CN110166630B - Method and system for monitoring mobile phone network security based on Type-C interface - Google Patents

Method and system for monitoring mobile phone network security based on Type-C interface Download PDF

Info

Publication number
CN110166630B
CN110166630B CN201910545905.XA CN201910545905A CN110166630B CN 110166630 B CN110166630 B CN 110166630B CN 201910545905 A CN201910545905 A CN 201910545905A CN 110166630 B CN110166630 B CN 110166630B
Authority
CN
China
Prior art keywords
mobile phone
module
monitoring
correction
interface
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910545905.XA
Other languages
Chinese (zh)
Other versions
CN110166630A (en
Inventor
黄标
黄统政
刘泉得
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Anxinpu Electronics Co ltd
Original Assignee
Chongqing Anlian Pu Electronics Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Anlian Pu Electronics Co ltd filed Critical Chongqing Anlian Pu Electronics Co ltd
Priority to CN201910545905.XA priority Critical patent/CN110166630B/en
Publication of CN110166630A publication Critical patent/CN110166630A/en
Application granted granted Critical
Publication of CN110166630B publication Critical patent/CN110166630B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72409User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • H04W12/37Managing security policies for mobile devices or for controlling mobile applications

Abstract

The invention relates to the technical field of security monitoring, in particular to a method and a system for monitoring the network security of a mobile phone based on a Type-C interface, which comprises the following steps of firstly setting the mobile phone in a network connection state, then setting the mobile phone to be in a monitored state, then connecting the mobile phone with an external device through the Type-C interface, automatically installing a monitoring module and a correction module in the mobile phone by the external device through the Type-C interface, acquiring the monitoring information of the mobile phone by the monitoring module and checking the monitoring information through the correction module, sending the checking result to a feedback module, generating an execution operation option by the feedback module and sending the execution operation option to the mobile phone, then selecting and executing by a user, finishing the network security monitoring after the execution, pulling out the Type-C from the mobile phone interface, disconnecting the external device from the mobile phone, and realizing the monitoring and feedback of the network security of the mobile phone end through the external device, the network security use risk of the user is reduced, and the phenomenon that the mobile phone loses important information in the unknown network is avoided, so that extra loss is suffered.

Description

Method and system for monitoring mobile phone network security based on Type-C interface
Technical Field
The invention relates to the technical field of security monitoring, in particular to a method and a system for monitoring the security of a mobile phone network based on a Type-C interface.
Background
At present, almost everyone uses the mobile phone frequently in daily life, the configuration updating of the mobile phone is fast, the functions are more diversified and intelligentized, people are used to various matters related to life entertainment, life and work through the mobile phone and a network, and an interface on the mobile phone is gradually changed into only an earphone interface and a mobile phone charging interface.
Because the function of the earphone interface is single, the mobile phone charging interface is generally considered as the only interface for accessing the mobile phone to the external device, for example, Android and IOS of the current mobile phone operating system, most of the pluggable interfaces on the mobile phone are Type-C, Lightning charging interfaces for Android and IOS, when the mobile phone is connected to the network, the external device cannot be connected by introducing an external interface corresponding to the mobile phone charging interface, so that the network security of the mobile phone is monitored, and the external interface can leave an attached installation file in the mobile phone after the external interface is used, so that the space resource of the mobile phone is occupied, and aiming at the above contents, a method and a system for monitoring the network security of the mobile phone based on the Type-C interface are provided.
Disclosure of Invention
The invention aims to solve the technical problem of providing a method and a system for monitoring the network security of a mobile phone through a Type-C interface, so as to solve the defects that the mobile phone in the prior art can not access an external interface through a mobile phone charging interface, is connected with an external device so as to monitor the network security of the mobile phone, and occupies space resources of the mobile phone.
The invention solves the technical problems through the following technical scheme:
a method for monitoring the security of a mobile phone network based on a Type-C interface comprises the following steps:
1) firstly, the mobile phone is in a network connection state, and then the mobile phone is set to be in a monitored state;
2) the mobile phone is connected with the external equipment through the Type-C interface, and the external equipment automatically installs a monitoring module and a correction module in the mobile phone through the Type-C interface;
3) the monitoring module acquires the monitoring information of the mobile phone, checks the monitoring information through the correction module, and then sends a check result to the feedback module;
4) the feedback module generates a corresponding execution operation option according to the check result and sends the execution operation option to the mobile phone, and the user selects the execution operation according to the execution operation received by the mobile phone and decides to execute the execution operation;
5) after the execution operation is finished, the network security monitoring is finished, the Type-C is pulled out from the mobile phone interface, and the connection between the external equipment and the mobile phone is disconnected.
Preferably, the installation process of the monitoring module in the step 2) is as follows:
a. judging whether the mobile phone needs to simulate clicking to install the monitoring module, if so, installing the monitoring module in a click simulating manner;
b. if the simulation click installation is not needed, the monitoring module is installed by preferentially adopting a mode of loading an installation program and importing an installation package download link.
Preferably, the installation process of the correction module in step 2) is as follows:
a. judging whether a mobile phone network security inspection standard exists in the mobile phone, if so, taking the secondary inspection standard as a correction standard of a correction module, extracting qualified inspection parameters of the mobile phone network security, converting the qualified inspection parameters into a corresponding correction format, and storing the qualified inspection parameters in a specified directory of the mobile phone;
b. if the verification standard of the mobile phone network security does not exist, the correction module is installed by preferentially adopting a mode of loading an installation program and importing an installation package downloading link, and the correction module is stored in a mobile phone directory specified by a user.
Preferably, in the step 3), the process of checking by the correction module is as follows:
a. the correction module firstly acquires network security monitoring information about the accessed mobile phone;
b. the parameters related to the mobile phone network security inspection in the monitoring information are independently taken out and displayed in a list form, then the parameters are compared with the corresponding qualified parameters in the correction module one by one, the correction result is counted until the comparison of all the monitoring information is finished, and the final counted correction result is generated;
c. and taking out the unqualified items in the correction result, marking the unqualified items, recording the corresponding reasons, forming a check result and outputting the check result to the feedback module.
Preferably, the execution operation includes repair, black-drawing, trust, exit and pass, the black-drawing and the trust in the execution operation are primary single options, the exit and the pass are secondary single options, and the primary single option and the secondary single options jointly form any multiple options with the repair item.
The invention also provides a system for monitoring the security of the mobile phone network, which is applied to the method for monitoring the security of the mobile phone network based on the Type-C interface, wherein the external device comprises:
the system comprises a scanning module, a monitoring module and a correction module, wherein the scanning module is used for acquiring network connection in the mobile phone, acquiring configuration information of the mobile phone and judging whether the monitoring module and/or the correction module need to be installed;
the monitoring module is arranged in the mobile phone and is used for establishing a network connection monitoring relation between the mobile phone and the external equipment;
the correction module is arranged in the mobile phone and used for checking the network connection information of the mobile phone and the external equipment;
and the unloading module is used for unloading the monitoring module and the correction module on the external equipment.
Preferably, the mobile phone is connected with the external equipment through a Type-C interface, and the external equipment automatically installs the monitoring module in the mobile phone and starts the monitoring module;
the installation process of the monitoring module comprises the following steps:
a. judging whether the mobile phone needs to simulate clicking to install the monitoring module, if so, installing the monitoring module in a click simulating manner;
b. if the simulation click installation is not needed, the monitoring module is installed by preferentially adopting a mode of loading an installation program and importing an installation package download link.
Preferably, the mobile phone is connected with the external equipment through a Type-C interface, and the external equipment automatically installs the correction module in the mobile phone and starts the correction module;
the installation process of the correction module comprises the following steps:
a. judging whether a mobile phone network security inspection standard exists in the mobile phone, if so, taking the secondary inspection standard as a correction standard of a correction module, extracting qualified inspection parameters of the mobile phone network security, converting the qualified inspection parameters into a corresponding correction format, and storing the qualified inspection parameters in a specified directory of the mobile phone;
b. if the verification standard of the mobile phone network security does not exist, the correction module is installed by preferentially adopting a mode of loading an installation program and importing an installation package downloading link, and the correction module is stored in a mobile phone directory specified by a user.
Preferably, the process of checking by the correction module is as follows:
a. the correction module firstly acquires network security monitoring information about the accessed mobile phone;
b. the parameters related to the mobile phone network security inspection in the monitoring information are independently taken out and displayed in a list form, then the parameters are compared with the corresponding qualified parameters in the correction module one by one, the correction result is counted until the comparison of all the monitoring information is finished, and the final counted correction result is generated;
c. and taking out the unqualified items in the correction result, marking the unqualified items, recording the corresponding reasons, forming a check result and outputting the check result to the feedback module.
Preferably, after the execution operation is completed, the default mobile phone end determines to execute the uninstalling module, then uninstalls all relevant files and programs of the monitoring module and the correction module installed on the mobile phone, and cleans up residues.
Compared with the prior art, the invention has the beneficial effects that:
1. the charging interface and the charging equipment of the mobile phone are connected through the set Type-C interface, then the network connection information in the mobile phone and the configuration information of the mobile phone are obtained through the set scanning module, whether the monitoring module and/or the correction module are required to be installed or not is judged, corresponding installation and information monitoring are carried out, a user can realize network security monitoring and feedback on a mobile phone terminal through the external equipment only by inserting the Type-C interface into the charging interface of the corresponding mobile phone, the previous network security check or monitoring mode of the user is improved, and the network security use risk of the user is reduced.
2. Through the arranged correction module and the feedback module, the monitoring module firstly acquires the network security monitoring information of the mobile phone, then the monitoring information is checked with the correction module to generate a check result, the check result is sent to the feedback module, then the feedback module generates a confirmation option corresponding to the execution operation, the network security monitoring is completed after the execution operation is finished, a user can selectively perform the corresponding execution operation through the arranged feedback module according to the monitoring result of the monitoring module, the effect of the user on the mobile phone network security monitoring is improved, the feedback regulation modes of various network security monitoring are provided, the mobile phone is prevented from losing important information in an unknown network, and therefore extra loss is suffered.
Drawings
FIG. 1 is a schematic diagram of a method for monitoring security of a mobile phone network based on a Type-C interface according to the present invention;
FIG. 2 is a flowchart of a monitoring module installation process of the method for monitoring the security of a mobile phone network based on a Type-C interface according to the present invention;
FIG. 3 is a flowchart of a calibration module installation process of the method for monitoring mobile phone network security based on a Type-C interface according to the present invention;
fig. 4 is a schematic diagram of a calibration module checking process of the method for monitoring the network security of the mobile phone based on the Type-C interface.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments.
All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that all the directional indicators (such as up, down, left, right, front, and rear … …) in the embodiment of the present invention are only used to explain the relative position relationship between the components, the movement situation, etc. in a specific posture (as shown in the drawing), and if the specific posture is changed, the directional indicator is changed accordingly.
Descriptions in this specification as relating to "first", "second", etc. are for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicit to any indicated technical feature or quantity. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature.
In the description of the present invention, "a plurality" means at least two, e.g., two, three, etc., unless specifically limited otherwise.
In the present invention, unless otherwise expressly stated or limited, the terms "connected," "secured," and the like are to be construed broadly, and for example, "secured" may be a fixed connection, a removable connection, or an integral part; can be mechanically or electrically connected; they may be directly connected or indirectly connected through intervening media, or they may be connected internally or in any other suitable relationship, unless expressly stated otherwise. The specific meanings of the above terms in the present invention can be understood by those skilled in the art according to specific situations.
In addition, the technical solutions in the embodiments of the present invention may be combined with each other, but it must be based on the realization of those skilled in the art, and when the technical solutions are contradictory or cannot be realized, such a combination of technical solutions should not be considered to exist, and is not within the protection scope of the present invention.
As shown in fig. 1, the present invention provides a method for monitoring mobile phone network security based on Type-C interface, which includes the following steps:
1) s101, firstly, the mobile phone is in a network connection state, and then the mobile phone is set to be in a monitored state;
when the method is used, firstly, the setting is opened at the mobile phone end, the wireless and network are clicked, the WLAN or the mobile network and the mobile network are selected to share, the corresponding option is clicked to connect, then, the USB debugging mode is opened at the mobile phone end, the setting is opened in the mobile phone, the mobile phone is clicked, the version number is continuously clicked for 7 times, then, the previous-level menu is returned, the developer option is entered, the USB debugging is checked, the unknown source is opened at the mobile phone end, the setting is opened in the mobile phone, the safety is clicked, and the unknown source is checked.
2) S102, connecting the mobile phone with external equipment through a Type-C interface, and automatically installing a monitoring module and a correction module in the mobile phone through the external equipment through the Type-C interface;
3) s103, the monitoring module acquires mobile phone monitoring information, checks the mobile phone monitoring information through the correction module, and then sends a check result to the feedback module;
4) s104, the feedback module generates a corresponding execution operation option according to the check result and sends the execution operation option to the mobile phone, and the user selects and decides to execute the execution operation according to the execution operation received by the mobile phone;
5) and S105, after the execution operation is finished, the network security monitoring is finished, the Type-C is pulled out from the mobile phone interface, and the connection between the external equipment and the mobile phone is disconnected.
As shown in fig. 2, in this embodiment, the installation process of the monitoring module in step 2) is as follows:
a. judging whether the mobile phone needs to simulate clicking to install the monitoring module, if so, installing the monitoring module in a click simulating manner;
b. if the simulation click installation is not needed, the monitoring module is installed by preferentially adopting a mode of loading an installation program and importing an installation package download link.
As shown in fig. 3, in this embodiment, the installation process of the correction module in step 2) is as follows:
a. judging whether a mobile phone network security inspection standard exists in the mobile phone, if so, taking the secondary inspection standard as a correction standard of a correction module, extracting qualified inspection parameters of the mobile phone network security, converting the qualified inspection parameters into a corresponding correction format, and storing the qualified inspection parameters in a specified directory of the mobile phone;
b. if the verification standard of the mobile phone network security does not exist, the correction module is installed by preferentially adopting a mode of loading an installation program and importing an installation package downloading link, and the correction module is stored in a mobile phone directory specified by a user.
As shown in fig. 4, in the present embodiment, in the step 3), the process of performing the verification by the correction module is as follows:
a. s201, a correction module firstly acquires network security monitoring information about an accessed mobile phone;
specifically, the mobile phone is scanned through the set scanning module to obtain information of a connection type, a connection name, a connection time, a PRL version, a SID, a NID, a CELL ID, a network uplink/download speed, a signal strength, an MCC, an MNC, an IP address, a short message center number and the like of a mobile phone network, and all configuration information about the mobile phone, and whether a file and an application program which are the same as or corresponding to the installation of the monitoring module or the correction module are owned in the mobile phone is judged, and then the next step is executed.
S202, parameters related to mobile phone network security inspection in the monitoring information are independently taken out and displayed in a list form, then the parameters are compared with corresponding qualified parameters in a correction module one by one, correction results are counted until all monitoring information is compared, and a final counted correction result is generated;
and S203, taking out the unqualified items in the correction result, marking the unqualified items, recording the corresponding reasons, forming a check result and outputting the check result to the feedback module.
In this embodiment, the execution operation includes repair, black-pulling, trust, exit and pass, where black-pulling and trust in the execution operation are primary single options, and exit and pass are secondary single options, and the primary single option and the secondary single option together form any multiple options with the repair item.
Specifically, the result of the execution operation may be fed back in the form of one or more arbitrary permutations of the repair option and/or the primary menu option and/or the secondary menu option; the exit and pass options of the second single option can be only used for the user to select one of the options to feed back; when the connected network is subjected to the black-pulling option by the user, the network enters a network blacklist and disappears in a network connection selection list of the user, and the network blacklist can be used for selecting the network of the blacklist to be recovered to be normal again through the decision of the user; when the connected network is added with the trust option by the user, the user can be connected with the trust network preferentially by default when the user is connected repeatedly; when the user selects the repair option, the mobile phone terminal automatically modifies the network connection related parameters or configuration information; therefore, the network is repaired, and when the user selects an exit or pass option, the mobile phone end immediately disconnects the network connection of the mobile phone or continues to use the mobile phone.
The present invention further provides a system for monitoring mobile phone network security, which is applied to the method for monitoring mobile phone network security based on Type-C interface, and compared with the specific implementation of the method for monitoring mobile phone network security based on Type-C interface, the specific implementation is characterized in that the external device includes:
the system comprises a scanning module, a monitoring module and a correction module, wherein the scanning module is used for acquiring network connection in the mobile phone, acquiring configuration information of the mobile phone and judging whether the monitoring module and/or the correction module need to be installed;
the monitoring module is arranged in the mobile phone and is used for establishing a network connection monitoring relation between the mobile phone and the external equipment;
the correction module is arranged in the mobile phone and used for checking the network connection information of the mobile phone and the external equipment;
and the unloading module is used for unloading the monitoring module and the correction module on the external equipment.
After the execution operation is completed, the default mobile phone end determines to execute the uninstalling module, then uninstalls all relevant files and programs of the monitoring module and the correction module installed on the mobile phone, and cleans up residues.
When the mobile phone terminal is used, the mobile phone terminal firstly waits for all execution operations to be finished, then the mobile phone terminal starts to automatically unload the mobile phone terminal, the Type-C interface is inserted into the mobile phone terminal from the charging interface and the mobile phone terminal is connected with the external equipment, all installation files or residual information installed on the mobile phone terminal through the external equipment are installed, after all execution operations of the mobile phone terminal are finished, the fact that the external equipment completes network monitoring tasks of the mobile phone terminal is shown, and a user can extract the Type-C from the mobile phone interface.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (3)

1. A method for monitoring the security of a mobile phone network based on a Type-C interface is characterized by comprising the following steps:
1) firstly, the mobile phone is in a network connection state, and then the mobile phone is set to be in a monitored state;
2) the mobile phone is connected with the external equipment through the Type-C interface, and the external equipment automatically installs a scanning module, a monitoring module, a correction module, a feedback module and an unloading module in the mobile phone through the Type-C interface;
3) the monitoring module acquires the monitoring information of the mobile phone, checks the monitoring information through the correction module, and then sends a check result to the feedback module;
4) the feedback module generates corresponding execution operation options according to the check result and sends the execution operation options to the mobile phone, and a user performs selection operation according to the execution operation options received by the mobile phone and decides to select one of the execution operation options for execution;
5) after the execution operation is finished, the network security monitoring is finished, the Type-C is pulled out from the mobile phone interface, and the connection between the external equipment and the mobile phone is disconnected;
the installation process of the monitoring module in the step 2) is as follows:
a. judging whether the mobile phone needs to simulate clicking to install the monitoring module, if so, installing the monitoring module in a click simulating manner;
b. if the simulation click installation is not needed, installing the monitoring module in a mode of loading an installation program and importing an installation package download link;
the installation process of the correction module in the step 2) is as follows:
a. judging whether a mobile phone network security inspection standard exists in the mobile phone, if so, taking the inspection standard as a correction standard of a correction module, extracting qualified inspection parameters of the mobile phone network security, converting the qualified inspection parameters into a corresponding correction format, and storing the qualified inspection parameters in a specified directory of the mobile phone;
b. if the verification standard of the mobile phone network security does not exist, installing a correction module in a mode of loading an installation program and importing an installation package downloading link, wherein the correction module is stored in a mobile phone directory specified by a user;
in the step 3), the process of checking by the correction module is as follows:
a. the correction module firstly acquires network security monitoring information about the accessed mobile phone;
b. the parameters related to the mobile phone network security inspection in the monitoring information are independently taken out and displayed in a list form, then the parameters are compared with the corresponding qualified parameters in the correction module one by one, the correction result is counted until the comparison of all the monitoring information is finished, and the final counted correction result is generated;
c. taking out unqualified items in the correction result, marking the unqualified items and recording corresponding reasons to form a check result and outputting the check result to a feedback module;
the execution operation options comprise repair, black drawing, trust, exit and pass, the black drawing and the trust in the execution operation options are primary single options, the exit and the pass are secondary single options, and the primary single options, the secondary single options and the repair form any multiple options.
2. The method for monitoring the network security of the mobile phone based on the Type-C interface of claim 1, wherein after the execution of the operation option is completed, the mobile phone automatically executes the uninstalling module, then uninstalls all files and programs related to the scanning module, the monitoring module, the calibration module, and the feedback module installed on the mobile phone, and cleans up residues.
3. A system for implementing the method for monitoring the network security of the mobile phone based on the Type-C interface according to any one of claims 1 to 2, wherein the system comprises an external device, and the external device comprises:
the system comprises a scanning module, a monitoring module and a correction module, wherein the scanning module is used for acquiring network connection in the mobile phone, acquiring configuration information of the mobile phone and judging whether the monitoring module and/or the correction module need to be installed;
the monitoring module is arranged in the mobile phone and is used for establishing a network connection monitoring relation between the mobile phone and the external equipment;
the correction module is arranged in the mobile phone and used for checking the network connection information of the mobile phone and the external equipment;
the feedback module is arranged in the mobile phone, generates corresponding execution operation options according to the check result and sends the execution operation options to the mobile phone, and the user performs selection operation according to the execution operation options received by the mobile phone and decides to select one of the execution operation options to execute
And the unloading module is used for unloading the scanning module, the monitoring module, the correcting module and the feedback module on the mobile phone.
CN201910545905.XA 2019-06-23 2019-06-23 Method and system for monitoring mobile phone network security based on Type-C interface Active CN110166630B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910545905.XA CN110166630B (en) 2019-06-23 2019-06-23 Method and system for monitoring mobile phone network security based on Type-C interface

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910545905.XA CN110166630B (en) 2019-06-23 2019-06-23 Method and system for monitoring mobile phone network security based on Type-C interface

Publications (2)

Publication Number Publication Date
CN110166630A CN110166630A (en) 2019-08-23
CN110166630B true CN110166630B (en) 2021-06-29

Family

ID=67625494

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910545905.XA Active CN110166630B (en) 2019-06-23 2019-06-23 Method and system for monitoring mobile phone network security based on Type-C interface

Country Status (1)

Country Link
CN (1) CN110166630B (en)

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8639733B2 (en) * 2009-03-16 2014-01-28 Apple Inc. Automatic identification of compatible applications and accessories
CN103997427A (en) * 2014-03-03 2014-08-20 浙江大学 Communication network detection and anti-attack protection method and device, communication equipment and communication system
CN105635122A (en) * 2015-12-23 2016-06-01 北京金山安全软件有限公司 Wifi access method and device and electronic equipment
CN109032948A (en) * 2018-07-28 2018-12-18 安徽捷兴信息安全技术有限公司 It is a kind of by USB interface to the method and detection system of mobile phone application safety detection

Also Published As

Publication number Publication date
CN110166630A (en) 2019-08-23

Similar Documents

Publication Publication Date Title
CN104978263A (en) Mobile terminal application program test method and mobile terminal application program test system
US10394572B2 (en) Power adapter and method for upgrading the power adapter
CN105307195B (en) A kind of method and device updating access point name parameter
US20150024736A1 (en) System and Method for Enhanced Diagnostics on Mobile Communication Devices
JP5710680B2 (en) System and method for reducing factory program time for wireless devices
CN103701503A (en) Bluetooth pairing method and system, and Bluetooth KEY
CN106126414B (en) Application software testing method and system
CN106897095A (en) The multiple method of application program hot repair, device and readable storage medium storing program for executing
CN111158738A (en) Earphone firmware upgrading method and device and readable storage medium
CN108683556B (en) Method and device for detecting functional state of network card and computer storage medium
CN110908702A (en) Version switching method, version switching device, computer equipment and storage medium
CN112214405A (en) Software testing method and device, electronic equipment and readable storage medium
CN110166630B (en) Method and system for monitoring mobile phone network security based on Type-C interface
CN110908489B (en) Test method and test equipment for battery management system
CN113238935A (en) Application testing method, system, device, medium, and computer program product
CN111104331A (en) Software management method, terminal device and computer-readable storage medium
CN111949536A (en) JAVA application program testing method and system based on bytecode technology
CN107509215A (en) A kind of wireless authentication automated testing method and system
CN111158947A (en) Method for making pre-copy file, server and readable storage medium
CN114546842A (en) Interface test method and device, storage medium and electronic equipment
CN110502429B (en) Management method, device, equipment and storage medium of test system
CN1794734B (en) Method of unloading in advance then installing medium object and terminal equipment
CN106375461A (en) Configuration resource near-field transmission method and device
CN114840407A (en) Mock testing method and related equipment
CN111638914A (en) Method, equipment and storage medium for setting terminal function

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20230811

Address after: Building 5, Phase I Standardization Workshop, Sichuan-Chongqing Cooperation Demonstration Park, Economic Development Zone, Dazhu County, Dazhou City, Sichuan Province, 635000

Patentee after: Sichuan Anxinpu Electronics Co.,Ltd.

Address before: 400 000 Pingshan Industrial Park, Jingkai District, Qijiang District, Chongqing (Intelligent Terminal Industrial Park)

Patentee before: Chongqing Anlian Pu Electronics Co.,Ltd.