WO2013178022A1 - 一种防止移动终端异常上传信息的系统及方法 - Google Patents

一种防止移动终端异常上传信息的系统及方法 Download PDF

Info

Publication number
WO2013178022A1
WO2013178022A1 PCT/CN2013/075891 CN2013075891W WO2013178022A1 WO 2013178022 A1 WO2013178022 A1 WO 2013178022A1 CN 2013075891 W CN2013075891 W CN 2013075891W WO 2013178022 A1 WO2013178022 A1 WO 2013178022A1
Authority
WO
WIPO (PCT)
Prior art keywords
mobile terminal
standby state
module
real
channel
Prior art date
Application number
PCT/CN2013/075891
Other languages
English (en)
French (fr)
Inventor
李焕
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Priority to KR1020147036386A priority Critical patent/KR101689764B1/ko
Priority to US14/404,279 priority patent/US20150154396A1/en
Priority to EP13797595.9A priority patent/EP2858336B1/en
Priority to JP2015514337A priority patent/JP5956069B2/ja
Publication of WO2013178022A1 publication Critical patent/WO2013178022A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
    • G06F1/26Power supply means, e.g. regulation thereof
    • G06F1/28Supervision thereof, e.g. detecting power-supply failure by out of limits supervision
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/81Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer by operating on the power supply, e.g. enabling or disabling power-on, sleep or resume operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/121Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
    • H04W12/122Counter-measures against attacks; Protection against rogue devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/128Anti-malware arrangements, e.g. protection against SMS fraud or mobile malware
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/08Testing, supervising or monitoring using real traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/034Test or assess a computer or a system
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Definitions

  • the present invention relates to the field of communications, and in particular, to a system and method for preventing abnormal uploading information of a mobile terminal.
  • Mobile phone security applications will become one of the important applications of mobile phones in the future.
  • Mobile phone information security is bound to become a key research topic in the field of information security.
  • the embodiments of the present invention provide a system and method for preventing abnormal uploading information of a mobile terminal, so as to overcome the abnormal leakage of user information and improve the security of mobile terminal user information.
  • the embodiment of the invention provides a system for preventing abnormal uploading information of a mobile terminal, comprising: a real-time monitoring module, a comparison module and a software prompting module, wherein:
  • the real-time monitoring module is configured to: monitor the standby state and the standby state of the mobile terminal in real time.
  • the comparing module is configured to: after receiving the notification of the real-time monitoring module, compare the transmit power of the mobile terminal in the standby state with the transmit power of the mobile terminal in a theoretical standby state, and Notifying the software prompt module of the comparison result;
  • the software prompting module is configured to: when the comparison result is that the transmitting power of the mobile terminal in the standby state is greater than the transmitting power of the mobile terminal in the theoretical standby state, prompting the user that information is malicious in the current state The risk of disclosure.
  • the real-time monitoring module is configured to monitor the standby state of the mobile terminal and the transmit power in a standby state in real time as follows:
  • the system also includes a storage module coupled to the real-time monitoring module and the comparison module, respectively:
  • the real-time monitoring module is further configured to: notify the storage module of the standby state; the storage module is configured to: store the self-storing module after receiving the notification of the real-time monitoring module
  • the comparison module is further configured to: receive the mobile terminal sent by the storage module in the
  • the software prompting module is further configured to: when the comparison result is that the mobile terminal in the standby state has a transmit power less than or equal to a transmit power of the mobile terminal provided by the storage module in the theoretical standby state, The user is not prompted to be in danger of malicious disclosure of information in the current state.
  • the real-time monitoring module includes: a channel monitoring unit, a register, a standby state determining unit, a power calculating unit, and a transmitting unit, where:
  • the channel monitoring unit is configured to: monitor an operating state of each channel of the mobile terminal in real time, and save an operating state of each channel of the mobile terminal in the register;
  • the register is configured to: store each letter of the mobile terminal sent by the channel monitoring unit The working state of the road;
  • the standby state determining unit is configured to: read an operating state of each channel of the mobile terminal in the register, and determine, according to an operating state of each channel, whether the mobile terminal is in a standby state;
  • the power calculation unit is configured to: when the standby state determining unit determines that the mobile terminal is in a standby state, calculate transmit power of the mobile terminal in the standby state; and the transmitting unit is configured to: The standby state of the mobile terminal notifies the comparison module of the comparison module.
  • the embodiment of the invention further provides a method for preventing an abnormal uploading information of a mobile terminal, including:
  • the transmit power in the standby state is greater than the transmit power of the mobile terminal in the theoretical standby state, and the user is prompted to have a risk of malicious leakage of information in the current state.
  • the method further includes: when the transmit power in the theoretical standby state is not prompted, the user is not in danger of malicious leakage of information in the current state.
  • the accuracy is high, which not only protects the security of the user information, but also does not promptly pop up the prompt box to cause the user's inconvenience, and can largely overcome the abnormal leakage of the user information, thereby improving the security of the mobile terminal user information, and Enable users to enjoy the great convenience that mobile terminals bring to our lives. At the same time, there will be no worries.
  • FIG. 1 is a structural diagram of a system for preventing an abnormal uploading information of a mobile terminal in an embodiment
  • FIG. 2 is a structural diagram of a real-time monitoring module in Application Example 1;
  • FIG. 3 is a structural diagram of a storage module in Application Example 2;
  • FIG. 4 is a flowchart of a method for preventing abnormal uploading information of a mobile terminal in an embodiment. Preferred embodiment of the invention
  • a system for preventing abnormal uploading information of a mobile terminal includes: a real-time monitoring module 11, a comparison module 12, and a software prompting module 13.
  • the real-time monitoring module 11 is configured to: monitor the standby state of the mobile terminal and the transmit power in the standby state in real time, and notify the comparison module 12 of the transmit power in the standby state and the standby state; the comparison module 12 is configured to: After receiving the notification from the real-time monitoring module 11, comparing the transmitted powers, and notifying the software prompting module 13 of the comparison result;
  • the software prompting module 13 is configured to: when the comparison result is that the mobile terminal has a risk of malicious leakage of information in the current state of the standby user.
  • system further includes a storage module 14 connected to the real-time monitoring module 11 and the comparison module 12, respectively:
  • the real-time monitoring module 11 is further configured to: notify the storage module 14 of the standby state; the storage module 14 is configured to: after receiving the notification of the real-time monitoring module 11,
  • the comparison module 12 is further configured to: receive the transmit power of the mobile terminal sent by the storage module 14 in the theoretical standby state, and send the mobile terminal in the standby state
  • the real-time monitoring module 11 is configured to monitor the standby state of the mobile terminal and the transmit power in the standby state in real time as follows:
  • the real-time monitoring module 11 includes: a channel monitoring unit 111, a register 112, a standby state determining unit 113, a power calculating unit 114, and a transmitting unit 115, where:
  • the channel monitoring unit 111 is configured to: monitor an operating state of each channel of the mobile terminal in real time, and save an operating state of each channel of the mobile terminal in the register 112; the register 112 is configured to: store the The working state of each channel of the mobile terminal sent by the channel monitoring unit 111;
  • the standby state determining unit 113 is configured to: read an operating state of each channel of the mobile terminal in the register 112, and determine, according to an operating state of each channel, whether the mobile terminal is in a standby state;
  • the power calculation unit 114 is configured to: when the standby state determining unit 113 determines that the mobile terminal is in a standby state, calculate a transmit power of the mobile terminal in the standby state;
  • the transmission unit 115 is configured to: notify the comparison module 12 and the storage module 14 of the standby state of the mobile terminal, and send the transmit power of the mobile terminal in the standby state to the comparison module 12.
  • the transmission unit 115 further includes a first transmission unit 1151 and a second transmission unit 1152, where: The first transmission unit 1151 is configured to: notify the storage module 14 of the standby state of the mobile terminal;
  • the second transmission unit 1152 is configured to notify the comparison module 12 of the standby state of the mobile terminal and the transmission power in the standby state.
  • the storage module 14 includes: a reading unit 141, a storage unit 142, and a transmission unit 143, where:
  • the reading unit 141 is configured to: after receiving the standby state of the mobile terminal sent by the real-time monitoring module 11, the transmitting mobile terminal stored in the storage unit 142 sends the transmission unit 143 in a theoretical standby state.
  • the method is configured to: send the transmit power of the mobile terminal in the theoretical standby state to the comparison module 12.
  • the software prompting module 13 is further configured to: when the comparison result is that the mobile terminal's transmit power in the standby state is less than or equal to the mobile terminal provided by the storage module 14 in a theoretical standby state When transmitting power, the user is not prompted to be in danger of malicious disclosure of information in the current state.
  • P-CCPCH Primary Common Control Physical Channel
  • PICH Paging Indicator Channel
  • PICH belongs to the downlink common indicator channel, which is used to provide a paging indication to the mobile phone, and notifies the user equipment (User Equipment, UE) to receive paging information on the S-CCPCH; physical random access channel (Physical) Random Access Channel, PRACH ) , which And transmitting a specific access request information to the base station; and a Dedicated Physical Channel (DPCH), including a Dedicated Physical Control Channel (DPCCH) and a Dedicated Physical Data Channel (DPDCH) ), where the UE registers or updates the location on a dedicated physical channel.
  • DPCH Dedicated Physical Channel
  • DPCCH Dedicated Physical Control Channel
  • DPDCH Dedicated Physical Data Channel
  • the real-time monitoring module 11 in the application example 1 monitors the working status of each channel in real time, and determines whether the mobile phone is in the standby state according to the working state of each channel, and the theoretical power value of the storage module 14 when storing the mobile phone standby state in the mobile phone factory phase (
  • the 3rd Generation Partnership Project (3rd Generation Partnership Project, 3GPP) requires that the minimum transmit power value of WCDMA is less than -50dBm, but the test result according to the development stage is generally less than this value (for example, -55dBm), and the standby power can be set at this time.
  • the upper limit of the value is -55dBm.
  • the software prompt module 13 invokes the software program, and the software pops up the prompt box mouth to prompt the user that the mobile phone transmits power abnormally in the current state, prompting the user to take measures to protect the mobile phone information from being leaked.
  • this embodiment provides a method for preventing abnormal uploading information of a mobile terminal, and the method includes the following steps.
  • the operating status of each channel of the mobile terminal is monitored in real time, and whether the mobile terminal is in a standby state is determined according to the working state of each channel, and the mobile terminal is calculated when the mobile terminal is in a standby state. Transmit power in standby mode.
  • the 360 mobile phone security guard is more popular, which is realized by encrypting the information, that is, if the information of the mobile phone is leaked, it is leaked in an encrypted manner, that is, Said, if the password is cracked after the leak, the information is also leaked, and the password set by the general user is not high, it is easy to be cracked.
  • the system and method for preventing abnormal uploading information of a mobile terminal provided in the foregoing embodiments consider information security from a hardware perspective, and prevent information leakage on the terminal side.
  • the information on the mobile phone is not sent after confirmation, the information will not be transmitted, so that the problem of information leakage is solved from the source, which is more convenient and safer.
  • it not only protects the security of the user information, but also does not promptly pop up the prompt box to cause the user's inconvenience, and can largely overcome the abnormal leakage of the user information, thereby improving the security of the mobile terminal user information and enabling the user to While enjoying the great convenience that mobile terminals bring to our lives, there will be no worries.
  • the accuracy is high, which not only protects the security of the user information, but also does not promptly pop up the prompt box to cause the user's inconvenience, and can largely overcome the abnormal leakage of the user information, thereby improving the security of the mobile terminal user information, and It enables users to enjoy the great convenience that mobile terminals bring to our lives without worrying.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

一种防止移动终端异常上传信息的方法及系统。该系统包括:实时监测模块,其设置成:实时监测移动终端的待机状态及待机状态下的发射功率,并将所述待机状态及待机状态下的发射功率通知比较模块;比较模块,其设置成:在收到通知后,将所述移动终端在所述待机状态下的发射功率与所述移动终端在理论待机状态下的发射功率进行比较,并将比较结果通知软件提示模块;软件提示模块,其设置成:当比较结果为所述移动终端在所述待机状态下的发射功率大于所述移动终端在理论待机状态下的发射功率时,提示用户当前状态下存在信息恶意泄露的风险,采用本方法及系统,判定准确度高,可以克服用户信息的非正常泄露,从而提高了移动终端用户信息的安全性。

Description

一种防止移动终端异常上传信息的系统及方法
技术领域
本发明涉及通信领域, 具体涉及一种防止移动终端异常上传信息的系统 及方法。
背景技术
随着手机产业的发展, 移动互联网的日益普及, 催生了各类手机应用的 诞生, 随着 3G ( 3rd Generation, 第三代)技术的发展和 4G ( 4th Generation, 第四代) 时代的到来, 技术支持的高度提升势必引发手机应用行业的急速增 长。 目前, 几乎所有传统互联网的应用都可以移植到移动互联网上, 技术的 发展带来了全新的应用, 也伴生新的安全风险。 目前, 智能手机的发展使得 手机上的应用日渐丰富甚至有超过电脑终端应用的趋势, 传统互联网上存在 着的各种信息安全问题逐渐延伸到移动互联网领域, 甚至演化成为新的安全 威胁: 垃圾短信充斥、 短信欺诈屡禁不止, 手机病毒等恶意程序对个人隐私、 财务信息甚至企业商业机密构成威胁, 手机用户为此遭受经济损失甚至名誉 损失屡见不鲜。
随着智能手机普及率的逐步提高、 3G网络的完善、 以及手机用户上网习 惯的形成, 手机安全应用将成为未来手机的重要应用之一, 手机信息安全也 势必成为信息安全领域的重点研究课题。
发明内容
本发明实施例提供一种防止移动终端异常上传信息的系统及方法, 以克 服用户信息的非正常泄露, 提高移动终端用户信息的安全性。
本发明实施例提供了一种防止移动终端异常上传信息的系统, 包括: 实 时监测模块、 比较模块和软件提示模块, 其中:
所述实时监测模块设置成: 实时监测所述移动终端的待机状态及待机状 模块;
所述比较模块设置成: 在收到所述实时监测模块的通知后, 将所述移动 终端在所述待机状态下的发射功率与所述移动终端在理论待机状态下的发射 功率进行比较, 并将比较结果通知软件提示模块; 以及
所述软件提示模块设置成: 当比较结果为所述移动终端在所述待机状态 下的发射功率大于所述移动终端在所述理论待机状态下的发射功率时, 提示 用户当前状态下存在信息恶意泄露的风险。
所述实时监测模块是设置成以如下方式实时监测所述移动终端的待机状 态及待机状态下的发射功率:
实时监测所述移动终端各个信道的工作状态, 根据所述各个信道的工作 状态判断出所述移动终端是否处于待机状态, 并在所述移动终端处于待机状 态时, 计算出所述移动终端在所述待机状态下的发射功率。 所述系统还包括分别与所述实时监测模块和所述比较模块相连的存储模 块, 其中:
所述实时监测模块还设置成: 将所述待机状态通知所述存储模块; 所述存储模块设置成: 在收到所述实时监测模块的通知后, 将自身存储
所述比较模块还设置成: 接收所述存储模块发来的所述移动终端在所述
所述软件提示模块还设置成: 当比较结果为所述移动终端在所述在待机 状态下的发射功率小于或等于所述存储模块提供的移动终端在所述理论待机 状态下的发射功率时, 不提示用户当前状态下存在信息恶意泄露的危险。
所述实时监测模块包括: 信道监测单元、 寄存器、 待机状态判定单元、 功率计算单元和传输单元, 其中:
所述信道监测单元设置成: 实时监测所述移动终端各个信道的工作状态, 并将所述移动终端各个信道的工作状态保存在所述寄存器中;
所述寄存器设置成: 存储所述信道监测单元发来的所述移动终端各个信 道的工作状态;
所述待机状态判定单元设置成: 读取所述寄存器中所述移动终端各个信 道的工作状态, 根据所述各个信道的工作状态确定所述移动终端是否处于待 机状态;
所述功率计算单元设置成: 在所述待机状态判定单元确定所述移动终端 处于待机状态时, 计算所述移动终端在所述待机状态下的发射功率; 以及 所述传输单元设置成: 将所述移动终端的所述待机状态通知所述比较模 所述比较模块。
本发明实施例还提供了一种防止移动终端异常上传信息的方法, 包括:
待机状态下的发射功率大于所述移动终端在所述理论待机状态下的发射功 率, 则提示用户当前状态下存在信息恶意泄露的危险。 包括:
实时监测所述移动终端各个信道的工作状态, 根据所述各个信道的工作 状态判断出所述移动终端是否处于待机状态, 并在所述移动终端处于待机状 态时, 计算出所述移动终端在所述待机状态下的发射功率。
所述方法还包括: 在所述理论待机状态下的发射功率时, 则不提示用户当前状态下存在信息恶 意泄露的危险。 定准确度高, 既保护了用户信息的安全, 又不会频繁弹出提示框引起用户的 不便, 可以很大程度的克服用户信息的非正常泄露, 从而提高了移动终端用 户信息的安全性, 并使用户能够在享受移动终端给我们生活带来的巨大方便 的同时不会有后顾之忧。 附图概述
图 1 是实施例中防止移动终端异常上传信息的系统的结构图;
图 2 是应用示例 1中实时监测模块的结构图;
图 3是应用示例 2中存储模块的结构图;
图 4是实施例中防止移动终端异常上传信息的方法的流程图。 本发明的较佳实施方式
下文中将结合附图对本发明的实施例进行详细说明。 需要说明的是, 在 不冲突的情况下, 本申请中的实施例及实施例中的特征可以相互任意组合。
如图 1所示,本实施例中提供了一种防止移动终端异常上传信息的系统, 该系统包括: 实时监测模块 11、 比较模块 12和软件提示模块 13。
所述实时监测模块 11设置成: 实时监测移动终端的待机状态及待机状态 下的发射功率,并将所述待机状态及待机状态下的发射功率通知比较模块 12; 所述比较模块 12设置成: 在收到所述实时监测模块 11的通知后, 将所 的发射功率进行比较, 并将比较结果通知软件提示模块 13; 以及
所述软件提示模块 13设置成: 当比较结果为所述移动终端在所述待机状 户当前状态下存在信息恶意泄露的风险。
此外, 所述系统还包括分别与所述实时监测模块 11和所述比较模块 12 相连的存储模块 14, 其中:
所述实时监测模块 11还设置成: 将所述待机状态通知所述存储模块 14; 所述存储模块 14设置成: 在收到所述实时监测模块 11的通知后, 将自
12; 所述比较模块 12还设置成: 接收所述存储模块 14发来的所述移动终端 在所述理论待机状态下的发射功率, 将所述移动终端在所述待机状态下的发
其中,所述实时监测模块 11是设置成以如下方式实时监测所述移动终端 的待机状态及待机状态下的发射功率:
实时监测所述移动终端各个信道的工作状态, 根据所述各个信道的工作 状态判断出所述移动终端是否处于待机状态, 并在所述移动终端处于待机状 态时, 计算出所述移动终端在待机状态下的发射功率。
应用示例 1
在应用示例 1中, 如图 2所示, 所述实时监测模块 11包括: 信道监测单 元 111、 寄存器 112、 待机状态判定单元 113、 功率计算单元 114和传输单元 115, 其中:
所述信道监测单元 111设置成: 实时监测所述移动终端各个信道的工作 状态, 并将所述移动终端各个信道的工作状态保存在所述寄存器 112中; 所述寄存器 112设置成: 存储所述信道监测单元 111发来的所述移动终 端各个信道的工作状态;
所述待机状态判定单元 113设置成: 读取所述寄存器 112中所述移动终 端各个信道的工作状态, 根据所述各个信道的工作状态确定所述移动终端是 否处于待机状态;
所述功率计算单元 114设置成: 在所述待机状态判定单元 113确定所述 移动终端处于待机状态时,计算所述移动终端在所述待机状态下的发射功率; 以及
所述传输单元 115设置成: 将所述移动终端的待机状态通知所述比较模 块 12和所述存储模块 14, 并将所述移动终端在所述待机状态下的发射功率 发送至所述比较模块 12。
作为一种可选的方式,所述传输单元 115还包括第一传输单元 1151和第 二传输单元 1152, 其中: 所述第一传输单元 1151设置成:将所述移动终端的待机状态通知存储模 块 14;
所述第二传输单元 1152设置成:将所述移动终端的待机状态及待机状态 下的发射功率通知比较模块 12。
应用示例 2
在应用示例 2中, 如图 3所示, 所述存储模块 14包括: 读取单元 141、 存储单元 142和传输单元 143 , 其中:
所述读取单元 141设置成:在收到实时监测模块 11发来的移动终端的待 机状态后, 读取存储单元 142中存储的所述移动终端在理论待机状态下的发 所述传输单元 143设置成: 将该移动终端在理论待机状态下的发射功率 发送至比较模块 12。
另外, 所述软件提示模块 13还设置成: 当比较结果为所述移动终端在所 述在待机状态下的发射功率小于或等于所述存储模块 14提供的所述移动终 端在理论待机状态下的发射功率时, 不提示用户当前状态下存在信息恶意泄 露的危险。
在一个应用示例中, 例如: 假如手机在宽带码分多址(Wideband Code Division Multiple Access ( WCDMA ) 网络下待机, 要不断地监听主要公共控 制物理信道(Primary Common Control Physical Channel, P-CCPCH ) , 在该信 道上经常会发送一些小区开销信息, 如哪些状态发生改变, 同时, 手机还要 监听寻呼指示信道(Paging Indicator Channel, PICH ) , 该 PICH会告诉手机 在辅助公共控制物理信道 ( Secondary Common Control Physical Channel , S-CCPCH ) 上有没有这个手机的寻呼消息。 待机时涉及到的信道包括: P-CCPCH: 其用于承载下行系统控制和广播信息, 其中该信息的内容是传送 小区系统消息; PICH: 属于下行公共指示信道, 其用于给手机提供寻呼指示, 并通知用户设备 ( User Equipment, UE )到 S-CCPCH上接收寻呼( Paging ) 信息; 物理随机接入信道(Physical Random Access Channel, PRACH ) , 其 用于向基站发送具体的接入请求信息; 以及专用物理信道( Dedicated Physical Channel , DPCH ) , 其包括专用物理控制信道(Dedicated Physical Control Channel, DPCCH )和专用物理数据信道 ( Dedicated Physical Data Channel, DPDCH ) , 其中 UE在专用物理信道上进行注册或位置更新。
本应用示例 1 中的实时监测模块 11会实时监测上述各个信道的工作状 态, 根据各个信道的工作状态判断手机是否处于待机状态, 存储模块 14在手 机出厂阶段储存手机待机状态时的理论功率值 (第三代合作伙伴计划 3rd Generation Partnership Project, 3 GPP ) 中要求 WCDMA的最小发射功率值小 于 -50dBm, 但根据研发阶段的测试结果一般会小于这个值(例如 -55dBm ) , 此时可以设置待机功率值的上限为 -55dBm ) , 通过上述对信道的监测判断出 手机处于待机状态后, 如果手机在当前待机状态下的实际发射功率大于 -55dBm, 此时可以判断出手机待机时出现异常大功率, 有可能出现异常信息 上传, 软件提示模块 13调用软件程序, 软件弹出提示框口, 提示用户当前状 态下, 手机发射功率异常, 提示用户釆取措施保护手机的信息不被泄露。
如图 4所示, 本实施例提供了一种防止移动终端异常上传信息的方法, 该方法包括以下步骤。
其中, 实时监测所述移动终端各个信道的工作状态, 根据所述各个信道 的工作状态判断出所述移动终端是否处于待机状态, 并在所述移动终端处于 待机状态时, 计算出所述移动终端在待机状态下的发射功率。
状态下
Figure imgf000009_0001
在理论待机状态下的发射功率时, 则提示用户当前状态下存在信息恶意泄露 的危险。
当前状态下存在信息恶意泄露的危险。 相关技术中, 针对防止移动终端异常上传信息, 比较盛行的是 360手机 安全卫士, 它通过对信息加密等方式实现, 即, 手机的信息假如泄露, 其是 以加密的方式被泄露的, 也就是说, 泄密后如果密码被破解, 信息同样被泄 露, 而且一般用户设置的密码的安全级别都不高, 很容易会被破解。 但是, 从上述实施例可以看出, 相对于相关技术, 上述实施例中提供的防止移动终 端异常上传信息的系统及方法, 从硬件角度考虑信息安全性, 在终端侧就阻 止信息的泄露, 换句话说, 手机上的信息如果不是经过确认后发送的话, 信 息是不会被传输的, 这样从源头上解决信息泄露的问题, 更方便更安全。 同 时, 既保护了用户信息的安全, 又不会频繁弹出提示框引起用户的不便, 可 以很大程度的克服用户信息的非正常泄露, 从而提高了移动终端用户信息的 安全性, 并使用户能够在享受移动终端给我们生活带来的巨大方便的同时不 会有后顾之忧。
本领域普通技术人员可以理解上述方法中的全部或部分步骤可通过程序 来指令相关硬件完成, 所述程序可以存储于计算机可读存储介质中, 如只读 存储器、 磁盘或光盘等。 可选地, 上述实施例的全部或部分步骤也可以使用 一个或多个集成电路来实现。 相应地, 上述实施例中的各模块 /单元可以釆用 硬件的形式实现, 也可以釆用软件功能模块的形式实现。 本发明实施例不限 制于任何特定形式的硬件和软件的结合。
以上所述仅为本发明的优选实施例而已, 并非用于限定本发明的保护范 围。 根据本发明的发明内容, 还可有其他多种实施例, 在不背离本发明精神 相应的改变和变形, 凡在本发明的精神和原则之内, 所作的任何修改、 等同 替换、 改进等, 均应包含在本发明的保护范围之内。
工业实用性
定准确度高, 既保护了用户信息的安全, 又不会频繁弹出提示框引起用户的 不便, 可以很大程度的克服用户信息的非正常泄露, 从而提高了移动终端用 户信息的安全性, 并使用户能够在享受移动终端给我们生活带来的巨大方便 的同时不会有后顾之忧。

Claims

权 利 要 求 书
1、 一种防止移动终端异常上传信息的系统, 包括: 实时监测模块、 比较 模块和软件提示模块, 其中:
所述实时监测模块设置成: 实时监测所述移动终端的待机状态及待机状 模块; ' ^ " ' ' ' ' ' '
所述比较模块设置成: 在收到所述实时监测模块的通知后, 将所述移动 终端在所述待机状态下的发射功率与所述移动终端在理论待机状态下的发射 功率进行比较, 并将比较结果通知所述软件提示模块; 以及
所述软件提示模块设置成: 当比较结果为所述移动终端在所述待机状态 下的发射功率大于所述移动终端在所述理论待机状态下的发射功率时, 提示 用户当前状态下存在信息恶意泄露的风险。
2、 如权利要求 1所述的系统, 其中:
所述实时监测模块是设置成以如下方式实时监测所述移动终端的待机状 态及待机状态下的发射功率:
实时监测所述移动终端各个信道的工作状态, 根据所述各个信道的工作 状态判断出所述移动终端是否处于待机状态, 并在所述移动终端处于待机状 态时, 计算出所述移动终端在所述待机状态下的发射功率。
3、如权利要求 1所述的系统, 还包括分别与所述实时监测模块和所述比 较模块相连的存储模块, 其中:
所述实时监测模块还设置成: 将所述待机状态通知所述存储模块; 所述存储模块设置成: 在收到所述实时监测模块的通知后, 将自身存储
Figure imgf000011_0001
4、 如权利要求 1所述的系统, 其中: 所述软件提示模块还设置成: 当比较结果为所述移动终端在所述在待机 状态下的发射功率小于或等于所述存储模块提供的移动终端在所述理论待机 状态下的发射功率时, 不提示用户当前状态下存在信息恶意泄露的危险。
5、 如权利要求 1所述的系统, 其中:
所述实时监测模块包括: 信道监测单元、 寄存器、 待机状态判定单元、 功率计算单元和传输单元, 其中: 所述信道监测单元设置成: 实时监测所述移动终端各个信道的工作状态, 并将所述移动终端各个信道的工作状态保存在所述寄存器中;
所述寄存器设置成: 存储所述信道监测单元发来的所述移动终端各个信 道的工作状态;
所述待机状态判定单元设置成: 读取所述寄存器中所述移动终端各个信 道的工作状态, 根据所述各个信道的工作状态确定所述移动终端是否处于待 机状态;
所述功率计算单元设置成: 在所述待机状态判定单元确定所述移动终端 处于待机状态时, 计算所述移动终端在所述待机状态下的发射功率; 以及 所述传输单元设置成: 将所述移动终端的所述待机状态通知所述比较模 所述比较模块。
6、 一种防止移动终端异常上传信息的方法, 包括:
待机状态下的发射功率大于所述移动终端在所述理论待机状态下的发射功 率, 则提示用户当前状态下存在信息恶意泄露的危险。
7、 如权利要求 6所述的方法, 其中:
包括:
实时监测所述移动终端各个信道的工作状态, 根据所述各个信道的工作 状态判断出所述移动终端是否处于待机状态, 并在所述移动终端处于待机状 态时, 计算出所述移动终端在所述待机状态下的发射功率。
8、 如权利要求 6所述的方法, 还包括: 在所述理论待机状态下的发射功率时, 则不提示用户当前状态下存在信息恶 意泄露的危险。
PCT/CN2013/075891 2012-06-01 2013-05-20 一种防止移动终端异常上传信息的系统及方法 WO2013178022A1 (zh)

Priority Applications (4)

Application Number Priority Date Filing Date Title
KR1020147036386A KR101689764B1 (ko) 2012-06-01 2013-05-20 이동 단말이 비정상적으로 정보를 업로딩하는 것을 방지하는 시스템 및 방법
US14/404,279 US20150154396A1 (en) 2012-06-01 2013-05-20 System And Method For Preventing Mobile Terminal From Abnormal Uploading Of Information
EP13797595.9A EP2858336B1 (en) 2012-06-01 2013-05-20 System and method for preventing mobile terminal from abnormal uploading of information
JP2015514337A JP5956069B2 (ja) 2012-06-01 2013-05-20 移動端末による情報の異常アップロードを防止するためのシステム及び方法

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201210178879.XA CN103458375B (zh) 2012-06-01 2012-06-01 一种防止移动终端异常上传信息的系统及方法
CN201210178879.X 2012-06-01

Publications (1)

Publication Number Publication Date
WO2013178022A1 true WO2013178022A1 (zh) 2013-12-05

Family

ID=49672402

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2013/075891 WO2013178022A1 (zh) 2012-06-01 2013-05-20 一种防止移动终端异常上传信息的系统及方法

Country Status (6)

Country Link
US (1) US20150154396A1 (zh)
EP (1) EP2858336B1 (zh)
JP (1) JP5956069B2 (zh)
KR (1) KR101689764B1 (zh)
CN (1) CN103458375B (zh)
WO (1) WO2013178022A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109976497A (zh) * 2019-03-20 2019-07-05 苏州浪潮智能科技有限公司 一种bmc控制模组化psu供电的系统及方法
CN111010302B (zh) * 2019-12-19 2021-02-09 北京国舜科技股份有限公司 移动终端的安全监控方法、装置、电子设备及存储介质

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010219707A (ja) * 2009-03-16 2010-09-30 Nec Corp 携帯端末装置及びその制御方法等
CN102158597A (zh) * 2011-02-28 2011-08-17 奇智软件(北京)有限公司 一种用于移动通讯终端的电磁辐射提示系统及方法
CN102244858A (zh) * 2011-08-01 2011-11-16 王冬梅 移动终端可自行锁定和解锁通信功能的方法及该移动终端

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3428629B2 (ja) * 1999-03-26 2003-07-22 日本電気株式会社 携帯電話装置及びその電力制御方法
US7111246B2 (en) * 2004-02-17 2006-09-19 Microsoft Corporation User interface accorded to tiered object-related trust decisions
US7877621B2 (en) * 2004-09-03 2011-01-25 Virginia Tech Intellectual Properties, Inc. Detecting software attacks by monitoring electric power consumption patterns
KR100801649B1 (ko) * 2006-10-12 2008-02-05 삼성전자주식회사 휴대 단말의 대기모드 절전 방법
CN101166216A (zh) * 2006-10-20 2008-04-23 乐金电子(中国)研究开发中心有限公司 一种具辐射功率监测告警功能的手机及其监测告警方法
JP4850288B2 (ja) * 2007-08-27 2012-01-11 富士通株式会社 ネットワーク管理システム、中継装置及び方法
KR100969567B1 (ko) * 2008-07-04 2010-07-12 포항공과대학교 산학협력단 이동 통신 단말기의 비정상적인 배터리 소모 검출 방법 및장치
CN101656969B (zh) * 2008-08-21 2013-01-23 中国移动通信集团公司 一种针对辐射的预警方法、装置及系统
US8984628B2 (en) * 2008-10-21 2015-03-17 Lookout, Inc. System and method for adverse mobile application identification
WO2010141826A2 (en) * 2009-06-05 2010-12-09 The Regents Of The University Of Michigan System and method for detecting energy consumption anomalies and mobile malware variants
US9264914B2 (en) * 2009-11-30 2016-02-16 Mediatek Inc. Methods for monitoring paging messages with reduced power consumption and communications apparatuses utilizing the same
US8818740B2 (en) * 2010-02-17 2014-08-26 Pentair Thermal Management Llc Sensor-powered wireless cable leak detection
US8797933B2 (en) * 2010-12-27 2014-08-05 Via Telecom Co., Ltd. Apparatuses and methods for saving power in paging operations
US8965718B2 (en) * 2011-11-01 2015-02-24 Microsoft Technology Licensing, Llc Analyzing power consumption in mobile computing devices

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010219707A (ja) * 2009-03-16 2010-09-30 Nec Corp 携帯端末装置及びその制御方法等
CN102158597A (zh) * 2011-02-28 2011-08-17 奇智软件(北京)有限公司 一种用于移动通讯终端的电磁辐射提示系统及方法
CN102244858A (zh) * 2011-08-01 2011-11-16 王冬梅 移动终端可自行锁定和解锁通信功能的方法及该移动终端

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP2858336A4 *

Also Published As

Publication number Publication date
CN103458375B (zh) 2018-05-04
US20150154396A1 (en) 2015-06-04
JP2015525508A (ja) 2015-09-03
KR101689764B1 (ko) 2016-12-26
KR20150021078A (ko) 2015-02-27
EP2858336A1 (en) 2015-04-08
CN103458375A (zh) 2013-12-18
JP5956069B2 (ja) 2016-07-20
EP2858336B1 (en) 2018-01-31
EP2858336A4 (en) 2015-07-01

Similar Documents

Publication Publication Date Title
US10609646B2 (en) Intelligent management of a plurality of communications links
TWI228005B (en) Authentication of termination messages in telecommunications system
US9654981B2 (en) Data integrity for proximity-based communication
US9615257B2 (en) Data integrity for proximity-based communication
US20230292116A1 (en) Methods supporting authentication in wireless communication networks and related network nodes and wireless terminals
US20120036362A1 (en) Secret-Key Exchange for Wireless and Sensor Networks
CN113302962A (zh) 无线装置的无线电接入能力
US20110305338A1 (en) Method and system for secure provisioning of a wireless device
KR102339529B1 (ko) 무선 리소스의 구성
US20160134610A1 (en) Privacy during re-authentication of a wireless station with an authentication server
US11916925B2 (en) Method for improving data transmission security
CN112335213A (zh) 用于对早期数据传输的安全处理的方法
WO2013178022A1 (zh) 一种防止移动终端异常上传信息的系统及方法
JP2015529408A (ja) 電力消費を低減する無線端末および無線端末の電力消費を低減するための方法
US20200163151A1 (en) Handling rrc connection release
WO2022257876A1 (zh) 密钥材料的处理方法、获取方法、信息传输方法及设备
CA2742363C (en) Method and system for secure provisioning of a wireless device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13797595

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 14404279

Country of ref document: US

ENP Entry into the national phase

Ref document number: 2015514337

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 20147036386

Country of ref document: KR

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: 2013797595

Country of ref document: EP