights management in mating information system, effectively can not limit the rights of using of download person, the information leakage using and cause of going beyond one's commission of download person may be caused.
Summary of the invention
The object of the present invention is to provide a kind of information of mobile terminal security protection system and method, when being intended to apply on mobile terminals based on Enterprise Informatization system, by encryption and decryption technology and access control technology, the protection to information data in information system can be realized, to avoid the possible problem of being carried out information leakage by mobile terminal.
The present invention is achieved in that a kind of information of mobile terminal security protection system, and described information of mobile terminal security protection system operates on Mobile operating system, provides safeguard protection for during visit information system on mobile terminals; Specifically comprise:
Monitoring module, for monitoring operation during mobile terminal system visit information system in real time, and sends instruction according to action type to the file encryption module of lower floor, file decryption module or message reference control module;
File encryption module, be connected with described monitoring module, for after the instruction receiving monitoring module or the transmission of file access control module, the file preserving out is encrypted, and notifies that file encryption is preserved operation note in journal file by logger module from infosystem;
File decryption module, is connected with described monitoring module, according to the instruction that described monitoring module transmits, to the file decryption operation of specifying in instruction, successful decryption after opening file, circular document access control module, and notify that decryption oprerations is recorded in journal file by logger module;
Message reference control module is positioned at the inner nuclear layer of Mobile operating system, be connected with described monitoring module, by receiving the instruction transmitted from described monitoring module, realize controlling operation during mobile terminal accessing infosystem, and logger module will be notified by operation note in journal file;
File access control module is positioned at the inner nuclear layer of Mobile operating system, be connected with described monitoring module, by receiving the instruction transmitted from described file decryption module, the accessing operation realizing the file object after to deciphering carries out control of authority, when monitoring file close operation, fileinfo is informed to file encryption module by file access control module, and is recorded in journal file by notice logger module by the accessing operation of file object;
Logger module, with described file encryption module, file decryption module, message reference control module and file access control model calling, according to the instruction that described file encryption module, file decryption module, file access control module and message reference control module are sent, realize carrying out log recording to all operations.
Further, be provided with and prevent cracking system in described logger module, this prevents that cracking system comprises: cloud database, cloud server, mobile terminal, security strategy setting module;
Cloud database is connected with described cloud server, and mobile terminal is by wireless network and cloud server is two-way carries out message exchange, and security strategy setting module is connected with mobile terminal; Data, instruction are passed to security strategy setting module by mobile terminal, and the state of security strategy setting module are reported; Described cloud database comprises: subscriber information storing module, user key memory module, journal file memory module, subscriber information storing module, and cloud database has oneself protection system and privacy guard system completely; Described security strategy setting module comprises: file access module, file access logger module and dynamic encryption and decryption module; The instruction that security strategy setting module can transmit according to mobile terminal, setting security strategy; And according to the description of security strategy, send instruction to file access module, file access logger module and dynamic encryption and decryption module; And the state of inquiry file access modules, file access logger module and dynamic encryption and decryption module report mobile terminal.
Further, the instruction that described file access module is sent by receiving security strategy setting module, realizes carrying out control of authority to the accessing operation of mobile terminal file object; The instruction that file access logger module is sent by receiving security strategy setting module, realizes carrying out record to all operations of file; Dynamic encryption and decryption module is positioned at the inner nuclear layer of Mobile operating system, by receiving the instruction that security strategy setting module is sent, automatically realizes the encryption and decryption process to file.
In described mobile terminal use procedure, user is when using application program, and the MD5 value that running of mobile terminal correlation module calculates this program submits to cloud server to compare, and contrast successful user normally uses, contrast and unsuccessfully cannot use this program, prevent application program from being distorted by virus.
Another object of the present invention is to provide a kind of anti-means of defence cracking system, this anti-crack method comprises the following steps:
Step one: dynamic encryption and decryption module realizes automatic encryption and decryption and comprises when valid application program reads encrypted data, and dynamic encryption and decryption module is decrypted operation, valid application program then can normal usage data;
Step 2: when valid application program carries out write operation to file, dynamic encryption and decryption module is encrypted operation, the file that valid application program is preserved is the file after encryption;
Step 3: when unauthorized applications reads encrypted data, dynamic encryption and decryption module is not decrypted operation, unauthorized applications then cannot normal usage data;
Step 4: when unauthorized applications carries out write operation to file, dynamic encryption and decryption module does not carry out encryption and decryption operation.
Further, this information of mobile terminal security protection system starts automatically along with when mobile terminal system starts.
Further, this system starts automatically along with when mobile terminal system starts.
Further, the action type that monitoring module is monitored in real time comprises: preserve file operation, open file operation, copy paste operation, screen copy operation and printing.When preserving file operation and occurring, monitoring module is by circular document encrypting module; When copying paste operation, screen copy operation and printing and occurring, monitoring module is by announcement information access control module; When accessing the file that this system is encrypted, monitoring module is by circular document deciphering module.
Further, the operation that message reference control module controls comprises carries out print screen, content replication stickup, dump operation to the information data had access to.
Further, the accessing operation that file access control module controls comprises the opening of file object, creates, deletes, renames, copies, moves, preserves, setup of attribute operation.
Further, file access control module to file carry out control of authority comprise read-only, hide, forbid deleting, forbid opening, forbid copying, forbid that unauthorized applications accesses one by file that valid application program is opened.
Another object of the present invention is to provide a kind of information of mobile terminal safety protective method, described information of mobile terminal safety protective method comprises:
Preservation file operation during monitoring mobile terminal system visit information system, copy paste operation, screen copy operation and printing, when preserving file operation and occurring, operation will be encrypted to file, and recording of encrypted daily record;
When copying paste operation, screen copy operation and printing and occurring, operation during mobile terminal accessing infosystem is controlled, and by operation note in journal file;
In the terminal, when being opened by the file of system encryption, opening operation will be monitored, and encrypt file is deciphered by circular document deciphering module; At successful decryption and after opening file, protect the file be opened, and record deciphering daily record;
According to the instruction transmitted, all operations of real time monitoring file, and carry out log recording; When monitoring file close operation, operation will be encrypted to file.
The advantage that the present invention has and good effect are: this information of mobile terminal security protection system and method, can from the safety of three aspects protection when intelligent mobile terminal visit information system.
1. operation during pair visit information system manages and controls.Prevent that user from carrying out print screen, the information data browsed copies the operations such as stickup.
2. pair data file downloaded from information system or derive carries out automatic encryption.
3. pair data file downloaded from information system or derive, carries out rights management in use.To the rights management of user in inherited information system, the information leakage that prevent user from abusing, go beyond one's commission etc. is caused.
Accompanying drawing explanation
Fig. 1 is the information of mobile terminal security protection system structural representation that the embodiment of the present invention provides;
Fig. 2 is that anti-that the embodiment of the present invention provides cracks system architecture schematic diagram;
Fig. 3 is the information of mobile terminal safety protective method flow diagram that the embodiment of the present invention provides;
Fig. 4 is the anti-crack method process flow diagram that the embodiment of the present invention provides.
In figure: 1, monitoring module; 2, message reference control module; 3, file encryption module; 4, file decryption module; 5, file access control module; 6, logger module; 6-1, cloud database; 6-2, cloud server; 6-3, mobile terminal; 6-4, security strategy setting module.
Embodiment
In order to make object of the present invention, technical scheme and advantage clearly understand, below in conjunction with embodiment, the present invention is further elaborated.Should be appreciated that specific embodiment described herein only in order to explain the present invention, be not intended to limit the present invention.
Below in conjunction with drawings and the specific embodiments, application principle of the present invention is further described, as described in accompanying drawing 1 to accompanying drawing 4,
Information of mobile terminal safety protective method comprises:
S101: preservation file operation during monitoring mobile terminal system visit information system, copy paste operation, screen copy operation and printing, when preserving file operation and occurring, will be encrypted operation to file, and recording of encrypted daily record;
S102: when copying paste operation, screen copy operation and printing and occurring, operation during mobile terminal 6-3 visit information system is controlled, and by operation note in journal file;
S103: in mobile terminal 6-3, when being opened by the file of system encryption, opening operation will be monitored, and encrypt file is deciphered by circular document deciphering module 4; At successful decryption and after opening file, protect the file be opened, and record deciphering daily record;
S104: according to the instruction transmitted, all operations of real time monitoring file, and carry out log recording; When monitoring file close operation, operation will be encrypted to file.
For Anroid smart mobile phone, application of the present invention is described.
Android system is divided into four level: Applications (application layer), Application
Frameworks (application framework layer), Libraries and Android Runtime (class libraries and real time execution storehouse layer), Linux Kernel (Linux inner core).
1, Applications (application layer)
Android, by prepackage one group of core application, comprises email client, short message service, calendar schedule, Map Services, browser, contact person and other application programs.All application programs are all that Java programming language is write.
2, Application Frameworks (application framework layer)
The original intention of this layer of Anroid system is: the multiplexing mechanism of simplified assembly; Any application can issue oneself function, and these functions can be used by any other application again (certainly will by the constraint from the pressure safety standard of framework).Identical with multiplexing mechanism, framework allows the replacing of assembly.
3, Libraries and Android Runtime (class libraries and real time execution storehouse layer)
Android comprises a set of C/C++ storehouse, and the various components of android system is all in use.These functions pass through Android application framework to developer.
Monitoring module 1 of the present invention, file encryption module 3, file decryption module 4, message reference control module 2, file access control module 5 and logger module 6 are all positioned at this layer.
Monitoring module 1, message reference control module 2, file access control module 5 and file access logger module 6 all adopt Hook system call mode, by change operating system workflow, realize the access control to file and log recording.
The system call of the concrete Hook operating system of message reference control module 2, file access control module 5 and file access logger module 6: Open, Read, Write, Delete and Move, file access control module 5 whether allows file access operation to continue by Logic judgment or blocking system calls, and file access logger module 6 carries out log recording when allowing file access operation.The method that message reference control module 2, file access control module 5 and file access logger module 6 link up with son adopts ripe kernelinline hook technology, namely jump in new kernel function by instructions such as write jmp or push ret, thus the function reaching amendment or filter.
File encryption module 3 and file decryption module 4, as system component, provide called interface in the mode of dynamic link libraries, call for other module.
4, Linux Kernel (Linux inner core)
Android relies on Linux 2.6 editions, provides core system service: safety, memory management, management of process, group of networks, driving model.Kernel portion is also equivalent to an abstraction hierarchy in hardware layer and system between other software groups.
Anti-crack method comprises the following steps:
S201: dynamic encryption and decryption module realizes automatic encryption and decryption and comprises when valid application program reads encrypted data, and dynamic encryption and decryption module is decrypted operation, valid application program then can normal usage data;
S202: when valid application program carries out write operation to file, dynamic encryption and decryption module is encrypted operation, the file that valid application program is preserved is the file after encryption;
S203: when unauthorized applications reads encrypted data, dynamic encryption and decryption module is not decrypted operation, unauthorized applications then cannot normal usage data;
S204: when unauthorized applications carries out write operation to file, dynamic encryption and decryption module does not carry out encryption and decryption operation.
Mobile terminal 6-3 Information Security Defending System, instruction is distributed to mobile terminal 6-3 by cloud server 6-2, transmit the instruction and data of safeguard protection, the instruction of safeguard protection can be passed to security strategy setting module 6-4 by mobile terminal 6-3, in mobile terminal 6-3 use procedure, user is when using application program, the MD5 value that mobile terminal 6-3 operation correlation module calculates this program submits to cloud server 6-2 to contrast, contrast successful user normally uses, contrast and unsuccessfully cannot use this program, prevent application program from being distorted by virus, security strategy setting module 6-4 can by the description of security strategy, to file access module, dynamic encryption and decryption module and file access logger module 6 send instruction, file access module after the instruction receiving security strategy setting module 6-4, according to the requirement of security strategy, all operations of real time monitoring mobile terminal 6-3 files object, and controlling, file access logger module 6 after the instruction receiving security strategy setting module 6-4, according to the requirement of security strategy, all operations of real time monitoring mobile terminal 6-3 files object, and carry out log recording, dynamic encryption and decryption module after the instruction receiving security strategy setting module 6-4, according to the requirement of security strategy, the read-write operation of real time monitoring mobile terminal 6-3 files object, and carry out encryption and decryption operation.If later stage user needs to install related software voluntarily, need be asked to cloud server 6-2 by mobile terminal 6-3 in a pre-installation, by cloud server 6-2 according in cloud database 6-1 to should the related data of software contrast, could install after legal, not conform to rule refusal and install.
The foregoing is only preferred embodiment of the present invention, not in order to limit the present invention, all any amendments done within the spirit and principles in the present invention, equivalent replacement and improvement etc., all should be included within protection scope of the present invention.

Claims (9)

1. an information of mobile terminal security protection system, is characterized in that, described information of mobile terminal security protection system operates on Mobile operating system, provides safeguard protection for during visit information on mobile terminals; Specifically comprise:
Monitoring module, for monitoring operation during mobile terminal system visit information system in real time, and sends instruction according to action type to the file encryption module of lower floor, file decryption module or message reference control module;
File encryption module, be connected with described monitoring module, for after the instruction receiving monitoring module or the transmission of file access control module, the file preserving out is encrypted, and notifies that file encryption is preserved operation note in journal file by logger module from infosystem;
File decryption module, is connected with described monitoring module, according to the instruction that described monitoring module transmits, to the file decryption operation of specifying in instruction, successful decryption after opening file, circular document access control module, and notify that decryption oprerations is recorded in journal file by logger module;
Message reference control module is positioned at the inner nuclear layer of Mobile operating system, be connected with described monitoring module, by receiving the instruction transmitted from described monitoring module, realize controlling operation during mobile terminal accessing infosystem, and logger module will be notified by operation note in journal file;
File access control module is positioned at the inner nuclear layer of Mobile operating system, be connected with described monitoring module, by receiving the instruction transmitted from described file decryption module, the accessing operation realizing the file object after to deciphering carries out control of authority, when monitoring file close operation, fileinfo is informed to file encryption module by file access control module, and is recorded in journal file by notice logger module by the accessing operation of file object;
Logger module, with described file encryption module, file decryption module, message reference control module and file access control model calling, according to the instruction that described file encryption module, file decryption module, file access control module and message reference control module are sent, realize carrying out log recording to all operations.
2. information of mobile terminal security protection system as claimed in claim 1, it is characterized in that, be provided with in described logger module and prevent cracking system, this prevents that cracking system comprises: cloud database, cloud server, mobile terminal, security strategy setting module;
Cloud database is connected with described cloud server, and mobile terminal is by wireless network and cloud server is two-way carries out message exchange, and security strategy setting module is connected with mobile terminal; Data, instruction are passed to security strategy setting module by mobile terminal, and the state of security strategy setting module are reported; Described cloud database comprises: subscriber information storing module, user key memory module, journal file memory module, subscriber information storing module, and cloud database has oneself protection system and privacy guard system completely; Described security strategy setting module comprises: file access module, file access logger module and dynamic encryption and decryption module; The instruction that security strategy setting module can transmit according to mobile terminal, setting security strategy; And according to the description of security strategy, send instruction to file access module, file access logger module and dynamic encryption and decryption module; And the state of inquiry file access modules, file access logger module and dynamic encryption and decryption module report mobile terminal.
3. information of mobile terminal security protection system as claimed in claim 2, is characterized in that, the instruction that described file access module is sent by receiving security strategy setting module realizes carrying out control of authority to the accessing operation of mobile terminal file object; The instruction that file access logger module is sent by receiving security strategy setting module, realizes carrying out record to all operations of file; Dynamic encryption and decryption module is positioned at the inner nuclear layer of Mobile operating system, by receiving the instruction that security strategy setting module is sent, automatically realizes the encryption and decryption process to file.
4. information of mobile terminal security protection system as claimed in claim 2, it is characterized in that, in described mobile terminal use procedure, user is when using application program, the MD5 value that running of mobile terminal correlation module calculates this program submits to cloud server to compare, contrast successful user normally uses, and contrasts and unsuccessfully cannot use this program, prevent application program from being distorted by virus.
5. information of mobile terminal security protection system as claimed in claim 2, it is characterized in that, the described anti-anti-crack method cracking system comprises the following steps:
Step one: dynamic encryption and decryption module realizes automatic encryption and decryption and comprises when valid application program reads encrypted data, and dynamic encryption and decryption module is decrypted operation, valid application program then can normal usage data;
Step 2: when valid application program carries out write operation to file, dynamic encryption and decryption module is encrypted operation, the file that valid application program is preserved is the file after encryption;
Step 3: when unauthorized applications reads encrypted data, dynamic encryption and decryption module is not decrypted operation, unauthorized applications then cannot normal usage data;
Step 4: when unauthorized applications carries out write operation to file, dynamic encryption and decryption module does not carry out encryption and decryption operation.
6. information of mobile terminal security protection system as claimed in claim 1, it is characterized in that, this information of mobile terminal security protection system starts automatically along with when mobile terminal system starts.
7. information of mobile terminal security protection system as claimed in claim 1, is characterized in that, the action type that monitoring module carries out monitoring in real time comprises: preserve file operation, open file operation, copy paste operation, screen copy operation and printing; When preserving file operation and occurring, monitoring module is by circular document encrypting module; When copying paste operation, screen copy operation and printing and occurring, monitoring module is by announcement information access control module; When accessing the file that this system is encrypted, monitoring module is by circular document deciphering module.
8. information of mobile terminal security protection system as claimed in claim 1, is characterized in that, the operation that described message reference control module controls comprises carries out print screen, content replication stickup, dump operation to the information data had access to; The accessing operation that described file access control module controls comprises the opening of file object, creates, deletes, renames, copies, moves, preserves, setup of attribute operation; Described file access control module to file carry out control of authority comprise read-only, hide, forbid deleting, forbid opening, forbid copying, forbid that unauthorized applications accesses one by file that valid application program is opened.
9. an information of mobile terminal safety protective method, is characterized in that, changes information of mobile terminal safety protective method and comprises:
Step one: preservation file operation during monitoring mobile terminal system visit information system, copy paste operation, screen copy operation and printing, when preserving file operation and occurring, will be encrypted operation to file, and recording of encrypted daily record;
Step 2: when copying paste operation, screen copy operation and printing and occurring, operation during mobile terminal accessing infosystem is controlled, and by operation note in journal file;
Step 3: in the terminal, when being opened by the file of system encryption, opening operation will be monitored, and encrypt file is deciphered by circular document deciphering module; At successful decryption and after opening file, protect the file be opened, and record deciphering daily record;
Step 4: according to the instruction transmitted, all operations of real time monitoring file, and carry out log recording; When monitoring file close operation, operation will be encrypted to file.
CN201510401462.9A 2015-07-09 2015-07-09 Mobile terminal information safety protection system and method Pending CN104978543A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510401462.9A CN104978543A (en) 2015-07-09 2015-07-09 Mobile terminal information safety protection system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510401462.9A CN104978543A (en) 2015-07-09 2015-07-09 Mobile terminal information safety protection system and method

Publications (1)

Publication Number Publication Date
CN104978543A true CN104978543A (en) 2015-10-14

Family

ID=54275033

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510401462.9A Pending CN104978543A (en) 2015-07-09 2015-07-09 Mobile terminal information safety protection system and method

Country Status (1)

Country Link
CN (1) CN104978543A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105631357A (en) * 2015-12-22 2016-06-01 洛阳师范学院 System and method for protecting information security of mobile terminals
CN106919479A (en) * 2015-12-24 2017-07-04 北京谊安医疗系统股份有限公司 A kind of real-time logs recording method of embedded device controller
CN107563187A (en) * 2017-08-30 2018-01-09 广东欧珀移动通信有限公司 Access operation monitoring method, device, mobile terminal and readable storage medium storing program for executing
CN109104392A (en) * 2017-06-21 2018-12-28 杨树桃 A kind of safe Wallet System of block chain
CN109241783A (en) * 2018-08-14 2019-01-18 中国科学院信息工程研究所 Mobile terminal manages implementation of strategies method and device
CN114124680A (en) * 2021-09-24 2022-03-01 绿盟科技集团股份有限公司 File access control alarm log management method and device
CN116861469A (en) * 2023-09-05 2023-10-10 河北比穆建筑科技有限公司 Encryption method, system, terminal and storage medium of revit file

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102254124A (en) * 2011-07-21 2011-11-23 周亮 Information security protecting system and method of mobile terminal
CN103632107A (en) * 2012-08-23 2014-03-12 苏州慧盾信息安全科技有限公司 Mobile terminal information safety protection system and method
CN103716354A (en) * 2012-10-09 2014-04-09 苏州慧盾信息安全科技有限公司 Security protection system and method for information system
CN104462998A (en) * 2014-12-09 2015-03-25 天津光电安辰信息技术有限公司 Domestic commercial cryptography algorithm based cloud storage encryption system and implementation method thereof
CN104680079A (en) * 2015-02-04 2015-06-03 上海信息安全工程技术研究中心 Electronic document security management system and electronic document security management method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102254124A (en) * 2011-07-21 2011-11-23 周亮 Information security protecting system and method of mobile terminal
CN103632107A (en) * 2012-08-23 2014-03-12 苏州慧盾信息安全科技有限公司 Mobile terminal information safety protection system and method
CN103716354A (en) * 2012-10-09 2014-04-09 苏州慧盾信息安全科技有限公司 Security protection system and method for information system
CN104462998A (en) * 2014-12-09 2015-03-25 天津光电安辰信息技术有限公司 Domestic commercial cryptography algorithm based cloud storage encryption system and implementation method thereof
CN104680079A (en) * 2015-02-04 2015-06-03 上海信息安全工程技术研究中心 Electronic document security management system and electronic document security management method

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105631357A (en) * 2015-12-22 2016-06-01 洛阳师范学院 System and method for protecting information security of mobile terminals
CN106919479A (en) * 2015-12-24 2017-07-04 北京谊安医疗系统股份有限公司 A kind of real-time logs recording method of embedded device controller
CN106919479B (en) * 2015-12-24 2020-04-24 北京谊安医疗系统股份有限公司 Real-time log recording method of embedded device controller
CN109104392A (en) * 2017-06-21 2018-12-28 杨树桃 A kind of safe Wallet System of block chain
CN107563187A (en) * 2017-08-30 2018-01-09 广东欧珀移动通信有限公司 Access operation monitoring method, device, mobile terminal and readable storage medium storing program for executing
CN109241783A (en) * 2018-08-14 2019-01-18 中国科学院信息工程研究所 Mobile terminal manages implementation of strategies method and device
CN114124680A (en) * 2021-09-24 2022-03-01 绿盟科技集团股份有限公司 File access control alarm log management method and device
CN114124680B (en) * 2021-09-24 2023-11-17 绿盟科技集团股份有限公司 File access control alarm log management method and device
CN116861469A (en) * 2023-09-05 2023-10-10 河北比穆建筑科技有限公司 Encryption method, system, terminal and storage medium of revit file
CN116861469B (en) * 2023-09-05 2023-12-12 河北比穆建筑科技有限公司 Encryption method, system, terminal and storage medium of revit file

Similar Documents

Publication Publication Date Title
US11057355B2 (en) Protecting documents using policies and encryption
CN104978543A (en) Mobile terminal information safety protection system and method
US8549656B2 (en) Securing and managing apps on a device
US20150081644A1 (en) Method and system for backing up and restoring a virtual file system
CN103632107B (en) A kind of information of mobile terminal security protection system and method
US9147084B2 (en) Method and system for isolating secure communication events from a non-secure application
US20140096230A1 (en) Method and system for sharing vpn connections between applications
CN103548320A (en) Secure execution of unsecured apps on a device
US9633214B2 (en) Self-removal of enterprise app data
CN103716354A (en) Security protection system and method for information system
WO2020225604A1 (en) Method and devices for enabling data governance using policies triggered by metadata in multi-cloud environments
US20140281499A1 (en) Method and system for enabling communications between unrelated applications
CN103763313A (en) File protection method and system
CN103647784A (en) Public and private isolation method and device
CN104462997A (en) Method, device and system for protecting work data in mobile terminal
CN105528553A (en) A method and a device for secure sharing of data and a terminal
CN110807191B (en) Safe operation method and device of application program
CN105631357A (en) System and method for protecting information security of mobile terminals
GB2555569B (en) Enhanced computer objects security
JP2005038124A (en) File access control method and control system
JP5835022B2 (en) Distribution apparatus, distribution processing method and program, information processing apparatus, information processing method and program
CN110162946B (en) Mobile storage management and control method and device
Sugumar et al. Data security in public cloud storage environment
JP2006139475A (en) Secret information protection system for existing application

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
DD01 Delivery of document by public notice

Addressee: Huang Kaifeng

Document name: Notification of Passing Examination on Formalities

RJ01 Rejection of invention patent application after publication

Application publication date: 20151014

RJ01 Rejection of invention patent application after publication