CN115499844A - Mobile terminal information safety protection system and method - Google Patents

Mobile terminal information safety protection system and method Download PDF

Info

Publication number
CN115499844A
CN115499844A CN202211156984.3A CN202211156984A CN115499844A CN 115499844 A CN115499844 A CN 115499844A CN 202211156984 A CN202211156984 A CN 202211156984A CN 115499844 A CN115499844 A CN 115499844A
Authority
CN
China
Prior art keywords
data
module
software
mobile terminal
application software
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202211156984.3A
Other languages
Chinese (zh)
Other versions
CN115499844B (en
Inventor
王皓然
付鋆
陈运晶
汪浩
刘俊荣
钱俊凤
班秋成
周泽元
周琳妍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guizhou Power Grid Co Ltd
Original Assignee
Guizhou Power Grid Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guizhou Power Grid Co Ltd filed Critical Guizhou Power Grid Co Ltd
Priority to CN202211156984.3A priority Critical patent/CN115499844B/en
Publication of CN115499844A publication Critical patent/CN115499844A/en
Application granted granted Critical
Publication of CN115499844B publication Critical patent/CN115499844B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/08Testing, supervising or monitoring using real traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/20Transfer of user or subscriber data
    • H04W8/205Transfer to or from user equipment or user record carrier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/30Network data restoration; Network data reliability; Network data fault tolerance
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a mobile terminal information security protection system and a method, and particularly relates to the technical field of information security protection, wherein the system comprises a software security evaluation module, an authority setting module, a data encryption module, an operation isolation module, a software updating module, an equipment positioning locking module, a cloud storage module, an equipment retrieving verification module and a data recovery module; the software evaluation module is used for evaluating the safety performance of various kinds of application software which are not on line in a software mall in the mobile terminal equipment on the premise of government supervision and monitoring the running condition of the application program in real time after the application program is on line, the evaluation of the privacy information of the application software by the software safety evaluation module reduces the invasion of the privacy information of a user, the rights and interests of the user are ensured, the data transmission is encrypted, decrypted and isolated by the data encryption module and the running isolation module, the attack of viruses and the leakage problem of data are reduced, and the safety degree of the data information is improved.

Description

Mobile terminal information safety protection system and method
Technical Field
The invention relates to the technical field of information security protection, in particular to a system and a method for protecting information security of a mobile terminal.
Background
With the rapid development of information technology and the continuous promotion of wireless network technology, the mobile terminal is more intelligent and convenient, the mobile terminal including a smart phone, a tablet computer, a vehicle-mounted computer and the like increasingly becomes a main terminal form for users to perform various network activities, however, the frequent occurrence of privacy information leakage of the mobile terminal leads to frequent occurrence of security events, the privacy of the users is threatened by security, and how to protect the privacy information of the mobile terminal information users becomes a problem of close relationship between mobile terminal manufacturers and the users.
The mobile terminal system comprises an encryption module, a software interaction module, a network connection authentication module, a data processing module, a display module and the like, wherein the encryption module unlocks the access authority of the mobile terminal to reduce the contact of others by setting a fingerprint password, a digital password or face recognition when a user accesses an interface, the software interaction module is used for setting a geographical position access, a photo access, a short message information access, an address book access and the like for application software installed in the mobile terminal by the user, the network connection authentication module is used for connecting to the Internet by verification code verification or password verification when the mobile terminal needs to perform network activities through a wireless network, and the data processing module is used for performing data acquisition, data cleaning, data redundancy and the like on various data of the mobile terminal and visually displaying each network activity interface for the user through the display module.
At present, information security protection established in a mobile terminal system is not perfect, for example, in a software interaction process, after a user authorizes certain software, the software continuously acquires privacy information of the user and sends the privacy information out, so that the authority of the software is abused, the privacy is sent out according to the existing authority of the software, if the software A has the authority of acquiring an address book of the user and does not have the authority of network connection, and the software B does not have the authority of acquiring the address book of the user and has the authority of network connection, the situation that the software A transfers the address book of the user to the software B, and the software B sends the address book out through network access may occur, so that the security privacy of the user is threatened.
Disclosure of Invention
In order to overcome the above defects in the prior art, embodiments of the present invention provide a system and a method for protecting information security of a mobile terminal, where a software security evaluation module is used to evaluate application software to reduce invasion of private information of a user, so as to ensure the rights and interests of the user, a data encryption module and an operation isolation module are used to encrypt and decrypt data transmission for isolation, so as to reduce virus attack and data leakage, improve the security of data information, and a cloud storage module is used to encrypt and store data information to help the user to recover data, so as to avoid loss of the user due to data information loss, thereby solving the problems in the background art.
In order to achieve the purpose, the invention provides the following technical scheme: a mobile terminal information security protection system comprises a software security evaluation module, an authority setting module, a data encryption module, an operation isolation module, a software updating module, an equipment positioning locking module, a cloud storage module, an equipment retrieving verification module and a data recovery module;
the software security evaluation module is used for evaluating the security performance of various application software which is not on line in a software mall in the mobile terminal equipment on the premise of government supervision and monitoring the running condition of an application program in real time after the application program is on line;
the permission setting module is used for setting privacy permissions given by users after the software mall is online, wherein the privacy permissions comprise permissions of an address list, permissions of multimedia message and short message, permissions of a camera, permissions of a video photo, position permissions, microphone use permissions and network connection permissions;
the data encryption module encrypts and operates data in the operation process of application software, and the operation isolation module isolates the operation environment of the application software on the basis of data encryption to protect an application program from being glared by other application software;
the software updating module is used for connecting the application software to a network for automatic updating under the condition of user confirmation; the problem that the running of the BUG or the application software is blocked is solved.
The device positioning and locking module is used for uploading data in the mobile terminal to the cloud storage module through remote positioning and remote locking of the mobile terminal device system when the mobile terminal device is lost;
the cloud storage module acquires the encrypted data of the mobile terminal and stores the encrypted data;
the device retrieving verification module is used for unlocking the password in an identity verification mode when the user retrieves the mobile terminal device and recovering the privacy information of the user.
In a preferred embodiment, the software security evaluation module comprises application software privacy permission detection, software data security detection and software networking security detection, wherein the software privacy permission detection is to apply for basic information of application software and whether the software applies for sensitive information permission, wherein the basic information refers to version number, application name, program memory size, permission description information and the like of the application software; the software data security detection means detecting whether the storage position of the application software data is secure and whether the storage position is encrypted; the software networking safety detection means that whether the privacy information packet contains unsafe data or not is detected when the application software is networked to perform various network activities, and if not, the data packet is encrypted and transmitted, so that the condition that the data packet uploaded by the networking is acquired by viruses or other application programs is reduced.
In a preferred embodiment, the Method for software data security detection is to convert class.dex files compiled by Dalvik byte codes into class _ dex2jar files compiled by Java byte codes, open function source codes for analyzing application processing data through jd _ gui, and analyze memory data calling condition and software thread running condition by combining a Method Profiling tool in DDMS.
In a preferred embodiment, the data encryption module transmits data of application software in a symmetric encryption manner to ensure that private information is not stolen, the symmetric encryption includes a high-level encryption standard, data plaintext is encrypted by using alternate keys, then bytes are used for replacing the encrypted plaintext, line bits of the encrypted plaintext are scrambled and vertical bits of the encrypted plaintext are scrambled, then the encrypted plaintext is replaced by the bytes after encryption by using the keys, the encrypted plaintext is obtained after ten times of repetition, then the bytes are replaced by the bytes, line bits are scrambled, then the keys are encrypted to finally form a ciphertext for data transmission, and a data receiver needs to obtain the keys to perform reverse operation on the encryption step, so that the decryption can be performed.
In a preferred embodiment, the running isolation module encrypts important data or data infected by a virus in the application software and then enters a specified file directory, during the running isolation, the application software can run normally, if the application software contains the virus file, the virus file is killed by the running isolation module, and if the virus file is infected by the important data, the infected important data is encrypted and run to prevent other data from being infected.
In a preferred embodiment, the device location locking module performs static data analysis through application software codes, tracks the dynamic situation of the application software data, performs key encryption through a locator locking position in the mobile terminal after user identity authentication, performs data clearing and deep hiding on privacy information, performs the highest encryption standard, performs key encryption, and transmits the key encryption to the cloud storage module, and the cloud storage module performs identification anti-counterfeiting attack on an encryption key through the collision of a hash function in the process of uploading the privacy information, so that the problem of data information security caused by uploading the data to the cloud storage module is reduced.
In a preferred embodiment, the device retrieving verification module includes an identity verification unit and a data recovery unit, the identity verification unit verifies a user through password verification, fingerprint identification and face identification, the verification method verifies the security of the user through bilinear pairing operation, hash-to-point operation or scalar multiplication, and the data recovery unit recovers the private information in the cloud storage module to the mobile terminal device through back calculation of advanced encryption standard.
In a preferred embodiment, an operation method of a mobile terminal information security protection system includes the following specific operation steps:
s1, firstly, before application software is on-line, a software security evaluation module is used for evaluating security privacy information and monitoring the running condition of the application program in real time after the application program is on-line;
s2, when the user downloads and uses the application software, the data encryption module encrypts and operates the application software data, the operation isolation module isolates the operation environment of the application software on the basis of data encryption, and the software updating module automatically updates the connection network of the application software under the condition of user confirmation;
s3, when the mobile terminal equipment is lost, the equipment positioning and locking module uploads the data in the mobile terminal to the cloud storage module for encrypted storage through remote positioning and remote locking of the mobile terminal equipment system;
and S4, finally, when the user retrieves the mobile terminal equipment, the equipment retrieval verification module unlocks the password in an identity verification mode, and the user privacy information is restored.
The invention has the technical effects and advantages that:
according to the invention, the evaluation of the application software privacy information is carried out through the software security evaluation module, the invasion to the privacy information of the user is reduced, the rights and interests of the user are ensured, the data transmission is encrypted, decrypted and isolated through the data encryption module and the operation isolation module, the problems of virus attack and data leakage are reduced, the security of the data information is improved, the data information is encrypted and stored through the cloud storage module, the data recovery of the user is facilitated, and the loss of the user caused by the loss of the data information is avoided.
Drawings
FIG. 1 is a block diagram of the system architecture of the present invention.
FIG. 2 is a flow chart of a system method of the present invention.
FIG. 3 is a block diagram of the device recovery verification module of the present invention.
FIG. 4 is a block diagram of the software security evaluation module according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be obtained by a person skilled in the art without making any creative effort based on the embodiments in the present invention, belong to the protection scope of the present invention.
Examples
The embodiment provides a mobile terminal information security protection system as shown in fig. 1, which includes a software security evaluation module, an authority setting module, a data encryption module, an operation isolation module, a software updating module, an equipment positioning and locking module, a cloud storage module, an equipment retrieving and verifying module, and a data recovery module.
The software safety evaluation module is used for evaluating the safety performance of various application software which is not on line in the software mall in the mobile terminal equipment on the premise of government supervision and monitoring the running condition of the application program in real time after the application program is on line.
The permission setting module is used for setting privacy permissions given by users after the software mall is online, and the privacy permissions comprise permissions of an address book, permissions of multimedia messages, permissions of a camera, permissions of a video picture, position permissions, microphone use permissions, network connection permissions and the like.
The data encryption module encrypts and operates data in the operation process of the application software, and the operation isolation module isolates the operation environment of the application software on the basis of data encryption to protect the application program from information glancing by other application software.
The software updating module is used for connecting the application software to a network for automatic updating under the condition of user confirmation, so that the problem that the application software has BUG or is unsmooth in running of the application software is reduced.
The device positioning and locking module is used for uploading data in the mobile terminal to the cloud storage module through remote positioning and remote locking of the mobile terminal device system when the mobile terminal device is lost.
And the cloud storage module acquires the data encryption of the mobile terminal and stores the data encryption.
The device retrieving verification module is used for unlocking the password in an identity verification mode when the user retrieves the mobile terminal device and recovering the privacy information of the user.
The embodiment provides an operation method of a mobile terminal information security protection system as shown in fig. 1, which includes the following specific steps:
s1, firstly, before application software is not on-line, a software security evaluation module evaluates security privacy information, and after the application program is on-line, real-time monitoring is carried out on the running condition of the application program;
specifically, in this embodiment, the software security evaluation module includes application software privacy permission detection, software data security detection, and software networking security detection, where the software privacy permission detection is to apply for basic information of the application software and whether the software applies for a sensitive information permission, where the basic information refers to a version number of the application software, an application name, a program memory size, permission description information, and the like; the software data security detection means detecting whether the storage position of the application software data is secure and whether the storage position is encrypted; the software networking safety detection means that whether unsafe data are contained in the privacy information packet is detected when the application software networking carries out various network activities, if not, the data packet is encrypted and transmitted, so that the situation that the data packet uploaded by the networking is acquired by viruses or other application programs is reduced, the privacy information of a user is prevented from being infringed by the evaluation of the privacy information of the application software through the software safety evaluation module, and the rights and interests of the user are guaranteed.
Specifically, the Method for software data security detection is to convert a class _ dex _ jar file compiled by Dalvik byte codes into a class _ dex2jar.jar file compiled by Java byte codes, open a function source code for analyzing application program processing data through jd _ gui, and analyze memory data calling condition and software thread running condition by combining a Method Profiling tool in DDMS.
S2, when the user downloads and uses the application software, the data encryption module encrypts and operates the application software data, the operation isolation module isolates the operation environment of the application software on the basis of data encryption, and the software updating module automatically updates the connection network of the application software under the condition of user confirmation;
specifically, it should be noted that the data encryption module performs data transmission on application software in a symmetric encryption manner to ensure that private information is not stolen, where the symmetric encryption includes advanced encryption standards, performs alternate key encryption on data plaintext, then replaces the encrypted plaintext with bytes, scrambles its line bits and vertical bits, then encrypts the line bits and vertical bits with a key, replaces the line bits with the bytes, repeats ten times to obtain the encrypted plaintext, performs line bit scrambling again with byte substitution, then encrypts the key to finally form a ciphertext for data transmission, and the data receiver needs to obtain the key to perform reverse operation on the encryption step, so as to decrypt the data.
The embodiment specifically describes that the running isolation module encrypts important data or data infected by a virus in the application software and then enters a specified file directory, during the running isolation, the application software can run normally, if the application software contains the virus file, the application software is killed by the running isolation module, if the virus file infects the important data, the infected important data is encrypted and run to prevent other data from being infected, the data transmission is encrypted, decrypted and isolated through the data encryption module and the running isolation module, the problems of virus attack and data leakage are reduced, and the safety of data information is improved.
S3, when the mobile terminal equipment is lost, the equipment positioning and locking module uploads the data in the mobile terminal to the cloud storage module for encrypted storage through remote positioning and remote locking of the mobile terminal equipment system;
the embodiment specifically illustrates that the device location locking module performs static data analysis through application software codes, tracks dynamic conditions of application software data, performs key encryption according to the highest encryption standard after data emptying and deep hiding of privacy information through a locator locking position in a mobile terminal after user identity verification, and transmits the key encryption to the cloud storage module, the cloud storage module performs identification anti-counterfeiting attack on an encryption key through the collision property of a hash function in the privacy information uploading process, so that the problem of data information security caused by uploading data to the cloud storage module is reduced, the data information is encrypted and stored through the cloud storage module, data recovery of a user is facilitated, and loss of the user caused by data information loss is avoided.
And S4, finally, unlocking the password in an identity authentication mode when the user retrieves the mobile terminal equipment or logs in other mobile terminal equipment retrieval authentication modules, and recovering the user privacy information again.
The embodiment specifically describes that the device retrieving and verifying module includes an identity verifying unit and a data restoring unit, the identity verifying unit verifies that a user passes through password verification, fingerprint identification and face identification, the verifying method verifies the security of the user through bilinear pairing operation, hash-to-point operation or scalar multiplication, and the data restoring unit restores the private information in the cloud storage module to the mobile terminal device through back calculation of the advanced encryption standard.
And finally: the above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that are within the spirit and principle of the present invention are intended to be included in the scope of the present invention.

Claims (8)

1. A mobile terminal information safety protection system is characterized in that: the device comprises a software security evaluation module, an authority setting module, a data encryption module, an operation isolation module, a software updating module, a device positioning locking module, a cloud storage module, a device recovery verification module and a data recovery module;
the software security evaluation module is used for evaluating the security performance of various application software which is not on line in a software mall in the mobile terminal equipment on the premise of government supervision and monitoring the running condition of an application program in real time after the application program is on line;
the permission setting module is used for setting privacy permissions given by users after the software mall is online, wherein the privacy permissions comprise permissions of an address list, permissions of multimedia message and short message, permissions of a camera, permissions of a video photo, position permissions, microphone use permissions and network connection permissions;
the data encryption module encrypts and operates data in the operation process of application software, and the operation isolation module isolates the operation environment of the application software on the basis of data encryption to protect an application program from being glared by other application software;
the software updating module is used for connecting the application software to a network for automatic updating under the condition of user confirmation;
the device positioning and locking module is used for uploading data in the mobile terminal to the cloud storage module through remote positioning and remote locking of the mobile terminal device system when the mobile terminal device is lost;
the cloud storage module acquires the encrypted data of the mobile terminal and stores the encrypted data;
the device retrieving verification module is used for unlocking the password in an identity verification mode when the user retrieves the mobile terminal device and recovering the privacy information of the user.
2. The system for protecting information security of a mobile terminal according to claim 1, wherein: the software security evaluation module comprises application software privacy permission detection, software data security detection and software networking security detection, wherein the software privacy permission detection is to apply basic information of the application software and whether the software applies for sensitive information permission, and the basic information refers to the version number, the application name, the program memory size, permission description information and the like of the application software; the software data security detection means detecting whether the storage position of the application software data is secure and whether the storage position is encrypted; the software networking safety detection means that whether the privacy information packet contains unsafe data or not is detected when the application software is networked to perform various network activities, and if not, the data packet is encrypted and transmitted, so that the condition that the data packet uploaded by the networking is acquired by viruses or other application programs is reduced.
3. The system for protecting information security of a mobile terminal according to claim 2, wherein: the Method for detecting the software data security comprises the steps of compiling classes with Dalvik byte codes into classes _ dex2jar.jar files by using Java byte codes, opening function source codes for analyzing data processed by application programs by using jd _ gui, and analyzing memory data calling conditions and software thread running conditions by combining a Method Profiling tool in the DDMS.
4. The system for protecting information security of a mobile terminal according to claim 1, wherein: the data encryption module transmits data of application software in a symmetric encryption mode to ensure that private information is not stolen, the symmetric encryption comprises a high-level encryption standard, alternate key encryption is carried out on data plaintext, then bytes are used for replacing the encrypted plaintext, line bits of the encrypted plaintext are scrambled and vertical bits of the encrypted plaintext are scrambled, then the encrypted plaintext is replaced by the bytes after encryption by the keys, the encrypted plaintext is obtained after ten times of repetition, the bytes are replaced by the bytes, line bits are scrambled, then the keys are encrypted to finally form a ciphertext for data transmission, and a data receiving party needs to obtain the keys to carry out reverse operation on the encryption step, so that the decryption can be carried out.
5. The system for protecting information security of a mobile terminal according to claim 1, wherein: the operation isolation module encrypts important data or data infected by viruses in the application software and then enters a specified file directory, the application software can normally operate during operation isolation, if the application software contains the virus files, the virus files are killed by the operation isolation module, and if the virus files infect the important data, the infected important data is encrypted to operate to prevent other data from being infected.
6. The system for protecting information security of a mobile terminal according to claim 1, wherein: the device positioning and locking module is used for statically analyzing data through application software codes and tracking dynamic conditions of the application software data, after user identity verification, key encryption is carried out through a locator locking position in the mobile terminal and after privacy information is emptied and deeply hidden, the highest encryption standard is carried out, and the key encryption is carried out and transmitted to the cloud storage module.
7. The system for protecting information security of a mobile terminal according to claim 1, wherein: the device retrieving verification module comprises an identity verification unit and a data recovery unit, the identity verification unit verifies a user in a password verification mode, a fingerprint identification mode and a face identification mode, the verification method verifies the safety of the user in a bilinear pairing operation mode, a Hash-to-point operation mode or a scalar multiplication operation mode, and the data recovery unit recovers the private information in the cloud storage module to the mobile terminal device through reverse calculation of a high-level encryption standard.
8. An operation method of a mobile terminal information security protection system according to any one of claims 1 to 7, characterized in that: the specific operation steps are as follows:
s1, firstly, before application software is on-line, a software security evaluation module is used for evaluating security privacy information and monitoring the running condition of the application program in real time after the application program is on-line;
s2, when the user downloads and uses the application software, the data encryption module encrypts and operates the application software data, the operation isolation module isolates the operation environment of the application software on the basis of data encryption, and the software updating module automatically updates the connection network of the application software under the condition of user confirmation;
s3, when the mobile terminal equipment is lost, the equipment positioning and locking module uploads the data in the mobile terminal to the cloud storage module for encrypted storage through remote positioning and remote locking of the mobile terminal equipment system;
and S4, finally, when the user retrieves the mobile terminal equipment, the equipment retrieval verification module unlocks the password in an identity verification mode, and the user privacy information is restored.
CN202211156984.3A 2022-09-22 2022-09-22 Mobile terminal information safety protection system and method Active CN115499844B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211156984.3A CN115499844B (en) 2022-09-22 2022-09-22 Mobile terminal information safety protection system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211156984.3A CN115499844B (en) 2022-09-22 2022-09-22 Mobile terminal information safety protection system and method

Publications (2)

Publication Number Publication Date
CN115499844A true CN115499844A (en) 2022-12-20
CN115499844B CN115499844B (en) 2024-04-30

Family

ID=84470186

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211156984.3A Active CN115499844B (en) 2022-09-22 2022-09-22 Mobile terminal information safety protection system and method

Country Status (1)

Country Link
CN (1) CN115499844B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115659341A (en) * 2022-12-23 2023-01-31 中国计量大学现代科技学院 Software information safety monitoring system
CN117131543A (en) * 2023-09-13 2023-11-28 南京道成网络科技有限公司 Mobile phone safety privacy protection system

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070079364A1 (en) * 2005-09-30 2007-04-05 Timothy Abels Directory-secured packages for authentication of software installation
CN104079568A (en) * 2014-06-27 2014-10-01 东湖软件产业股份有限公司 Method and system for preventing file leakage based on cloud storage technology
CN104537309A (en) * 2015-01-23 2015-04-22 北京奇虎科技有限公司 Application program bug detection method, application program bug detection device and server
CN104700029A (en) * 2013-12-04 2015-06-10 中国移动通信集团广东有限公司 On-line detecting method, device and server for software
US20160337348A1 (en) * 2015-05-12 2016-11-17 Victoria Kien Man Teng Security for cloud systems and virtualization cloud systems, mobile cloud systems and mobile virtualization cloud systems, and computer clusters and mobile device clusters
CN107644165A (en) * 2017-08-29 2018-01-30 国家电网公司 Security protection platform and safety protecting method and device
CN107888609A (en) * 2017-11-29 2018-04-06 滁州市华晨软件科技有限公司 A kind of information security of computer network system
CN109063494A (en) * 2018-07-25 2018-12-21 安徽三实信息技术服务有限公司 A kind of information of mobile terminal security protection system and means of defence
CN109460660A (en) * 2018-10-18 2019-03-12 广州市网欣计算机科技有限公司 A kind of mobile device safety management system
CN109492397A (en) * 2018-11-15 2019-03-19 平顶山工业职业技术学院(平顶山煤矿技工学校) A kind of computer information safe system
CN111368297A (en) * 2020-02-02 2020-07-03 西安电子科技大学 Privacy protection mobile malicious software detection method, system, storage medium and application
CN113365277A (en) * 2020-07-06 2021-09-07 中央广播电视总台 Wireless network safety protection system

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070079364A1 (en) * 2005-09-30 2007-04-05 Timothy Abels Directory-secured packages for authentication of software installation
CN104700029A (en) * 2013-12-04 2015-06-10 中国移动通信集团广东有限公司 On-line detecting method, device and server for software
CN104079568A (en) * 2014-06-27 2014-10-01 东湖软件产业股份有限公司 Method and system for preventing file leakage based on cloud storage technology
CN104537309A (en) * 2015-01-23 2015-04-22 北京奇虎科技有限公司 Application program bug detection method, application program bug detection device and server
US20160337348A1 (en) * 2015-05-12 2016-11-17 Victoria Kien Man Teng Security for cloud systems and virtualization cloud systems, mobile cloud systems and mobile virtualization cloud systems, and computer clusters and mobile device clusters
CN107644165A (en) * 2017-08-29 2018-01-30 国家电网公司 Security protection platform and safety protecting method and device
CN107888609A (en) * 2017-11-29 2018-04-06 滁州市华晨软件科技有限公司 A kind of information security of computer network system
CN109063494A (en) * 2018-07-25 2018-12-21 安徽三实信息技术服务有限公司 A kind of information of mobile terminal security protection system and means of defence
CN109460660A (en) * 2018-10-18 2019-03-12 广州市网欣计算机科技有限公司 A kind of mobile device safety management system
CN109492397A (en) * 2018-11-15 2019-03-19 平顶山工业职业技术学院(平顶山煤矿技工学校) A kind of computer information safe system
CN111368297A (en) * 2020-02-02 2020-07-03 西安电子科技大学 Privacy protection mobile malicious software detection method, system, storage medium and application
CN113365277A (en) * 2020-07-06 2021-09-07 中央广播电视总台 Wireless network safety protection system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
闫晓丹;闫伟;: "基于Android的隐私数据安全保护系统研究与实现", 硅谷, no. 20, 23 October 2013 (2013-10-23) *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115659341A (en) * 2022-12-23 2023-01-31 中国计量大学现代科技学院 Software information safety monitoring system
CN115659341B (en) * 2022-12-23 2023-03-10 中国计量大学现代科技学院 Software information safety monitoring system
CN117131543A (en) * 2023-09-13 2023-11-28 南京道成网络科技有限公司 Mobile phone safety privacy protection system

Also Published As

Publication number Publication date
CN115499844B (en) 2024-04-30

Similar Documents

Publication Publication Date Title
Wang et al. Smartphone security challenges
CN115499844B (en) Mobile terminal information safety protection system and method
CA2933829C (en) Privacy management for tracked devices
CN112217835B (en) Message data processing method and device, server and terminal equipment
KR20120035299A (en) Image protection processing apparatus for privacy protection, and image security system and method using the same
CN112149123B (en) Safety inspection system and method for application program
US20130145483A1 (en) System And Method For Processing Protected Electronic Communications
EP2835997B1 (en) Cell phone data encryption method and decryption method
CN113472793A (en) Personal data protection system based on hardware password equipment
CN102006186A (en) System for monitoring illegal external connection of intranet equipment and method thereof
CN116132989B (en) Industrial Internet security situation awareness system and method
CN111245783A (en) Isolated environment data transmission device and method based on digital encryption technology
CN112202773B (en) Computer network information security monitoring and protection system based on internet
KR20140140717A (en) Apparatus and method for providing security in remote digital forensics
Park et al. A methodology for the decryption of encrypted smartphone backup data on android platform: A case study on the latest samsung smartphone backup system
CN103873521A (en) Cloud architecture-based mobile phone privacy file protection system and method
CN117592041B (en) Data safety protection system
CN108694329B (en) Mobile intelligent terminal security event credible recording system and method based on combination of software and hardware
KR102585404B1 (en) Data security apparatus
CN107995616B (en) User behavior data processing method and device
CN112565279A (en) Sensor signal processing system based on safety network
Han et al. The privacy protection framework for biometric information in network based CCTV environment
CN113536334A (en) Authorization checking method, module and system
CN109219814B (en) System and method for forensic access control
CN111695958A (en) Information safety management system of automobile leasing platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant