CN104978543A - Mobile terminal information safety protection system and method - Google Patents
Mobile terminal information safety protection system and method Download PDFInfo
- Publication number
- CN104978543A CN104978543A CN201510401462.9A CN201510401462A CN104978543A CN 104978543 A CN104978543 A CN 104978543A CN 201510401462 A CN201510401462 A CN 201510401462A CN 104978543 A CN104978543 A CN 104978543A
- Authority
- CN
- China
- Prior art keywords
- file
- module
- mobile terminal
- information
- decryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Abstract
The present invention discloses a mobile terminal information safety protection system and method. The system comprises a monitoring module, a file encryption module, a file decryption module, an information access control module, a file access control module and a log recording module. The system is automatically started along with startup of a mobile terminal system; the monitoring module monitors an operation when the mobile terminal system accesses an information system in real time; the file encryption module carries out encryption processing on a file stored from the information system; the file decryption module carries out the decryption operation on a designated file and opens the file after successfully carrying out decryption; the information access control module implements control on the operation when a mobile terminal accesses the information system; the file access control module implements authority control on the access operation of a decrypted file object; and the log recording module implements log recording on all operations. By applying the mobile terminal information safety protection system and method, encryption protection is provided, protection is comprehensive, expandability is high, safety is high, the system resource occupation rate is high and user experience is good.
Description
Technical field
The invention belongs to field of information security technology, particularly relate to a kind of information of mobile terminal security protection system and method.
Background technology
Along with the development of IT application in enterprises, enterprise, by building information system, easily for enterprise customer provides a large amount of information datas, is wherein no lack of the information data having enterprise's contract information, corporate client information etc. responsive.When using these information systems, user is by computing machine or intelligent mobile terminal (comprising smart mobile phone and panel computer) access information system, and obtaining information data.Information system in internal system by nusrmgr.cpl, user authority management, can take precautions against the leakage of information; But these information are once arrive user's access terminal (computing machine or intelligent mobile terminal); then no longer be controlled by the protection of information system; such as user obtains the information data be presented on access terminal screen by print screen; user can by legal data unload function; information data is downloaded in access terminal and stores, etc.Therefore the information leakage event caused due to the access of access terminal occurs again and again.For the at present comparative maturity of the information leakage protection on computing machine, but still without preventive means and method effectively on intelligent mobile terminal.
Existing mobile phone safe software, is all realize based on data storage security, for the information leakage problem that visit information system faces, there is following serious loss:
1, cannot manage operation during visit information system.Intelligent mobile terminal is when visit information system, information data is by after Internet Transmission to intelligent mobile terminal, do not store with file mode, but being directly shown on screen by application software, information data obtains by the means such as stickup that copy that now user can carry out such as screen copy, content.
2, the data file downloaded from information system or derive only being encrypted, can effectively preventing because losing the information leakage caused.But, because cannot rights management in mating information system, effectively can not limit the rights of using of download person, the information leakage using and cause of going beyond one's commission of download person may be caused.
Summary of the invention
The object of the present invention is to provide a kind of information of mobile terminal security protection system and method, when being intended to apply on mobile terminals based on Enterprise Informatization system, by encryption and decryption technology and access control technology, the protection to information data in information system can be realized, to avoid the possible problem of being carried out information leakage by mobile terminal.
The present invention is achieved in that a kind of information of mobile terminal security protection system, and described information of mobile terminal security protection system operates on Mobile operating system, provides safeguard protection for during visit information system on mobile terminals; Specifically comprise:
Monitoring module, for monitoring operation during mobile terminal system visit information system in real time, and sends instruction according to action type to the file encryption module of lower floor, file decryption module or message reference control module;
File encryption module, be connected with described monitoring module, for after the instruction receiving monitoring module or the transmission of file access control module, the file preserving out is encrypted, and notifies that file encryption is preserved operation note in journal file by logger module from infosystem;
File decryption module, is connected with described monitoring module, according to the instruction that described monitoring module transmits, to the file decryption operation of specifying in instruction, successful decryption after opening file, circular document access control module, and notify that decryption oprerations is recorded in journal file by logger module;
Message reference control module is positioned at the inner nuclear layer of Mobile operating system, be connected with described monitoring module, by receiving the instruction transmitted from described monitoring module, realize controlling operation during mobile terminal accessing infosystem, and logger module will be notified by operation note in journal file;
File access control module is positioned at the inner nuclear layer of Mobile operating system, be connected with described monitoring module, by receiving the instruction transmitted from described file decryption module, the accessing operation realizing the file object after to deciphering carries out control of authority, when monitoring file close operation, fileinfo is informed to file encryption module by file access control module, and is recorded in journal file by notice logger module by the accessing operation of file object;
Logger module, with described file encryption module, file decryption module, message reference control module and file access control model calling, according to the instruction that described file encryption module, file decryption module, file access control module and message reference control module are sent, realize carrying out log recording to all operations.
Further, be provided with and prevent cracking system in described logger module, this prevents that cracking system comprises: cloud database, cloud server, mobile terminal, security strategy setting module;
Cloud database is connected with described cloud server, and mobile terminal is by wireless network and cloud server is two-way carries out message exchange, and security strategy setting module is connected with mobile terminal; Data, instruction are passed to security strategy setting module by mobile terminal, and the state of security strategy setting module are reported; Described cloud database comprises: subscriber information storing module, user key memory module, journal file memory module, subscriber information storing module, and cloud database has oneself protection system and privacy guard system completely; Described security strategy setting module comprises: file access module, file access logger module and dynamic encryption and decryption module; The instruction that security strategy setting module can transmit according to mobile terminal, setting security strategy; And according to the description of security strategy, send instruction to file access module, file access logger module and dynamic encryption and decryption module; And the state of inquiry file access modules, file access logger module and dynamic encryption and decryption module report mobile terminal.
Further, the instruction that described file access module is sent by receiving security strategy setting module, realizes carrying out control of authority to the accessing operation of mobile terminal file object; The instruction that file access logger module is sent by receiving security strategy setting module, realizes carrying out record to all operations of file; Dynamic encryption and decryption module is positioned at the inner nuclear layer of Mobile operating system, by receiving the instruction that security strategy setting module is sent, automatically realizes the encryption and decryption process to file.
In described mobile terminal use procedure, user is when using application program, and the MD5 value that running of mobile terminal correlation module calculates this program submits to cloud server to compare, and contrast successful user normally uses, contrast and unsuccessfully cannot use this program, prevent application program from being distorted by virus.
Another object of the present invention is to provide a kind of anti-means of defence cracking system, this anti-crack method comprises the following steps:
Step one: dynamic encryption and decryption module realizes automatic encryption and decryption and comprises when valid application program reads encrypted data, and dynamic encryption and decryption module is decrypted operation, valid application program then can normal usage data;
Step 2: when valid application program carries out write operation to file, dynamic encryption and decryption module is encrypted operation, the file that valid application program is preserved is the file after encryption;
Step 3: when unauthorized applications reads encrypted data, dynamic encryption and decryption module is not decrypted operation, unauthorized applications then cannot normal usage data;
Step 4: when unauthorized applications carries out write operation to file, dynamic encryption and decryption module does not carry out encryption and decryption operation.
Further, this information of mobile terminal security protection system starts automatically along with when mobile terminal system starts.
Further, this system starts automatically along with when mobile terminal system starts.
Further, the action type that monitoring module is monitored in real time comprises: preserve file operation, open file operation, copy paste operation, screen copy operation and printing.When preserving file operation and occurring, monitoring module is by circular document encrypting module; When copying paste operation, screen copy operation and printing and occurring, monitoring module is by announcement information access control module; When accessing the file that this system is encrypted, monitoring module is by circular document deciphering module.
Further, the operation that message reference control module controls comprises carries out print screen, content replication stickup, dump operation to the information data had access to.
Further, the accessing operation that file access control module controls comprises the opening of file object, creates, deletes, renames, copies, moves, preserves, setup of attribute operation.
Further, file access control module to file carry out control of authority comprise read-only, hide, forbid deleting, forbid opening, forbid copying, forbid that unauthorized applications accesses one by file that valid application program is opened.
Another object of the present invention is to provide a kind of information of mobile terminal safety protective method, described information of mobile terminal safety protective method comprises:
Preservation file operation during monitoring mobile terminal system visit information system, copy paste operation, screen copy operation and printing, when preserving file operation and occurring, operation will be encrypted to file, and recording of encrypted daily record;
When copying paste operation, screen copy operation and printing and occurring, operation during mobile terminal accessing infosystem is controlled, and by operation note in journal file;
In the terminal, when being opened by the file of system encryption, opening operation will be monitored, and encrypt file is deciphered by circular document deciphering module; At successful decryption and after opening file, protect the file be opened, and record deciphering daily record;
According to the instruction transmitted, all operations of real time monitoring file, and carry out log recording; When monitoring file close operation, operation will be encrypted to file.
The advantage that the present invention has and good effect are: this information of mobile terminal security protection system and method, can from the safety of three aspects protection when intelligent mobile terminal visit information system.
1. operation during pair visit information system manages and controls.Prevent that user from carrying out print screen, the information data browsed copies the operations such as stickup.
2. pair data file downloaded from information system or derive carries out automatic encryption.
3. pair data file downloaded from information system or derive, carries out rights management in use.To the rights management of user in inherited information system, the information leakage that prevent user from abusing, go beyond one's commission etc. is caused.
Accompanying drawing explanation
Fig. 1 is the information of mobile terminal security protection system structural representation that the embodiment of the present invention provides;
Fig. 2 is that anti-that the embodiment of the present invention provides cracks system architecture schematic diagram;
Fig. 3 is the information of mobile terminal safety protective method flow diagram that the embodiment of the present invention provides;
Fig. 4 is the anti-crack method process flow diagram that the embodiment of the present invention provides.
In figure: 1, monitoring module; 2, message reference control module; 3, file encryption module; 4, file decryption module; 5, file access control module; 6, logger module; 6-1, cloud database; 6-2, cloud server; 6-3, mobile terminal; 6-4, security strategy setting module.
Embodiment
In order to make object of the present invention, technical scheme and advantage clearly understand, below in conjunction with embodiment, the present invention is further elaborated.Should be appreciated that specific embodiment described herein only in order to explain the present invention, be not intended to limit the present invention.
Below in conjunction with drawings and the specific embodiments, application principle of the present invention is further described, as described in accompanying drawing 1 to accompanying drawing 4,
Information of mobile terminal safety protective method comprises:
S101: preservation file operation during monitoring mobile terminal system visit information system, copy paste operation, screen copy operation and printing, when preserving file operation and occurring, will be encrypted operation to file, and recording of encrypted daily record;
S102: when copying paste operation, screen copy operation and printing and occurring, operation during mobile terminal 6-3 visit information system is controlled, and by operation note in journal file;
S103: in mobile terminal 6-3, when being opened by the file of system encryption, opening operation will be monitored, and encrypt file is deciphered by circular document deciphering module 4; At successful decryption and after opening file, protect the file be opened, and record deciphering daily record;
S104: according to the instruction transmitted, all operations of real time monitoring file, and carry out log recording; When monitoring file close operation, operation will be encrypted to file.
For Anroid smart mobile phone, application of the present invention is described.
Android system is divided into four level: Applications (application layer), Application
Frameworks (application framework layer), Libraries and Android Runtime (class libraries and real time execution storehouse layer), Linux Kernel (Linux inner core).
1, Applications (application layer)
Android, by prepackage one group of core application, comprises email client, short message service, calendar schedule, Map Services, browser, contact person and other application programs.All application programs are all that Java programming language is write.
2, Application Frameworks (application framework layer)
The original intention of this layer of Anroid system is: the multiplexing mechanism of simplified assembly; Any application can issue oneself function, and these functions can be used by any other application again (certainly will by the constraint from the pressure safety standard of framework).Identical with multiplexing mechanism, framework allows the replacing of assembly.
3, Libraries and Android Runtime (class libraries and real time execution storehouse layer)
Android comprises a set of C/C++ storehouse, and the various components of android system is all in use.These functions pass through Android application framework to developer.
Monitoring module 1 of the present invention, file encryption module 3, file decryption module 4, message reference control module 2, file access control module 5 and logger module 6 are all positioned at this layer.
Monitoring module 1, message reference control module 2, file access control module 5 and file access logger module 6 all adopt Hook system call mode, by change operating system workflow, realize the access control to file and log recording.
The system call of the concrete Hook operating system of message reference control module 2, file access control module 5 and file access logger module 6: Open, Read, Write, Delete and Move, file access control module 5 whether allows file access operation to continue by Logic judgment or blocking system calls, and file access logger module 6 carries out log recording when allowing file access operation.The method that message reference control module 2, file access control module 5 and file access logger module 6 link up with son adopts ripe kernelinline hook technology, namely jump in new kernel function by instructions such as write jmp or push ret, thus the function reaching amendment or filter.
File encryption module 3 and file decryption module 4, as system component, provide called interface in the mode of dynamic link libraries, call for other module.
4, Linux Kernel (Linux inner core)
Android relies on Linux 2.6 editions, provides core system service: safety, memory management, management of process, group of networks, driving model.Kernel portion is also equivalent to an abstraction hierarchy in hardware layer and system between other software groups.
Anti-crack method comprises the following steps:
S201: dynamic encryption and decryption module realizes automatic encryption and decryption and comprises when valid application program reads encrypted data, and dynamic encryption and decryption module is decrypted operation, valid application program then can normal usage data;
S202: when valid application program carries out write operation to file, dynamic encryption and decryption module is encrypted operation, the file that valid application program is preserved is the file after encryption;
S203: when unauthorized applications reads encrypted data, dynamic encryption and decryption module is not decrypted operation, unauthorized applications then cannot normal usage data;
S204: when unauthorized applications carries out write operation to file, dynamic encryption and decryption module does not carry out encryption and decryption operation.
Mobile terminal 6-3 Information Security Defending System, instruction is distributed to mobile terminal 6-3 by cloud server 6-2, transmit the instruction and data of safeguard protection, the instruction of safeguard protection can be passed to security strategy setting module 6-4 by mobile terminal 6-3, in mobile terminal 6-3 use procedure, user is when using application program, the MD5 value that mobile terminal 6-3 operation correlation module calculates this program submits to cloud server 6-2 to contrast, contrast successful user normally uses, contrast and unsuccessfully cannot use this program, prevent application program from being distorted by virus, security strategy setting module 6-4 can by the description of security strategy, to file access module, dynamic encryption and decryption module and file access logger module 6 send instruction, file access module after the instruction receiving security strategy setting module 6-4, according to the requirement of security strategy, all operations of real time monitoring mobile terminal 6-3 files object, and controlling, file access logger module 6 after the instruction receiving security strategy setting module 6-4, according to the requirement of security strategy, all operations of real time monitoring mobile terminal 6-3 files object, and carry out log recording, dynamic encryption and decryption module after the instruction receiving security strategy setting module 6-4, according to the requirement of security strategy, the read-write operation of real time monitoring mobile terminal 6-3 files object, and carry out encryption and decryption operation.If later stage user needs to install related software voluntarily, need be asked to cloud server 6-2 by mobile terminal 6-3 in a pre-installation, by cloud server 6-2 according in cloud database 6-1 to should the related data of software contrast, could install after legal, not conform to rule refusal and install.
The foregoing is only preferred embodiment of the present invention, not in order to limit the present invention, all any amendments done within the spirit and principles in the present invention, equivalent replacement and improvement etc., all should be included within protection scope of the present invention.
Claims (9)
1. an information of mobile terminal security protection system, is characterized in that, described information of mobile terminal security protection system operates on Mobile operating system, provides safeguard protection for during visit information on mobile terminals; Specifically comprise:
Monitoring module, for monitoring operation during mobile terminal system visit information system in real time, and sends instruction according to action type to the file encryption module of lower floor, file decryption module or message reference control module;
File encryption module, be connected with described monitoring module, for after the instruction receiving monitoring module or the transmission of file access control module, the file preserving out is encrypted, and notifies that file encryption is preserved operation note in journal file by logger module from infosystem;
File decryption module, is connected with described monitoring module, according to the instruction that described monitoring module transmits, to the file decryption operation of specifying in instruction, successful decryption after opening file, circular document access control module, and notify that decryption oprerations is recorded in journal file by logger module;
Message reference control module is positioned at the inner nuclear layer of Mobile operating system, be connected with described monitoring module, by receiving the instruction transmitted from described monitoring module, realize controlling operation during mobile terminal accessing infosystem, and logger module will be notified by operation note in journal file;
File access control module is positioned at the inner nuclear layer of Mobile operating system, be connected with described monitoring module, by receiving the instruction transmitted from described file decryption module, the accessing operation realizing the file object after to deciphering carries out control of authority, when monitoring file close operation, fileinfo is informed to file encryption module by file access control module, and is recorded in journal file by notice logger module by the accessing operation of file object;
Logger module, with described file encryption module, file decryption module, message reference control module and file access control model calling, according to the instruction that described file encryption module, file decryption module, file access control module and message reference control module are sent, realize carrying out log recording to all operations.
2. information of mobile terminal security protection system as claimed in claim 1, it is characterized in that, be provided with in described logger module and prevent cracking system, this prevents that cracking system comprises: cloud database, cloud server, mobile terminal, security strategy setting module;
Cloud database is connected with described cloud server, and mobile terminal is by wireless network and cloud server is two-way carries out message exchange, and security strategy setting module is connected with mobile terminal; Data, instruction are passed to security strategy setting module by mobile terminal, and the state of security strategy setting module are reported; Described cloud database comprises: subscriber information storing module, user key memory module, journal file memory module, subscriber information storing module, and cloud database has oneself protection system and privacy guard system completely; Described security strategy setting module comprises: file access module, file access logger module and dynamic encryption and decryption module; The instruction that security strategy setting module can transmit according to mobile terminal, setting security strategy; And according to the description of security strategy, send instruction to file access module, file access logger module and dynamic encryption and decryption module; And the state of inquiry file access modules, file access logger module and dynamic encryption and decryption module report mobile terminal.
3. information of mobile terminal security protection system as claimed in claim 2, is characterized in that, the instruction that described file access module is sent by receiving security strategy setting module realizes carrying out control of authority to the accessing operation of mobile terminal file object; The instruction that file access logger module is sent by receiving security strategy setting module, realizes carrying out record to all operations of file; Dynamic encryption and decryption module is positioned at the inner nuclear layer of Mobile operating system, by receiving the instruction that security strategy setting module is sent, automatically realizes the encryption and decryption process to file.
4. information of mobile terminal security protection system as claimed in claim 2, it is characterized in that, in described mobile terminal use procedure, user is when using application program, the MD5 value that running of mobile terminal correlation module calculates this program submits to cloud server to compare, contrast successful user normally uses, and contrasts and unsuccessfully cannot use this program, prevent application program from being distorted by virus.
5. information of mobile terminal security protection system as claimed in claim 2, it is characterized in that, the described anti-anti-crack method cracking system comprises the following steps:
Step one: dynamic encryption and decryption module realizes automatic encryption and decryption and comprises when valid application program reads encrypted data, and dynamic encryption and decryption module is decrypted operation, valid application program then can normal usage data;
Step 2: when valid application program carries out write operation to file, dynamic encryption and decryption module is encrypted operation, the file that valid application program is preserved is the file after encryption;
Step 3: when unauthorized applications reads encrypted data, dynamic encryption and decryption module is not decrypted operation, unauthorized applications then cannot normal usage data;
Step 4: when unauthorized applications carries out write operation to file, dynamic encryption and decryption module does not carry out encryption and decryption operation.
6. information of mobile terminal security protection system as claimed in claim 1, it is characterized in that, this information of mobile terminal security protection system starts automatically along with when mobile terminal system starts.
7. information of mobile terminal security protection system as claimed in claim 1, is characterized in that, the action type that monitoring module carries out monitoring in real time comprises: preserve file operation, open file operation, copy paste operation, screen copy operation and printing; When preserving file operation and occurring, monitoring module is by circular document encrypting module; When copying paste operation, screen copy operation and printing and occurring, monitoring module is by announcement information access control module; When accessing the file that this system is encrypted, monitoring module is by circular document deciphering module.
8. information of mobile terminal security protection system as claimed in claim 1, is characterized in that, the operation that described message reference control module controls comprises carries out print screen, content replication stickup, dump operation to the information data had access to; The accessing operation that described file access control module controls comprises the opening of file object, creates, deletes, renames, copies, moves, preserves, setup of attribute operation; Described file access control module to file carry out control of authority comprise read-only, hide, forbid deleting, forbid opening, forbid copying, forbid that unauthorized applications accesses one by file that valid application program is opened.
9. an information of mobile terminal safety protective method, is characterized in that, changes information of mobile terminal safety protective method and comprises:
Step one: preservation file operation during monitoring mobile terminal system visit information system, copy paste operation, screen copy operation and printing, when preserving file operation and occurring, will be encrypted operation to file, and recording of encrypted daily record;
Step 2: when copying paste operation, screen copy operation and printing and occurring, operation during mobile terminal accessing infosystem is controlled, and by operation note in journal file;
Step 3: in the terminal, when being opened by the file of system encryption, opening operation will be monitored, and encrypt file is deciphered by circular document deciphering module; At successful decryption and after opening file, protect the file be opened, and record deciphering daily record;
Step 4: according to the instruction transmitted, all operations of real time monitoring file, and carry out log recording; When monitoring file close operation, operation will be encrypted to file.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510401462.9A CN104978543A (en) | 2015-07-09 | 2015-07-09 | Mobile terminal information safety protection system and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510401462.9A CN104978543A (en) | 2015-07-09 | 2015-07-09 | Mobile terminal information safety protection system and method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104978543A true CN104978543A (en) | 2015-10-14 |
Family
ID=54275033
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510401462.9A Pending CN104978543A (en) | 2015-07-09 | 2015-07-09 | Mobile terminal information safety protection system and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104978543A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105631357A (en) * | 2015-12-22 | 2016-06-01 | 洛阳师范学院 | System and method for protecting information security of mobile terminals |
CN106919479A (en) * | 2015-12-24 | 2017-07-04 | 北京谊安医疗系统股份有限公司 | A kind of real-time logs recording method of embedded device controller |
CN107563187A (en) * | 2017-08-30 | 2018-01-09 | 广东欧珀移动通信有限公司 | Access operation monitoring method, device, mobile terminal and readable storage medium storing program for executing |
CN109104392A (en) * | 2017-06-21 | 2018-12-28 | 杨树桃 | A kind of safe Wallet System of block chain |
CN109241783A (en) * | 2018-08-14 | 2019-01-18 | 中国科学院信息工程研究所 | Mobile terminal manages implementation of strategies method and device |
CN114124680A (en) * | 2021-09-24 | 2022-03-01 | 绿盟科技集团股份有限公司 | File access control alarm log management method and device |
CN116861469A (en) * | 2023-09-05 | 2023-10-10 | 河北比穆建筑科技有限公司 | Encryption method, system, terminal and storage medium of revit file |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102254124A (en) * | 2011-07-21 | 2011-11-23 | 周亮 | Information security protecting system and method of mobile terminal |
CN103632107A (en) * | 2012-08-23 | 2014-03-12 | 苏州慧盾信息安全科技有限公司 | Mobile terminal information safety protection system and method |
CN103716354A (en) * | 2012-10-09 | 2014-04-09 | 苏州慧盾信息安全科技有限公司 | Security protection system and method for information system |
CN104462998A (en) * | 2014-12-09 | 2015-03-25 | 天津光电安辰信息技术有限公司 | Domestic commercial cryptography algorithm based cloud storage encryption system and implementation method thereof |
CN104680079A (en) * | 2015-02-04 | 2015-06-03 | 上海信息安全工程技术研究中心 | Electronic document security management system and electronic document security management method |
-
2015
- 2015-07-09 CN CN201510401462.9A patent/CN104978543A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102254124A (en) * | 2011-07-21 | 2011-11-23 | 周亮 | Information security protecting system and method of mobile terminal |
CN103632107A (en) * | 2012-08-23 | 2014-03-12 | 苏州慧盾信息安全科技有限公司 | Mobile terminal information safety protection system and method |
CN103716354A (en) * | 2012-10-09 | 2014-04-09 | 苏州慧盾信息安全科技有限公司 | Security protection system and method for information system |
CN104462998A (en) * | 2014-12-09 | 2015-03-25 | 天津光电安辰信息技术有限公司 | Domestic commercial cryptography algorithm based cloud storage encryption system and implementation method thereof |
CN104680079A (en) * | 2015-02-04 | 2015-06-03 | 上海信息安全工程技术研究中心 | Electronic document security management system and electronic document security management method |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105631357A (en) * | 2015-12-22 | 2016-06-01 | 洛阳师范学院 | System and method for protecting information security of mobile terminals |
CN106919479A (en) * | 2015-12-24 | 2017-07-04 | 北京谊安医疗系统股份有限公司 | A kind of real-time logs recording method of embedded device controller |
CN106919479B (en) * | 2015-12-24 | 2020-04-24 | 北京谊安医疗系统股份有限公司 | Real-time log recording method of embedded device controller |
CN109104392A (en) * | 2017-06-21 | 2018-12-28 | 杨树桃 | A kind of safe Wallet System of block chain |
CN107563187A (en) * | 2017-08-30 | 2018-01-09 | 广东欧珀移动通信有限公司 | Access operation monitoring method, device, mobile terminal and readable storage medium storing program for executing |
CN109241783A (en) * | 2018-08-14 | 2019-01-18 | 中国科学院信息工程研究所 | Mobile terminal manages implementation of strategies method and device |
CN114124680A (en) * | 2021-09-24 | 2022-03-01 | 绿盟科技集团股份有限公司 | File access control alarm log management method and device |
CN114124680B (en) * | 2021-09-24 | 2023-11-17 | 绿盟科技集团股份有限公司 | File access control alarm log management method and device |
CN116861469A (en) * | 2023-09-05 | 2023-10-10 | 河北比穆建筑科技有限公司 | Encryption method, system, terminal and storage medium of revit file |
CN116861469B (en) * | 2023-09-05 | 2023-12-12 | 河北比穆建筑科技有限公司 | Encryption method, system, terminal and storage medium of revit file |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11057355B2 (en) | Protecting documents using policies and encryption | |
CN104978543A (en) | Mobile terminal information safety protection system and method | |
US8549656B2 (en) | Securing and managing apps on a device | |
US20150081644A1 (en) | Method and system for backing up and restoring a virtual file system | |
CN103632107B (en) | A kind of information of mobile terminal security protection system and method | |
US9147084B2 (en) | Method and system for isolating secure communication events from a non-secure application | |
US20140096230A1 (en) | Method and system for sharing vpn connections between applications | |
CN103548320A (en) | Secure execution of unsecured apps on a device | |
US9633214B2 (en) | Self-removal of enterprise app data | |
CN103716354A (en) | Security protection system and method for information system | |
WO2020225604A1 (en) | Method and devices for enabling data governance using policies triggered by metadata in multi-cloud environments | |
US20140281499A1 (en) | Method and system for enabling communications between unrelated applications | |
CN103763313A (en) | File protection method and system | |
CN103647784A (en) | Public and private isolation method and device | |
CN104462997A (en) | Method, device and system for protecting work data in mobile terminal | |
CN105528553A (en) | A method and a device for secure sharing of data and a terminal | |
CN110807191B (en) | Safe operation method and device of application program | |
CN105631357A (en) | System and method for protecting information security of mobile terminals | |
GB2555569B (en) | Enhanced computer objects security | |
JP2005038124A (en) | File access control method and control system | |
JP5835022B2 (en) | Distribution apparatus, distribution processing method and program, information processing apparatus, information processing method and program | |
CN110162946B (en) | Mobile storage management and control method and device | |
Sugumar et al. | Data security in public cloud storage environment | |
JP2006139475A (en) | Secret information protection system for existing application |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
DD01 | Delivery of document by public notice |
Addressee: Huang Kaifeng Document name: Notification of Passing Examination on Formalities |
|
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20151014 |
|
RJ01 | Rejection of invention patent application after publication |