CN106612504A - Method and device for running terminal in trusted environment - Google Patents

Method and device for running terminal in trusted environment Download PDF

Info

Publication number
CN106612504A
CN106612504A CN201510690352.9A CN201510690352A CN106612504A CN 106612504 A CN106612504 A CN 106612504A CN 201510690352 A CN201510690352 A CN 201510690352A CN 106612504 A CN106612504 A CN 106612504A
Authority
CN
China
Prior art keywords
application
terminal system
user
terminal
environment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201510690352.9A
Other languages
Chinese (zh)
Inventor
刘小锐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201510690352.9A priority Critical patent/CN106612504A/en
Priority to PCT/CN2016/080392 priority patent/WO2016165674A1/en
Publication of CN106612504A publication Critical patent/CN106612504A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Signal Processing (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The invention proposes a method and a device for running a terminal in a trusted environment at least in order to solve the problem on how to ensure that the key information of a user is not captured by a WLAN wireless access ability provider through real-time intervention in the process of network surfing and shopping via a WLAN network and improve the security of terminal use. The method for running a terminal in a trusted environment comprises the following steps: monitoring an application run by a terminal system in real time; judging whether the application run by the terminal system accords with a preset scene; and when the application run by the terminal system accords with the preset scene, intervening with the current running environment of the terminal to ensure that the terminal is in a trusted running environment when key information input by a user is received.

Description

A kind of trusted end-user environment operation method and device
Technical field
The present invention relates to the communications field, in particular to a kind of trusted end-user environment operation method and dress Put.
Background technology
Mobile phone is becoming personal information centre at present, and mobile phone carries increasing user function, In addition to traditional speech business based on circuit domain, the mobile Internet application based on data service is Cover the various aspects of life.Lead in mobile payment, media transmission, information browse, resource sharing etc. Domain, has changed the traditional lifestyles of people.It is while mobile Internet fast development, mobile The information security of the Internet is also challenged, and is increasingly becoming the bottleneck of restriction mobile Internet.And mobile phone end The entrance and node as mobile Internet is held, how to be ensured the safety of its running environment, is had become industry The core focus on boundary.
When electric business platform moves payment now, if the WLAN wireless networks for using, its payment information Provider's capture of WLAN wireless access capabilities can be provided, be caused its account number cipher to be revealed, is brought weight Big security risk.Enter using wlan network online and during doing shopping for user in correlation technique Row is intervened in real time, it is ensured that the key message of user is not captured by WLAN wireless access capabilities provider, at present Effective solution is proposed not yet.
The content of the invention
The present invention proposes a kind of trusted end-user environment operation method and device, at least to solve user's use Wlan network surf the Net and do shopping during intervened in real time, it is ensured that the key message of user not by The problem of WLAN wireless access capabilities provider capture, improves the safety that terminal is used.
According to an aspect of the invention, there is provided a kind of trusted end-user environment operation method, including:
Application to terminal system operation carries out monitor in real time;
Judge whether the application of the terminal system operation meets default scene;
When the application of terminal system operation meets the default scene, terminal current operating environment is entered Row is intervened, and to ensure during the key message of receiving user's input, terminal is in believable running environment.
Preferably, the default scene be system default arrange and/or user pre-set, including with down to It is one of few:
Specific application type, including bank's related application, payment related application etc..
Specific Run-time scenario, is included in the Run-time scenario at input account number cipher interface etc..
Preferably, the scene pre-sets for user and specifically includes:User is by the specific application type It is arranged to white list, and white list can be carried out increasing, is deleted or modified.
Preferably, judge whether the application of the terminal system operation meets default scene and specifically include:Judge The application of terminal system operation whether in white list, if, then it is assumed that the terminal system The application of operation meets the default scene.
Preferably, it is described when the application of terminal system operation meets the default scene, terminal is worked as Front running environment carries out intervention and specifically includes:When the application of terminal system operation meets the default field Jing Shi, automatically disconnects WLAN connections, start mobile network data connection, and is currently running all Nonsystematic application is forced to terminate.
Preferably, when the application of terminal system operation meets the default scene, to the current fortune of terminal After row environment is intervened, continue monitoring and judge whether the application of presently described terminal system operation meets pre- If scene, if not no disconnect mobile network data network connection when meeting default scene automatically, and And connect automatically the WLAN connections of the disconnection.
According to a further aspect in the invention, a kind of trusted end-user environment running gear is additionally provided, including:
Using monitoring module, the application for running to terminal system carries out monitor in real time;
Scene judge module, for judging whether the application of the terminal system operation meets default scene;
Environment intervention module is for when the application that the terminal system is run meets the default scene, right Terminal current operating environment is intervened, to ensure that terminal is in during the key message of receiving user's input In believable running environment.
Preferably, the scene judge module judges whether the application of the terminal system operation meets default field Scape, wherein the default scene be system default arrange and/or user pre-set, including it is following at least it One:
Specific application type, including bank's related application, payment related application etc..
Specific Run-time scenario, is included in the Run-time scenario at input account number cipher interface etc..
Preferably, the device also includes white list setup module, for user by the specific application type It is arranged to white list, and white list can be carried out increasing, is deleted or modified.
Preferably, scene judge module is specifically for including the application for judging the terminal system operation being It is no in white list, if, then it is assumed that the application of terminal system operation meets the default scene.
Preferably, the environment intervention module specifically for:When the application of terminal system operation meets institute When stating default scene, automatically disconnect WLAN connections, start mobile network data connection, and by it is all just Force to terminate in the nonsystematic application of operation.
Preferably, the device also includes environment recovery module, for when the application of terminal system operation When meeting the default scene, after intervening to terminal current operating environment, continue monitoring and judge current Whether the application of terminal system operation meets default scene, if not no when meeting default scene, Automatically mobile network data network connection is disconnected, and connects automatically the WLAN connections of the disconnection.
By the embodiment of the present invention, using the method for the feasible environment operation of terminal, user uses wlan network Intervened during online and shopping in real time, it is ensured that the key message of user is not wirelessly connect by WLAN Enter the problem of ability provider capture, improve the safety that terminal is used.
Description of the drawings
Accompanying drawing described herein is used for providing a further understanding of the present invention, constitutes of the application Point, the schematic description and description of the present invention is used to explain the present invention, does not constitute to the present invention's Improper restriction.In the accompanying drawings:
Fig. 1 is the trusted end-user environment operation method flow chart according to the embodiment of the present invention;
Fig. 2 is the preferred embodiment flow process of the trusted end-user environment operation method according to the embodiment of the present invention Figure;
Fig. 3 is that white list uses flow process in trusted end-user environment operation method according to the embodiment of the present invention Figure;
Fig. 4 is that background application terminates flow process in trusted end-user environment operation method according to the embodiment of the present invention Figure;
Fig. 5 is the trusted end-user environment running gear structure chart implemented according to the present invention.
Specific embodiment
It should be noted that the spy in embodiment and embodiment in the case where not conflicting, in the application Levy and can be mutually combined.Below with reference to the accompanying drawings and in conjunction with the embodiments describing the present invention in detail.
Fig. 1 is the feasible environment operation method flow chart of terminal according to the embodiment of the present invention.As shown in figure 1, The method includes:Step S102 is to step S106:
S102:Application to terminal system operation carries out monitor in real time;
In embodiments of the present invention, the step carried out by terminal system manufacturer it is preset, with system-level authority, Application to mobile phone system operation carries out monitor in real time.
S104:Judge whether the application of the terminal system operation meets default scene;
In embodiments of the present invention, the default scene is that system default is arranged and/or user pre-sets, Including at least one of:
Specific application type, including bank's related application, payment related application etc..
Specific Run-time scenario, is included in the Run-time scenario at input account number cipher interface etc..
Scene pre-sets for user and specifically includes:The specific application type is arranged to white name by user It is single, and white list can be carried out increasing, is deleted or modified.Terminal may determine that the terminal The application of system operation whether in white list, if, then it is assumed that the application symbol of terminal system operation Close the default scene.
Fig. 3 uses flow chart for white list in the trusted end-user environment operation method of the embodiment of the present invention, such as schemes Shown in 3:
Step S301:Mobile phone terminal starts;
Step S302:Trusted end-user environment operation method starts, and resides backstage, mobile phone running environment is entered Row monitor in real time;
Step S303:Read the built-in white list list of system in backstage;
Step S304:After reading built-in white list list, a white list queue is generated, per subsystem When startup is applied, all the bag name in application bag name and white list queue to be launched is compared, determine The startup strategy of next step.
Step S305:The white list allocation window that user can be provided in system is carried out to current white list Zeng Jia, deletion, modification.
Step S306:The amended white list of user is updated, modification result is embodied in white list queue.
Step S307:Flow process terminates.
S106:When the application of terminal system operation meets the default scene, to the current fortune of terminal Row environment is intervened, and to ensure during the key message of receiving user's input, terminal is in believable operation In environment.
When the application of terminal system operation meets the default scene, terminal current operating environment is entered Row intervention is specifically included:When the application of terminal system operation meets the default scene, from dynamic circuit breaker WLAN connections are opened, starts mobile network data connection, and will be all nonsystematic applications being currently running strong System terminates.
Fig. 4 terminates flow chart for background application in the trusted end-user environment operation method of the embodiment of the present invention, such as Shown in Fig. 4:
S401:System start-up application;
S402:Judge that this application starts, system needs to enter trusted context;
S403:Terminate all nonsystematic applications in backstage;
S404:The result of detection cleaning;
S405:If reaching requirement, this terminates the behavior success of background application;
S406:If not reaching requirement, the tactful grade that background application terminates is lifted, backstage is carried out again Using power cut-off;
S407:Until the result that background application terminates it is up to standard;
S408:Terminate.
When the application of terminal system operation meets the default scene, terminal current operating environment is entered After row is intervened, continue monitoring and judge whether the application of presently described terminal system operation meets default scene, If not no when meeting default scene, mobile network data network connection disconnected automatically, and is connected automatically Connect the WLAN connections of the disconnection.
Fig. 2 is the preferred embodiment flow process of the trusted end-user environment operation method according to the embodiment of the present invention Figure;As shown in Fig. 2 the embodiment comprises the steps:
Step S201:Mobile phone terminal starts, into standby mode;
Step S202:Start in start process, reside backstage, monitor in real time is carried out to mobile phone running environment;
Step S203:Carry out the judgement of running environment;
Step S204:Mobile phone terminal carries out the switching of data channel, from WLAN environment changings to mobile number According to network environment, from terms of current technology assessment and protective capacities, the embodiment of the present invention is mobile data network The transmission link of network is believable;
Step S205:Terminate all of backstage nonsystematic application, prevents running background from having wooden horse process, right User data is monitored;
Step S206:After user completes data transfer, scene judgement is carried out;
Step S207:Decide whether to exit credible performing environment;
Step S208:Mobile phone terminal exits credible performing environment, reconnects to wlan network;
Step S209:Mobile phone enters standby mode;
Step S210:Flow process terminates.
The base station location that terminal is located according to the optimal cell of the signal intensity, indicates that mobile terminal should The direction of the movement, position coordinateses directional signal intensity best base station of the direction from mobile terminal Position coordinateses.
Trusted end-user environment running gear structure chart is additionally provided in the present embodiment, for realizing above-mentioned enforcement Example and preferred implementation, carried out illustrating are repeated no more, below to being related in the system Module is illustrated.As used below, term " module " can realize predetermined function software and/ Or the combination of hardware.Although the device described by following examples is preferably with software realizing, firmly Part, or the realization of the combination of software and hardware is also may and to be contemplated.Fig. 5 is according to the present invention The trusted end-user environment running gear structure chart of enforcement.As shown in figure 5, the device includes:
Using monitoring module 50, the application for running to terminal system carries out monitor in real time;
Scene judge module 51, for judging whether the application of the terminal system operation meets default scene;
The scene judge module 51 judges whether the application of terminal system operation meets default scene, wherein The default scene is that system default is arranged and/or user pre-sets, including at least one of:
Specific application type, including bank's related application, payment related application etc..
Specific Run-time scenario, is included in the Run-time scenario at input account number cipher interface etc..
The device also includes white list setup module, is arranged to the specific application type for user White list, and white list can be carried out increasing, is deleted or modified.
Scene judge module 51 judges the application of the terminal system operation whether in white list, if It is, then it is assumed that the application of the terminal system operation meets the default scene.
Environment intervention module 52, for meeting the default scene when the application of terminal system operation When, terminal current operating environment is intervened, to ensure during the key message of receiving user's input, eventually End is in believable running environment.
Environment intervention module 52 specifically for:When the application of terminal system operation meets the default field Jing Shi, automatically disconnects WLAN connections, start mobile network data connection, and is currently running all Nonsystematic application is forced to terminate.
The device also includes environment recovery module, for meeting described pre- when the application of terminal system operation If during scene, after intervening to terminal current operating environment, continuing monitoring and judging presently described terminal system Whether the application of system operation meets default scene, if not no when meeting default scene, disconnect automatically and moving Dynamic network data network connection, and connect automatically the WLAN connections of the disconnection.
Obviously, those skilled in the art should be understood that each module or each step of the above-mentioned present invention can Realize with general computing device, they can be concentrated on single computing device, or distribution On the network constituted by multiple computing devices, alternatively, they can use the executable journey of computing device Sequence code realizing, it is thus possible to by computing device performing in being stored in storage device, and And in some cases, shown or described step can be performed with the order being different from herein, or They are fabricated to each integrated circuit modules respectively, or the multiple modules in them or step are made Realize into single integrated circuit module.So, the present invention is not restricted to any specific hardware and software With reference to.
The preferred embodiments of the present invention are these are only, the present invention is not limited to, for this area Technical staff for, the present invention can have various modifications and variations.It is all in the spirit and principles in the present invention Within, any modification, equivalent substitution and improvements made etc. should be included in protection scope of the present invention Within.

Claims (12)

1. a kind of trusted end-user environment operation method, it is characterised in that include:
Application to terminal system operation carries out monitor in real time;
Judge whether the application of the terminal system operation meets default scene;
When the application of terminal system operation meets the default scene, to terminal current operating environment Intervened, to ensure during the key message of receiving user's input, terminal is in believable running environment.
2. trusted end-user environment operation method according to claim 1, it is characterised in that the judgement Whether the application of the terminal system operation meets default scene, wherein the default scene is system default Arrange and/or user pre-sets, including at least one of:
Specific application type, including bank's related application, payment related application etc..
Specific Run-time scenario, is included in the Run-time scenario at input account number cipher interface etc..
3. trusted end-user environment operation method according to claim 2, it is characterised in that the scene Pre-set for user and specifically include:The specific application type is arranged to white list by user, and White list can be carried out increasing, is deleted or modified.
4. trusted end-user environment operation method according to claim 3, it is characterised in that judge described Whether the application of terminal system operation meets default scene specifically includes:Judge the terminal system fortune Capable application whether in white list, if, then it is assumed that the application of terminal system operation meets described Default scene.
5. trusted end-user environment operation method according to claim 1, it is characterised in that described to work as institute The application of terminal system operation is stated when meeting the default scene, terminal current operating environment is intervened Specifically include:When the application of terminal system operation meets the default scene, WLAN is disconnected automatically Connection, starts mobile network data connection, and all nonsystematic applications being currently running is forced to terminate.
6. trusted end-user environment operation method according to claim 5, it is characterised in that also include: When the application of terminal system operation meets the default scene, terminal current operating environment is carried out After intervention, continue monitoring and judge whether the application of presently described terminal system operation meets default scene, such as Fruit is not no when meeting default scene, then disconnect automatically mobile network data network connection, and connect automatically The WLAN connections of the disconnection.
7. a kind of trusted end-user environment running gear, it is characterised in that include:
Using monitoring module, the application for running to terminal system carries out monitor in real time;
Scene judge module, for judging whether the application of the terminal system operation meets default scene;
Environment intervention module, for when the application that the terminal system is run meets the default scene, Terminal current operating environment is intervened, to ensure during the key message of receiving user's input, end In believable running environment.
8. trusted end-user environment running gear according to claim 7, it is characterised in that the scene Judge module judges whether the application of the terminal system operation meets default scene, wherein the default field Scape is that system default is arranged and/or user pre-sets, including at least one of:
Specific application type, including bank's related application, payment related application etc..
Specific Run-time scenario, is included in the Run-time scenario at input account number cipher interface etc..
9. trusted end-user environment running gear according to claim 8, it is characterised in that also including white The specific application type is arranged to white list for user by list setup module, and can be right White list is carried out increasing, is deleted or modified.
10. trusted end-user environment running gear according to claim 9, it is characterised in that scene is sentenced Disconnected module specifically for including judging application that the terminal system is run whether in white list, if It is, then it is assumed that the application of the terminal system operation meets the default scene.
11. trusted end-user environment running gears according to claim 7, it is characterised in that the ring Border intervention module specifically for:When the application of terminal system operation meets the default scene, from Dynamic circuit breaker opens WLAN connections, starts mobile network data connection, and should by all nonsystematics being currently running Terminated with pressure.
12. trusted end-user environment running gears according to claim 11, it is characterised in that also include Environment recovery module, for when the application that the terminal system is run meets the default scene, to end After end current operating environment is intervened, continue monitoring and judge that the application of presently described terminal system operation is It is no to meet default scene, if not no when meeting default scene, disconnect automatically mobile network data network Connection, and connect automatically the WLAN connections of the disconnection.
CN201510690352.9A 2015-10-21 2015-10-21 Method and device for running terminal in trusted environment Withdrawn CN106612504A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510690352.9A CN106612504A (en) 2015-10-21 2015-10-21 Method and device for running terminal in trusted environment
PCT/CN2016/080392 WO2016165674A1 (en) 2015-10-21 2016-04-27 Trusted environment operating method and device for terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510690352.9A CN106612504A (en) 2015-10-21 2015-10-21 Method and device for running terminal in trusted environment

Publications (1)

Publication Number Publication Date
CN106612504A true CN106612504A (en) 2017-05-03

Family

ID=57127156

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510690352.9A Withdrawn CN106612504A (en) 2015-10-21 2015-10-21 Method and device for running terminal in trusted environment

Country Status (2)

Country Link
CN (1) CN106612504A (en)
WO (1) WO2016165674A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107621977A (en) * 2017-09-28 2018-01-23 努比亚技术有限公司 A kind of control method of application, terminal and computer-readable recording medium
CN112416380A (en) * 2019-08-21 2021-02-26 成都鼎桥通信技术有限公司 Method and device for preventing killing and preventing freezing by applying

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115361470B (en) * 2022-08-26 2024-02-27 中国银行股份有限公司 Method and device for limiting mobile terminal APP operation network environment

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100185953A1 (en) * 2009-01-19 2010-07-22 Compagnie Industrielle Et Financiere D'ingenierie Ingenico Method for securing an interface between a user and an application, corresponding system, terminal and computer program product
CN103595731A (en) * 2013-11-29 2014-02-19 北京网秦天下科技有限公司 System and method for protecting account security
CN104021339A (en) * 2014-06-10 2014-09-03 北京奇虎科技有限公司 Safety payment method and device for mobile terminal
CN104267994A (en) * 2014-09-30 2015-01-07 北京奇虎科技有限公司 Application running device and terminal device
CN104463569A (en) * 2014-11-11 2015-03-25 北京奇虎科技有限公司 Secure connection payment method and device
CN104821992A (en) * 2015-05-25 2015-08-05 广东欧珀移动通信有限公司 Method and device for automatically switching network connection type of mobile phone
CN104869565A (en) * 2015-05-28 2015-08-26 魅族科技(中国)有限公司 Communication information access method and terminal
CN104902479A (en) * 2015-05-20 2015-09-09 玉环看知信息科技有限公司 Network security management equipment and method and mobile terminal

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100185953A1 (en) * 2009-01-19 2010-07-22 Compagnie Industrielle Et Financiere D'ingenierie Ingenico Method for securing an interface between a user and an application, corresponding system, terminal and computer program product
CN103595731A (en) * 2013-11-29 2014-02-19 北京网秦天下科技有限公司 System and method for protecting account security
CN104021339A (en) * 2014-06-10 2014-09-03 北京奇虎科技有限公司 Safety payment method and device for mobile terminal
CN104267994A (en) * 2014-09-30 2015-01-07 北京奇虎科技有限公司 Application running device and terminal device
CN104463569A (en) * 2014-11-11 2015-03-25 北京奇虎科技有限公司 Secure connection payment method and device
CN104902479A (en) * 2015-05-20 2015-09-09 玉环看知信息科技有限公司 Network security management equipment and method and mobile terminal
CN104821992A (en) * 2015-05-25 2015-08-05 广东欧珀移动通信有限公司 Method and device for automatically switching network connection type of mobile phone
CN104869565A (en) * 2015-05-28 2015-08-26 魅族科技(中国)有限公司 Communication information access method and terminal

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107621977A (en) * 2017-09-28 2018-01-23 努比亚技术有限公司 A kind of control method of application, terminal and computer-readable recording medium
CN107621977B (en) * 2017-09-28 2021-06-18 努比亚技术有限公司 Application control method, terminal and computer readable storage medium
CN112416380A (en) * 2019-08-21 2021-02-26 成都鼎桥通信技术有限公司 Method and device for preventing killing and preventing freezing by applying
CN112416380B (en) * 2019-08-21 2024-03-29 成都鼎桥通信技术有限公司 Method and device for killing and freezing prevention by application

Also Published As

Publication number Publication date
WO2016165674A1 (en) 2016-10-20

Similar Documents

Publication Publication Date Title
CN104639624B (en) A kind of method and apparatus for realizing mobile terminal remote access control
US9015808B1 (en) Restricting mobile device services between an occurrence of an account change and acquisition of a security code
CN112203336B (en) Wireless access control method, device and system
CN110267327A (en) Business transmitting method and device
CN104168557A (en) Upgrading method for operating systems and upgrading device for operating systems
CN103491648B (en) Communication means and system based on WIFI
CN104581992B (en) Business access method and mobile management entity
CN107567072A (en) A kind of WIFI hot spot information amending method and device
CN105657712B (en) Access control method and device for WiFi hotspot
CN103023930A (en) Webpage sharing method and device
CN106657154B (en) Wireless access method, system, WiFi platform and operator number taking platform
CN103249014A (en) Method for encrypting short message of mobile communication
CN106851779A (en) A kind of method and mobile terminal for recognizing access point and focus
CN109963320A (en) The control method and equipment of service access
CN106612504A (en) Method and device for running terminal in trusted environment
CN103916852A (en) Data transmission method and mobile terminal
CN106454968A (en) CSFB-based calling method and apparatus
CN107294723A (en) The generation of message integrity authentication information and verification method, device and checking system
CN105451161B (en) File sharing method and system are realized based on Android mobile phone built in base station mode
CN105933890A (en) Embedded SIM card realizing method and system, user terminal and server
CN102300183A (en) Method and device for protecting data service
CN105530714A (en) MIFI communication service system and MIFI and communication method thereof
CN107071810A (en) Processing method, mobile terminal and base station that data cube computation disconnects
CN106102011A (en) Method, device and the terminal that a kind of terminal positioning processes
CN105681352A (en) Wi-Fi access security control method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20170503