CN107197085A - A kind of comprehensive safety management-control method of intelligent movable mobile phone online - Google Patents

A kind of comprehensive safety management-control method of intelligent movable mobile phone online Download PDF

Info

Publication number
CN107197085A
CN107197085A CN201710281376.8A CN201710281376A CN107197085A CN 107197085 A CN107197085 A CN 107197085A CN 201710281376 A CN201710281376 A CN 201710281376A CN 107197085 A CN107197085 A CN 107197085A
Authority
CN
China
Prior art keywords
mobile phone
management
control
software
strategy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710281376.8A
Other languages
Chinese (zh)
Inventor
吴振华
刘洪军
李�杰
姬生正
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Automobile Micro Joint Information Technology Ltd By Share Ltd
Original Assignee
Shandong Automobile Micro Joint Information Technology Ltd By Share Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Automobile Micro Joint Information Technology Ltd By Share Ltd filed Critical Shandong Automobile Micro Joint Information Technology Ltd By Share Ltd
Priority to CN201710281376.8A priority Critical patent/CN107197085A/en
Publication of CN107197085A publication Critical patent/CN107197085A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72406User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by software upgrading or downloading
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72454User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72457User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to geographic location

Abstract

Currently, cell phone software market lacks effective supervision, and mobile phone business progressively increases again, and this causes the dark fund industrial chain of field of mobile phones to quickly grow, and a large amount of Malwares are able to easily be mixed into software market.Once downloading, installation carries wooden horse, the software at back door, personal information, geographical position, privacy etc. will be threatened seriously.It is an object of the invention to provide a kind of comprehensive safety management-control method of intelligent movable mobile phone online, cell phone intelligent management and control application system used in method, it is made up of management and control backstage and mobile phone terminal application software, mobile phone terminal realizes the management and control of concrete function by installing the form of software additional, administrative staff issue management and control strategy by management and control backstage, with realize enterprise security policy automatic deployment, equipment strategy issue automatically, device status monitoring, message push function.

Description

A kind of comprehensive safety management-control method of intelligent movable mobile phone online
1st, background technology:
Mobile communication business, mobile Internet business are developed rapidly in recent years, and profound influence has arrived social all trades and professions, Mobile Internet gives people to learn, lives and bring many facilities.The negative report on internet also can be to users simultaneously Thought, psychology cause some to negatively affect.
With the popularization of smart mobile phone, cell phone software also hides many potential safety hazards, including telecommunication fraud, illegal wap Website, game equivalent Malware are hard to guard against.
Currently, cell phone software market lacks effective supervision, and mobile phone business progressively increases again, and this causes the dark fund of field of mobile phones Industrial chain is quickly grown, and a large amount of Malwares are able to easily be mixed into software market.Once download, install with wooden horse, back door Software, personal information, geographical position, privacy etc. will be threatened seriously.
2nd, the content of the invention:
It is an object of the invention to provide a kind of comprehensive safety management-control method of intelligent movable mobile phone online.
The purpose of the present invention is realized in the following manner.A kind of comprehensive safety management-control method of intelligent movable mobile phone online Used cell phone intelligent management and control application system, is made up of, mobile phone terminal is soft by installing additional management and control backstage and mobile phone terminal application software The form of part realizes the management and control of concrete function, and administrative staff issue management and control strategy by management and control backstage, to realize enterprise security plan Summary automatic deployment, equipment strategy are issued automatically, device status monitoring, message push function, and implementation is as follows:(1)Server The presence of mobile phone is constantly monitored by the form of long connection, the start situation of mobile phone is understood;(2)Server is by pushing Mechanism issues management and control strategy, can a key issue the entry-into-force time section that comes into force strategy, can also generate strategy immediately, at the appointed time section Management and control correlation function;(3)Mobile phone terminal installs application software additional, obtains corresponding authority and intercepts relevant sensitization word short message, blacklist electricity Talk about, objectionable website is browsed, sensitive word is searched for, form alarm record;(4)Hand is constantly positioned by the information exchange of long connection The positional information of machine, grasps the constantly position of mobile phone, forms movement locus;(5)Mobile phone terminal application software is called out by alarm clock timing Awake implementation strategy, it is ensured that the period management and control that backstage is issued can be performed immediately;(6)Pass through control platform manipulation disabling vpn generations Function of surfing the Net is managed, prevents user from browsing flame by agency;(7)Usb debugging modes, disabling are disabled by control platform The modes such as factory reset, after preventing that user mobile phone from losing, monitoring behavior is lost by brush machine or recovery factory mode;(8)It is logical Management and control consistency operation is crossed, the relevant information of designated mobile phone is wiped, it is ensured that after mobile phone is lost, information is not revealed;(9)Mobile phone terminal should Submitted with the sensitive word information of software, realize that process is injected by xposed frameworks, intercepting system control EditText obtains text Value, the sensitive word correspondence set according to backstage is intercepted.
Mobile phone terminal software can according to management needs, gather user relevant information, check user detailed behavioural information and The related custom of user is analyzed, the alarm of the non-security usage behavior of user by analyze data, can be realized, all functions can be real Existing capable of being opened by one key or closing, can also realize that the specific period is turned on and off.
3rd, illustrate:
Fig. 1 is equipment topological diagram;
Fig. 2 business system figures.
Embodiment
Technical scheme is set forth in below in conjunction with accompanying drawing and example.
Cell phone intelligent management and control application system used in a kind of comprehensive safety management-control method of intelligent movable mobile phone online, by Management and control backstage and mobile phone terminal application software composition, mobile phone terminal are realized the management and control of concrete function by installing the form of software additional, managed Personnel issue management and control strategy by management and control backstage, with realize enterprise security policy automatic deployment, equipment strategy issue automatically, equipment Condition monitoring, message push function, implementation are as follows:(1)Server by the form of long connection constantly monitor mobile phone Wire state, understands the start situation of mobile phone;(2)Server issues management and control strategy by push-mechanism, can a key issue instant life Effect is tactful, the entry-into-force time section that can also generate strategy, at the appointed time section management and control correlation function;(3)Mobile phone terminal is installed additional using soft Part, obtains corresponding authority interception relevant sensitization word short message, blacklist phone, objectionable website is browsed, sensitive word is searched for, is formed and accused Alert record;(4)By the positional information of the information exchange of long connection constantly locating cellphone, the constantly position of mobile phone is grasped, is formed Movement locus;(5)Mobile phone terminal application software wakes up implementation strategy by alarm clock timing, it is ensured that the period management and control that backstage is issued It can perform immediately;(6)By control platform manipulation disabling vpn proxy surfing functions, prevent user from browsing bad by agency Information;(7)By control platform disabling usb debugging modes, the mode such as recovery from errdisable Default Value prevents user mobile phone from losing Afterwards, monitoring behavior is lost by brush machine or recovery factory mode;(8)Pass through management and control consistency operation, the related letter of erasing designated mobile phone Breath, it is ensured that after mobile phone is lost, information is not revealed;(9)Mobile phone terminal application software sensitivity word information is submitted, and passes through xposed frameworks Realize that process is injected, intercepting system control EditText obtains textual value, the sensitive word correspondence set according to backstage is intercepted.
Mobile phone terminal software can according to management needs, gather user relevant information, check user detailed behavioural information and The related custom of user is analyzed, the alarm of the non-security usage behavior of user by analyze data, can be realized, all functions can be real Existing capable of being opened by one key or closing, can also realize that the specific period is turned on and off.
It is the known technology of those skilled in the art in addition to the technical characteristic described in specification.

Claims (2)

1. a kind of comprehensive safety management-control method of intelligent movable mobile phone online, it is characterised in that:Mobile phone used in methods described Intelligent management and control application system, is made up of management and control backstage and mobile phone terminal application software, and mobile phone terminal is realized by installing the form of software additional The management and control of concrete function, administrative staff issue management and control strategy by management and control backstage, to realize enterprise security policy automatic deployment, set Standby strategy is issued automatically, device status monitoring, message push function, and implementation is as follows:(1)Server passes through long connection Form constantly monitors the presence of mobile phone, understands the start situation of mobile phone;(2)Server issues management and control by push-mechanism Strategy, can a key issue the entry-into-force time section that comes into force strategy, can also generate strategy immediately, the at the appointed time related work(of section management and control Energy;(3)Mobile phone terminal installs application software additional, obtains corresponding authority and intercepts relevant sensitization word short message, blacklist phone, objectionable website Browse, sensitive word search etc., formed alarm record;(4)Believed by the position of the information exchange of long connection constantly locating cellphone Breath, grasps the constantly position of mobile phone, forms movement locus;(5)Mobile phone terminal application software is waken up by alarm clock timing and performs plan Slightly, it is ensured that the period management and control that backstage is issued can be performed immediately;(6)Pass through control platform manipulation disabling vpn proxy surfing work( Can, prevent user from browsing flame by agency;(7)Usb debugging modes are disabled by control platform, recovery from errdisable is dispatched from the factory The modes such as setting, after preventing that user mobile phone from losing, monitoring behavior is lost by brush machine or recovery factory mode;(8)After management and control Platform is operated, and wipes the relevant information of designated mobile phone, it is ensured that after mobile phone is lost, information is not revealed;(9)Mobile phone terminal application software is quick Feel word information to submit, realize that process is injected by xposed frameworks, intercepting system control EditText obtains textual value, according to The sensitive word correspondence of backstage setting is intercepted.
2. the method according to claim has 1, it is characterised in that:Mobile phone terminal software can gather user according to management needs Relevant information, check the detailed behavioural information of user and the related custom of analysis user, user can be realized by analyze data The alarm of non-security usage behavior, all functions can realize capable of being opened by one key or closing, can also realize specific period open or Close.
CN201710281376.8A 2017-04-26 2017-04-26 A kind of comprehensive safety management-control method of intelligent movable mobile phone online Pending CN107197085A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710281376.8A CN107197085A (en) 2017-04-26 2017-04-26 A kind of comprehensive safety management-control method of intelligent movable mobile phone online

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710281376.8A CN107197085A (en) 2017-04-26 2017-04-26 A kind of comprehensive safety management-control method of intelligent movable mobile phone online

Publications (1)

Publication Number Publication Date
CN107197085A true CN107197085A (en) 2017-09-22

Family

ID=59873400

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710281376.8A Pending CN107197085A (en) 2017-04-26 2017-04-26 A kind of comprehensive safety management-control method of intelligent movable mobile phone online

Country Status (1)

Country Link
CN (1) CN107197085A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108171091A (en) * 2018-01-22 2018-06-15 江苏长顺江波软件科技发展有限公司 A kind of operating system forbids the method for storing the mobile phone of connection as USB
CN112532734A (en) * 2020-12-02 2021-03-19 建信金融科技有限责任公司 Message sensitive information detection method and device
CN112911063A (en) * 2019-12-03 2021-06-04 成都牧云人人工智能科技有限公司 Multi-terminal control time-limited entertainment communication learning system and method and terminal equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101917289A (en) * 2010-08-09 2010-12-15 成都信息工程学院 System for remotely supervising internet surfing of minors based on computer and mobile phone
CN102685215A (en) * 2012-04-18 2012-09-19 华为技术有限公司 Method, device and system for online monitoring of mobile terminal
CN103116723A (en) * 2013-02-06 2013-05-22 北京奇虎科技有限公司 Method, device and system of web site interception process
CN103198255A (en) * 2013-04-03 2013-07-10 武汉大学 Method and system for monitoring and intercepting sensitive behaviour of Android software
CN105791597A (en) * 2016-05-05 2016-07-20 绿网天下(福建)网络科技股份有限公司 Method for managing and controlling application software through customized mobile phone
CN106201619A (en) * 2016-07-15 2016-12-07 绿网天下(福建)网络科技股份有限公司 A kind of method customizing management and control mobile phone

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101917289A (en) * 2010-08-09 2010-12-15 成都信息工程学院 System for remotely supervising internet surfing of minors based on computer and mobile phone
CN102685215A (en) * 2012-04-18 2012-09-19 华为技术有限公司 Method, device and system for online monitoring of mobile terminal
CN103116723A (en) * 2013-02-06 2013-05-22 北京奇虎科技有限公司 Method, device and system of web site interception process
CN103198255A (en) * 2013-04-03 2013-07-10 武汉大学 Method and system for monitoring and intercepting sensitive behaviour of Android software
CN105791597A (en) * 2016-05-05 2016-07-20 绿网天下(福建)网络科技股份有限公司 Method for managing and controlling application software through customized mobile phone
CN106201619A (en) * 2016-07-15 2016-12-07 绿网天下(福建)网络科技股份有限公司 A kind of method customizing management and control mobile phone

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108171091A (en) * 2018-01-22 2018-06-15 江苏长顺江波软件科技发展有限公司 A kind of operating system forbids the method for storing the mobile phone of connection as USB
CN112911063A (en) * 2019-12-03 2021-06-04 成都牧云人人工智能科技有限公司 Multi-terminal control time-limited entertainment communication learning system and method and terminal equipment
CN112532734A (en) * 2020-12-02 2021-03-19 建信金融科技有限责任公司 Message sensitive information detection method and device
CN112532734B (en) * 2020-12-02 2023-11-21 建信金融科技有限责任公司 Method and device for detecting message sensitive information

Similar Documents

Publication Publication Date Title
CN102110220B (en) Application program monitoring method and device
CN104462970B (en) A kind of Android application program privilege abuse detection methods based on process communication
CN103795745B (en) The monitoring method and system of a kind of intelligent mobile terminal
CN105095746B (en) Application program launching method for authenticating and device
CN102082802A (en) Behavior-based mobile terminal security protection system and method
CN111931166B (en) Application program anti-attack method and system based on code injection and behavior analysis
CN106599709B (en) Method, device and terminal for preventing privacy information leakage
CN107197085A (en) A kind of comprehensive safety management-control method of intelligent movable mobile phone online
CN103716785A (en) Mobile Internet security service system
CN104102882A (en) Protection method and device for privacy data of application program
CN101483658B (en) System and method for input content protection of browser
CN107766728A (en) Mobile application security managing device, method and mobile operation safety protection system
CN102208004B (en) Method for controlling software behavior based on least privilege principle
CN104376266A (en) Determination method and device for security level of application software
CN102202052A (en) Virtual-machine-technology-based information system password management method
CN103413083A (en) Security defending system for single host
CN110447215A (en) The dynamic alarm method and terminal of application software malicious act
CN113111347A (en) Threat disposal method and safety monitoring probe for Android application
CN107343279A (en) Method for connecting network, device, terminal device and storage medium
CN103034918A (en) Electric power safe production management system operating method
CN104426960B (en) A kind of trial method and device of payment applications
CN104021062A (en) Information processing method and electronic device
CN106791231A (en) A kind of harassing call treating method and apparatus
CN106953874B (en) Website falsification-proof method and device
Cagalaban et al. Improving SCADA control systems security with software vulnerability analysis

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170922