CN113179347B - Internet-based mobile phone safety protection system - Google Patents

Internet-based mobile phone safety protection system Download PDF

Info

Publication number
CN113179347B
CN113179347B CN202110348099.4A CN202110348099A CN113179347B CN 113179347 B CN113179347 B CN 113179347B CN 202110348099 A CN202110348099 A CN 202110348099A CN 113179347 B CN113179347 B CN 113179347B
Authority
CN
China
Prior art keywords
mobile phone
characters
phone terminal
space
false
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110348099.4A
Other languages
Chinese (zh)
Other versions
CN113179347A (en
Inventor
赵阳
吴继承
何杰
欧文灏
鲁伟
徐思通
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Panfeng Precision Technology Co Ltd
Original Assignee
Shenzhen Panfeng Precision Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Panfeng Precision Technology Co Ltd filed Critical Shenzhen Panfeng Precision Technology Co Ltd
Priority to CN202110348099.4A priority Critical patent/CN113179347B/en
Publication of CN113179347A publication Critical patent/CN113179347A/en
Application granted granted Critical
Publication of CN113179347B publication Critical patent/CN113179347B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/16Error detection or correction of the data by redundancy in hardware
    • G06F11/20Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
    • G06F11/2053Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where persistent mass storage functionality or persistent mass storage control functionality is redundant
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/0608Saving storage space on storage systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/0614Improving the reliability of storage systems
    • G06F3/0619Improving the reliability of storage systems in relation to data integrity, e.g. data losses, bit errors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/062Securing storage systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0629Configuration or reconfiguration of storage systems
    • G06F3/0631Configuration or reconfiguration of storage systems by allocating resources to storage systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Computer Security & Cryptography (AREA)
  • Quality & Reliability (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a mobile phone safety protection system based on internet, relating to the technical field of mobile phone safety protection and solving the problems that in the prior art, the technical problem that the security performance of the mobile phone terminal is reduced due to the incapability of setting the authority of the mobile phone terminal is solved, the storage space in the mobile phone terminal is managed through the storage management unit, the software is divided and stored, the memory of the common software and the memory of the non-common software are calculated by the ratio, the memory ratio is corresponding to the ratio of the storage space of the important space and the public space, then the sub-storage space except the important space and the public space in the mobile phone terminal is constructed into a spare space, formatting the inside of the spare space, and blocking the spare space from transmitting data with the outside, the storage space is reasonably divided, so that the phenomenon that the storage space is insufficient to cause important data loss is prevented, and the data safety performance of the mobile phone terminal is improved.

Description

Internet-based mobile phone safety protection system
Technical Field
The invention relates to the technical field of mobile phone safety protection, in particular to a mobile phone safety protection system based on the Internet.
Background
With the popularization of 3G technology and the popularization of smart phones, the functions of the mobile phones are more and more powerful, the mobile phones are not only used for personal consumption, but also increasingly handle official affairs, such as drafting business documents, sending and receiving company mails and the like, the safety problem of the mobile phones is not limited in the personal privacy scope, but is more and more related to the information safety of organizations, and the data on the mobile phones are subjected to safety protection and are more and more concerned by people;
in the prior art, there are many methods for protecting mobile phone information, but generally, selected files or folders are encrypted, and in the prior art, the authority setting cannot be performed on the mobile phone terminal, which results in the reduction of the security performance of the mobile phone terminal.
Disclosure of Invention
The invention aims to provide an Internet-based mobile phone security protection system, which is characterized in that a permission setting unit is used for carrying out permission setting on mobile phone access, a preset text set and a real-time login password text set are constructed, the preset text set and the real-time login password text set are subjected to subset corresponding comparison, then the number of check characters and false characters is obtained, secondary problem verification is set, the accuracy of permission verification is improved, and the security performance of a mobile phone terminal is enhanced; the storage space in the mobile phone terminal is managed through the storage management unit, the software is divided and stored, the ratio of the memories of the common software and the uncommon software is calculated, the ratio of the memories corresponds to the ratio of the storage space of the important space and the storage space of the public space, then the sub-storage space except the important space and the sub-storage space of the public space in the mobile phone terminal is constructed into the spare space, the inside of the spare space is formatted, the spare space and external data transmission are blocked, the storage space is reasonably divided, the shortage of the storage space is prevented, the loss of important data is caused, and the data safety performance of the mobile phone terminal is improved.
The purpose of the invention can be realized by the following technical scheme:
a mobile phone safety protection system based on the Internet comprises an authority setting unit, a network detection unit, a storage management unit, a safety protection platform, a registration unit and a database;
the permission setting unit is used for setting the permission of the access of the mobile phone, and the specific permission setting process is as follows:
step S1: a user sets a privacy problem through a mobile phone terminal, sets the privacy problem as a hidden secret order, then does not store answers corresponding to the privacy problem, sets an anti-forgetting prompt according to the normal use frequency of the user, if the real-time use frequency of the user does not reach the normal use frequency, the mobile phone terminal displays the anti-forgetting prompt, then erases a setting trace of the privacy problem in the mobile phone terminal, the privacy problem is represented as a user-defined set problem, the anti-forgetting prompt is represented as a prompt trace for helping the user to memorize a password, and the erasing trace is a publicly known prior art;
step S2: the method comprises the steps that a user sets login permission through a mobile phone terminal, the user sets a plurality of characters as mobile phone login keys and marks the characters as preset characters, wherein the preset characters comprise kernel-through characters and false characters, the kernel-through characters are effective characters for obtaining permission, and the false characters are invalid characters for not obtaining permission;
step S3: sequencing single Chinese characters or words in preset characters according to the sequence of the occurrence number from large to small, constructing a preset text set by the sequenced preset characters, then carrying out authority verification when a real-time login user uses a mobile phone terminal, acquiring a login password of the real-time login user in real time, acquiring the single Chinese characters or words in the real-time login password, sequencing the single Chinese characters or words in the login password according to the sequence of the occurrence number from large to small, and constructing a real-time login password text set;
step S4: performing subset corresponding comparison on a preset text set and a real-time login password text set, namely comparing a second bit subset in the preset text set with a second bit subset in the real-time login password text set, marking a subset with the same position as the preset text set and the real-time login password text set to screen a text, then respectively comparing a single Chinese character or word in the screened text with a Ketong character and a false character, if the single Chinese character or word in the screened text is the Ketong character, adding 1 to the number of the Ketong characters, and if the single Chinese character or word in the screened text is the false character, adding 1 to the number of the false character;
step S5: then, acquiring the number of the Ketong characters and the number of the false characters, calculating a ratio of the number of the Ketong characters to the number of the false characters, if a ratio result is larger than 1, generating a signal to be Ketong, entering step S6, and if the ratio result is smaller than or equal to 1, generating a verification failure signal;
step S6: comparing the number of the false characters with a threshold value of the number of the false characters, if the number of the false characters is more than or equal to the threshold value of the number of the false characters, generating a verification failure signal, and if the number of the false characters is less than the threshold value of the number of the false characters, generating a verification success signal; wherein the threshold value of the number of the false characters is represented as the maximum number of the false characters when the verification is successful;
step S7: if the number of the approved characters is less than the approved character number threshold value, and the number of the false characters is less than the false character number threshold value, generating a secondary verification signal, displaying a private question through the mobile phone terminal, if the answer is correct, the secondary verification is successful, if the answer is wrong, the secondary verification fails, and the approved character number threshold value represents the minimum number of approved characters when the verification is successful.
Further, the storage management unit is configured to manage a storage space in the mobile phone terminal, and the specific management process is as follows:
step SS 1: dividing a storage space in the mobile phone terminal into a plurality of sub-storage spaces, performing memory division on the sub-storage spaces to obtain terminal software in the mobile phone terminal, and marking the terminal software as i, i =1, 2, … …, n, n is a positive integer;
step SS 2: acquiring the use times and frequency of terminal software in the mobile phone terminal, marking the use times and frequency of the terminal software in the mobile phone terminal as CSi and PLi, and then using a formula
Figure 400228DEST_PATH_IMAGE001
Obtaining an important coefficient Xi of terminal software in the mobile phone terminal, wherein a1 and a2 are proportional coefficients, a1 is greater than a2 is greater than 0, and correspondingly enabling the important coefficient Xi to be obtainedThe using times and the frequency can be obtained by a counter;
step SS 3: and then comparing the important coefficient Xi of the terminal software in the mobile phone terminal with an important coefficient threshold value: if the important coefficient Xi of the terminal software in the mobile phone terminal is more than or equal to the important coefficient threshold, marking the corresponding terminal as the common software, then storing the common software into the sub-storage space, and marking the corresponding sub-storage space as the important space, if the important coefficient Xi of the terminal software in the mobile phone terminal is less than the important coefficient threshold, marking the corresponding terminal as the uncommon software, then storing the uncommon software into the sub-storage space, and marking the corresponding sub-storage space as the open space;
step SS 4: the method comprises the steps of calculating the ratio of memories of common software and uncommon software, enabling the ratio of the memories to correspond to the ratio of storage spaces of an important space and an open space, then constructing a sub-storage space except the important space and the open space in a mobile phone terminal into a spare space, formatting the inside of the spare space, and blocking the spare space from transmitting data with the outside.
Further, the network detection unit is configured to analyze network information connected to a mobile phone terminal of a user, so as to perform network detection on the mobile phone terminal, where the network information includes range data, quantity data, and floating data, the range data is a network coverage area connected to the mobile phone terminal, the quantity data is an average online number of people in a network connected to the mobile phone terminal, the floating data is a maximum difference value of network speed floating of the mobile phone terminal, a connected network is marked as o, o =1, 2, … …, m, and m are positive integers, the network coverage area is obtained by people measurement, the online number of people can be obtained by the number of network terminal nodes, the network speed floating can be obtained by network transmission of a router terminal, and a specific analysis and detection process is as follows:
step T1: acquiring the network coverage area connected with the mobile phone terminal, and marking the network coverage area connected with the mobile phone terminal as MJo;
step T2: acquiring the average online number of the network connected with the mobile phone terminal, and marking the average online number of the network connected with the mobile phone terminal as RSo;
step T3: acquiring a maximum difference value of network speed fluctuation of the mobile phone terminal connection, and marking the maximum difference value of the network speed fluctuation of the mobile phone terminal connection as CZo;
step T4: by the formula
Figure 388912DEST_PATH_IMAGE002
Obtaining a detection coefficient JCo of the network, wherein b1, b2 and b3 are proportional coefficients, b1 is more than b2 is more than b3 is more than 0, and alpha is an error correction factor and takes the value of 1.36;
step T5: the detection coefficient JCo of the network is compared to a detection coefficient threshold.
Further, the registration login unit is used for the manager and the user to submit manager information and user information for registration through the mobile phone terminal, and the manager information and the user information which are successfully registered are sent to the database for storage, the manager information comprises the name, the age, the time of entry and the mobile phone number of the real name authentication of the user, and the user information comprises the name, the age, the occupation and the mobile phone number of the real name authentication of the user.
Compared with the prior art, the invention has the beneficial effects that:
1. in the invention, the permission setting unit sets the permission of the mobile phone access, a preset text set and a real-time login password text set are constructed, the preset text set and the real-time login password text set are subjected to subset corresponding comparison, then the number of the Ketong characters and the false characters is obtained, and secondary problem verification is set, so that the accuracy of the permission verification is improved, and the safety performance of the mobile phone terminal is enhanced;
2. according to the invention, the storage space in the mobile phone terminal is managed through the storage management unit, the software is divided and stored, the memory ratio of the common software and the memory of the uncommon software is calculated, the memory ratio corresponds to the storage space ratio of the important space and the public space, then the sub-storage space except the important space and the public space in the mobile phone terminal is constructed into the spare space, the inside of the spare space is formatted, the transmission of the spare space and external data is blocked, the storage space is reasonably differentiated, the phenomenon that the storage space is insufficient and the important data is lost is prevented, and the data security performance of the mobile phone terminal is improved;
3. in the invention, network information connected with a user mobile phone terminal is analyzed through a network detection unit, so that network detection is carried out on the mobile phone terminal, the network coverage area connected with the mobile phone terminal, the average online number of people in a network connected with the mobile phone terminal and the maximum difference value of network speed floating of the mobile phone terminal are obtained, the detection coefficient JCo of the network is obtained through a formula, and the detection coefficient JCo of the network is compared with a detection coefficient threshold value; the network connected with the mobile phone is detected, so that the information of the mobile phone terminal of the user is prevented from being leaked due to network abnormality, and the privacy safety performance of the mobile phone terminal is improved.
Drawings
In order to facilitate understanding for those skilled in the art, the present invention will be further described with reference to the accompanying drawings;
fig. 1 is a schematic block diagram of the present invention.
Detailed Description
The technical solutions of the present invention will be described clearly and completely with reference to the following embodiments, and it should be understood that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As shown in fig. 1, an internet-based mobile phone security protection system includes an authority setting unit, a network detection unit, a storage management unit, a security protection platform, a registration unit, and a database;
the registration login unit is used for the manager and the user to submit manager information and user information through the mobile phone terminal for registration, and sending the manager information and the user information which are successfully registered to the database for storage, wherein the manager information comprises the name, the age, the time of entry and the mobile phone number of real name authentication of the user, and the user information comprises the name, the age, the occupation and the mobile phone number of real name authentication of the user;
the permission setting unit is used for setting permissions for mobile phone access, and the specific permission setting process is as follows:
step S1: a user sets a privacy problem through a mobile phone terminal, sets the privacy problem as a hidden secret order, then does not store answers corresponding to the privacy problem, sets an anti-forgetting prompt according to the normal use frequency of the user, if the real-time use frequency of the user does not reach the normal use frequency, the mobile phone terminal displays the anti-forgetting prompt, then erases a privacy problem setting trace in the mobile phone terminal, the privacy problem is represented as a user-defined set problem, and the anti-forgetting prompt is represented as a prompt for helping the user to memorize a password;
step S2: the method comprises the steps that a user sets login permission through a mobile phone terminal, the user sets a plurality of characters as mobile phone login keys and marks the characters as preset characters, wherein the preset characters comprise kernel-through characters and false characters, the kernel-through characters are effective characters for obtaining permission, and the false characters are invalid characters for not obtaining permission;
step S3: sequencing single Chinese characters or words in preset characters according to the sequence of the occurrence number from large to small, constructing a preset text set by the sequenced preset characters, then carrying out authority verification when a real-time login user uses a mobile phone terminal, acquiring a login password of the real-time login user in real time, acquiring the single Chinese characters or words in the real-time login password, sequencing the single Chinese characters or words in the login password according to the sequence of the occurrence number from large to small, and constructing a real-time login password text set;
step S4: performing subset corresponding comparison on a preset text set and a real-time login password text set, namely comparing a second bit subset in the preset text set with a second bit subset in the real-time login password text set, marking a subset with the same position as the preset text set and the real-time login password text set to screen a text, then respectively comparing a single Chinese character or word in the screened text with a Ketong character and a false character, if the single Chinese character or word in the screened text is the Ketong character, adding 1 to the number of the Ketong characters, and if the single Chinese character or word in the screened text is the false character, adding 1 to the number of the false character;
step S5: then, acquiring the number of the Ketong characters and the number of the false characters, calculating a ratio of the number of the Ketong characters to the number of the false characters, if a ratio result is larger than 1, generating a signal to be Ketong, entering step S6, and if the ratio result is smaller than or equal to 1, generating a verification failure signal;
step S6: comparing the number of the false characters with a threshold value of the number of the false characters, if the number of the false characters is more than or equal to the threshold value of the number of the false characters, generating a verification failure signal, and if the number of the false characters is less than the threshold value of the number of the false characters, generating a verification success signal; wherein the threshold value of the number of the false characters is represented as the maximum number of the false characters when the verification is successful;
step S7: if the number of the check characters is less than the threshold of the number of the check characters, and the number of the false characters is less than the threshold of the number of the false characters, generating a secondary verification signal, displaying a private question through a mobile phone terminal, if the answer is correct, the secondary verification is successful, if the answer is wrong, the secondary verification fails, and the threshold of the number of the check characters represents the minimum number of the check characters when the verification is successful;
the storage management unit is used for managing the storage space in the mobile phone terminal, and the specific management process is as follows:
step SS 1: dividing a storage space in the mobile phone terminal into a plurality of sub-storage spaces, performing memory division on the sub-storage spaces to obtain terminal software in the mobile phone terminal, and marking the terminal software as i, i =1, 2, … …, n, n is a positive integer;
step SS 2: acquiring the use times and frequency of terminal software in the mobile phone terminal, marking the use times and frequency of the terminal software in the mobile phone terminal as CSi and PLi, and then using a formula
Figure 937705DEST_PATH_IMAGE001
Obtaining an important coefficient Xi of terminal software in the mobile phone terminal, wherein a1 and a2 are proportional coefficients, and a1 is greater than a2 is greater than 0;
step SS 3: and then comparing the important coefficient Xi of the terminal software in the mobile phone terminal with an important coefficient threshold value: if the important coefficient Xi of the terminal software in the mobile phone terminal is more than or equal to the important coefficient threshold, marking the corresponding terminal as the common software, then storing the common software into the sub-storage space, and marking the corresponding sub-storage space as the important space, if the important coefficient Xi of the terminal software in the mobile phone terminal is less than the important coefficient threshold, marking the corresponding terminal as the uncommon software, then storing the uncommon software into the sub-storage space, and marking the corresponding sub-storage space as the open space;
step SS 4: calculating the ratio of the memories of the common software and the uncommon software, enabling the ratio of the memories to correspond to the ratio of the storage spaces of the important space and the public space, then constructing a sub-storage space except the important space and the public space in the mobile phone terminal into a spare space, formatting the inside of the spare space, and blocking the spare space from transmitting data with the outside;
the network detection unit is used for analyzing network information connected with a mobile phone terminal of a user, so that network detection is carried out on the mobile phone terminal, the network information comprises range data, quantity data and floating data, the range data is the network coverage area connected with the mobile phone terminal, the quantity data is the average online number of people in a network connected with the mobile phone terminal, the floating data is the maximum difference value of the network speed floating of the mobile phone terminal, the connected network is marked as o, o =1, 2, … …, m and m are positive integers, and the specific analysis and detection process is as follows:
step T1: acquiring the network coverage area connected with the mobile phone terminal, and marking the network coverage area connected with the mobile phone terminal as MJo;
step T2: acquiring the average online number of the network connected with the mobile phone terminal, and marking the average online number of the network connected with the mobile phone terminal as RSo;
step T3: acquiring a maximum difference value of network speed fluctuation of the mobile phone terminal connection, and marking the maximum difference value of the network speed fluctuation of the mobile phone terminal connection as CZo;
step T4: by the formula
Figure 104376DEST_PATH_IMAGE002
Obtaining a detection coefficient JCo of the network, wherein b1, b2 and b3 are proportional coefficients, b1 is more than b2 is more than b3 is more than 0, and alpha is an error correction factor and takes the value of 1.36;
step T5: compare the detection coefficient JCo of the network to a detection coefficient threshold:
if the detection coefficient JCo of the network is larger than or equal to the detection coefficient threshold, marking the corresponding network as a safe network, generating a normal connection signal and sending the normal connection signal to the mobile phone terminal of the manager;
and if the detection coefficient JCo of the network is less than the detection coefficient threshold value, marking the corresponding network as a dangerous network, generating an abnormal connection signal and sending the abnormal connection signal to the mobile phone terminal of the manager.
When the method works, the permission setting unit is used for carrying out permission setting on mobile phone access, a preset text set and a real-time login password text set are constructed, the preset text set and the real-time login password text set are subjected to subset corresponding comparison, then the number of the Ketong characters and the false characters is obtained, secondary problem verification is set, the accuracy of permission verification is improved, and meanwhile the safety performance of a mobile phone terminal is enhanced; and then, the storage management unit is used for managing the storage space in the mobile phone terminal, dividing and storing the software, constructing a spare space, and analyzing the network information connected with the mobile phone terminal of the user through the network detection unit, so that the network detection is carried out on the mobile phone terminal, the connection network is detected, and the data loss in the mobile phone terminal caused by network abnormality is reduced.
The above formulas are all calculated by taking the numerical value of the dimension, the formula is a formula which obtains the latest real situation by acquiring a large amount of data and performing software simulation, and the preset parameters in the formula are set by the technical personnel in the field according to the actual situation.
The foregoing is merely exemplary and illustrative of the present invention and various modifications, additions and substitutions may be made by those skilled in the art to the specific embodiments described without departing from the scope of the invention as defined in the following claims.

Claims (2)

1. A mobile phone safety protection system based on the Internet is characterized by comprising an authority setting unit, a network detection unit, a storage management unit, a safety protection platform, a registration login unit and a database;
the permission setting unit is used for setting the permission of the access of the mobile phone, and the specific permission setting process is as follows:
step S1: a user sets a private question through a mobile phone terminal, sets the private question as a hidden secret order, then does not store answers corresponding to the private question, sets an anti-forgetting prompt according to the normal use frequency of the user, displays the anti-forgetting prompt if the real-time use frequency of the user does not reach the normal use frequency, and then erases a private question setting trace in the mobile phone terminal; the privacy problem is represented as a problem set by a user in a self-defining way, and the forgetting-prevention prompt is represented as a prompt for helping the user to memorize a password;
step S2: a user sets login authority through a mobile phone terminal, sets a plurality of characters as mobile phone login keys and marks the characters as preset characters;
step S3: sequencing single Chinese characters or words in preset characters according to the sequence of the occurrence number from large to small, constructing a preset text set by the sequenced preset characters, then carrying out authority verification when a real-time login user uses a mobile phone terminal, acquiring a login password of the real-time login user in real time, acquiring the single Chinese characters or words in the real-time login password, sequencing the single Chinese characters or words in the login password according to the sequence of the occurrence number from large to small, and constructing a real-time login password text set;
step S4: performing subset corresponding comparison on a preset text set and a real-time login password text set, namely comparing a second bit subset in the preset text set with a second bit subset in the real-time login password text set, marking the subset with the same preset text set as the real-time login password text set as a screening text, then respectively comparing a single Chinese character or word in the screening text with a Ketong character and a false character, if the single Chinese character or word in the screening text is the Ketong character, adding 1 to the number of the Ketong characters, and if the single Chinese character or word in the screening text is the false character, adding 1 to the number of the false character;
step S5: then, acquiring the number of the Ketong characters and the number of the false characters, calculating a ratio of the number of the Ketong characters to the number of the false characters, if a ratio result is larger than 1, generating a signal to be Ketong, entering step S6, and if the ratio result is smaller than or equal to 1, generating a verification failure signal;
step S6: comparing the number of the false characters with a threshold value of the number of the false characters, if the number of the false characters is more than or equal to the threshold value of the number of the false characters, generating a verification failure signal, and if the number of the false characters is less than the threshold value of the number of the false characters, generating a verification success signal; wherein the threshold value of the number of the false characters is represented as the maximum number of the false characters when the verification is successful;
step S7: if the number of the check characters is less than the threshold of the number of the check characters, and the number of the false characters is less than the threshold of the number of the false characters, generating a secondary verification signal, displaying a private question through a mobile phone terminal, if the answer is correct, the secondary verification is successful, if the answer is wrong, the secondary verification fails, and the threshold of the number of the check characters represents the minimum number of the check characters when the verification is successful; the preset characters comprise Ketong characters and false characters, wherein the Ketong characters are represented as valid characters for obtaining the authority, and the false characters are represented as invalid characters for not obtaining the authority;
the storage management unit is used for managing the storage space in the mobile phone terminal, and the specific management process is as follows:
step SS 1: dividing a storage space in the mobile phone terminal into a plurality of sub-storage spaces, performing memory division on the sub-storage spaces to obtain terminal software in the mobile phone terminal, and marking the terminal software as i, i =1, 2, … …, n, n is a positive integer;
step SS 2: acquiring the use times and frequency of terminal software in the mobile phone terminal, and enabling the terminal in the mobile phone terminalThe number of uses and frequency of the software are labeled as CSi and PLi, and then are represented by the formula
Figure 778027DEST_PATH_IMAGE001
Obtaining an important coefficient Xi of terminal software in the mobile phone terminal, wherein a1 and a2 are proportional coefficients, and a1 is greater than a2 is greater than 0;
step SS 3: and then comparing the important coefficient Xi of the terminal software in the mobile phone terminal with an important coefficient threshold value: if the important coefficient Xi of the terminal software in the mobile phone terminal is larger than or equal to the important coefficient threshold, marking the corresponding terminal software as the common software, then storing the common software into the sub-storage space, marking the corresponding sub-storage space as the important space, if the important coefficient Xi of the terminal software in the mobile phone terminal is smaller than the important coefficient threshold, marking the corresponding terminal software as the uncommon software, then storing the uncommon software into the sub-storage space, and marking the corresponding sub-storage space as the open space;
step SS 4: calculating the ratio of the memories of the common software and the uncommon software, enabling the ratio of the memories to correspond to the ratio of the storage spaces of the important space and the public space, then constructing a sub-storage space except the important space and the public space in the mobile phone terminal into a spare space, formatting the inside of the spare space, and blocking the spare space from transmitting data with the outside;
the network detection unit is used for analyzing network information connected with a mobile phone terminal of a user so as to perform network detection on the mobile phone terminal, obtain the network coverage area connected with the mobile phone terminal, the average online number of people connected with the mobile phone terminal and the maximum difference value of the network speed floating of the mobile phone terminal, and respectively mark the network coverage area connected with the mobile phone terminal, the average online number of people connected with the mobile phone terminal and the maximum difference value of the network speed floating of the mobile phone terminal as MCo, RSO and CZo; by the formula
Figure 475593DEST_PATH_IMAGE002
Obtaining a detection coefficient JCo of the network, wherein b1, b2 and b3 are all proportional coefficients, b1 is more than b2 is more than b3 is more than 0, and alpha is errorAnd the difference correction factor is 1.36, and the detection coefficient JCo of the network is compared with the detection coefficient threshold value.
2. The internet-based mobile phone security protection system of claim 1, wherein the registration login unit is configured to enable a manager and a user to submit manager information and user information for registration through a mobile phone terminal, and send the manager information and the user information that are successfully registered to the database for storage, the manager information includes a name, an age, an enrollment time of the manager and a mobile phone number for authenticating the real name of the user, and the user information includes a name, an age, an occupation of the user and a mobile phone number for authenticating the real name of the user.
CN202110348099.4A 2021-03-31 2021-03-31 Internet-based mobile phone safety protection system Active CN113179347B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110348099.4A CN113179347B (en) 2021-03-31 2021-03-31 Internet-based mobile phone safety protection system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110348099.4A CN113179347B (en) 2021-03-31 2021-03-31 Internet-based mobile phone safety protection system

Publications (2)

Publication Number Publication Date
CN113179347A CN113179347A (en) 2021-07-27
CN113179347B true CN113179347B (en) 2022-03-29

Family

ID=76922783

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110348099.4A Active CN113179347B (en) 2021-03-31 2021-03-31 Internet-based mobile phone safety protection system

Country Status (1)

Country Link
CN (1) CN113179347B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115277844B (en) * 2022-06-13 2024-03-26 杭州猎火传媒科技有限公司 Big data background data processing method and system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105187459A (en) * 2015-10-28 2015-12-23 广州睿颢软件技术有限公司 Account private data security system and data protection method thereof
CN112187792A (en) * 2020-09-27 2021-01-05 安徽斯跑特科技有限公司 Network information safety protection system based on internet

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101237376B1 (en) * 2011-07-14 2013-02-26 주식회사 제이컴정보 Integrated security control System and Method for Smartphones
CN103310161B (en) * 2012-03-14 2016-08-03 北京海泰方圆科技股份有限公司 A kind of means of defence for Database Systems and system
US11123641B2 (en) * 2017-07-24 2021-09-21 Sony Interactive Entertainment Inc. Information processing device, server device, parental control method, profile information management method
US20200327254A1 (en) * 2019-04-10 2020-10-15 Truthshare Software Private Limited System and method to find origin and to prevent spread of false information on an information sharing systems

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105187459A (en) * 2015-10-28 2015-12-23 广州睿颢软件技术有限公司 Account private data security system and data protection method thereof
CN112187792A (en) * 2020-09-27 2021-01-05 安徽斯跑特科技有限公司 Network information safety protection system based on internet

Also Published As

Publication number Publication date
CN113179347A (en) 2021-07-27

Similar Documents

Publication Publication Date Title
CN112182519B (en) Computer storage system security access method and access system
US7769696B2 (en) Information storing apparatus
CN110943990B (en) Big data-based data analysis system for communication security management and control
US20090287923A1 (en) Reverse Mapping Method and Apparatus for Form Filling
CN107438049B (en) Malicious login identification method and device
US10091223B2 (en) Method for detecting anomalies in network traffic
Olaniyi et al. Design of secure electronic voting system using multifactor authentication and cryptographic hash functions
CN113179347B (en) Internet-based mobile phone safety protection system
CN110472012A (en) A kind of block chain sensitivity word treatment method, device, storage medium and equipment
CN112804207B (en) Alliance chain node security admission method applied to electronic government affair scene
CN116915515B (en) Access security control method and system for industrial control network
CN115115351B (en) Method and system for auditing environmental damage identification evaluation report
CN117292054A (en) Three-dimensional digital-based intelligent operation and maintenance method and system for power grid
Kounine et al. Assessing disclosure risk in anonymized datasets
CN113824739B (en) User authority management method and system of cloud management platform
CN112989333B (en) Security authentication method and system
CN111708996B (en) Enterprise internal management consultation information sharing system based on Internet
CN106534214A (en) Router security authentication method, device and system
CN113076531A (en) Identity authentication method and device, computer equipment and storage medium
CN112632592A (en) Block chain credible privacy computing power improving system based on TEE technology
CN116011025B (en) Digital identity authentication method and system based on block chain
Konnon et al. An Extended Layered Information Security Architecture (ELISA) for e-Government in Developing Countries
CN112149095B (en) Student data safety management method and system
CN114553504B (en) Third party secure login method
CN110930234B (en) Financial management method with remote access function

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant