CN106686624A - Control method and device - Google Patents

Control method and device Download PDF

Info

Publication number
CN106686624A
CN106686624A CN201510760111.7A CN201510760111A CN106686624A CN 106686624 A CN106686624 A CN 106686624A CN 201510760111 A CN201510760111 A CN 201510760111A CN 106686624 A CN106686624 A CN 106686624A
Authority
CN
China
Prior art keywords
application
network switching
terminal device
white list
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510760111.7A
Other languages
Chinese (zh)
Inventor
杨鹏
郭泉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201510760111.7A priority Critical patent/CN106686624A/en
Priority to PCT/CN2016/091625 priority patent/WO2017080255A1/en
Publication of CN106686624A publication Critical patent/CN106686624A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/34Reselection control
    • H04W36/36Reselection control by user or terminal equipment
    • H04W36/362Conditional handover
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/34Reselection control
    • H04W36/36Reselection control by user or terminal equipment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a control method, which is used for a terminal device. The method comprises the following steps: detecting whether there is a network switching request; and when detecting the network switching request, judging whether network switching of the terminal device is allowed according to an application initiating the network switching request. According to the scheme, by monitoring the network switching, malicious network switching is prevented effectively and leakage of user privacy data is prevented, and thus user economic loss can be prevented.

Description

A kind of control method and device
Technical field
The present invention relates to the communications field, and in particular to a kind of control method and device.
Background technology
As the development of information technology, smart mobile phone become more popular, become necessary in life Product.With the popularization of mobile phone, user Jing commonly uses mobile phone to be surfed the Net, and mobile network's flow is a kind of Relatively expensive resource, user typically can be surfed the Net in the case where there is WIFI using WIFI. And have a kind of Malware, and mobile network can be automatically switched to, force user to use mobile network, that is, use When using mobile network, Malware meeting positive opening mobile network's switch is closed WIFI network and is opened at family Close.And this can be great consumption user flow, cause the loss economically of user.And also have one kind Situation, then be to force user to be switched to WIFI network, i.e. Malware meeting positive closing mobile network switch, WIFI network switch is opened, WIFI connections are initiated.Such case is more dangerous, as the WIFI of user Router is poisoned, or user is forced to be connected to the fishing WIFI routers of hackers, then can cause The loss of the sensitive informations such as user account, password, contact person, cause the user loss economically.
The content of the invention:
The present invention provides a kind of control method and device, has effectively monitored network switching.
To solve above-mentioned technical problem, the present invention provides a kind of control method, is applied to terminal device, institute The method of stating includes:
Network switching request is detected whether;
When the network switching request is detected, judged according to the application for initiating the network switching request Whether the terminal device network switching is allowed.
Preferably,
It is described that terminal device network switching is determined whether according to the application for initiating the network switching request Including:
When the start white list generated in the terminal device or the white name of default credible third party application When the application for initiating the network switching request is found in list, it is allowed to the terminal device network switching.
Preferably,
It is described that terminal device network switching is determined whether according to the application for initiating the network switching request Including:
When the start white list generated in the terminal device and the white name of default credible third party application All search in list less than during the application for initiating the network switching request, in user-defined network legal power The application is searched in white list, if finding institute in the user-defined network legal power white list Application is stated, then allows the terminal device network switching.
Preferably,
It is described that terminal device network switching is determined whether according to the application for initiating the network switching request Including:
When the start white list generated in the terminal device and the white name of default credible third party application All search in list less than during the application for initiating the network switching request, in user-defined network legal power The application is searched in white list, if search in the user-defined network legal power white list less than The application, then point out application requests network switching, and when receiving after network switching confirms response institute is allowed State terminal device network switching.
Preferably, it is described to allow the terminal device network switching after network switching confirmation response is received Also include afterwards:
The application of the initiation network switching request is added into the white name of the user-defined network legal power It is single.
Preferably, methods described also includes:
Whether the application monitored in user-defined network legal power white list accesses private data;
When monitoring that arbitrary application accesses private data, indicating risk is carried out.
Preferably, methods described also includes:
When the terminal device is judged to first power on, start white list is generated according to the application of prepackage.
The present invention also provides a kind of control device, is arranged at terminal device, and described device includes:
Detection module, for detecting whether there is network switching request;
Judge module, for when the network switching request is detected, according to the initiation network switching The application of request determines whether the terminal device network switching.
Preferably,
The judge module includes the first switching submodule;
First switching submodule is used for when the start white list generated in the terminal device or default Credible third party application white list in when finding the application for initiating the network switching request, it is allowed to The terminal device network switching.
Preferably,
The judge module includes the second switching submodule;
Second switching submodule is used for when the start white list generated in the terminal device and presets Credible third party application white list in all search less than during the application for initiating the network switching request, The application is searched in user-defined network legal power white list, if the user-defined net The application is found in network authority white list, then allows the terminal device network switching.
Preferably,
The judge module includes the 3rd switching submodule;
3rd switching submodule is used for when the start white list generated in the terminal device and presets Credible third party application white list in all search less than during the application for initiating the network switching request, The application is searched in user-defined network legal power white list, if the user-defined net Search in network authority white list less than the application, then point out application requests network switching, when receiving net Network switching confirms to allow the terminal device network switching after response.
Preferably,
3rd switching submodule is additionally operable to be added to the application of the initiation network switching request described User-defined network legal power white list.
Preferably, described device also includes:
Control module, for monitoring user-defined network legal power white list in application whether access hidden Private data;It is additionally operable to, when monitoring that arbitrary application accesses private data, carry out indicating risk.
Preferably, described device also includes:
Processing module, for when the terminal device is judged to first power on, according to the application life of prepackage Into start white list.
Such scheme sheet avoids network malice by being monitored to network switching, effectively and switches, and keeps away The leakage of privacy of user data is exempted from, so as to avoid the loss of user's economy.
Description of the drawings
Fig. 1 is the flow chart of the control method in embodiment one;
Fig. 2 is the flow chart of the control method in embodiment two;
Fig. 3 is the structural representation of the control device in embodiment three.
Specific embodiment
Purpose, technical scheme and advantage to make the application becomes more apparent, below in conjunction with accompanying drawing Embodiments herein is described in detail.It should be noted that in the case where not conflicting, this Shen Please in embodiment and the feature in embodiment can mutually be combined.
Network switching according to the present invention can be from WIFI network be switched to mobile network, or from Mobile network is switched to WIFI network.Terminal device carries out management of monitor for network switching, when detecting After the request of the application for initiating network switching, according to the confidence levels of the application network is determined whether Switching.
In the present invention, whole system is scanned when the system of terminal device is used first, acquisition can enter The bag name (such as ID) of the application of row network switching, these applications can be the prepackage of terminal device manufacturer, Then the bag name that these are applied is stored, as start white list.Due to manufacturer be generally impossible to it is right Network carries out malice switching, it can be considered that the application in start white list is rational safest soft Part, by start white list confidence levels highest, such as one-level confidence level are set as, if start white list In application requests network switching can allow the network switching.
Then using default third party software list as two grades of confidence levels network switching application white list, If the application requests network switching in third party software list can also allow network switching.By user certainly The network legal power application white list of definition thinks in the present invention this one-level white list as three-level confidence level Confidence level it is minimum.If the application requests network switching of the rank can first point out user to confirm, if User confirms to allow the application network to switch, then terminal device then carries out network switching.Simultaneously for this The application terminal equipment of one class will be tracked monitoring, even if user allows the application handover network of the rank, Terminal device also can further track whether the application in this white list carries out the behaviour of sensitive data Make, such as upload contact person, message registration sends note, account information uploaded, if upper automatically State the operation of sensitive data, then it is assumed that the application is unsafe, it is high that can now point out user to apply Risk application, and forbid it to access network.
It should be noted that in other embodiments can be with according to other rule settings confidence level levels Not.
Embodiment one
Technical scheme is further illustrated below in conjunction with the accompanying drawings.
As shown in figure 1, the present embodiment provides a kind of control method, terminal device, methods described are applied to Including:
Step S11:Network switching request is detected whether;
Step S12:When the network switching request is detected, according to the initiation network switching request Using determining whether the terminal device network switching.
Specifically,
When the start white list generated in the terminal device or the white name of default credible third party application When the application for initiating the network switching request is found in list, it is allowed to the terminal device network switching.
When the start white list generated in the terminal device and the white name of default credible third party application All search in list less than during the application for initiating the network switching request, in user-defined network legal power The application is searched in white list, if finding institute in the user-defined network legal power white list Application is stated, then allows the terminal device network switching.
When the start white list generated in the terminal device and the white name of default credible third party application All search in list less than during the application for initiating the network switching request, in user-defined network legal power The application is searched in white list, if search in the user-defined network legal power white list less than The application, then point out application requests network switching, and when receiving after network switching confirms response institute is allowed State terminal device network switching.
Preferably, it is described to allow the terminal device network switching after network switching confirmation response is received Also include afterwards:
The application of the initiation network switching request is added into the white name of the user-defined network legal power It is single.
Preferably, methods described also includes:
Whether the application monitored in user-defined network legal power white list accesses private data;
When monitoring that arbitrary application accesses private data, indicating risk is carried out.
Preferably, methods described also includes:
When the terminal device is judged to first power on, according to the mark life of the application of log on switching Into start white list.
Above-mentioned technical proposal, can by carrying out being classified other management to the network switching authority on terminal device Preventing Malware from carrying out network switching well, it is to avoid user is unconsciously just subject to loss, Best Consumer's Experience can also be to the full extent provided simultaneously, reduced user and participated in.
Embodiment two
As shown in Fig. 2 further illustrating technical scheme with reference to specific scene.
Step S201:Judge whether it is start for the first time;If starting shooting for the first time, then turn S202 with Improve the efficiency for processing;Start shooting if not first time, then turn S203;
Step S202:Scanning whole system, generates start white list;
Specifically, the condition code of the application of log on switching authority is obtained after scanning system, equivalent to ID, For one application of unique mark, here we identify an APK with bag name, naturally it is also possible to without Bag name such as uses binary features code identifying the uniqueness of APK, and one is identified with APK signatures The uniqueness of APK.After the condition code being applied, add start white this ID condition code applied In list.
Step S203:It is have network switching request in monitoring system;
Here network switching request refers to closing WIFI network switch, or closes mobile network's switch, And carry out network switching.Either it is switched to WIFI network from mobile network still to switch from WIFI network To mobile network, all monitored.If having listened to network switching request, S204 is gone to step;
Step S204:By the characteristic ID of the application, judge that the application whether there is in start white list, If the application be present in start white list in be if go to step S213, if the application be not present in start shooting S205 is then gone to step in white list.
Step S205:By the characteristic ID of the application, judge the application whether in third party's trusted application In white list;
Such as certain user oneself downloads, the preset well-known third party software of nonsystematic, it is possible to need Network switching is carried out, for these softwares, it would be desirable to excluded outside Malware, by it Constitute third party's trusted application white list.If the application is present in third party, and trusted application is white S213 is then gone to step in list;Else if the application is not present in third party's trusted application white list Go to step S206.
Step S206:By the characteristic ID applied, judge whether the application is in permitting that user oneself is arranged Perhaps in the white list of network switching, S213 is if it is gone to step;If otherwise going to step S207.
Step S207:User is confirmed whether to allow network switching;
Terminal device prompting user has application request to carry out network switching, and shows the information of related application, Such as title, developer etc..If user selects to allow network switching to go to step S208;If user refuses Network switching then goes to step S214.
If user is not temporarily selected, wait user to be selected, carry out again after being selected Corresponding operating.During network switching prompting is shown, monitoring mechanism is present always, if other should With network switching request is carried out, then continue from flow process S203 to start to perform.
Step S208:Carry out network switching;
Step S209:Judge whether user chooses the application is added in self-defined white list, if it is, S210 is then gone to step, S214 is otherwise gone to step.
Step S210:The application is added in user-defined white list;
Specifically, the characteristic ID of the application can be added in user-defined white list.Due to this Using Feasible degree do not have the first two white list high, it would be desirable to further monitor the behavior of the application. That is the operation of execution step S211.
Step S211:Monitor whether the application in user-defined white list there are access privacy of user data, The behaviors such as such as contact person, account information, note, if it is go to step S212.
Step S212:It is risky to remind user to apply, and then goes to step S214.
Can with remind user while the application is deleted from user-defined white list trusty Remove.
Step S213:Allow network switching;
Step S214:Terminate this operation.
Embodiment three
As shown in figure 3, the present embodiment provides a kind of control device, terminal device, described device are arranged at Including:
Detection module 11, for detecting whether there is network switching request;
Judge module 12, for when the network switching request is detected, cutting according to the network is initiated The application for changing request determines whether the terminal device network switching.
Preferably,
The judge module 12 includes the first switching submodule 121;
First switching submodule 121 be used for when the terminal device generate start white list or When the application for initiating the network switching request is found in default credible third party application white list, Allow the terminal device network switching.
Preferably,
The judge module 12 includes the second switching submodule 122;
Second switching submodule 122 be used for when the terminal device generate start white list and All search in default credible third party application white list less than the application for initiating the network switching request When, the application is searched in user-defined network legal power white list, if the User Defined Network legal power white list in find the application, then allow the terminal device network switching.
Preferably,
The judge module 12 includes the 3rd switching submodule 123;
3rd switching submodule 123 be used for when the terminal device generate start white list and All search in default credible third party application white list less than the application for initiating the network switching request When, the application is searched in user-defined network legal power white list, if the User Defined Network legal power white list in search less than the application, then point out application requests network switching, work as reception Confirm to allow the terminal device network switching after response to network switching.
Preferably,
3rd switching submodule 123 is additionally operable to be added to the application of the initiation network switching request The user-defined network legal power white list.
Preferably, described device also includes:
Control module 13, for monitoring user-defined network legal power white list in application whether access Private data;It is additionally operable to, when monitoring that arbitrary application accesses private data, carry out indicating risk.
Preferably, described device also includes:
Processing module 14, for when the terminal device is judged to first power on, according to the application of prepackage Generate start white list.
The preferred embodiments of the present invention are the foregoing is only, the present invention is not limited to, for this For the technical staff in field, the present invention can have various modifications and variations.It is all the present invention spirit and Within principle, any modification, equivalent substitution and improvements made etc. should be included in the protection of the present invention Within the scope of.One of ordinary skill in the art will appreciate that all or part of step in said method can lead to Cross program to instruct related hardware to complete, described program can be stored in computer-readable recording medium, Such as read-only storage, disk or CD.Alternatively, all or part of step of above-described embodiment also may be used To be realized using one or more integrated circuits, correspondingly, each module/module in above-described embodiment can To be realized in the form of hardware, it would however also be possible to employ the form of software function module is realized.The application is not limited It is formed on the combination of the hardware and software of any particular form.

Claims (14)

1. a kind of control method, is applied to terminal device, it is characterised in that methods described includes:
Network switching request is detected whether;
When the network switching request is detected, judged according to the application for initiating the network switching request Whether the terminal device network switching is allowed.
2. the method for claim 1, it is characterised in that:
It is described that terminal device network switching is determined whether according to the application for initiating the network switching request Including:
When the start white list generated in the terminal device or the white name of default credible third party application When the application for initiating the network switching request is found in list, it is allowed to the terminal device network switching.
3. the method for claim 1, it is characterised in that:
It is described that terminal device network switching is determined whether according to the application for initiating the network switching request Including:
When the start white list generated in the terminal device and the white name of default credible third party application All search in list less than during the application for initiating the network switching request, in user-defined network legal power The application is searched in white list, if finding institute in the user-defined network legal power white list Application is stated, then allows the terminal device network switching.
4. the method for claim 1, it is characterised in that:
It is described that terminal device network switching is determined whether according to the application for initiating the network switching request Including:
When the start white list generated in the terminal device and the white name of default credible third party application All search in list less than during the application for initiating the network switching request, in user-defined network legal power The application is searched in white list, if search in the user-defined network legal power white list less than The application, then point out application requests network switching, and when receiving after network switching confirms response institute is allowed State terminal device network switching.
5. method as claimed in claim 4, it is characterised in that described when receiving network switching confirmation Allow also to include after the terminal device network switching after response:
The application of the initiation network switching request is added into the white name of the user-defined network legal power It is single.
6. the method for claim 1, it is characterised in that methods described also includes:
Whether the application monitored in user-defined network legal power white list accesses private data;
When monitoring that arbitrary application accesses private data, indicating risk is carried out.
7. the method for claim 1, it is characterised in that methods described also includes:
When the terminal device is judged to first power on, start white list is generated according to the application of prepackage.
8. a kind of control device, is arranged at terminal device, it is characterised in that described device includes:
Detection module, for detecting whether there is network switching request;
Judge module, for when the network switching request is detected, according to the initiation network switching The application of request determines whether the terminal device network switching.
9. device as claimed in claim 8, it is characterised in that:
The judge module includes the first switching submodule;
First switching submodule is used for when the start white list generated in the terminal device or default Credible third party application white list in when finding the application for initiating the network switching request, it is allowed to The terminal device network switching.
10. device as claimed in claim 8, it is characterised in that:
The judge module includes the second switching submodule;
Second switching submodule is used for when the start white list generated in the terminal device and presets Credible third party application white list in all search less than during the application for initiating the network switching request, The application is searched in user-defined network legal power white list, if the user-defined net The application is found in network authority white list, then allows the terminal device network switching.
11. devices as claimed in claim 8, it is characterised in that:
The judge module includes the 3rd switching submodule;
3rd switching submodule is used for when the start white list generated in the terminal device and presets Credible third party application white list in all search less than during the application for initiating the network switching request, The application is searched in user-defined network legal power white list, if the user-defined net Search in network authority white list less than the application, then point out application requests network switching, when receiving net Network switching confirms to allow the terminal device network switching after response.
12. devices as claimed in claim 11, it is characterised in that:
3rd switching submodule is additionally operable to be added to the application of the initiation network switching request described User-defined network legal power white list.
13. devices as claimed in claim 8, it is characterised in that described device also includes:
Control module, for monitoring user-defined network legal power white list in application whether access hidden Private data;It is additionally operable to, when monitoring that arbitrary application accesses private data, carry out indicating risk.
14. devices as claimed in claim 8, it is characterised in that described device also includes:
Processing module, for when the terminal device is judged to first power on, according to the application life of prepackage Into start white list.
CN201510760111.7A 2015-11-10 2015-11-10 Control method and device Pending CN106686624A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510760111.7A CN106686624A (en) 2015-11-10 2015-11-10 Control method and device
PCT/CN2016/091625 WO2017080255A1 (en) 2015-11-10 2016-07-25 Control method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510760111.7A CN106686624A (en) 2015-11-10 2015-11-10 Control method and device

Publications (1)

Publication Number Publication Date
CN106686624A true CN106686624A (en) 2017-05-17

Family

ID=58694725

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510760111.7A Pending CN106686624A (en) 2015-11-10 2015-11-10 Control method and device

Country Status (2)

Country Link
CN (1) CN106686624A (en)
WO (1) WO2017080255A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11900154B2 (en) * 2021-03-08 2024-02-13 Dell Products L.P. Enabling modern standby for unsupported applications

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102004876A (en) * 2009-12-31 2011-04-06 郑州信大捷安信息技术有限公司 Security terminal reinforcing model and reinforcing method of tolerable non-trusted component
CN102355667A (en) * 2011-06-30 2012-02-15 北京邮电大学 Method and system for controlling network connection of application programs in mobile intelligent terminal system

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8270981B2 (en) * 2008-12-03 2012-09-18 Electronics And Telecommunications Research Institute Method for handoff of portable terminal between heterogeneous wireless networks
CN104486785B (en) * 2014-12-23 2018-05-29 广东欧珀移动通信有限公司 A kind of switching method and system of mobile terminal network optimization
CN104883680B (en) * 2015-05-15 2019-08-30 深圳市立鳌科技有限公司 A kind of data guard method and user terminal
CN104902430B (en) * 2015-05-19 2019-02-01 Oppo广东移动通信有限公司 The flow control methods and system of intelligent terminal

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102004876A (en) * 2009-12-31 2011-04-06 郑州信大捷安信息技术有限公司 Security terminal reinforcing model and reinforcing method of tolerable non-trusted component
CN102355667A (en) * 2011-06-30 2012-02-15 北京邮电大学 Method and system for controlling network connection of application programs in mobile intelligent terminal system

Also Published As

Publication number Publication date
WO2017080255A1 (en) 2017-05-18

Similar Documents

Publication Publication Date Title
US11540133B2 (en) Systems and methods for security analysis of applications on user mobile devices while maintaining user application privacy
EP3210364B1 (en) Systems and methods for application security analysis
US9344431B2 (en) System and method for assessing an application based on data from multiple devices
US9294500B2 (en) System and method for creating and applying categorization-based policy to secure a mobile communications device from access to certain data objects
US20170230397A1 (en) System and method for assessing data objects on mobile communications devices
US9367680B2 (en) System and method for mobile communication device application advisement
KR20180080227A (en) Dynamic Honeypot System
US20130333039A1 (en) Evaluating Whether to Block or Allow Installation of a Software Application
WO2012027588A1 (en) System and method for server-coupled malware prevention
CN105635084A (en) Apparatus and method for authenticating terminal
CN105635122A (en) Wifi access method and device and electronic equipment
WO2013075422A1 (en) Method for protecting privacy information and mobile terminal
Xie et al. Designing system-level defenses against cellphone malware
US10860719B1 (en) Detecting and protecting against security vulnerabilities in dynamic linkers and scripts
CN111291372B (en) Method and device for detecting files of terminal equipment based on software gene technology
CN106686624A (en) Control method and device
KR102102256B1 (en) System including apparatus for managing sharer and server and method thereof
CN106713285A (en) Website link security verification method and system
CN111917764A (en) Service operation method, device, equipment and storage medium
US10339340B1 (en) Anonymous reputation requests

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170517

RJ01 Rejection of invention patent application after publication