CN107197085A - A kind of comprehensive safety management-control method of intelligent movable mobile phone online - Google Patents
A kind of comprehensive safety management-control method of intelligent movable mobile phone online Download PDFInfo
- Publication number
- CN107197085A CN107197085A CN201710281376.8A CN201710281376A CN107197085A CN 107197085 A CN107197085 A CN 107197085A CN 201710281376 A CN201710281376 A CN 201710281376A CN 107197085 A CN107197085 A CN 107197085A
- Authority
- CN
- China
- Prior art keywords
- mobile phone
- management
- control
- software
- strategy
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72406—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by software upgrading or downloading
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72454—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72457—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to geographic location
Abstract
Currently, cell phone software market lacks effective supervision, and mobile phone business progressively increases again, and this causes the dark fund industrial chain of field of mobile phones to quickly grow, and a large amount of Malwares are able to easily be mixed into software market.Once downloading, installation carries wooden horse, the software at back door, personal information, geographical position, privacy etc. will be threatened seriously.It is an object of the invention to provide a kind of comprehensive safety management-control method of intelligent movable mobile phone online, cell phone intelligent management and control application system used in method, it is made up of management and control backstage and mobile phone terminal application software, mobile phone terminal realizes the management and control of concrete function by installing the form of software additional, administrative staff issue management and control strategy by management and control backstage, with realize enterprise security policy automatic deployment, equipment strategy issue automatically, device status monitoring, message push function.
Description
1st, background technology:
Mobile communication business, mobile Internet business are developed rapidly in recent years, and profound influence has arrived social all trades and professions,
Mobile Internet gives people to learn, lives and bring many facilities.The negative report on internet also can be to users simultaneously
Thought, psychology cause some to negatively affect.
With the popularization of smart mobile phone, cell phone software also hides many potential safety hazards, including telecommunication fraud, illegal wap
Website, game equivalent Malware are hard to guard against.
Currently, cell phone software market lacks effective supervision, and mobile phone business progressively increases again, and this causes the dark fund of field of mobile phones
Industrial chain is quickly grown, and a large amount of Malwares are able to easily be mixed into software market.Once download, install with wooden horse, back door
Software, personal information, geographical position, privacy etc. will be threatened seriously.
2nd, the content of the invention:
It is an object of the invention to provide a kind of comprehensive safety management-control method of intelligent movable mobile phone online.
The purpose of the present invention is realized in the following manner.A kind of comprehensive safety management-control method of intelligent movable mobile phone online
Used cell phone intelligent management and control application system, is made up of, mobile phone terminal is soft by installing additional management and control backstage and mobile phone terminal application software
The form of part realizes the management and control of concrete function, and administrative staff issue management and control strategy by management and control backstage, to realize enterprise security plan
Summary automatic deployment, equipment strategy are issued automatically, device status monitoring, message push function, and implementation is as follows:(1)Server
The presence of mobile phone is constantly monitored by the form of long connection, the start situation of mobile phone is understood;(2)Server is by pushing
Mechanism issues management and control strategy, can a key issue the entry-into-force time section that comes into force strategy, can also generate strategy immediately, at the appointed time section
Management and control correlation function;(3)Mobile phone terminal installs application software additional, obtains corresponding authority and intercepts relevant sensitization word short message, blacklist electricity
Talk about, objectionable website is browsed, sensitive word is searched for, form alarm record;(4)Hand is constantly positioned by the information exchange of long connection
The positional information of machine, grasps the constantly position of mobile phone, forms movement locus;(5)Mobile phone terminal application software is called out by alarm clock timing
Awake implementation strategy, it is ensured that the period management and control that backstage is issued can be performed immediately;(6)Pass through control platform manipulation disabling vpn generations
Function of surfing the Net is managed, prevents user from browsing flame by agency;(7)Usb debugging modes, disabling are disabled by control platform
The modes such as factory reset, after preventing that user mobile phone from losing, monitoring behavior is lost by brush machine or recovery factory mode;(8)It is logical
Management and control consistency operation is crossed, the relevant information of designated mobile phone is wiped, it is ensured that after mobile phone is lost, information is not revealed;(9)Mobile phone terminal should
Submitted with the sensitive word information of software, realize that process is injected by xposed frameworks, intercepting system control EditText obtains text
Value, the sensitive word correspondence set according to backstage is intercepted.
Mobile phone terminal software can according to management needs, gather user relevant information, check user detailed behavioural information and
The related custom of user is analyzed, the alarm of the non-security usage behavior of user by analyze data, can be realized, all functions can be real
Existing capable of being opened by one key or closing, can also realize that the specific period is turned on and off.
3rd, illustrate:
Fig. 1 is equipment topological diagram;
Fig. 2 business system figures.
Embodiment
Technical scheme is set forth in below in conjunction with accompanying drawing and example.
Cell phone intelligent management and control application system used in a kind of comprehensive safety management-control method of intelligent movable mobile phone online, by
Management and control backstage and mobile phone terminal application software composition, mobile phone terminal are realized the management and control of concrete function by installing the form of software additional, managed
Personnel issue management and control strategy by management and control backstage, with realize enterprise security policy automatic deployment, equipment strategy issue automatically, equipment
Condition monitoring, message push function, implementation are as follows:(1)Server by the form of long connection constantly monitor mobile phone
Wire state, understands the start situation of mobile phone;(2)Server issues management and control strategy by push-mechanism, can a key issue instant life
Effect is tactful, the entry-into-force time section that can also generate strategy, at the appointed time section management and control correlation function;(3)Mobile phone terminal is installed additional using soft
Part, obtains corresponding authority interception relevant sensitization word short message, blacklist phone, objectionable website is browsed, sensitive word is searched for, is formed and accused
Alert record;(4)By the positional information of the information exchange of long connection constantly locating cellphone, the constantly position of mobile phone is grasped, is formed
Movement locus;(5)Mobile phone terminal application software wakes up implementation strategy by alarm clock timing, it is ensured that the period management and control that backstage is issued
It can perform immediately;(6)By control platform manipulation disabling vpn proxy surfing functions, prevent user from browsing bad by agency
Information;(7)By control platform disabling usb debugging modes, the mode such as recovery from errdisable Default Value prevents user mobile phone from losing
Afterwards, monitoring behavior is lost by brush machine or recovery factory mode;(8)Pass through management and control consistency operation, the related letter of erasing designated mobile phone
Breath, it is ensured that after mobile phone is lost, information is not revealed;(9)Mobile phone terminal application software sensitivity word information is submitted, and passes through xposed frameworks
Realize that process is injected, intercepting system control EditText obtains textual value, the sensitive word correspondence set according to backstage is intercepted.
Mobile phone terminal software can according to management needs, gather user relevant information, check user detailed behavioural information and
The related custom of user is analyzed, the alarm of the non-security usage behavior of user by analyze data, can be realized, all functions can be real
Existing capable of being opened by one key or closing, can also realize that the specific period is turned on and off.
It is the known technology of those skilled in the art in addition to the technical characteristic described in specification.
Claims (2)
1. a kind of comprehensive safety management-control method of intelligent movable mobile phone online, it is characterised in that:Mobile phone used in methods described
Intelligent management and control application system, is made up of management and control backstage and mobile phone terminal application software, and mobile phone terminal is realized by installing the form of software additional
The management and control of concrete function, administrative staff issue management and control strategy by management and control backstage, to realize enterprise security policy automatic deployment, set
Standby strategy is issued automatically, device status monitoring, message push function, and implementation is as follows:(1)Server passes through long connection
Form constantly monitors the presence of mobile phone, understands the start situation of mobile phone;(2)Server issues management and control by push-mechanism
Strategy, can a key issue the entry-into-force time section that comes into force strategy, can also generate strategy immediately, the at the appointed time related work(of section management and control
Energy;(3)Mobile phone terminal installs application software additional, obtains corresponding authority and intercepts relevant sensitization word short message, blacklist phone, objectionable website
Browse, sensitive word search etc., formed alarm record;(4)Believed by the position of the information exchange of long connection constantly locating cellphone
Breath, grasps the constantly position of mobile phone, forms movement locus;(5)Mobile phone terminal application software is waken up by alarm clock timing and performs plan
Slightly, it is ensured that the period management and control that backstage is issued can be performed immediately;(6)Pass through control platform manipulation disabling vpn proxy surfing work(
Can, prevent user from browsing flame by agency;(7)Usb debugging modes are disabled by control platform, recovery from errdisable is dispatched from the factory
The modes such as setting, after preventing that user mobile phone from losing, monitoring behavior is lost by brush machine or recovery factory mode;(8)After management and control
Platform is operated, and wipes the relevant information of designated mobile phone, it is ensured that after mobile phone is lost, information is not revealed;(9)Mobile phone terminal application software is quick
Feel word information to submit, realize that process is injected by xposed frameworks, intercepting system control EditText obtains textual value, according to
The sensitive word correspondence of backstage setting is intercepted.
2. the method according to claim has 1, it is characterised in that:Mobile phone terminal software can gather user according to management needs
Relevant information, check the detailed behavioural information of user and the related custom of analysis user, user can be realized by analyze data
The alarm of non-security usage behavior, all functions can realize capable of being opened by one key or closing, can also realize specific period open or
Close.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710281376.8A CN107197085A (en) | 2017-04-26 | 2017-04-26 | A kind of comprehensive safety management-control method of intelligent movable mobile phone online |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710281376.8A CN107197085A (en) | 2017-04-26 | 2017-04-26 | A kind of comprehensive safety management-control method of intelligent movable mobile phone online |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107197085A true CN107197085A (en) | 2017-09-22 |
Family
ID=59873400
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710281376.8A Pending CN107197085A (en) | 2017-04-26 | 2017-04-26 | A kind of comprehensive safety management-control method of intelligent movable mobile phone online |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107197085A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108171091A (en) * | 2018-01-22 | 2018-06-15 | 江苏长顺江波软件科技发展有限公司 | A kind of operating system forbids the method for storing the mobile phone of connection as USB |
CN112532734A (en) * | 2020-12-02 | 2021-03-19 | 建信金融科技有限责任公司 | Message sensitive information detection method and device |
CN112911063A (en) * | 2019-12-03 | 2021-06-04 | 成都牧云人人工智能科技有限公司 | Multi-terminal control time-limited entertainment communication learning system and method and terminal equipment |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101917289A (en) * | 2010-08-09 | 2010-12-15 | 成都信息工程学院 | System for remotely supervising internet surfing of minors based on computer and mobile phone |
CN102685215A (en) * | 2012-04-18 | 2012-09-19 | 华为技术有限公司 | Method, device and system for online monitoring of mobile terminal |
CN103116723A (en) * | 2013-02-06 | 2013-05-22 | 北京奇虎科技有限公司 | Method, device and system of web site interception process |
CN103198255A (en) * | 2013-04-03 | 2013-07-10 | 武汉大学 | Method and system for monitoring and intercepting sensitive behaviour of Android software |
CN105791597A (en) * | 2016-05-05 | 2016-07-20 | 绿网天下(福建)网络科技股份有限公司 | Method for managing and controlling application software through customized mobile phone |
CN106201619A (en) * | 2016-07-15 | 2016-12-07 | 绿网天下(福建)网络科技股份有限公司 | A kind of method customizing management and control mobile phone |
-
2017
- 2017-04-26 CN CN201710281376.8A patent/CN107197085A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101917289A (en) * | 2010-08-09 | 2010-12-15 | 成都信息工程学院 | System for remotely supervising internet surfing of minors based on computer and mobile phone |
CN102685215A (en) * | 2012-04-18 | 2012-09-19 | 华为技术有限公司 | Method, device and system for online monitoring of mobile terminal |
CN103116723A (en) * | 2013-02-06 | 2013-05-22 | 北京奇虎科技有限公司 | Method, device and system of web site interception process |
CN103198255A (en) * | 2013-04-03 | 2013-07-10 | 武汉大学 | Method and system for monitoring and intercepting sensitive behaviour of Android software |
CN105791597A (en) * | 2016-05-05 | 2016-07-20 | 绿网天下(福建)网络科技股份有限公司 | Method for managing and controlling application software through customized mobile phone |
CN106201619A (en) * | 2016-07-15 | 2016-12-07 | 绿网天下(福建)网络科技股份有限公司 | A kind of method customizing management and control mobile phone |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108171091A (en) * | 2018-01-22 | 2018-06-15 | 江苏长顺江波软件科技发展有限公司 | A kind of operating system forbids the method for storing the mobile phone of connection as USB |
CN112911063A (en) * | 2019-12-03 | 2021-06-04 | 成都牧云人人工智能科技有限公司 | Multi-terminal control time-limited entertainment communication learning system and method and terminal equipment |
CN112532734A (en) * | 2020-12-02 | 2021-03-19 | 建信金融科技有限责任公司 | Message sensitive information detection method and device |
CN112532734B (en) * | 2020-12-02 | 2023-11-21 | 建信金融科技有限责任公司 | Method and device for detecting message sensitive information |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102110220B (en) | Application program monitoring method and device | |
CN104462970B (en) | A kind of Android application program privilege abuse detection methods based on process communication | |
CN103795745B (en) | The monitoring method and system of a kind of intelligent mobile terminal | |
CN105095746B (en) | Application program launching method for authenticating and device | |
CN102082802A (en) | Behavior-based mobile terminal security protection system and method | |
CN111931166B (en) | Application program anti-attack method and system based on code injection and behavior analysis | |
CN106599709B (en) | Method, device and terminal for preventing privacy information leakage | |
CN107197085A (en) | A kind of comprehensive safety management-control method of intelligent movable mobile phone online | |
CN103716785A (en) | Mobile Internet security service system | |
CN104102882A (en) | Protection method and device for privacy data of application program | |
CN101483658B (en) | System and method for input content protection of browser | |
CN107766728A (en) | Mobile application security managing device, method and mobile operation safety protection system | |
CN102208004B (en) | Method for controlling software behavior based on least privilege principle | |
CN104376266A (en) | Determination method and device for security level of application software | |
CN102202052A (en) | Virtual-machine-technology-based information system password management method | |
CN103413083A (en) | Security defending system for single host | |
CN110447215A (en) | The dynamic alarm method and terminal of application software malicious act | |
CN113111347A (en) | Threat disposal method and safety monitoring probe for Android application | |
CN107343279A (en) | Method for connecting network, device, terminal device and storage medium | |
CN103034918A (en) | Electric power safe production management system operating method | |
CN104426960B (en) | A kind of trial method and device of payment applications | |
CN104021062A (en) | Information processing method and electronic device | |
CN106791231A (en) | A kind of harassing call treating method and apparatus | |
CN106953874B (en) | Website falsification-proof method and device | |
Cagalaban et al. | Improving SCADA control systems security with software vulnerability analysis |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170922 |