CN106612504A - Method and device for running terminal in trusted environment - Google Patents
Method and device for running terminal in trusted environment Download PDFInfo
- Publication number
- CN106612504A CN106612504A CN201510690352.9A CN201510690352A CN106612504A CN 106612504 A CN106612504 A CN 106612504A CN 201510690352 A CN201510690352 A CN 201510690352A CN 106612504 A CN106612504 A CN 106612504A
- Authority
- CN
- China
- Prior art keywords
- application
- terminal system
- user
- terminal
- environment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Signal Processing (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Computer Networks & Wireless Communication (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Abstract
The invention proposes a method and a device for running a terminal in a trusted environment at least in order to solve the problem on how to ensure that the key information of a user is not captured by a WLAN wireless access ability provider through real-time intervention in the process of network surfing and shopping via a WLAN network and improve the security of terminal use. The method for running a terminal in a trusted environment comprises the following steps: monitoring an application run by a terminal system in real time; judging whether the application run by the terminal system accords with a preset scene; and when the application run by the terminal system accords with the preset scene, intervening with the current running environment of the terminal to ensure that the terminal is in a trusted running environment when key information input by a user is received.
Description
Technical field
The present invention relates to the communications field, in particular to a kind of trusted end-user environment operation method and dress
Put.
Background technology
Mobile phone is becoming personal information centre at present, and mobile phone carries increasing user function,
In addition to traditional speech business based on circuit domain, the mobile Internet application based on data service is
Cover the various aspects of life.Lead in mobile payment, media transmission, information browse, resource sharing etc.
Domain, has changed the traditional lifestyles of people.It is while mobile Internet fast development, mobile
The information security of the Internet is also challenged, and is increasingly becoming the bottleneck of restriction mobile Internet.And mobile phone end
The entrance and node as mobile Internet is held, how to be ensured the safety of its running environment, is had become industry
The core focus on boundary.
When electric business platform moves payment now, if the WLAN wireless networks for using, its payment information
Provider's capture of WLAN wireless access capabilities can be provided, be caused its account number cipher to be revealed, is brought weight
Big security risk.Enter using wlan network online and during doing shopping for user in correlation technique
Row is intervened in real time, it is ensured that the key message of user is not captured by WLAN wireless access capabilities provider, at present
Effective solution is proposed not yet.
The content of the invention
The present invention proposes a kind of trusted end-user environment operation method and device, at least to solve user's use
Wlan network surf the Net and do shopping during intervened in real time, it is ensured that the key message of user not by
The problem of WLAN wireless access capabilities provider capture, improves the safety that terminal is used.
According to an aspect of the invention, there is provided a kind of trusted end-user environment operation method, including:
Application to terminal system operation carries out monitor in real time;
Judge whether the application of the terminal system operation meets default scene;
When the application of terminal system operation meets the default scene, terminal current operating environment is entered
Row is intervened, and to ensure during the key message of receiving user's input, terminal is in believable running environment.
Preferably, the default scene be system default arrange and/or user pre-set, including with down to
It is one of few:
Specific application type, including bank's related application, payment related application etc..
Specific Run-time scenario, is included in the Run-time scenario at input account number cipher interface etc..
Preferably, the scene pre-sets for user and specifically includes:User is by the specific application type
It is arranged to white list, and white list can be carried out increasing, is deleted or modified.
Preferably, judge whether the application of the terminal system operation meets default scene and specifically include:Judge
The application of terminal system operation whether in white list, if, then it is assumed that the terminal system
The application of operation meets the default scene.
Preferably, it is described when the application of terminal system operation meets the default scene, terminal is worked as
Front running environment carries out intervention and specifically includes:When the application of terminal system operation meets the default field
Jing Shi, automatically disconnects WLAN connections, start mobile network data connection, and is currently running all
Nonsystematic application is forced to terminate.
Preferably, when the application of terminal system operation meets the default scene, to the current fortune of terminal
After row environment is intervened, continue monitoring and judge whether the application of presently described terminal system operation meets pre-
If scene, if not no disconnect mobile network data network connection when meeting default scene automatically, and
And connect automatically the WLAN connections of the disconnection.
According to a further aspect in the invention, a kind of trusted end-user environment running gear is additionally provided, including:
Using monitoring module, the application for running to terminal system carries out monitor in real time;
Scene judge module, for judging whether the application of the terminal system operation meets default scene;
Environment intervention module is for when the application that the terminal system is run meets the default scene, right
Terminal current operating environment is intervened, to ensure that terminal is in during the key message of receiving user's input
In believable running environment.
Preferably, the scene judge module judges whether the application of the terminal system operation meets default field
Scape, wherein the default scene be system default arrange and/or user pre-set, including it is following at least it
One:
Specific application type, including bank's related application, payment related application etc..
Specific Run-time scenario, is included in the Run-time scenario at input account number cipher interface etc..
Preferably, the device also includes white list setup module, for user by the specific application type
It is arranged to white list, and white list can be carried out increasing, is deleted or modified.
Preferably, scene judge module is specifically for including the application for judging the terminal system operation being
It is no in white list, if, then it is assumed that the application of terminal system operation meets the default scene.
Preferably, the environment intervention module specifically for:When the application of terminal system operation meets institute
When stating default scene, automatically disconnect WLAN connections, start mobile network data connection, and by it is all just
Force to terminate in the nonsystematic application of operation.
Preferably, the device also includes environment recovery module, for when the application of terminal system operation
When meeting the default scene, after intervening to terminal current operating environment, continue monitoring and judge current
Whether the application of terminal system operation meets default scene, if not no when meeting default scene,
Automatically mobile network data network connection is disconnected, and connects automatically the WLAN connections of the disconnection.
By the embodiment of the present invention, using the method for the feasible environment operation of terminal, user uses wlan network
Intervened during online and shopping in real time, it is ensured that the key message of user is not wirelessly connect by WLAN
Enter the problem of ability provider capture, improve the safety that terminal is used.
Description of the drawings
Accompanying drawing described herein is used for providing a further understanding of the present invention, constitutes of the application
Point, the schematic description and description of the present invention is used to explain the present invention, does not constitute to the present invention's
Improper restriction.In the accompanying drawings:
Fig. 1 is the trusted end-user environment operation method flow chart according to the embodiment of the present invention;
Fig. 2 is the preferred embodiment flow process of the trusted end-user environment operation method according to the embodiment of the present invention
Figure;
Fig. 3 is that white list uses flow process in trusted end-user environment operation method according to the embodiment of the present invention
Figure;
Fig. 4 is that background application terminates flow process in trusted end-user environment operation method according to the embodiment of the present invention
Figure;
Fig. 5 is the trusted end-user environment running gear structure chart implemented according to the present invention.
Specific embodiment
It should be noted that the spy in embodiment and embodiment in the case where not conflicting, in the application
Levy and can be mutually combined.Below with reference to the accompanying drawings and in conjunction with the embodiments describing the present invention in detail.
Fig. 1 is the feasible environment operation method flow chart of terminal according to the embodiment of the present invention.As shown in figure 1,
The method includes:Step S102 is to step S106:
S102:Application to terminal system operation carries out monitor in real time;
In embodiments of the present invention, the step carried out by terminal system manufacturer it is preset, with system-level authority,
Application to mobile phone system operation carries out monitor in real time.
S104:Judge whether the application of the terminal system operation meets default scene;
In embodiments of the present invention, the default scene is that system default is arranged and/or user pre-sets,
Including at least one of:
Specific application type, including bank's related application, payment related application etc..
Specific Run-time scenario, is included in the Run-time scenario at input account number cipher interface etc..
Scene pre-sets for user and specifically includes:The specific application type is arranged to white name by user
It is single, and white list can be carried out increasing, is deleted or modified.Terminal may determine that the terminal
The application of system operation whether in white list, if, then it is assumed that the application symbol of terminal system operation
Close the default scene.
Fig. 3 uses flow chart for white list in the trusted end-user environment operation method of the embodiment of the present invention, such as schemes
Shown in 3:
Step S301:Mobile phone terminal starts;
Step S302:Trusted end-user environment operation method starts, and resides backstage, mobile phone running environment is entered
Row monitor in real time;
Step S303:Read the built-in white list list of system in backstage;
Step S304:After reading built-in white list list, a white list queue is generated, per subsystem
When startup is applied, all the bag name in application bag name and white list queue to be launched is compared, determine
The startup strategy of next step.
Step S305:The white list allocation window that user can be provided in system is carried out to current white list
Zeng Jia, deletion, modification.
Step S306:The amended white list of user is updated, modification result is embodied in white list queue.
Step S307:Flow process terminates.
S106:When the application of terminal system operation meets the default scene, to the current fortune of terminal
Row environment is intervened, and to ensure during the key message of receiving user's input, terminal is in believable operation
In environment.
When the application of terminal system operation meets the default scene, terminal current operating environment is entered
Row intervention is specifically included:When the application of terminal system operation meets the default scene, from dynamic circuit breaker
WLAN connections are opened, starts mobile network data connection, and will be all nonsystematic applications being currently running strong
System terminates.
Fig. 4 terminates flow chart for background application in the trusted end-user environment operation method of the embodiment of the present invention, such as
Shown in Fig. 4:
S401:System start-up application;
S402:Judge that this application starts, system needs to enter trusted context;
S403:Terminate all nonsystematic applications in backstage;
S404:The result of detection cleaning;
S405:If reaching requirement, this terminates the behavior success of background application;
S406:If not reaching requirement, the tactful grade that background application terminates is lifted, backstage is carried out again
Using power cut-off;
S407:Until the result that background application terminates it is up to standard;
S408:Terminate.
When the application of terminal system operation meets the default scene, terminal current operating environment is entered
After row is intervened, continue monitoring and judge whether the application of presently described terminal system operation meets default scene,
If not no when meeting default scene, mobile network data network connection disconnected automatically, and is connected automatically
Connect the WLAN connections of the disconnection.
Fig. 2 is the preferred embodiment flow process of the trusted end-user environment operation method according to the embodiment of the present invention
Figure;As shown in Fig. 2 the embodiment comprises the steps:
Step S201:Mobile phone terminal starts, into standby mode;
Step S202:Start in start process, reside backstage, monitor in real time is carried out to mobile phone running environment;
Step S203:Carry out the judgement of running environment;
Step S204:Mobile phone terminal carries out the switching of data channel, from WLAN environment changings to mobile number
According to network environment, from terms of current technology assessment and protective capacities, the embodiment of the present invention is mobile data network
The transmission link of network is believable;
Step S205:Terminate all of backstage nonsystematic application, prevents running background from having wooden horse process, right
User data is monitored;
Step S206:After user completes data transfer, scene judgement is carried out;
Step S207:Decide whether to exit credible performing environment;
Step S208:Mobile phone terminal exits credible performing environment, reconnects to wlan network;
Step S209:Mobile phone enters standby mode;
Step S210:Flow process terminates.
The base station location that terminal is located according to the optimal cell of the signal intensity, indicates that mobile terminal should
The direction of the movement, position coordinateses directional signal intensity best base station of the direction from mobile terminal
Position coordinateses.
Trusted end-user environment running gear structure chart is additionally provided in the present embodiment, for realizing above-mentioned enforcement
Example and preferred implementation, carried out illustrating are repeated no more, below to being related in the system
Module is illustrated.As used below, term " module " can realize predetermined function software and/
Or the combination of hardware.Although the device described by following examples is preferably with software realizing, firmly
Part, or the realization of the combination of software and hardware is also may and to be contemplated.Fig. 5 is according to the present invention
The trusted end-user environment running gear structure chart of enforcement.As shown in figure 5, the device includes:
Using monitoring module 50, the application for running to terminal system carries out monitor in real time;
Scene judge module 51, for judging whether the application of the terminal system operation meets default scene;
The scene judge module 51 judges whether the application of terminal system operation meets default scene, wherein
The default scene is that system default is arranged and/or user pre-sets, including at least one of:
Specific application type, including bank's related application, payment related application etc..
Specific Run-time scenario, is included in the Run-time scenario at input account number cipher interface etc..
The device also includes white list setup module, is arranged to the specific application type for user
White list, and white list can be carried out increasing, is deleted or modified.
Scene judge module 51 judges the application of the terminal system operation whether in white list, if
It is, then it is assumed that the application of the terminal system operation meets the default scene.
Environment intervention module 52, for meeting the default scene when the application of terminal system operation
When, terminal current operating environment is intervened, to ensure during the key message of receiving user's input, eventually
End is in believable running environment.
Environment intervention module 52 specifically for:When the application of terminal system operation meets the default field
Jing Shi, automatically disconnects WLAN connections, start mobile network data connection, and is currently running all
Nonsystematic application is forced to terminate.
The device also includes environment recovery module, for meeting described pre- when the application of terminal system operation
If during scene, after intervening to terminal current operating environment, continuing monitoring and judging presently described terminal system
Whether the application of system operation meets default scene, if not no when meeting default scene, disconnect automatically and moving
Dynamic network data network connection, and connect automatically the WLAN connections of the disconnection.
Obviously, those skilled in the art should be understood that each module or each step of the above-mentioned present invention can
Realize with general computing device, they can be concentrated on single computing device, or distribution
On the network constituted by multiple computing devices, alternatively, they can use the executable journey of computing device
Sequence code realizing, it is thus possible to by computing device performing in being stored in storage device, and
And in some cases, shown or described step can be performed with the order being different from herein, or
They are fabricated to each integrated circuit modules respectively, or the multiple modules in them or step are made
Realize into single integrated circuit module.So, the present invention is not restricted to any specific hardware and software
With reference to.
The preferred embodiments of the present invention are these are only, the present invention is not limited to, for this area
Technical staff for, the present invention can have various modifications and variations.It is all in the spirit and principles in the present invention
Within, any modification, equivalent substitution and improvements made etc. should be included in protection scope of the present invention
Within.
Claims (12)
1. a kind of trusted end-user environment operation method, it is characterised in that include:
Application to terminal system operation carries out monitor in real time;
Judge whether the application of the terminal system operation meets default scene;
When the application of terminal system operation meets the default scene, to terminal current operating environment
Intervened, to ensure during the key message of receiving user's input, terminal is in believable running environment.
2. trusted end-user environment operation method according to claim 1, it is characterised in that the judgement
Whether the application of the terminal system operation meets default scene, wherein the default scene is system default
Arrange and/or user pre-sets, including at least one of:
Specific application type, including bank's related application, payment related application etc..
Specific Run-time scenario, is included in the Run-time scenario at input account number cipher interface etc..
3. trusted end-user environment operation method according to claim 2, it is characterised in that the scene
Pre-set for user and specifically include:The specific application type is arranged to white list by user, and
White list can be carried out increasing, is deleted or modified.
4. trusted end-user environment operation method according to claim 3, it is characterised in that judge described
Whether the application of terminal system operation meets default scene specifically includes:Judge the terminal system fortune
Capable application whether in white list, if, then it is assumed that the application of terminal system operation meets described
Default scene.
5. trusted end-user environment operation method according to claim 1, it is characterised in that described to work as institute
The application of terminal system operation is stated when meeting the default scene, terminal current operating environment is intervened
Specifically include:When the application of terminal system operation meets the default scene, WLAN is disconnected automatically
Connection, starts mobile network data connection, and all nonsystematic applications being currently running is forced to terminate.
6. trusted end-user environment operation method according to claim 5, it is characterised in that also include:
When the application of terminal system operation meets the default scene, terminal current operating environment is carried out
After intervention, continue monitoring and judge whether the application of presently described terminal system operation meets default scene, such as
Fruit is not no when meeting default scene, then disconnect automatically mobile network data network connection, and connect automatically
The WLAN connections of the disconnection.
7. a kind of trusted end-user environment running gear, it is characterised in that include:
Using monitoring module, the application for running to terminal system carries out monitor in real time;
Scene judge module, for judging whether the application of the terminal system operation meets default scene;
Environment intervention module, for when the application that the terminal system is run meets the default scene,
Terminal current operating environment is intervened, to ensure during the key message of receiving user's input, end
In believable running environment.
8. trusted end-user environment running gear according to claim 7, it is characterised in that the scene
Judge module judges whether the application of the terminal system operation meets default scene, wherein the default field
Scape is that system default is arranged and/or user pre-sets, including at least one of:
Specific application type, including bank's related application, payment related application etc..
Specific Run-time scenario, is included in the Run-time scenario at input account number cipher interface etc..
9. trusted end-user environment running gear according to claim 8, it is characterised in that also including white
The specific application type is arranged to white list for user by list setup module, and can be right
White list is carried out increasing, is deleted or modified.
10. trusted end-user environment running gear according to claim 9, it is characterised in that scene is sentenced
Disconnected module specifically for including judging application that the terminal system is run whether in white list, if
It is, then it is assumed that the application of the terminal system operation meets the default scene.
11. trusted end-user environment running gears according to claim 7, it is characterised in that the ring
Border intervention module specifically for:When the application of terminal system operation meets the default scene, from
Dynamic circuit breaker opens WLAN connections, starts mobile network data connection, and should by all nonsystematics being currently running
Terminated with pressure.
12. trusted end-user environment running gears according to claim 11, it is characterised in that also include
Environment recovery module, for when the application that the terminal system is run meets the default scene, to end
After end current operating environment is intervened, continue monitoring and judge that the application of presently described terminal system operation is
It is no to meet default scene, if not no when meeting default scene, disconnect automatically mobile network data network
Connection, and connect automatically the WLAN connections of the disconnection.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510690352.9A CN106612504A (en) | 2015-10-21 | 2015-10-21 | Method and device for running terminal in trusted environment |
PCT/CN2016/080392 WO2016165674A1 (en) | 2015-10-21 | 2016-04-27 | Trusted environment operating method and device for terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510690352.9A CN106612504A (en) | 2015-10-21 | 2015-10-21 | Method and device for running terminal in trusted environment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106612504A true CN106612504A (en) | 2017-05-03 |
Family
ID=57127156
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510690352.9A Withdrawn CN106612504A (en) | 2015-10-21 | 2015-10-21 | Method and device for running terminal in trusted environment |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN106612504A (en) |
WO (1) | WO2016165674A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107621977A (en) * | 2017-09-28 | 2018-01-23 | 努比亚技术有限公司 | A kind of control method of application, terminal and computer-readable recording medium |
CN112416380A (en) * | 2019-08-21 | 2021-02-26 | 成都鼎桥通信技术有限公司 | Method and device for preventing killing and preventing freezing by applying |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115361470B (en) * | 2022-08-26 | 2024-02-27 | 中国银行股份有限公司 | Method and device for limiting mobile terminal APP operation network environment |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100185953A1 (en) * | 2009-01-19 | 2010-07-22 | Compagnie Industrielle Et Financiere D'ingenierie Ingenico | Method for securing an interface between a user and an application, corresponding system, terminal and computer program product |
CN103595731A (en) * | 2013-11-29 | 2014-02-19 | 北京网秦天下科技有限公司 | System and method for protecting account security |
CN104021339A (en) * | 2014-06-10 | 2014-09-03 | 北京奇虎科技有限公司 | Safety payment method and device for mobile terminal |
CN104267994A (en) * | 2014-09-30 | 2015-01-07 | 北京奇虎科技有限公司 | Application running device and terminal device |
CN104463569A (en) * | 2014-11-11 | 2015-03-25 | 北京奇虎科技有限公司 | Secure connection payment method and device |
CN104821992A (en) * | 2015-05-25 | 2015-08-05 | 广东欧珀移动通信有限公司 | Method and device for automatically switching network connection type of mobile phone |
CN104869565A (en) * | 2015-05-28 | 2015-08-26 | 魅族科技(中国)有限公司 | Communication information access method and terminal |
CN104902479A (en) * | 2015-05-20 | 2015-09-09 | 玉环看知信息科技有限公司 | Network security management equipment and method and mobile terminal |
-
2015
- 2015-10-21 CN CN201510690352.9A patent/CN106612504A/en not_active Withdrawn
-
2016
- 2016-04-27 WO PCT/CN2016/080392 patent/WO2016165674A1/en active Application Filing
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100185953A1 (en) * | 2009-01-19 | 2010-07-22 | Compagnie Industrielle Et Financiere D'ingenierie Ingenico | Method for securing an interface between a user and an application, corresponding system, terminal and computer program product |
CN103595731A (en) * | 2013-11-29 | 2014-02-19 | 北京网秦天下科技有限公司 | System and method for protecting account security |
CN104021339A (en) * | 2014-06-10 | 2014-09-03 | 北京奇虎科技有限公司 | Safety payment method and device for mobile terminal |
CN104267994A (en) * | 2014-09-30 | 2015-01-07 | 北京奇虎科技有限公司 | Application running device and terminal device |
CN104463569A (en) * | 2014-11-11 | 2015-03-25 | 北京奇虎科技有限公司 | Secure connection payment method and device |
CN104902479A (en) * | 2015-05-20 | 2015-09-09 | 玉环看知信息科技有限公司 | Network security management equipment and method and mobile terminal |
CN104821992A (en) * | 2015-05-25 | 2015-08-05 | 广东欧珀移动通信有限公司 | Method and device for automatically switching network connection type of mobile phone |
CN104869565A (en) * | 2015-05-28 | 2015-08-26 | 魅族科技(中国)有限公司 | Communication information access method and terminal |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107621977A (en) * | 2017-09-28 | 2018-01-23 | 努比亚技术有限公司 | A kind of control method of application, terminal and computer-readable recording medium |
CN107621977B (en) * | 2017-09-28 | 2021-06-18 | 努比亚技术有限公司 | Application control method, terminal and computer readable storage medium |
CN112416380A (en) * | 2019-08-21 | 2021-02-26 | 成都鼎桥通信技术有限公司 | Method and device for preventing killing and preventing freezing by applying |
CN112416380B (en) * | 2019-08-21 | 2024-03-29 | 成都鼎桥通信技术有限公司 | Method and device for killing and freezing prevention by application |
Also Published As
Publication number | Publication date |
---|---|
WO2016165674A1 (en) | 2016-10-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104639624B (en) | A kind of method and apparatus for realizing mobile terminal remote access control | |
US9015808B1 (en) | Restricting mobile device services between an occurrence of an account change and acquisition of a security code | |
CN112203336B (en) | Wireless access control method, device and system | |
CN110267327A (en) | Business transmitting method and device | |
CN104168557A (en) | Upgrading method for operating systems and upgrading device for operating systems | |
CN103491648B (en) | Communication means and system based on WIFI | |
CN104581992B (en) | Business access method and mobile management entity | |
CN107567072A (en) | A kind of WIFI hot spot information amending method and device | |
CN105657712B (en) | Access control method and device for WiFi hotspot | |
CN103023930A (en) | Webpage sharing method and device | |
CN106657154B (en) | Wireless access method, system, WiFi platform and operator number taking platform | |
CN103249014A (en) | Method for encrypting short message of mobile communication | |
CN106851779A (en) | A kind of method and mobile terminal for recognizing access point and focus | |
CN109963320A (en) | The control method and equipment of service access | |
CN106612504A (en) | Method and device for running terminal in trusted environment | |
CN103916852A (en) | Data transmission method and mobile terminal | |
CN106454968A (en) | CSFB-based calling method and apparatus | |
CN107294723A (en) | The generation of message integrity authentication information and verification method, device and checking system | |
CN105451161B (en) | File sharing method and system are realized based on Android mobile phone built in base station mode | |
CN105933890A (en) | Embedded SIM card realizing method and system, user terminal and server | |
CN102300183A (en) | Method and device for protecting data service | |
CN105530714A (en) | MIFI communication service system and MIFI and communication method thereof | |
CN107071810A (en) | Processing method, mobile terminal and base station that data cube computation disconnects | |
CN106102011A (en) | Method, device and the terminal that a kind of terminal positioning processes | |
CN105681352A (en) | Wi-Fi access security control method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20170503 |