WO2016078327A1 - 移动终端中恶意操作的识别方法和装置 - Google Patents

移动终端中恶意操作的识别方法和装置 Download PDF

Info

Publication number
WO2016078327A1
WO2016078327A1 PCT/CN2015/077411 CN2015077411W WO2016078327A1 WO 2016078327 A1 WO2016078327 A1 WO 2016078327A1 CN 2015077411 W CN2015077411 W CN 2015077411W WO 2016078327 A1 WO2016078327 A1 WO 2016078327A1
Authority
WO
WIPO (PCT)
Prior art keywords
mobile terminal
identification code
user
malicious
identifying
Prior art date
Application number
PCT/CN2015/077411
Other languages
English (en)
French (fr)
Inventor
申聪
Original Assignee
深圳市汇顶科技股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市汇顶科技股份有限公司 filed Critical 深圳市汇顶科技股份有限公司
Priority to EP15860153.4A priority Critical patent/EP3147788A4/en
Priority to KR1020167035872A priority patent/KR20170010819A/ko
Publication of WO2016078327A1 publication Critical patent/WO2016078327A1/zh
Priority to US15/382,664 priority patent/US20170098073A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/81Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer by operating on the power supply, e.g. enabling or disabling power-on, sleep or resume operations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2201/00Electronic components, circuits, software, systems or apparatus used in telephone systems
    • H04M2201/34Microprocessors
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2250/00Details of telephonic subscriber devices
    • H04M2250/10Details of telephonic subscriber devices including a GPS signal receiver

Definitions

  • the present invention relates to the field of mobile terminal manufacturing technologies, and in particular, to a method and apparatus for identifying malicious operations in a mobile terminal.
  • the present invention aims to solve at least one of the above technical problems.
  • a first object of the present invention is to provide a method for identifying a malicious operation in a mobile terminal.
  • the method can identify that an illegal user is performing a malicious operation on the mobile terminal, so that the mobile terminal responds in time.
  • a second object of the present invention is to provide an apparatus for identifying malicious operations in a mobile terminal.
  • a method for identifying a malicious operation in a mobile terminal includes: receiving an operation of a user on a mobile terminal; and determining that the operation of the mobile terminal matches a preset suspected malicious operation. And prompting the user to input an operation identification code; receiving the operation identification code, and determining whether the operation identification code matches a preset anti-malware operation identification code; and if the operation identification code and the preset anti-prevention If the malicious operation ID does not match, the device will be preset according to the preset method.
  • the mobile terminal operates.
  • the mobile terminal When the mobile terminal recognizes a malicious operation, the mobile terminal prompts the user to input an operation identification code, and determines the operation identification code input by the user and the preset anti-malware operation identification code. Whether it is matched, thereby identifying that an illegal user is performing a malicious operation on the mobile terminal, so that the mobile terminal responds in time.
  • the device for identifying a malicious operation in the mobile terminal of the second aspect of the present invention includes: a first receiving module, configured to receive an operation of the user on the mobile terminal; and a prompting module, configured to determine the mobile When the operation of the terminal matches the preset suspected malicious operation, the user is prompted to input an operation identification code; the determining module is configured to receive the operation identification code, and determine the operation identification code and the preset anti-malware operation identification code. Whether the matching is performed; and the operating module, configured to operate the mobile terminal according to a preset manner when the operation identification code does not match the preset anti-malware operation identification code.
  • the device for maliciously operating the mobile terminal in the embodiment of the present invention prompts the user to input an operation identification code when identifying a malicious operation, and determines whether the operation identification code input by the user matches the preset anti-malware operation identification code. Therefore, it is recognized that the illegal user is performing malicious operations on the mobile terminal, so that the mobile terminal responds in time.
  • FIG. 1 is a flowchart of a method for identifying a malicious operation in a mobile terminal according to an embodiment of the present invention
  • FIG. 2 is a flowchart of a method for identifying a malicious operation in a mobile terminal according to an embodiment of the present invention
  • FIG. 3 is a schematic structural diagram of an apparatus for identifying a malicious operation in a mobile terminal according to an embodiment of the present invention
  • FIG. 4 is a schematic structural diagram of an apparatus for identifying a malicious operation in a mobile terminal according to an embodiment of the present invention.
  • FIG. 1 is a flow chart of a method of identifying a malicious operation in a mobile terminal in accordance with one embodiment of the present invention. As shown in FIG. 1, the method for identifying malicious operations in the mobile terminal includes:
  • the mobile terminal may include, but is not limited to, one of a mobile phone, a tablet computer, a notebook computer, and a PDA.
  • the preset suspected malicious operations include, but are not limited to, first starting the mobile terminal, resetting the mobile terminal, upgrading the mobile terminal, updating the mobile terminal system, and changing the habitual operation of the mobile terminal. One of them.
  • the mobile terminal determines whether the operation that the user has just performed on the mobile terminal is a suspected malicious operation. Specifically, the mobile terminal can identify whether the operation just performed by the user is a suspected malicious operation by matching the operation that the user has just performed with the suspected malicious operation stored in advance in the mobile terminal.
  • the mobile terminal recognizes that the user has just performed the operation on the mobile terminal, the mobile terminal is activated for the first time, or the mobile terminal is reset, or the mobile terminal is upgraded, or the mobile terminal system is selected to be updated, or It is a habitual operation change of the mobile terminal (for example, the legal user usually uses the fingerprint A to unlock, and the mobile terminal recognizes the unused fingerprint B for unlocking, and the mobile terminal determines that the user who is operating the mobile terminal to the mobile terminal The habitual operation has changed. Or, when the mobile terminal is brushed, the mobile terminal prompts the user to input an operation identification code to check the identity of the user.
  • the habitual operation change of the mobile terminal for example, the legal user usually uses the fingerprint A to unlock, and the mobile terminal recognizes the unused fingerprint B for unlocking, and the mobile terminal determines that the user who is operating the mobile terminal to the mobile terminal The habitual operation has changed.
  • the mobile terminal prompts the user to input an operation identification code to check the identity of the user.
  • S103 Receive an operation identification code, and determine whether the operation identification code matches a preset anti-malware operation identification code.
  • the anti-malware operation identification code includes, but is not limited to, one of a user's fingerprint, a living fingerprint, an iris, and a combination of one or more of numbers, letters, and symbols.
  • the mobile terminal can determine whether the user who has performed the malicious operation on the mobile terminal is a legitimate user by matching the operation identifier input by the user with the preset anti-malware operation identification code.
  • the preset anti-malware operation identification code may be pre-stored in the mobile terminal and stored in a secure space in the mobile terminal, that is, the preset anti-malware operation identification code is stored without being accessed by malicious operations or
  • the damaged storage space that is, the storage space that cannot be added, deleted, or modified by an illegal user. Thereby, it can be ensured that the preset anti-maliware operation identification code is not lost, deleted, or destroyed.
  • the mobile terminal receives the fingerprint input by the user, and then compares it with the user fingerprint stored in the secure space of the mobile terminal. If it does not match, it determines that the user is an illegal user, that is, the mobile terminal has just been suspected of malicious operation. The user is an illegal user.
  • the mobile terminal receives the password input by the user, and then compares it with the password stored in the secure space of the mobile terminal. If the password matches, it is determined that the user who has just performed the malicious operation on the mobile terminal is a legitimate user.
  • the mobile terminal can not only determine whether the user is an illegal user by identifying whether the fingerprint matches, but also identify the user's identity through other biometrics, for example, using the user's iris or the like.
  • the mobile terminal is operated according to a preset manner.
  • the preset manner includes, but is not limited to, one of automatic shutdown, bulletproof warning, and information of sending an illegal user.
  • the mobile terminal determines that the operation identifier input by the user does not match the preset anti-malware operation identification code, the illegal user has just performed a malicious operation on the mobile terminal.
  • the mobile terminal can respond in time, for example, the mobile terminal can automatically shut down, or the mobile terminal can pop up a prompt box to warn the user, or automatically send the information of the illegal user to the legitimate user, wherein the information of the illegal user includes but is not limited to the illegal user.
  • the personal identity information, the geographical location information, the mobile phone number, the fingerprint, etc., the recipient corresponding to the information of the mobile terminal transmitting the illegal user may be a legitimate user of the mobile terminal or a receiving device/mobile terminal designated by the legitimate user.
  • the mobile terminal When the mobile terminal recognizes a malicious operation, the mobile terminal prompts the user to input an operation identification code, and determines and determines the operation identification code input by the user and the preset anti-malware operation identification. Whether the codes match, thereby identifying that the illegal user has performed malicious operations on the mobile terminal, so that the mobile terminal responds in time.
  • the method for identifying malicious operations in the mobile terminal includes:
  • S201 Receive an anti-malware operation identification code input by a legal user, and store the anti-malware operation identification code as a preset anti-malware operation identification code in a secure storage space of the mobile terminal.
  • the mobile terminal may prompt the legal user to register one or more anti-malware operation identification codes when the system determines security, for example, if the anti-malware function is not activated, or the security mechanism of the mobile terminal determines that the mobile terminal is located.
  • the legitimate user is prompted to register the fingerprint or enter the password.
  • the mobile terminal can store the anti-malware operation identification code registered by the legal user in the secure storage space of the mobile terminal, wherein the secure storage space means that the mobile terminal does not appear lost, deleted, or destroyed when being maliciously operated.
  • Space for example, if the anti-malware operation identifier registered by the legitimate user is a fingerprint, the fingerprint of the legitimate user can be stored in the storage device of the fingerprint chip.
  • the mobile terminal may also send the anti-malware operation identification code registered by the legal user to the service provider or the server of the system provider for storage. After the mobile terminal receives the operation identification code input by the user who has just performed a malicious operation on the mobile terminal, the anti-malware operation identification code may be downloaded from the server for matching verification.
  • the mobile terminal may include, but is not limited to, one of a mobile phone, a tablet computer, a notebook computer, and a PDA.
  • the preset suspected malicious operations include, but are not limited to, first starting the mobile terminal, resetting the mobile terminal, upgrading the mobile terminal, updating the mobile terminal system, and changing the habitual operation of the mobile terminal. One of them.
  • S204 Receive an operation identification code, and determine whether the operation identification code matches a preset anti-malware operation identification code.
  • the anti-malware operation identification code includes, but is not limited to, one of a user's fingerprint, a living fingerprint, an iris, and a combination of one or more of numbers, letters, and symbols.
  • the preset manner includes, but is not limited to, one of automatic shutdown, bullet box warning, and automatic transmission of illegal user information.
  • the mobile terminal may acquire the geographical location of the mobile terminal according to, for example, the GPS module. Coordinates, and send the geographic location coordinates of the mobile terminal to legitimate users in different ways. For example, the geographic location coordinates are sent to a service provider or a server of a system provider, and the server pushes to a legitimate user by, for example, a secure mail; or the mobile terminal can directly edit the secure mail including the geographical location coordinates in the mobile terminal. , or notify legitimate users by SMS or other means. Thus, the legitimate user can know the current geographic location where the mobile terminal is located.
  • the mobile terminal obtains the geographical location information of the mobile terminal, and sends the geographical location information to the server, and the server sends the information to the legitimate user, thereby the legitimate user is lost.
  • the server sends the information to the legitimate user, thereby the legitimate user is lost.
  • the present invention also provides an apparatus for identifying malicious operations in a mobile terminal.
  • FIG. 3 is a schematic structural diagram of an apparatus for identifying a malicious operation in a mobile terminal according to an embodiment of the present invention.
  • the identification device for malicious operation in the mobile terminal includes: a first receiving module 100.
  • the first receiving module 100 is configured to receive an operation of the user on the mobile terminal.
  • the mobile terminal may include, but is not limited to, one of a mobile phone, a tablet computer, a notebook computer, and a PDA.
  • the prompting module 200 is configured to prompt the user to input an operation identification code when determining that the operation of the mobile terminal matches the preset suspected malicious operation.
  • the preset suspected malicious operations include, but are not limited to, one of first starting the mobile terminal, resetting the mobile terminal, upgrading the mobile terminal, updating the mobile terminal system, and changing the habitual operation of the mobile terminal. Specifically, after the first receiving module 100 receives the operation of the user, the prompting module 200 determines whether the operation that the user has just performed on the mobile terminal is a suspected malicious operation.
  • the prompting module 200 can identify whether the operation just performed by the user is a suspected malicious operation by matching the operation that the user has just performed with the suspected malicious operation stored in advance in the mobile terminal. If the prompting module 200 recognizes that the operation that the user has just performed on the mobile terminal is to start the mobile terminal for the first time, or reset the mobile terminal, or upgrade the mobile terminal, or select to update the mobile terminal system, or move to the mobile terminal.
  • the habitual operation change of the terminal for example, the legal user usually uses the fingerprint A to unlock, and the mobile terminal recognizes the unused fingerprint B for unlocking, the mobile terminal determines that the user who is operating the mobile terminal performs the habitual operation on the mobile terminal. If a change has occurred, or the mobile terminal is flashed, the prompting module 200 prompts the user to input an operation identification code to check the identity of the user.
  • the determining module 300 is configured to receive the operation identification code, and determine whether the operation identification code matches the preset anti-malware operation identification code.
  • the anti-malware operation identification code includes, but is not limited to, one of a user's fingerprint, a living fingerprint, an iris, and a combination of one or more of numbers, letters, and symbols. Specifically, the determining module 300 can determine whether the user who has performed a malicious operation on the mobile terminal is a legitimate user by matching the operation identifier input by the user with the preset anti-malware operation identification code.
  • the preset anti-malware operation identification code may be pre-stored in the mobile terminal and stored in a secure space in the mobile terminal, that is, the preset anti-malware operation identification code is stored without being accessed by malicious operations or
  • the damaged storage space that is, the storage space that cannot be added, deleted, or modified by an illegal user. Thereby, it can be ensured that the preset anti-maliware operation identification code is not lost, deleted, or destroyed.
  • the determining module 300 receives the fingerprint input by the user, and then compares it with the user fingerprint stored in the secure space of the mobile terminal. If not, the determining module 300 determines that the user is an illegal user, that is, just performs the mobile terminal. The user suspected of malicious operation is an illegal user.
  • the determining module 300 receives the password input by the user, and then stores it in advance in the mobile terminal. The passwords in the secure space are compared. If the passwords match, the determining module 300 determines that the user who has just performed a malicious operation on the mobile terminal is a legitimate user.
  • the judging module 300 can not only determine whether the user is an illegal user by identifying whether the fingerprint matches, but also identify the user's identity by other biometrics, for example, using the user's iris or the like.
  • the operation module 400 is configured to operate the mobile terminal according to a preset manner when the operation identification code does not match the preset anti-malware operation identification code.
  • the preset manner includes, but is not limited to, one of automatic shutdown, bulletproof warning, and information of sending an illegal user. Specifically, if the determining module 300 determines that the operation identifier input by the user does not match the preset anti-malware operation identification code, the illegal user has just performed a malicious operation on the mobile terminal. At this time, the operation module 400 can respond in time.
  • the operation module 400 can automatically shut down the mobile terminal to shut down the mobile terminal, or the operation module 400 can pop up a prompt box to warn the user, or automatically send the information of the illegal user to the legitimate user, wherein the information of the illegal user includes but is not limited to an illegal user.
  • the personal identity information, the geographical location information, the mobile phone number, the fingerprint, etc., and the receiving party corresponding to the information of the mobile terminal transmitting the illegal user may be a legitimate user of the mobile terminal or a receiving device/mobile terminal designated by the legitimate user.
  • the device for maliciously operating the mobile terminal in the embodiment of the present invention prompts the user to input an operation identification code when identifying a malicious operation, and determines whether the operation identification code input by the user and the preset anti-malware operation identification code are Matching, thereby identifying an illegal user to perform a malicious operation on the mobile terminal, so that the mobile terminal responds in time.
  • the identification device for malicious operation in the mobile terminal includes: a first receiving module 100, a prompting module 200, a determining module 300, and an operating module 400.
  • the second receiving module 500 is configured to receive an anti-malware operation identification code input by a legal user. Specifically, the second receiving module 500 may prompt the legal user to register one or more anti-malware operation identification codes when the system determines security, for example, when the anti-malware function is not activated, or the security mechanism of the mobile terminal determines When the mobile terminal is in a safe state, the legal user is prompted to register the fingerprint or enter the password.
  • the storage module 600 is configured to store the anti-malware operation identification code as a preset anti-malware operation identification code in a secure storage space of the mobile terminal. Specifically, the storage module 600 can put a legitimate user's note
  • the anti-malware operation identification code is stored in the secure storage space of the mobile terminal, wherein the secure storage space refers to a space in which the mobile terminal does not appear lost, deleted, or destroyed when maliciously operated, for example, if a legitimate user registers
  • the anti-malware operation identifier is a fingerprint
  • the fingerprint of the legitimate user can be stored in the storage device of the fingerprint chip.
  • the storage module 600 may also send the anti-malware operation identification code registered by the legal user to the service provider or the server of the system provider for storage.
  • the anti-malware operation identification code may be downloaded from the server for matching verification.
  • the obtaining module 700 is configured to obtain geographic location information of the mobile terminal. Specifically, if the determining module 300 determines that the operation identification code does not match the preset anti-malware operation identification code, that is, the illegal user has just performed a malicious operation on the mobile terminal, the obtaining module 700 may acquire the mobile terminal according to, for example, the GPS module. Geographical coordinates.
  • the sending module 800 is configured to send the geographic location information to a legitimate user. Specifically, the sending module 800 can send the geographic location coordinates of the mobile terminal to the legal user in different manners. For example, the geographic location coordinates are sent to a service provider or a server of a system provider, which is pushed to a legitimate user by, for example, a secure mail; or the sending module 800 can directly edit the security including the geographic location coordinates in the mobile terminal. Mail, or notify legitimate users via SMS. Thus, the legitimate user can know the current geographic location where the mobile terminal is located.
  • the mobile terminal obtains the geographical location information of the mobile terminal, and sends the geographical location information to the server, and the server sends the information to the legitimate user, thereby the legitimate user is lost.
  • the server sends the information to the legitimate user, thereby the legitimate user is lost.
  • portions of the invention may be implemented in hardware, software, firmware or a combination thereof.
  • multiple steps or methods may be implemented in software or firmware stored in a memory and executed by a suitable instruction execution system.
  • a suitable instruction execution system For example, if implemented in hardware, as in another embodiment, it can be implemented by any one or combination of the following techniques well known in the art: having logic gates for implementing logic functions on data signals. Discrete logic circuits, application specific integrated circuits with suitable combinational logic gates, programmable gate arrays (PGAs), field programmable gate arrays (FPGAs), etc.
  • the mobile terminal obtains the geographical location information of the mobile terminal, and sends the geographical location information to the server, and the server sends the information to the legitimate user, thereby the legitimate user is lost.
  • the server sends the information to the legitimate user, thereby the legitimate user is lost.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Quality & Reliability (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)

Abstract

本发明提出一种移动终端中恶意操作的识别方法和装置,其中,该方法包括:接收用户对移动终端的操作;当判断对移动终端的操作与预设的疑似恶意操作匹配时,提示用户输入操作识别码;接收操作识别码,并判断操作识别码与预设的防恶意操作识别码是否匹配;以及如果操作识别码与预设的防恶意操作识别码不匹配,则按照预设的方式对移动终端进行操作。本发明实施例的移动终端中恶意操作的识别方法,可以识别出非法用户正在对移动终端进行恶意操作,以便移动终端及时做出响应。

Description

移动终端中恶意操作的识别方法和装置 技术领域
本发明涉及移动终端制造技术领域,尤其涉及一种移动终端中恶意操作的识别方法和装置。
背景技术
随着移动终端的快速发展,用户使用移动终端也越来越普及。然而如果用户丢失了移动终端或者移动终端被盗,盗窃者可以对移动终端进行恶意操作,例如,对移动终端进行刷机,由于恶意操作后的移动终端并不影响使用,移动终端可以再次进入市场进行买卖。也就是说,现有的移动终端并不能对非法用户的恶意操作进行有效的识别,因此,目前还没有有效机制对被恶意操作的移动终端进行保护。
发明内容
本发明旨在至少解决上述技术问题之一。
为此,本发明的第一个目的在于提出一种移动终端中恶意操作的识别方法。该方法可以识别出非法用户正在对移动终端进行恶意操作,以便移动终端及时做出响应。
本发明的第二个目的在于提出一种移动终端中恶意操作的识别装置。
为了实现上述目的,本发明第一方面实施例的移动终端中恶意操作的识别方法,包括:接收用户对移动终端的操作;当判断所述对移动终端的操作与预设的疑似恶意操作匹配时,提示所述用户输入操作识别码;接收所述操作识别码,并判断所述操作识别码与预设的防恶意操作识别码是否匹配;以及如果所述操作识别码与所述预设的防恶意操作识别码不匹配,则按照预设的方式对所 述移动终端进行操作。
本发明实施例的移动终端中恶意操作的识别方法,当移动终端识别到疑似的恶意操作时,提示用户输入操作识别码,并通过判断用户输入的操作识别码与预设的防恶意操作识别码是否匹配,从而识别出非法用户正在对移动终端进行恶意操作,以便移动终端及时做出响应。
为了实现上述目的,本发明第二方面实施例的移动终端中恶意操作的识别装置,包括:第一接收模块,用于接收用户对移动终端的操作;提示模块,用于当判断所述对移动终端的操作与预设的疑似恶意操作匹配时,提示所述用户输入操作识别码;判断模块,用于接收所述操作识别码,并判断所述操作识别码与预设的防恶意操作识别码是否匹配;以及操作模块,用于当所述操作识别码与所述预设的防恶意操作识别码不匹配时,按照预设的方式对所述移动终端进行操作。
本发明实施例的移动终端中恶意操作的识别装置,当识别到疑似的恶意操作时,提示用户输入操作识别码,并通过判断用户输入的操作识别码与预设的防恶意操作识别码是否匹配,从而识别出非法用户正在对移动终端进行恶意操作,以便移动终端及时做出响应。
本发明附加的方面和优点将在下面的描述中部分给出,部分将从下面的描述中变得明显,或通过本发明的实践了解到。
附图说明
本发明上述的和/或附加的方面和优点从下面结合附图对实施例的描述中将变得明显和容易理解,其中,
图1是根据本发明一个实施例的移动终端中恶意操作的识别方法的流程图;
图2是根据本发明一个具体实施例的移动终端中恶意操作的识别方法的流程图;
图3是根据本发明一个实施例的移动终端中恶意操作的识别装置的结构示意图;以及
图4是根据本发明一个具体实施例的移动终端中恶意操作的识别装置的结构示意图。
具体实施方式
下面详细描述本发明的实施例,所述实施例的示例在附图中示出,其中自始至终相同或类似的标号表示相同或类似的元件或具有相同或类似功能的元件。下面通过参考附图描述的实施例是示例性的,仅用于解释本发明,而不能理解为对本发明的限制。相反,本发明的实施例包括落入所附加权利要求书的精神和内涵范围内的所有变化、修改和等同物。
下面参考附图描述根据本发明实施例的移动终端中恶意操作的识别方法和装置。
图1是根据本发明一个实施例的移动终端中恶意操作的识别方法的流程图。如图1所示,该移动终端中恶意操作的识别方法包括:
S101,接收用户对移动终端的操作。
具体地,移动终端可包括但不限于手机、平板电脑、笔记本电脑、PDA中的一种。
S102,当判断对移动终端的操作与预设的疑似恶意操作匹配时,提示用户输入操作识别码。
在本发明的一个实施例中,预设的疑似恶意操作包括但不限于首次启动移动终端、重置移动终端、对移动终端进行升级、更新移动终端系统、对所述移动终端的习惯性操作改变中的一种。
具体地,在移动终端接收到用户的操作之后,移动终端判断用户刚刚对移动终端进行过的操作是否为疑似恶意的操作。具体而言,移动终端可通过将用户刚刚进行过的操作与移动终端中预先存储的疑似恶意操作进行匹配,从而识别出用户刚刚的操作是否为疑似恶意的操作。如果移动终端识别到用户刚刚对移动终端进行过的操作是首次启动移动终端,或者是对移动终端进行重置,或者是对移动终端进行升级,或者是选择更新移动终端系统,或者 是对移动终端的习惯性操作改变(例如,合法用户通常使用指纹A进行解锁,移动终端识别到未使用过的指纹B进行解锁,则移动终端判断正在对移动终端进行操作的用户对移动终端的习惯性操作发生了改变),再或者是对移动终端进行刷机,则移动终端提示用户输入操作识别码,以对用户的身份进行核对。
S103,接收操作识别码,并判断操作识别码与预设的防恶意操作识别码是否匹配。
在本发明的一个实施例中,防恶意操作识别码包括但不限于用户的指纹、活体指纹、虹膜中的一种,以及数字、字母、符号中的一种或者多种的组合。
具体而言,移动终端可通过将用户输入的操作识别码与预设的防恶意操作识别码进行匹配来判断对移动终端进行了疑似恶意操作的用户是否为合法用户。其中,预设的防恶意操作识别码可以预先存储在移动终端中,并且存储在移动终端中的安全空间中,也就是说,预设的防恶意操作识别码存储在不会被恶意操作访问或者损坏的存储空间中,即,存储在非法用户不能进行添加、删除或者修改的存储空间中。由此,可以保证该预设的防恶意操作识别码不会丢失、被删除、或者被破坏。
举例而言,移动终端接收用户输入的指纹,然后跟预先存储在移动终端的安全空间中的用户指纹进行比较,如果不匹配,则判断用户为非法用户,即刚刚对移动终端进行了疑似恶意操作的用户为非法用户。或者,移动终端接收用户输入的密码,然后跟预先存储在移动终端的安全空间中的密码进行比较,如果密码匹配,则判断刚刚对移动终端进行了疑似恶意操作的用户为合法用户。
应当理解的是,移动终端不仅仅可以通过识别指纹是否匹配来判断用户是否为非法用户,还可以通过其他生物特征对用户的身份进行识别,例如,利用用户的虹膜等进行识别。
S104,如果操作识别码与预设的防恶意操作识别码不匹配,则按照预设的方式对移动终端进行操作。
在本发明的一个实施例中,预设的方式包括但不限于自动关机、弹框警告、发送非法用户的信息中的一种。
具体地,如果移动终端判断用户输入的操作识别码与预设的防恶意操作识别码不匹配,则说明非法用户刚刚对移动终端进行了恶意操作,此时,移 动终端可以及时作出响应,例如,移动终端可以自动关机,或者移动终端可以弹出提示框警告用户,或者自动将非法用户的信息发送给合法用户,其中,非法用户的信息包括但不限于非法用户的个人身份信息、地理位置信息、手机号码、指纹等,移动终端发送非法用户的信息对应的接收方可以是该移动终端的合法用户或者是该合法用户指定的接收装置/移动终端等。
本发明实施例的移动终端中恶意操作的识别方法,当移动终端识别到疑似的恶意操作时,提示用户输入操作识别码,并通过并判断用户输入的操作识别码与预设的防恶意操作识别码是否匹配,从而识别出非法用户对移动终端进行了恶意操作,以便移动终端及时做出响应。
图2是根据本发明一个具体实施例的移动终端中恶意操作的识别方法的流程图。如图2所示,该移动终端中恶意操作的识别方法包括:
S201,接收合法用户输入的防恶意操作识别码,并将防恶意操作识别码作为预设的防恶意操作识别码存储在移动终端的安全存储空间中。
具体地,移动终端可以在系统确定安全的情况下,提示合法用户注册一个或者多个防恶意操作识别码,例如,在防恶意功能未激活的情况下,或者移动终端的安全机制判断移动终端处于安全的情况下,提示合法用户注册指纹,或者输入密码。然后,移动终端可将合法用户注册的防恶意操作识别码存储在移动终端的安全存储空间中,其中,安全存储空间是指移动终端在被恶意操作时不会出现丢失、被删除、被破坏的空间,例如,如果合法用户注册的防恶意操作识别码是指纹的话,可以将合法用户的指纹存储在指纹芯片的存储设备中。
此外,移动终端还可以将合法用户注册的防恶意操作识别码发送至服务提供商或者是系统提供商的服务器上进行存储。当移动终端接收到刚刚对移动终端进行了疑似恶意操作的用户输入的操作识别码后,可以从服务器上下载防恶意操作识别码进行匹配验证。
S202,接收用户对移动终端的操作。
具体地,移动终端可包括但不限于手机、平板电脑、笔记本电脑、PDA中的一种。
S203,当判断对移动终端的操作与预设的疑似恶意操作匹配时,提示用户输入操作识别码。
在本发明的一个实施例中,预设的疑似恶意操作包括但不限于首次启动移动终端、重置移动终端、对移动终端进行升级、更新移动终端系统、对所述移动终端的习惯性操作改变中的一种。
S204,接收操作识别码,并判断操作识别码与预设的防恶意操作识别码是否匹配。
在本发明的一个实施例中,防恶意操作识别码包括但不限于用户的指纹、活体指纹、虹膜中的一种,以及数字、字母、符号中的一种或者多种的组合。
S205,如果操作识别码与预设的防恶意操作识别码不匹配,则按照预设的方式对移动终端进行操作。
在本发明的一个实施例中,预设的方式包括但不限于自动关机、弹框警告、自动发送非法用户信息中的一种。
S206,获取移动终端的地理位置信息,并将地理位置信息发送至合法用户。
具体地,如果移动终端判断操作识别码与预设的防恶意操作识别码不匹配,即,非法用户刚刚对移动终端进行了疑似恶意操作,则移动终端可根据例如GPS模块获取移动终端的地理位置坐标,并通过不同的方式将移动终端的地理位置坐标发送给合法用户。例如,将该地理位置坐标发送到服务提供商或者是系统提供商的服务器上,由服务器通过例如安全邮件推送给合法用户;或者移动终端可在移动终端中直接编辑包含地理位置坐标的的安全邮件,或通过短信等方式通知合法用户。由此,合法用户可以获知移动终端所处的当前地理位置。
本发明实施例的移动终端中恶意操作的识别方法,移动终端通过获取移动终端的地理位置信息,并将该地理位置信息发送至服务器,由服务器推送给合法用户,由此,合法用户在遗失移动终端或者移动终端被盗后,当移动终端被非法用户恶意操作后,可以及时获取到移动终端的相关信息。
为了实现上述实施例,本发明还提出一种移动终端中恶意操作的识别装置。
图3是根据本发明一个实施例的移动终端中恶意操作的识别装置的结构示意图。如图3所示,移动终端中恶意操作的识别装置包括:第一接收模块 100、提示模块200、判断模块300和操作模块400。
具体地,第一接收模块100用于接收用户对移动终端的操作。其中,移动终端可包括但不限于手机、平板电脑、笔记本电脑、PDA中的一种。
提示模块200用于当判断对移动终端的操作与预设的疑似恶意操作匹配时,提示用户输入操作识别码。其中,预设的疑似恶意操作包括但不限于首次启动移动终端、重置移动终端、对移动终端进行升级、更新移动终端系统、对所述移动终端的习惯性操作改变中的一种。具体地,在第一接收模块100接收到用户的操作之后,提示模块200判断用户刚刚对移动终端进行过的操作是否为疑似恶意的操作。
具体而言,提示模块200可通过将用户刚刚进行过的操作与移动终端中预先存储的疑似恶意操作进行匹配,从而识别出用户刚刚的操作是否为疑似恶意的操作。如果提示模块200识别到用户刚刚对移动终端进行过的操作是首次启动移动终端,或者是对移动终端进行重置,或者是对移动终端进行升级,或者是选择更新移动终端系统,或者是对移动终端的习惯性操作改变(例如,合法用户通常使用指纹A进行解锁,移动终端识别到未使用过的指纹B进行解锁,则移动终端判断正在对移动终端进行操作的用户对移动终端的习惯性操作发生了改变),再或者是对移动终端进行刷机,则提示模块200提示用户输入操作识别码,以对用户的身份进行核对。
判断模块300用于接收操作识别码,并判断操作识别码与预设的防恶意操作识别码是否匹配。其中,防恶意操作识别码包括但不限于用户的指纹、活体指纹、虹膜中的一种,以及数字、字母、符号中的一种或者多种的组合。具体而言,判断模块300可通过将用户输入的操作识别码与预设的防恶意操作识别码进行匹配来判断对移动终端进行了疑似恶意操作的用户是否为合法用户。其中,预设的防恶意操作识别码可以预先存储在移动终端中,并且存储在移动终端中的安全空间中,也就是说,预设的防恶意操作识别码存储在不会被恶意操作访问或者损坏的存储空间中,即,存储在非法用户不能进行添加、删除或者修改的存储空间中。由此,可以保证该预设的防恶意操作识别码不会丢失、被删除、或者被破坏。
举例而言,判断模块300接收用户输入的指纹,然后跟预先存储在移动终端的安全空间中的用户指纹进行比较,如果不匹配,则判断模块300判断用户为非法用户,即刚刚对移动终端进行了疑似恶意操作的用户为非法用户。或者,判断模块300接收用户输入的密码,然后跟预先存储在移动终端 的安全空间中的密码进行比较,如果密码匹配,则判断模块300判断刚刚对移动终端进行了疑似恶意操作的用户为合法用户。
应当理解的是,判断模块300不仅仅可以通过识别指纹是否匹配来判断用户是否为非法用户,还可以通过其他生物特征对用户的身份进行识别,例如,利用用户的虹膜等进行识别。
操作模块400用于当操作识别码与预设的防恶意操作识别码不匹配时,按照预设的方式对移动终端进行操作。其中,预设的方式包括但不限于自动关机、弹框警告、发送非法用户的信息中的一种。具体地,如果判断模块300判断用户输入的操作识别码与预设的防恶意操作识别码不匹配,则说明非法用户刚刚对移动终端进行了恶意操作,此时,操作模块400可以及时作出响应,例如,操作模块400可以自动关闭移动终端使移动终端关机,或者操作模块400可以弹出提示框警告用户,或者自动将非法用户的信息发送给合法用户,其中,非法用户的信息包括但不限于非法用户的个人身份信息、地理位置信息、手机号码、指纹等,移动终端发送非法用户的信息对应的接收方可以是该移动终端的合法用户或者是该合法用户指定的接收装置/移动终端等。
本发明实施例的移动终端中恶意操作的识别装置,当识别到疑似的恶意操作时,提示用户输入操作识别码,并通过并判断用户输入的操作识别码与预设的防恶意操作识别码是否匹配,从而识别出非法用户对移动终端进行了恶意操作,以便移动终端及时做出响应。
图4是根据本发明一个具体实施例的移动终端中恶意操作的识别装置的结构示意图。如图4所示,移动终端中恶意操作的识别装置包括:第一接收模块100、提示模块200、判断模块300和操作模块400。
具体地,第二接收模块500用于接收合法用户输入的防恶意操作识别码。具体地,第二接收模块500可以在系统确定安全的情况下,提示合法用户注册一个或者多个防恶意操作识别码,例如,在防恶意功能未激活的情况下,或者移动终端的安全机制判断移动终端处于安全的情况下,提示合法用户注册指纹,或者输入密码。
存储模块600用于将防恶意操作识别码作为预设的防恶意操作识别码存储在移动终端的安全存储空间中。具体地,存储模块600可将合法用户注 册的防恶意操作识别码存储在移动终端的安全存储空间中,其中,安全存储空间是指移动终端在被恶意操作时不会出现丢失、被删除、被破坏的空间,例如,如果合法用户注册的防恶意操作识别码是指纹的话,可以将合法用户的指纹存储在指纹芯片的存储设备中。
此外,存储模块600还可以将合法用户注册的防恶意操作识别码发送至服务提供商或者是系统提供商的服务器上进行存储。当判断模块300接收到刚刚对移动终端进行了疑似恶意操作的用户输入的操作识别码后,可以从服务器上下载防恶意操作识别码进行匹配验证。
获取模块700用于获取移动终端的地理位置信息。具体地,如果判断模块300判断操作识别码与预设的防恶意操作识别码不匹配,即,非法用户刚刚对移动终端进行了疑似恶意操作,则获取模块700可根据例如GPS模块获取移动终端的地理位置坐标。
发送模块800用于将将地理位置信息发送至合法用户。具体地,发送模块800可通过不同的方式将移动终端的地理位置坐标发送给合法用户。例如,将该地理位置坐标发送到服务提供商或者是系统提供商的服务器上,由服务器通过例如安全邮件推送给合法用户;或者发送模块800可在移动终端中直接编辑包含地理位置坐标的的安全邮件,或通过短信等方式通知合法用户。由此,合法用户可以获知移动终端所处的当前地理位置。
本发明实施例的移动终端中恶意操作的识别装置,移动终端通过获取移动终端的地理位置信息,并将该地理位置信息发送至服务器,由服务器推送给合法用户,由此,合法用户在遗失移动终端或者移动终端被盗后,当移动终端被非法用户恶意操作后,可以及时获取到移动终端的相关信息。
应当理解,本发明的各部分可以用硬件、软件、固件或它们的组合来实现。在上述实施方式中,多个步骤或方法可以用存储在存储器中且由合适的指令执行系统执行的软件或固件来实现。例如,如果用硬件来实现,和在另一实施方式中一样,可用本领域公知的下列技术中的任一项或他们的组合来实现:具有用于对数据信号实现逻辑功能的逻辑门电路的离散逻辑电路,具有合适的组合逻辑门电路的专用集成电路,可编程门阵列(PGA),现场可编程门阵列(FPGA)等。
尽管已经示出和描述了本发明的实施例,本领域的普通技术人员可以理解:在不脱离本发明的原理和宗旨的情况下可以对这些实施例进行多种变化、修改、替换和变型,本发明的范围由权利要求及其等同物限定。
工业实用性
本发明公开的移动终端中恶意操作的识别方法和装置,移动终端通过获取移动终端的地理位置信息,并将该地理位置信息发送至服务器,由服务器推送给合法用户,由此,合法用户在遗失移动终端或者移动终端被盗后,当移动终端被非法用户恶意操作后,可以及时获取到移动终端的相关信息。

Claims (12)

  1. 一种移动终端中恶意操作的识别方法,包括:
    接收用户对移动终端的操作;
    当判断所述对移动终端的操作与预设的疑似恶意操作匹配时,提示所述用户输入操作识别码;
    接收所述操作识别码,并判断所述操作识别码与预设的防恶意操作识别码是否匹配;以及
    如果所述操作识别码与所述预设的防恶意操作识别码不匹配,则按照预设的方式对所述移动终端进行操作。
  2. 如权利要求1所述的移动终端中恶意操作的识别方法,其中,在所述接收用户对移动终端的操作之前,还包括:
    接收合法用户输入的防恶意操作识别码,并将所述防恶意操作识别码作为所述预设的防恶意操作识别码存储在所述移动终端的安全存储空间中。
  3. 如权利要求1所述的移动终端中恶意操作的识别方法,其中,在所述按照预设的方式对所述移动终端进行操作之后,还包括:
    获取所述移动终端的地理位置信息,并将所述地理位置信息发送至合法用户。
  4. 如权利要求1-3任一项所述的移动终端中恶意操作的识别方法,其中,所述防恶意操作识别码包括所述用户的指纹、活体指纹、虹膜中的一种,以及数字、字母、符号中的一种或者多种的组合。
  5. 如权利要求1-3任一项所述的移动终端中恶意操作的识别方法,其中,所述预设的疑似恶意操作包括首次启动移动终端、重置移动终端、对移动终端进行升级、更新移动终端系统、对所述移动终端的习惯性操作改变中的一种。(习惯性操作改变的意思是,比如一直使用A指纹解锁,突然识别到没有使用过的B指纹)
  6. 如权利要求1-3任一项所述的移动终端中恶意操作的识别方法,其中,所述预设的方式包括自动关机、弹框警告、发送非法用户的信息中的一种。
  7. 一种移动终端中恶意操作的识别装置,包括:
    第一接收模块,用于接收用户对移动终端的操作;
    提示模块,用于当判断所述对移动终端的操作与预设的疑似恶意操作匹 配时,提示所述用户输入操作识别码;
    判断模块,用于接收所述操作识别码,并判断所述操作识别码与预设的防恶意操作识别码是否匹配;以及
    操作模块,用于当所述操作识别码与所述预设的防恶意操作识别码不匹配时,按照预设的方式对所述移动终端进行操作。
  8. 如权利要求7所述的移动终端中恶意操作的识别装置,其中,还包括:
    第二接收模块,用于接收合法用户输入的防恶意操作识别码;以及
    存储模块,用于将所述防恶意操作识别码作为所述预设的防恶意操作识别码存储在所述移动终端的安全存储空间中。
  9. 如权利要求7所述的移动终端中恶意操作的识别装置,其中,还包括:
    获取模块,用于获取所述移动终端的地理位置信息;以及
    发送模块,用于将所述地理位置信息发送至合法用户。
  10. 如权利要求7-9任一项所述的移动终端中恶意操作的识别装置,其中,所述防恶意操作识别码包括所述用户的指纹、活体指纹、虹膜中的一种,以及数字、字母、符号中的一种或者多种的组合。
  11. 如权利要求7-9任一项所述的移动终端中恶意操作的识别装置,其中,所述预设的恶意操作包括首次启动移动终端、重置移动终端、对移动终端进行升级、更新移动终端系统、对所述移动终端的习惯性操作改变中的一种。
  12. 如权利要求7-9任一项所述的移动终端中恶意操作的识别装置,其中,所述预设的方式包括自动关机、弹框警告、发送非法用户的信息中的一种。
PCT/CN2015/077411 2014-11-18 2015-04-24 移动终端中恶意操作的识别方法和装置 WO2016078327A1 (zh)

Priority Applications (3)

Application Number Priority Date Filing Date Title
EP15860153.4A EP3147788A4 (en) 2014-11-18 2015-04-24 Method and apparatus for identifying malicious operation in mobile terminal
KR1020167035872A KR20170010819A (ko) 2014-11-18 2015-04-24 이동 단말기에서의 악성 동작 인식 방법 및 장치
US15/382,664 US20170098073A1 (en) 2014-11-18 2016-12-17 Method and apparatus for identifying malicious operation in mobile terminal

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410657992.5A CN104317668A (zh) 2014-11-18 2014-11-18 移动终端中恶意操作的识别方法和装置
CN201410657992.5 2014-11-18

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US15/382,664 Continuation US20170098073A1 (en) 2014-11-18 2016-12-17 Method and apparatus for identifying malicious operation in mobile terminal

Publications (1)

Publication Number Publication Date
WO2016078327A1 true WO2016078327A1 (zh) 2016-05-26

Family

ID=52372903

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/077411 WO2016078327A1 (zh) 2014-11-18 2015-04-24 移动终端中恶意操作的识别方法和装置

Country Status (5)

Country Link
US (1) US20170098073A1 (zh)
EP (1) EP3147788A4 (zh)
KR (1) KR20170010819A (zh)
CN (1) CN104317668A (zh)
WO (1) WO2016078327A1 (zh)

Families Citing this family (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104317668A (zh) * 2014-11-18 2015-01-28 深圳市汇顶科技股份有限公司 移动终端中恶意操作的识别方法和装置
CN104639749B (zh) * 2015-02-04 2018-01-23 广东欧珀移动通信有限公司 短信发送控制方法及装置
CN104899490B (zh) * 2015-05-27 2018-05-01 广东欧珀移动通信有限公司 一种终端定位方法及用户终端
CN105117242B (zh) * 2015-07-29 2018-06-29 广东欧珀移动通信有限公司 系统重置方法及终端
CN105204621B (zh) * 2015-08-26 2018-12-11 广东欧珀移动通信有限公司 一种信息传送方法及智能手表
CN105159563B (zh) * 2015-10-20 2018-11-20 上海创功通讯技术有限公司 终端设备及其控制方法
CN105893811A (zh) * 2015-12-31 2016-08-24 乐视移动智能信息技术(北京)有限公司 一种电子设备刷机验证的方法和装置
CN105787349A (zh) * 2016-02-29 2016-07-20 宇龙计算机通信科技(深圳)有限公司 一种安全刷机的方法及装置
CN106203124A (zh) * 2016-06-29 2016-12-07 宇龙计算机通信科技(深圳)有限公司 安装操作方法及操作装置、终端
CN106371806B (zh) * 2016-08-24 2019-06-14 广东威创视讯科技股份有限公司 判断操作动作有效性的方法和系统
CN106503528A (zh) * 2016-10-28 2017-03-15 惠州Tcl移动通信有限公司 一种基于移动终端的指纹识别拍照防盗控制方法及系统
CN106778392A (zh) * 2016-12-23 2017-05-31 惠州Tcl移动通信有限公司 一种移动终端安全保护方法及系统
WO2018205272A1 (zh) * 2017-05-12 2018-11-15 深圳市乃斯网络科技有限公司 指纹识别在终端的应用方法及系统
WO2018232664A1 (zh) * 2017-06-21 2018-12-27 深圳支点电子智能科技有限公司 一种移动终端安全信息保护方法和移动终端
CN107733872B (zh) * 2017-09-18 2022-03-25 北京小米移动软件有限公司 信息打印方法及装置
CN112528329A (zh) * 2020-12-11 2021-03-19 深圳信息职业技术学院 恶意获取用户位置隐私的检测方法及计算机可读存储介质
US20240250943A1 (en) * 2023-01-20 2024-07-25 Crowdstrike, Inc. Use of multifactor authentication in assessing suspicious activity

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101106768A (zh) * 2006-07-12 2008-01-16 英华达(南京)科技有限公司 移动通讯装置的数据保密与数据回收方法
CN101252703A (zh) * 2008-03-28 2008-08-27 宇龙计算机通信科技(深圳)有限公司 一种终端资料的保护方法、系统以及移动通信终端
CN101835143A (zh) * 2010-05-05 2010-09-15 中兴通讯股份有限公司 移动终端定位系统和方法、移动终端
CN102932741A (zh) * 2012-11-20 2013-02-13 青岛海信移动通信技术股份有限公司 手机防盗追踪方法及防盗追踪手机
CN104317668A (zh) * 2014-11-18 2015-01-28 深圳市汇顶科技股份有限公司 移动终端中恶意操作的识别方法和装置

Family Cites Families (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6480096B1 (en) * 1998-07-08 2002-11-12 Motorola, Inc. Method and apparatus for theft deterrence and secure data retrieval in a communication device
US7707409B2 (en) * 2002-04-30 2010-04-27 Kt Corporation Method and system for authenticating software
US8548429B2 (en) * 2004-03-08 2013-10-01 Rafi Nehushtan Cellular device security apparatus and method
CN100382644C (zh) * 2004-07-30 2008-04-16 华为技术有限公司 一种移动终端防盗方法
CN1801869A (zh) * 2005-01-06 2006-07-12 杭州波导软件有限公司 一种移动通信终端的防盗方法及其防盗系统
US7536304B2 (en) * 2005-05-27 2009-05-19 Porticus, Inc. Method and system for bio-metric voice print authentication
US8244532B1 (en) * 2005-12-23 2012-08-14 At&T Intellectual Property Ii, L.P. Systems, methods, and programs for detecting unauthorized use of text based communications services
CN100466861C (zh) * 2006-10-19 2009-03-04 宇龙计算机通信科技(深圳)有限公司 手机防盗的方法
CN101198119B (zh) * 2006-12-09 2012-02-29 北京三星通信技术研究有限公司 自动报失方法以及实现该方法的便携式终端
US8254568B2 (en) * 2007-01-07 2012-08-28 Apple Inc. Secure booting a computing device
US8893284B2 (en) * 2007-10-03 2014-11-18 Motorola Mobility Llc Method and system for providing extended authentication
US8289130B2 (en) * 2009-02-19 2012-10-16 Apple Inc. Systems and methods for identifying unauthorized users of an electronic device
CN101577907B (zh) * 2009-06-02 2011-12-07 中兴通讯股份有限公司 一种移动终端的管理方法及装置
US20110055891A1 (en) * 2009-08-26 2011-03-03 Rice Christopher T Device security
KR20110103598A (ko) * 2010-03-15 2011-09-21 주식회사 엘지유플러스 단말기의 잠금 해제 시스템 및 방법
US9436826B2 (en) * 2011-05-16 2016-09-06 Microsoft Technology Licensing, Llc Discovering malicious input files and performing automatic and distributed remediation
KR101380966B1 (ko) * 2011-08-24 2014-05-02 주식회사 팬택 휴대 단말 시스템에서의 보안 장치
US8387141B1 (en) * 2011-09-27 2013-02-26 Green Head LLC Smartphone security system
US8886925B2 (en) * 2011-10-11 2014-11-11 Citrix Systems, Inc. Protecting enterprise data through policy-based encryption of message attachments
EP2780900B1 (en) * 2011-11-14 2020-04-29 Yougetitback Limited Systems and methods for recovering low power devices
CN102694920B (zh) * 2012-05-28 2013-12-11 广东欧珀移动通信有限公司 一种手机防盗方法
KR101331480B1 (ko) * 2012-08-20 2013-12-03 크루셜소프트 주식회사 지문 인식을 위한 방법, 장치 및 컴퓨터 판독 가능 기록 매체
CN103037310A (zh) * 2012-12-14 2013-04-10 北京网秦天下科技有限公司 移动终端智能防盗方法和移动终端
US9706406B1 (en) * 2013-01-22 2017-07-11 Amazon Technologies, Inc. Security measures for an electronic device
US10423766B2 (en) * 2014-06-27 2019-09-24 Microsoft Technology Licensing, Llc Data protection system based on user input patterns on device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101106768A (zh) * 2006-07-12 2008-01-16 英华达(南京)科技有限公司 移动通讯装置的数据保密与数据回收方法
CN101252703A (zh) * 2008-03-28 2008-08-27 宇龙计算机通信科技(深圳)有限公司 一种终端资料的保护方法、系统以及移动通信终端
CN101835143A (zh) * 2010-05-05 2010-09-15 中兴通讯股份有限公司 移动终端定位系统和方法、移动终端
CN102932741A (zh) * 2012-11-20 2013-02-13 青岛海信移动通信技术股份有限公司 手机防盗追踪方法及防盗追踪手机
CN104317668A (zh) * 2014-11-18 2015-01-28 深圳市汇顶科技股份有限公司 移动终端中恶意操作的识别方法和装置

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3147788A4 *

Also Published As

Publication number Publication date
US20170098073A1 (en) 2017-04-06
EP3147788A1 (en) 2017-03-29
KR20170010819A (ko) 2017-02-01
CN104317668A (zh) 2015-01-28
EP3147788A4 (en) 2018-01-24

Similar Documents

Publication Publication Date Title
WO2016078327A1 (zh) 移动终端中恶意操作的识别方法和装置
US12001857B2 (en) Device locator disable authentication
US11764967B2 (en) Method and system for verifying device ownership upon receiving a tagged communication from the device
US9055427B2 (en) Updating configuration parameters in a mobile terminal
US20160269895A1 (en) Device diagnostic and data retrieval
WO2006044746A2 (en) Theft protection of a wireless device and content protection on the device
WO2013178117A1 (zh) 一种移动终端检测方法和移动终端
US20190108329A1 (en) Method and Terminal for Enhancing Information Security
US10713381B2 (en) Method and apparatus for securely calling fingerprint information, and mobile terminal
WO2017036345A1 (zh) 一种信息输入方法和装置
CN109117643B (zh) 系统处理的方法以及相关设备
CN101888627B (zh) 一种移动终端及保护其系统数据的方法
CN105050061A (zh) 一种基于用户声纹信息的消息发送方法及装置
CN103279705A (zh) 具有安全启动功能的芯片的校验方法及校验装置
WO2015188728A1 (zh) 移动支付安全的保护方法、装置及云服务器
CN104346568A (zh) 识别恶意应用程序的方法、装置及移动设备
WO2016183867A1 (zh) 安全移动支付方法、安全移动支付系统和终端
CN111506897A (zh) 数据处理方法和装置
JP6591832B2 (ja) ソフトウェア改ざん検知システム、及びネットワークセキュリティシステム
WO2010151102A1 (en) Remote destroy mechanism using trusted platform module
US20120192288A1 (en) Electronic device with function of securing digital files and method thereof
CN106295274B (zh) 一种应用程序控制方法及装置
KR101586562B1 (ko) 보안토큰 및 그 동작방법
CN108809647B (zh) 电缆调制解调器的启动方法及系统
TW201828142A (zh) 資訊輸入方法和裝置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15860153

Country of ref document: EP

Kind code of ref document: A1

REEP Request for entry into the european phase

Ref document number: 2015860153

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2015860153

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 1020167035872

Country of ref document: KR

NENP Non-entry into the national phase

Ref country code: DE