CN105718809A - Mobile communication terminal, data security monitoring method and device thereof - Google Patents

Mobile communication terminal, data security monitoring method and device thereof Download PDF

Info

Publication number
CN105718809A
CN105718809A CN201610032220.1A CN201610032220A CN105718809A CN 105718809 A CN105718809 A CN 105718809A CN 201610032220 A CN201610032220 A CN 201610032220A CN 105718809 A CN105718809 A CN 105718809A
Authority
CN
China
Prior art keywords
security monitoring
data transmission
data
transmission applications
communication terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610032220.1A
Other languages
Chinese (zh)
Inventor
唐钰林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN201610032220.1A priority Critical patent/CN105718809A/en
Publication of CN105718809A publication Critical patent/CN105718809A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes

Abstract

The invention discloses a mobile communication terminal, a data security monitoring method and device thereof. The data security monitoring method of the mobile communication terminal comprises the steps of receiving a data transmission request of a data transmission application in the mobile communication terminal; judging whether the data transmission application is in a preset data security monitoring list; if so, inputting a first prompt message, wherein the prompt message is used for prompting a user to confirm whether data transmission of the data transmission application is authorized; if a first indication message is received, authorizing the data transmission application to transmit data; if a second indication message is received, authorizing the data transmission application not to transmit data. Through the mobile communication terminal, the data security monitoring method and device thereof, the problem of low data monitoring security of the mobile communication terminal is solved.

Description

Communication terminal and data method for safety monitoring thereof and device
Technical field
The present invention relates to data security arts, in particular to a kind of communication terminal and data method for safety monitoring thereof and device.
Background technology
The system of communication terminal is usually mounted with multiple mobile applications; often have third-party rogue application and send data infringement equipment user interests from backstage when agreeing to without user by sending the interface of Mobile solution data-interface or note/multimedia message at Background scheduling; such as send charge note on backstage or send Mobile solution data waste customer flow, and user cannot find in time.For Android (android) system, although say that primary Android system can check that when application program is installed application program is employed which authority of system and can be shown by prompting frame when installing.But, current substantial amounts of Android system terminal unit user all can ignore this point, does not conscientiously check that the information of prompting frame clicks directly on installation.
Providing a solution in the related, the program is to add monitoring application according to user, and the data that application is sent are monitored, and sends data and can be intercepted and point out mandate system is formed second protection in the unwitting situation of user;But the program there is also following problem: 1, Android system is not had deep understanding by Android system terminal equipment user, some user is not aware which application program can send data automatically, so being also unknown to which application is carried out data monitoring, therefore it is likely to occur risk Lou monitored when the data of application software are sent and are configured.2, when the data of application software are sent and are monitored arranging by user, owing to an Android system terminal unit may install substantial amounts of application software, after every a third-party application installs, user wants that monitoring this application is required for manually going to add in watch-list, complex operation, Consumer's Experience is bad.
For the problem that the data monitoring safety of the communication terminal in correlation technique is low, effective solution is not yet proposed at present.
Summary of the invention
Present invention is primarily targeted at a kind of communication terminal of offer and data method for safety monitoring thereof and device, the problem that data monitoring safety to solve communication terminal is low.
To achieve these goals, according to an aspect of the invention, it is provided the data method for safety monitoring of a kind of communication terminal, the method includes: receive the data sending request of data transmission applications in communication terminal;Judge whether data transmission applications is in preset data security monitoring list;If it is judged that data transmission applications is in preset data security monitoring list, then exporting the first information, wherein, for pointing out user to be confirmed whether, the transmission of the data to data transmission applications authorizes the first information;If receiving the first instruction information, then authorization data transmission application carries out data transmission, and wherein, the first instruction information is confirm that the data to data transmission applications send the instruction information authorized;If receiving the second instruction information, then authorization data transmission application does not carry out data transmission, and wherein, the second instruction information is confirm the data of data transmission applications not to be sent the instruction information authorized.
Further, before judging whether data transmission applications is in preset data security monitoring list, the method also includes: whether detection communication terminal has the data transmission applications of new deletion;And if be detected that communication terminal has the data transmission applications of new deletion, then the data transmission applications newly deleted is deleted from preset data security monitoring list.
Further, before judging whether data transmission applications is in preset data security monitoring list, the method also includes: whether detection communication terminal has newly installed data transmission applications;And if be detected that communication terminal has newly installed data transmission applications, then newly installed data transmission applications is added in preset data security monitoring list.
Further, after detecting that communication terminal has newly installed data transmission applications, the method also includes: export the second information, and wherein, the second information is for pointing out user to be confirmed whether to be added in preset data security monitoring list newly installed data transmission applications;If receiving the confirmation confirming to be added in preset data security monitoring list by newly installed data transmission applications, then newly installed data transmission applications is added in preset data security monitoring list.
Further, before judging whether data transmission applications is in preset data security monitoring list, the method also includes: judge whether to receive the renewal instruction to preset data security monitoring list, wherein, updates instruction and includes preset data security monitoring list being added or deleting;If receiving the renewal instruction to preset data security monitoring list, then according to updating instruction renewal preset data security monitoring list.
Further, the method also includes: judge whether preset data security monitoring list is performed renewal;And if it is judged that preset data security monitoring list is performed renewal, the application of communication terminal is carried out global search;By the result of global search, preset data security monitoring list is performed renewal.
Further, receive the data sending request of data transmission applications in communication terminal to include receiving following any one or more data sending request: the networking request of data transmission applications;Data transmission applications sends the request of note or multimedia message data;Data transmission applications sends the request of mail data;Data transmission applications call request;The shared Location Request of data transmission applications.
Further, after the transmission application of not authorization data carries out data transmission, the method also includes: delete the data to be sent of data transmission applications in communication terminal.
Further, before judging whether data transmission applications is in preset data security monitoring list, the method also includes: receive the input instruction being used for being turned on and off the data security monitoring function of communication terminal, wherein, data security monitoring function is that the data to data transmission applications send the function being monitored;If receiving the input instruction of the data security monitoring function opening communication terminal, then open the data security monitoring function of communication terminal;And if receive the input instruction of data security monitoring function closing communication terminal, then close the data security monitoring function of communication terminal.
Further, before judging whether data transmission applications is in preset data security monitoring list, the method also includes: whether there is preset data security monitoring list in detection communication terminal;If being absent from preset data security monitoring list in communication terminal, then the authority of all of application in retrieval communication terminal, retrieves the application for sending data;And set up preset data security monitoring list according to the application for sending data retrieved.
To achieve these goals, according to a further aspect in the invention, it is provided that the data safety monitoring device of a kind of communication terminal, this device includes: first receives unit, for receiving the data sending request of data transmission applications in communication terminal;First judging unit, is used for judging whether data transmission applications is in preset data security monitoring list;First output unit, for when judging that data transmission applications is in preset data security monitoring list, exporting the first information, wherein, for pointing out user to be confirmed whether, the transmission of the data to data transmission applications authorizes the first information;First granted unit, for when receiving the first instruction information, authorization data sends application and carries out data transmission, and wherein, the first instruction information is confirm that the data to data transmission applications send the instruction information authorized;Second granted unit, for when receiving the second instruction information, authorization data transmission application does not carry out data transmission, and wherein, the second instruction information is confirm the data of data transmission applications not to be sent the instruction information authorized.
Further, this device also includes: the first detection unit, and for before judging whether data transmission applications is in preset data security monitoring list, whether detection communication terminal has the data transmission applications of new deletion;And deletion unit, for when the data transmission applications that communication terminal has new deletion being detected, the data transmission applications newly deleted being deleted from preset data security monitoring list.
Further, this device also includes: the second detection unit, and for before judging whether data transmission applications is in preset data security monitoring list, whether detection communication terminal has newly installed data transmission applications;And first adding device, for when detecting that communication terminal has newly installed data transmission applications, newly installed data transmission applications being added in preset data security monitoring list.
Further, this device also includes: the second output unit, for after detecting that communication terminal has newly installed data transmission applications, export the second information, wherein, the second information is for pointing out user to be confirmed whether to be added in preset data security monitoring list newly installed data transmission applications;Second adding device, for when receiving the confirmation confirming to be added in preset data security monitoring list by newly installed data transmission applications, being added into newly installed data transmission applications in preset data security monitoring list.
Further, this device also includes: the second judging unit, for before judging whether data transmission applications is in preset data security monitoring list, judge whether to receive the renewal instruction to preset data security monitoring list, wherein, update instruction to include preset data security monitoring list being added or deleting;First updating block, for when receiving the renewal instruction to preset data security monitoring list, updating preset data security monitoring list according to updating instruction.
Further, this device also includes: the 3rd judging unit, is used for judging whether preset data security monitoring list is performed renewal;And first retrieval unit, for if it is judged that preset data security monitoring list is performed renewal, the application of communication terminal being carried out global search;Second updating block, for performing renewal by the result of global search to preset data security monitoring list.
Further, this device also includes: second receives unit, for before judging whether data transmission applications is in preset data security monitoring list, receive the input instruction being used for being turned on and off the data security monitoring function of communication terminal, wherein, data security monitoring function is that the data to data transmission applications send the function being monitored;Open unit, for when receiving the input instruction of the data security monitoring function opening communication terminal, opening the data security monitoring function of communication terminal;And closing unit, for when receiving the input instruction of the data security monitoring function closing communication terminal, closing the data security monitoring function of communication terminal.
Further, this device also includes: the 3rd detection unit, for, before judging whether data transmission applications is in preset data security monitoring list, whether there is preset data security monitoring list in detection communication terminal;Second retrieval unit, during for being absent from preset data security monitoring list in communication terminal, in retrieval communication terminal, the authority of all of application, retrieves the application for sending data;And set up unit, for setting up preset data security monitoring list according to the application for sending data retrieved.
To achieve these goals, according to a further aspect in the invention, it is provided that a kind of communication terminal, this communication terminal includes the data safety monitoring device of communication terminal provided by the invention.
The present invention is by receiving the data sending request of data transmission applications in communication terminal;Judge whether data transmission applications is in preset data security monitoring list;If it is judged that data transmission applications is in preset data security monitoring list, then exporting the first information, wherein, for pointing out user to be confirmed whether, the transmission of the data to data transmission applications authorizes information;If receiving the first instruction information, then authorization data transmission application carries out data transmission, and wherein, the first instruction information is confirm that the data to data transmission applications send the instruction information authorized;If receiving the second instruction information, then authorization data transmission application does not carry out data transmission, wherein, second instruction information is confirm the data of data transmission applications not to be sent the instruction information authorized, solve the problem that the data monitoring safety of communication terminal is low, and then reach the effect of the data monitoring safety improving communication terminal.
Accompanying drawing explanation
The accompanying drawing constituting the part of the application is used for providing a further understanding of the present invention, and the schematic description and description of the present invention is used for explaining the present invention, is not intended that inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is the flow chart of the data method for safety monitoring of communication terminal according to a first embodiment of the present invention;
Fig. 2 is the flow chart of the data method for safety monitoring of communication terminal according to a second embodiment of the present invention;
Fig. 3 is the flow chart of the data method for safety monitoring of communication terminal according to a third embodiment of the present invention;And
Fig. 4 is the schematic diagram of the data safety monitoring device of communication terminal according to embodiments of the present invention.
Detailed description of the invention
It should be noted that when not conflicting, the embodiment in the application and the feature in embodiment can be mutually combined.Describe the present invention below with reference to the accompanying drawings and in conjunction with the embodiments in detail.
In order to make those skilled in the art be more fully understood that the application scheme, below in conjunction with the accompanying drawing in the embodiment of the present application, technical scheme in the embodiment of the present application is clearly and completely described, obviously, described embodiment is only the embodiment of the application part, rather than whole embodiments.Based on the embodiment in the application, the every other embodiment that those of ordinary skill in the art obtain under not making creative work premise, all should belong to the scope of the application protection.
It should be noted that term " first " in the description and claims of this application and above-mentioned accompanying drawing, " second " etc. are for distinguishing similar object, without being used for describing specific order or precedence.Should be appreciated that the data of so use can be exchanged in the appropriate case, in order to embodiments herein described herein.In addition, term " includes " and " having " and their any deformation, it is intended to cover non-exclusive comprising, such as, contain series of steps or the process of unit, method, system, product or equipment be not necessarily limited to those steps or the unit clearly listed, but can include clearly not listing or for intrinsic other step of these processes, method, product or equipment or unit.
Embodiments provide the data method for safety monitoring of a kind of communication terminal.
Fig. 1 is the flow chart of the data method for safety monitoring of communication terminal according to a first embodiment of the present invention, as it is shown in figure 1, the method comprises the following steps:
Step S102: receive the data sending request of data transmission applications in communication terminal.
Communication terminal can be mobile phone, it is also possible to be the intelligent terminal with functionality mobile communication such as panel computer.Data transmission applications is to send the application program of data, such as, data transmission applications can be the application program in Android system, and data sending request refers to that application program to be sent out the request of data, if request is passed through, then data transmission applications controls communication terminal transmission data.In communication terminal, the data sending request of data transmission applications can include following any one or more data sending request;The networking request of data transmission applications, is used for asking networking;Data transmission applications sends the request of note or multimedia message data, sends data for request with note or multimedia message form;Data transmission applications sends the request of mail data, for asking to send data with the form of mail;Data transmission applications call request, be used for asking outwards to call;The shared Location Request of data transmission applications, carries out sharing location to communication terminal for request.
Communication terminal usually downloads multiple application, when set up applications, although the system of communication terminal may check when set up applications application program employs which authority of system, and eject information prompting user, but, most communication terminal user can ignore this information, conscientiously do not check that information clicks directly on installation, therefore some rogue programs are just had, namely third party's rogue application, data are sent in system background in the unwitting situation of user, the electricity of waste communication terminal and mobile data traffic, even reveal privacy of user, adverse effect is brought to user.In the present invention, when data transmission applications to send data in communication terminal, receive the data sending request of data transmission applications in communication terminal.
Step S104: judge whether data transmission applications is in preset data security monitoring list.
In preset data security monitoring list, storage has data transmission applications to be monitored, namely, it is stored in preset data just to need by the data in watch-list to be monitored, although some application program also is able to send data, but safety is high, or user setup is without to this Application Monitoring, thus no longer in data security monitoring list, therefore, in receiving communication terminal after the data sending request of data transmission applications, it is judged that whether data transmission applications is in preset data security monitoring list.It is monitored by judging whether data transmission applications is in preset data security monitoring list the data of data transmission applications are sent behavior.
Step S106: if it is judged that data transmission applications is in preset data security monitoring list, then export the first information.
For pointing out user to be confirmed whether, the transmission of the data to data transmission applications authorizes first information.If it is judged that data transmission applications is in preset data security monitoring list, then data transmission applications carried out data are probably when sending and carry out in the unwitting situation of user, the data sent may relate to privacy of user, it is likely to the mobile data traffic of waste and brings economic loss to user, therefore when judging that data transmission applications is in preset data security monitoring in table, export the first information, for pointing out user that the transmission of data is authorized.When judging that data transmission applications is not in preset data security monitoring in table, do not export information, data can need not be sent by data transmission applications by mandate, and the first information can be displayed for user on communication terminal screen and carry out selecting to authorize.Such as, by showing " mandate " and " not authorizing " two trigger prompts frames on the screen of communication terminal, carry out authorizing instruction to data transmission applications for user.
Step S108: if receiving the first instruction information, then authorization data transmission application carries out data transmission.
First instruction information is confirm that the data to data transmission applications send the instruction information authorized, if communication terminal receives the first instruction information, then authorization data transmission application carries out data transmission.Such as, if the user while click " mandate " trigger prompts frame on the screen of communication terminal, communication terminal detects that " mandate " trigger prompts frame is triggered, then the data of data transmission applications are sent and authorize, after mandate, data to be sent are sent by data transmission applications.
Step S110: if receiving the second instruction information, then authorization data transmission application does not carry out data transmission.
Second instruction information is confirm the data of data transmission applications not to be sent the instruction information authorized, if that is, communication terminal receives the second instruction information, then authorization data transmission application does not carry out data transmission.Such as, if the user while the screen of communication terminal is clicked " not authorizing " trigger prompts frame, communication terminal detects that " not authorizing " trigger prompts frame is triggered, then the data of data transmission applications are not sent and authorize, and data to be sent cannot be sent by data transmission applications.Preferably, in order to save the memory headroom of communication terminal, improve the speed of service, after the transmission application of not authorization data carries out data transmission, delete the data to be sent of data transmission applications in communication terminal.If not receiving instruction information within the default time, then authorization data transmission application does not carry out data transmission, by data deletion to be sent.
Preferably, in order to save the memory space of preset data security monitoring list, before judging whether data transmission applications is in preset data security monitoring list, method also includes: whether detection communication terminal has the data transmission applications of new deletion;If be detected that communication terminal has the data transmission applications of new deletion, then the data transmission applications newly deleted is deleted from preset data security monitoring list.If that is, data transmission applications is deleted from communication terminal, after the data transmission applications that communication terminal has new deletion being detected, the corresponding data transmission applications in preset data security monitoring list is deleted.
In order to improve motility and the safety of data security monitoring, before judging whether data transmission applications is in preset data security monitoring list, whether detection communication terminal has newly installed data transmission applications;If be detected that communication terminal has newly installed data transmission applications, then newly installed data transmission applications is added in preset data security monitoring list.Namely, if communication terminal has newly installed data transmission applications, then automatically newly installed data transmission applications is added in preset data security monitoring list, to monitor newly installed data transmission applications in time, it is prevented that harmful effects such as the private data leakage caused because not monitoring the data transmission of newly installed data transmission applications in time or the mobile data traffics of waste user.
Preferably, after detecting that communication terminal has newly installed data transmission applications, exporting the second information, wherein, the second information is for pointing out user to be confirmed whether to be added in preset data security monitoring list newly installed data transmission applications;If receiving the confirmation confirming to be added in preset data security monitoring list by newly installed data transmission applications, then newly installed data transmission applications is added in preset data security monitoring list.In order to facilitate user that newly installed data transmission applications is operated, after newly installed data transmission applications being detected, export the second information, such as, after newly installed data transmission applications being detected, display " whether newly installed data transmission applications being added in preset data security monitoring list " on the screen of the mobile terminal, if user selects "Yes", the "Yes" that detects communication terminal triggers signal and is triggered, and newly installed data transmission applications is added in preset data security monitoring list, if user selects "No", the "No" that detects communication terminal triggers signal and is triggered, and newly installed data transmission applications is not added in preset data security monitoring list.Choose whether newly installed data transmission applications to be added in preset data security monitoring list by user, it is possible to increase the motility to data transmission applications monitoring, promote Consumer's Experience.
Preferably, before judging whether data transmission applications is in preset data security monitoring list, it may be judged whether receive the renewal instruction to preset data security monitoring list, wherein, update instruction to include preset data security monitoring list being added or deleting;If receiving the renewal instruction to preset data security monitoring list, then according to updating instruction renewal preset data security monitoring list.Namely, except data security monitoring list being configured when the installation of data transmission applications or deletion, preset data security monitoring list according to circumstances can be added or delete by user at any time, preset data security monitoring list, after the interpolation receiving user or deletion instruction, is added or deletes according to the interpolation of user or deletion instruction by preset data security monitoring list.
Preferably, in order to facilitate user that preset data safe list is updated, it is possible to adopt following methods: judge whether described preset data security monitoring list is performed renewal;If it is judged that described preset data security monitoring list is performed renewal, the application of described communication terminal is carried out global search;By the result of global search, described preset data security monitoring list is performed renewal.That is, user can pass through more new data security monitoring listing function, the application in communication terminal is carried out global search, the result of global search is added in data security monitoring list.
In order to meet the needs of user's different times, can select to be turned on and off data security monitoring function different operational phase users.Before judging whether data transmission applications is in preset data security monitoring list, receive the input instruction being used for being turned on and off the data security monitoring function of communication terminal, wherein, data security monitoring function is that the data to data transmission applications send the function being monitored;If receiving the input instruction of the data security monitoring function opening communication terminal, then open the data security monitoring function of communication terminal;And if receive the input instruction of data security monitoring function closing communication terminal, then close the data security monitoring function of communication terminal.User can be turned on and off data security monitoring function in the arranging of communication terminal, namely, if receiving the input instruction of the turn-on data security monitoring function of user, then open the data security monitoring function of communication terminal, if receiving the input instruction of the closedown data security monitoring function of user, then close the data security monitoring function of communication terminal.
Preferably, in order to reduce user operation number of times, before judging whether data transmission applications is in preset data security monitoring list, whether detection communication terminal exists preset data security monitoring list;If being absent from preset data security monitoring list in communication terminal, then the authority of all of application in retrieval communication terminal, retrieves the application for sending data;Preset data security monitoring list is set up in the application for sending data according to retrieving.Such as, when data security monitoring function is opened, system boot can inquire about whether data security monitoring list exists, if there is no the authority of all application is then retrieved, retrieve the application for sending data, be involved in transmission data and the application for third party software is added in data security monitoring list.
This embodiment adopts and receives the data sending request of data transmission applications in communication terminal;Judge whether data transmission applications is in preset data security monitoring list;If it is judged that data transmission applications is in preset data security monitoring list, then exporting the first information, wherein, for pointing out user to be confirmed whether, the transmission of the data to data transmission applications authorizes information;If receiving the first instruction information, then authorization data transmission application carries out data transmission, and wherein, the first instruction information is confirm that the data to data transmission applications send the instruction information authorized;If receiving the second instruction information, then authorization data transmission application does not carry out data transmission, wherein, second instruction information is confirm the data of data transmission applications not to be sent the instruction information authorized, solve the problem that the data monitoring safety of communication terminal is low, and then reach the effect of the data monitoring safety improving communication terminal.
Fig. 2 is the flow chart of the data method for safety monitoring of communication terminal according to a second embodiment of the present invention, this embodiment can as the preferred implementation of above-mentioned first embodiment, as in figure 2 it is shown, the method includes:
Step S201: all application relating to transmission data are carried out data security monitoring by system boot acquiescence.
For mobile phone, such as Android mobile phone, when Android system is started shooting, gives tacit consent to the authority to all third party applications relating to and sending data and retrieves, it is involved in the application sending data and carries out data security monitoring, namely data transmission applications is carried out security monitoring.Such as, in system application is arranged, by the control module opening data security monitoring function, this function is defaulted as in systems and opens, and controls module by this, and user can be turned on and off according to the needs of oneself.
Step S202: set up preset data security monitoring list.
Set up preset data security monitoring list, for Android system, owing to most users is to the not deep understanding of Android system, it is not aware that those application programs can send data automatically, so being also unknown to those application are carried out data monitoring, therefore data transmission applications is added in preset data security monitoring list, in order to avoid the risk of leakage monitoring occurs.When data security monitoring function is opened, system boot can inquire about whether data security monitoring list exists, if there is no, to retrieve the authority of all application, the application being involved in the third party's program sending data is added in preset data security monitoring list, for instance, data sending request can be networking request, send mail/note/multimedia message requests, call request, share Location Request etc..
Step S203: when application program is installed or deleted, preset data security monitoring list is carried out synchronized update.
Authority retrieval is re-started when third-party application is installed or deletes.It is involved in the application sending data when application is installed and adds in preset data security monitoring list, eliminate the complicated process that user after third-party application installs is added manually in watch-list, save operating procedure so that the renewal hommization more to preset data security monitoring list.When third-party application is deleted, preset data security monitoring list is carried out synchronized update, from preset data security monitoring list, this data transmission applications is deleted.
Such as, when application is installed or deleted, it is updated synchronizing by broadcasting triggering preset data security monitoring list.In the process installing application, one can be increased installed application is carried out scope check, and the flow process in data security monitoring list is added in the application being involved in transmission data to;In the process deleting application, also the flow process of traversal preset data security monitoring list can be increased, if the application deleted is the monitoring application in preset data security monitoring list, then also the record of this application in preset data security monitoring list is deleted after application success is deleted.
Step S204: user according to circumstances adds or deletes the application in preset data security monitoring list.
In order to meet user's demand in varied situations, it is also provided to the function in user operation data security monitoring list in system application is arranged, record in data security monitoring list can be added or delete according to the demand of self by user, it is also possible to perform the machine application global search is updated the application in preset data security monitoring list by more new data security monitoring listing function.
Step S205: application request sends data.
When detecting that application request sends data, the request of acquisition sends the data transmission applications of data.
Step S206: determine whether the application in preset data security monitoring list.
When the request of acquisition sends the data transmission applications of data, it may be judged whether for the application in preset data security monitoring list.If it is judged that be the application in preset data security monitoring list, then perform step S208, if it is judged that be not the application in preset data security monitoring list, then perform step S207.
Step S207: perform to send data.
If it is judged that the application that request sends data is not the application in preset data security monitoring list, then perform transmission.
Step S208: pop-up dialogue box, prompting user authorizes.
If it is judged that data transmission applications is the application in preset data security monitoring list, then pop-up dialogue box, prompting user authorizes.
Step S209: judge whether user authorizes.
Receive the instruction information of user, it is judged that whether user is to data transmission applications mandate, if user is to data transmission applications mandate, then perform step S210, if user is not to data transmission applications mandate, then perform step S211.
Step S210: perform to send data.
If receiving the mandate instruction information of user, then perform data and send.
Step S211: cancel transmission data, abandon data.
If obtaining performing to send data behavior after user authorizes, if user's with no authorized, cancelling transmission data and abandoning data.
This embodiment adopts when application program is installed or deletes, preset data security monitoring list is carried out synchronized update, with automatic data maintenance security monitoring list, anti-leak-stopping is monitored, or the application in preset data security monitoring list is according to circumstances added or deletes by user, when data transmission applications request sends data, determine whether the application in preset data security monitoring list, if the application in preset data security monitoring list, then pop-up dialogue box, data transmission applications is authorized by prompting user, if user authorizes, then send data, if user does not authorize, stop sending data, and data to be sent are abandoned, achieve the secondary protection to security of system, owing to all third-party application sending data that relate to are carried out data monitoring by system default, and application programs implements the omnidistance operation too much without user of data monitoring, major part is all that system background processes, Consumer's Experience is good, and reach the effect of the data monitoring safety improving communication terminal.
Fig. 3 is the flow chart of the data method for safety monitoring of communication terminal according to a third embodiment of the present invention, this embodiment can as the preferred implementation of above-mentioned first embodiment,.As it is shown on figure 3, the method comprises the following steps:
Step S301: message monitoring function is opened.
The present embodiment is for Android system, in system is applied, Settings.apk such as, is provided with the control module opening note security monitoring function, user can arrange in (Settings) in system application and open note security monitoring function, such as, by opening this function in Settings, change the value of the variable i sSmsMonitorOpen in SettingsProvider into true, by this control module, user can according to oneself need open or close note security monitoring function at any time.
Step S302: whether the package name judging to call short message sending interface is the package name of system note application.
After message monitoring function is opened, whether the package name judging to call short message sending interface is the package name of system note application, such as, in the SMS transmission module Smsdispatcher of framework (Framework) layer, it is judged that whether the package name (PackageName) calling short message sending interface is the PackageName of system note application.When note distributor SmsDispatcher is invoked time, obtain the PackageName as caller application, it is judged that whether this PackageName is the PackageName of system note application, if, then perform step S303, if it is not, then perform step S304.
Step S303: send by normal flow process.
If it is judged that the PackageName that the PackageName calling note distributor is the application of system note, then send note by normal flow process.
Step S304: point out user to input mandate by dialog box, authorize and successfully then send note, authorizes refusal then to send note failure, and returns result display in system note is applied.
If it is judged that the PackageName calling note distributor is not the PackageName of system note application, then calls dialogue (Dialog) and point out user to input mandate.By Dialog interrupt sending note flow process, need to wait for user and authorize and could continue down to perform.If now having third party's program at Background scheduling short message sending interface, then can be interrupted by Dialog, Dialog is shown to interface (UI) thread top, the action of Background scheduling note is displayed to the user that, so that user can find the danger of this application in time, and take measures, for instance application program is disposed by user in time, it is to avoid loss.
If have ignored the application right to use limit information prompting frame when user installation application when being accidentally mounted with third party's rogue application, can prevent rogue application from sending note/multimedia message in system background, the interests of infringement user, when rogue's application call system sends short message interface, ejecting mandate prompting frame to authorize for user, therefore user also can find that being applied in Background scheduling sends short message interface in time.Achieve the application programming interfaces (ApplicationProgramInterface of the note application call system transmission note that nonsystematic carries, referred to as API) time, ejecting mandate prompting frame to authorize for user, user authorizes complete can continuation to send note.Because considering that extreme portions user gets used to the note application that system carries, so this realization is without influence on Consumer's Experience.
Alternatively, when calling Dialog, this Dialog is necessary for system-level Dialog, can in any interface display, otherwise, this Dialog cannot be called by servicing the context (context) of (service), additionally, this Dialog can not receive return key and return, and only accepts refusal or allows (rejectedorallowed) button event.When user clicks refusal (rejected) button, short message sending failure, it is preferable that return failed state and be shown in the application of system note;When user clicks permission (allowed) button, short message sending success, send the successful state of note and may be displayed in the application of system note.
Due to by realizing note security monitoring in Framework layer amendment short message sending flow process, so cannot ensure that calling this interface is a UI main thread or a sub-thread, owing to Dialog belongs to view, if sub-line journey have invoked this interface, Dialog can not be directly invoked by it, so the mode requiring over routine processes (Handler) calls Dialog indirectly, it is to avoid cause that program reports an error because sub-line journey can not change the view (View) of UI thread.
This embodiment adopts when equipment has the application of nonsystematic note to send note, eject and authorize prompting frame to authorize for user, if user authorizes successfully, send note, refusal is authorized then to send note failure, allow user can find to send in system background the data transmission applications of note in time, thus improve the safety of system, forming the secondary protection to system, having reached the effect of the data monitoring safety improving communication terminal.
It should be noted that, can perform in the computer system of such as one group of computer executable instructions in the step shown in the flow chart of accompanying drawing, and, although illustrating logical order in flow charts, but in some cases, it is possible to perform shown or described step with the order being different from herein.
Embodiments providing the data safety monitoring device of a kind of communication terminal, the data safety monitoring device of this communication terminal may be used for performing the data method for safety monitoring of the communication terminal of the embodiment of the present invention.
Fig. 4 is the schematic diagram of the data safety monitoring device of communication terminal according to embodiments of the present invention, and as shown in Figure 4, this device includes:
First receives unit 10, for receiving the data sending request of data transmission applications in communication terminal.
First judging unit 20, is used for judging whether data transmission applications is in preset data security monitoring list.
First output unit 30, for when judging that data transmission applications is in preset data security monitoring list, exporting the first information, wherein, for pointing out user to be confirmed whether, the transmission of the data to data transmission applications authorizes the first information.
First granted unit 40, for when receiving the first instruction information, authorization data sends application and carries out data transmission, and wherein, the first instruction information is confirm that the data to data transmission applications send the instruction information authorized.
Second granted unit 50, for when receiving the second instruction information, authorization data transmission application does not carry out data transmission, and wherein, the second instruction information is confirm the data of data transmission applications not to be sent the instruction information authorized.
Preferably, this device also includes: the first detection unit, and for before judging whether data transmission applications is in preset data security monitoring list, whether detection communication terminal has the data transmission applications of new deletion;And deletion unit, for when the data transmission applications that communication terminal has new deletion being detected, the data transmission applications newly deleted being deleted from preset data security monitoring list.
This device also includes: the second detection unit, and for before judging whether data transmission applications is in preset data security monitoring list, whether detection communication terminal has newly installed data transmission applications;And first adding device, for when detecting that communication terminal has newly installed data transmission applications, newly installed data transmission applications being added in preset data security monitoring list.
This device also includes: the second output unit, for after detecting that communication terminal has newly installed data transmission applications, export the second information, wherein, the second information is for pointing out user to be confirmed whether to be added in preset data security monitoring list newly installed data transmission applications;Second adding device, for when receiving the confirmation confirming to be added in preset data security monitoring list by newly installed data transmission applications, being added into newly installed data transmission applications in preset data security monitoring list.
This device also includes: the second judging unit, for before judging whether data transmission applications is in preset data security monitoring list, judge whether to receive the renewal instruction to preset data security monitoring list, wherein, update instruction to include preset data security monitoring list being added or deleting;First updating block, for when receiving the renewal instruction to preset data security monitoring list, updating preset data security monitoring list according to updating instruction.
This device also includes: the 3rd judging unit, is used for judging whether preset data security monitoring list is performed renewal;And first retrieval unit, for if it is judged that preset data security monitoring list is performed renewal, the application of communication terminal being carried out global search;Second updating block, for performing renewal by the result of global search to preset data security monitoring list.
This device also includes: second receives unit, for before judging whether data transmission applications is in preset data security monitoring list, receive the input instruction being used for being turned on and off the data security monitoring function of communication terminal, wherein, data security monitoring function is that the data to data transmission applications send the function being monitored;Open unit, for when receiving the input instruction of the data security monitoring function opening communication terminal, opening the data security monitoring function of communication terminal;And closing unit, for when receiving the input instruction of the data security monitoring function closing communication terminal, closing the data security monitoring function of communication terminal.
This device also includes: the 3rd detection unit, for, before judging whether data transmission applications is in preset data security monitoring list, whether there is preset data security monitoring list in detection communication terminal;Second retrieval unit, during for being absent from preset data security monitoring list in communication terminal, in retrieval communication terminal, the authority of all of application, retrieves the application for sending data;And set up unit, for setting up preset data security monitoring list according to the application for sending data retrieved.
This embodiment adopts the first reception unit 10 to receive the data sending request of data transmission applications in communication terminal;First judging unit 20 judges whether data transmission applications is in preset data security monitoring list;First output unit 30, when judging that data transmission applications is in preset data security monitoring list, exports the first information;First granted unit 40 is when receiving the first instruction information, and authorization data sends application and carries out data transmission, and wherein, the first instruction information is confirm that the data to data transmission applications send the instruction information authorized;Second granted unit 50 is when receiving the second instruction information, and authorization data transmission application does not carry out data transmission, and wherein, the second instruction information is confirm the data of data transmission applications not to be sent the instruction information authorized.Thus improve the safety of the data monitoring of communication terminal.
The embodiment of the present invention additionally provides a kind of communication terminal, and this communication terminal includes the data safety monitoring device of the communication terminal that the embodiment of the present invention provides.
Preferably, this communication terminal is the mobile phone of Android system.
Obviously, those skilled in the art should be understood that, each module of the above-mentioned present invention or each step can realize with general calculation element, they can concentrate on single calculation element, or it is distributed on the network that multiple calculation element forms, alternatively, they can realize with the executable program code of calculation element, thus, can be stored in storage device is performed by calculation element, or they are fabricated to respectively each integrated circuit modules, or the multiple modules in them or step are fabricated to single integrated circuit module realize.So, the present invention is not restricted to the combination of any specific hardware and software.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations.All within the spirit and principles in the present invention, any amendment of making, equivalent replacement, improvement etc., should be included within protection scope of the present invention.

Claims (19)

1. the data method for safety monitoring of a communication terminal, it is characterised in that including:
Receive the data sending request of data transmission applications in communication terminal;
Judge whether described data transmission applications is in preset data security monitoring list;
If it is judged that described data transmission applications is in described preset data security monitoring list, then exporting the first information, wherein, for pointing out user to be confirmed whether, the transmission of the data to described data transmission applications authorizes described first information;
If receiving the first instruction information, then authorizing described data transmission applications to carry out data transmission, wherein, described first instruction information is confirm that the data to described data transmission applications send the instruction information authorized;
If receiving the second instruction information, then not authorizing described data transmission applications to carry out data transmission, wherein, described second instruction information is confirm the data of described data transmission applications not to be sent the instruction information authorized.
2. method according to claim 1, it is characterised in that before judging whether described data transmission applications is in preset data security monitoring list, described method also includes:
Detect whether described communication terminal has the data transmission applications of new deletion;And
If be detected that described communication terminal has the data transmission applications of new deletion, then the data transmission applications of described new deletion is deleted from described preset data security monitoring list.
3. method according to claim 1, it is characterised in that before judging whether described data transmission applications is in preset data security monitoring list, described method also includes:
Detect whether described communication terminal has newly installed data transmission applications;And
If be detected that described communication terminal has newly installed data transmission applications, then described newly installed data transmission applications is added in described preset data security monitoring list.
4. method according to claim 3, it is characterised in that after detecting that described communication terminal has newly installed data transmission applications, described method also includes:
Exporting the second information, wherein, described second information is for pointing out user to be confirmed whether to be added in described preset data security monitoring list described newly installed data transmission applications;And
If receiving the confirmation confirming to be added in described preset data security monitoring list by described newly installed data transmission applications, then described newly installed data transmission applications is added in described preset data security monitoring list.
5. method according to claim 1, it is characterised in that before judging whether described data transmission applications is in preset data security monitoring list, described method also includes:
Judging whether to receive the renewal instruction to described preset data security monitoring list, wherein, described renewal instruction includes described preset data security monitoring list being added or deleting;And
If receiving the renewal instruction to described preset data security monitoring list, then update described preset data security monitoring list according to described renewal instruction.
6. method according to claim 1, it is characterised in that described method also includes:
Judge whether described preset data security monitoring list is performed renewal;And
If it is judged that described preset data security monitoring list is performed renewal, the application of described communication terminal is carried out global search;
By the result of global search, described preset data security monitoring list is performed renewal.
7. method according to claim 1, it is characterised in that receive the data sending request of data transmission applications in communication terminal and include receiving following any one or more data sending request:
The networking request of described data transmission applications;
Described data transmission applications sends the request of note or multimedia message data;
Described data transmission applications sends the request of mail data;
Described data transmission applications call request;And
The shared Location Request of described data transmission applications.
8. method according to claim 1, it is characterised in that after not authorizing described data transmission applications to carry out data transmission, described method also includes:
Delete the data to be sent of data transmission applications in described communication terminal.
9. method according to claim 1, it is characterised in that before judging whether described data transmission applications is in preset data security monitoring list, described method also includes:
Receiving the input instruction being used for being turned on and off the data security monitoring function of described communication terminal, wherein, described data security monitoring function is that the data to described data transmission applications send the function being monitored;
If receiving the input instruction of the data security monitoring function opening described communication terminal, then open the data security monitoring function of described communication terminal;And
If receiving the input instruction of the data security monitoring function closing described communication terminal, then close the data security monitoring function of described communication terminal.
10. method according to claim 1, it is characterised in that before judging whether described data transmission applications is in preset data security monitoring list, described method also includes:
Detect and whether described communication terminal exists described preset data security monitoring list;
If described communication terminal is absent from described preset data security monitoring list, then retrieve the authority of all of application in described communication terminal, retrieve the application for sending data;And
Described preset data security monitoring list is set up according to the application for sending data retrieved.
11. the data safety monitoring device of a communication terminal, it is characterised in that including:
First receives unit, for receiving the data sending request of data transmission applications in communication terminal;
First judging unit, is used for judging whether described data transmission applications is in preset data security monitoring list;
First output unit, for when judging that described data transmission applications is in described preset data security monitoring list, exporting the first information, wherein, for pointing out user to be confirmed whether, the transmission of the data to described data transmission applications authorizes described first information;
First granted unit, for when receiving the first instruction information, authorizing described data transmission applications to carry out data transmission, wherein, described first instruction information is confirm that the data to described data transmission applications send the instruction information authorized;And
Second granted unit, for when receiving the second instruction information, not authorizing described data transmission applications to carry out data transmission, wherein, described second instruction information is confirm the data of described data transmission applications not to be sent the instruction information authorized.
12. device according to claim 11, it is characterised in that described device also includes:
First detection unit, for, before judging whether described data transmission applications is in preset data security monitoring list, detecting whether described communication terminal has the data transmission applications of new deletion;And
Delete unit, for when the data transmission applications that described communication terminal has new deletion being detected, the data transmission applications of described new deletion being deleted from described preset data security monitoring list.
13. device according to claim 11, it is characterised in that described device also includes:
Second detection unit, for, before judging whether described data transmission applications is in preset data security monitoring list, detecting whether described communication terminal has newly installed data transmission applications;And
First adding device, for when detecting that described communication terminal has newly installed data transmission applications, being added into described newly installed data transmission applications in described preset data security monitoring list.
14. device according to claim 13, it is characterised in that described device also includes:
Second output unit, for after detecting that described communication terminal has newly installed data transmission applications, export the second information, wherein, described second information is for pointing out user to be confirmed whether to be added in described preset data security monitoring list described newly installed data transmission applications;And
Second adding device, for when receiving the confirmation confirming to be added in described preset data security monitoring list by described newly installed data transmission applications, being added into described newly installed data transmission applications in described preset data security monitoring list.
15. device according to claim 11, it is characterised in that described device also includes:
Second judging unit, for before judging whether described data transmission applications is in preset data security monitoring list, judge whether to receive the renewal instruction to described preset data security monitoring list, wherein, described renewal instruction includes described preset data security monitoring list being added or deleting;And
First updating block, for when receiving the renewal instruction to described preset data security monitoring list, updating described preset data security monitoring list according to described renewal instruction.
16. device according to claim 11, it is characterised in that described device also includes:
3rd judging unit, is used for judging whether described preset data security monitoring list is performed renewal;And
First retrieval unit, for if it is judged that described preset data security monitoring list is performed renewal, carrying out global search to the application of described communication terminal;
Second updating block, for performing renewal by the result of global search to described preset data security monitoring list.
17. device according to claim 11, it is characterised in that described device also includes:
Second receives unit, for before judging whether described data transmission applications is in preset data security monitoring list, receive the input instruction being used for being turned on and off the data security monitoring function of described communication terminal, wherein, described data security monitoring function is that the data to described data transmission applications send the function being monitored;
Open unit, for when receiving the input instruction of the data security monitoring function opening described communication terminal, opening the data security monitoring function of described communication terminal;And
Closing unit, for when receiving the input instruction of the data security monitoring function closing described communication terminal, closing the data security monitoring function of described communication terminal.
18. device according to claim 11, it is characterised in that described device also includes:
3rd detection unit, for, before judging whether described data transmission applications is in preset data security monitoring list, detecting and whether there is described preset data security monitoring list in described communication terminal;
Second retrieval unit, during for being absent from described preset data security monitoring list in described communication terminal, retrieves the authority of all of application in described communication terminal, retrieves the application for sending data;And
Set up unit, for setting up described preset data security monitoring list according to the application for sending data retrieved.
19. a communication terminal, it is characterised in that include the data safety monitoring device of communication terminal according to any one of claim 11 to 18.
CN201610032220.1A 2016-01-15 2016-01-15 Mobile communication terminal, data security monitoring method and device thereof Pending CN105718809A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610032220.1A CN105718809A (en) 2016-01-15 2016-01-15 Mobile communication terminal, data security monitoring method and device thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610032220.1A CN105718809A (en) 2016-01-15 2016-01-15 Mobile communication terminal, data security monitoring method and device thereof

Publications (1)

Publication Number Publication Date
CN105718809A true CN105718809A (en) 2016-06-29

Family

ID=56147299

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610032220.1A Pending CN105718809A (en) 2016-01-15 2016-01-15 Mobile communication terminal, data security monitoring method and device thereof

Country Status (1)

Country Link
CN (1) CN105718809A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107480983A (en) * 2017-08-29 2017-12-15 马建山 A kind of antitheft mobile phone payment system
CN110334529A (en) * 2019-06-24 2019-10-15 歌尔科技有限公司 Data processing method, device, equipment, system and audio frequency apparatus
CN110347862A (en) * 2019-06-24 2019-10-18 歌尔股份有限公司 Recording processing method, device, equipment, system and audio frequency apparatus
CN110347248A (en) * 2019-06-24 2019-10-18 歌尔科技有限公司 Interaction processing method, device, equipment and audio frequency apparatus
CN110400562A (en) * 2019-06-24 2019-11-01 歌尔科技有限公司 Interaction processing method, device, equipment and audio frequency apparatus
CN110941812A (en) * 2019-10-23 2020-03-31 天津智融创新科技发展有限公司 Privileged function calling method and system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102110220A (en) * 2011-02-14 2011-06-29 宇龙计算机通信科技(深圳)有限公司 Application program monitoring method and device
CN103150243A (en) * 2013-02-27 2013-06-12 广东欧珀移动通信有限公司 Monitoring method for application program of mobile terminal
CN103425926A (en) * 2012-05-14 2013-12-04 腾讯科技(深圳)有限公司 Application program starting method, list configuring method, terminal and server
CN103473232A (en) * 2012-06-06 2013-12-25 北京三星通信技术研究有限公司 Self-management device and self-management method of application programs
US20140082611A1 (en) * 2012-09-20 2014-03-20 Samsung Electronics Co. Ltd. Apparatus and method for monitoring application permissions
CN105072255A (en) * 2015-07-10 2015-11-18 北京奇虎科技有限公司 Mobile equipment privacy authority control method, mobile equipment privacy authority control device and corresponding mobile phone equipment

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102110220A (en) * 2011-02-14 2011-06-29 宇龙计算机通信科技(深圳)有限公司 Application program monitoring method and device
CN103425926A (en) * 2012-05-14 2013-12-04 腾讯科技(深圳)有限公司 Application program starting method, list configuring method, terminal and server
CN103473232A (en) * 2012-06-06 2013-12-25 北京三星通信技术研究有限公司 Self-management device and self-management method of application programs
US20140082611A1 (en) * 2012-09-20 2014-03-20 Samsung Electronics Co. Ltd. Apparatus and method for monitoring application permissions
CN103150243A (en) * 2013-02-27 2013-06-12 广东欧珀移动通信有限公司 Monitoring method for application program of mobile terminal
CN105072255A (en) * 2015-07-10 2015-11-18 北京奇虎科技有限公司 Mobile equipment privacy authority control method, mobile equipment privacy authority control device and corresponding mobile phone equipment

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107480983A (en) * 2017-08-29 2017-12-15 马建山 A kind of antitheft mobile phone payment system
CN110334529A (en) * 2019-06-24 2019-10-15 歌尔科技有限公司 Data processing method, device, equipment, system and audio frequency apparatus
CN110347862A (en) * 2019-06-24 2019-10-18 歌尔股份有限公司 Recording processing method, device, equipment, system and audio frequency apparatus
CN110347248A (en) * 2019-06-24 2019-10-18 歌尔科技有限公司 Interaction processing method, device, equipment and audio frequency apparatus
CN110400562A (en) * 2019-06-24 2019-11-01 歌尔科技有限公司 Interaction processing method, device, equipment and audio frequency apparatus
CN110400562B (en) * 2019-06-24 2022-03-22 歌尔科技有限公司 Interactive processing method, device, equipment and audio equipment
CN110941812A (en) * 2019-10-23 2020-03-31 天津智融创新科技发展有限公司 Privileged function calling method and system

Similar Documents

Publication Publication Date Title
CN105718809A (en) Mobile communication terminal, data security monitoring method and device thereof
CN105354492B (en) Communication terminal and its message informing control method and device
US8626125B2 (en) Apparatus and method for securing mobile terminal
EP2605455A1 (en) Method and apparatus for preventing illegal encroachment in internal network of intelligent home
EP2597814A1 (en) Abnormality alarm method and service node for intelligent home system
CN106559591B (en) Mobile phone terminal conversation method and device based on call forwarding
CN105631311A (en) Application program authority management method and device as well as terminal
CN102186167A (en) Method and system for monitoring applications
CN104268454A (en) Management method and device of application program of terminal
KR101101797B1 (en) Wireless terminal and method for managing network connection using the same
CN105550584A (en) RBAC based malicious program interception and processing method in Android platform
CN106211164A (en) Terminal network changing method, terminal network switching device and terminal
CN102355519A (en) Malicious call dialing prevention method for mobile intelligent terminal and system thereof
CN111726663A (en) Display device and control method for establishing connection with display device
CN107992745A (en) Kidnap countermeasure in a kind of interface based on Android platform
CN111554013A (en) Access control passing method, device, equipment and storage medium
KR20130059278A (en) An interactive ars voice menu connecting system and a connecting method thereof
CN111050323B (en) Terminal switching method, device and system
CN111107093A (en) Application login method, device, terminal and storage medium
KR101417334B1 (en) Method of blocking intrusion in mobile device and mobile device enabling the method
CN111027053A (en) Detection method and system for Android application program with Activity hijacking prevention function
CN109460654B (en) Service control method, service control system, server and computer storage medium
CN110287659B (en) Management method, terminal and system for APP application dynamic permission
CN102694903B (en) Data communications method and device
CN112399242A (en) Mobile network connection method, device, equipment and medium based on television

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160629