WO2016165674A1 - Trusted environment operating method and device for terminal - Google Patents

Trusted environment operating method and device for terminal Download PDF

Info

Publication number
WO2016165674A1
WO2016165674A1 PCT/CN2016/080392 CN2016080392W WO2016165674A1 WO 2016165674 A1 WO2016165674 A1 WO 2016165674A1 CN 2016080392 W CN2016080392 W CN 2016080392W WO 2016165674 A1 WO2016165674 A1 WO 2016165674A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
running
preset
environment
application
Prior art date
Application number
PCT/CN2016/080392
Other languages
French (fr)
Chinese (zh)
Inventor
刘小锐
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2016165674A1 publication Critical patent/WO2016165674A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself

Definitions

  • the present application relates to, but is not limited to, the field of communications, and in particular, to a terminal trusted environment operating method and apparatus.
  • Terminals that are currently able to access the network through wireless communication technologies such as mobile phones, are becoming personal information centers, carrying more and more functions.
  • mobile Internet applications based on data services have been involved. Every aspect of life.
  • the mobile Internet is developing rapidly, the information security of the mobile Internet is also threatened.
  • the entrance and node of the mobile Internet the security of the operating environment has become the focus of the industry.
  • the present application proposes a method and a device for operating a terminal trusted environment, and performs real-time intervention when a user accesses the network through the WLAN to ensure that key information of the user is not captured by the WLAN provider, thereby improving the security of the terminal.
  • a method for operating a terminal trusted environment including:
  • the terminal When the application running by the terminal system conforms to the preset scenario, the terminal currently operates the environment to ensure that the terminal is in a trusted operating environment when receiving key information input by the user.
  • the preset scenario is preset by the system and/or preset by the user, and includes at least one of the following:
  • the preset scenario includes: a specific application type preset by the user in the whitelist and a specific running scenario.
  • the step of determining whether the application running by the terminal system meets a preset scenario comprises: determining whether a package name of an application running by the terminal system is in a white list, and if it is in a white list, determining that the The application running on the terminal system conforms to the preset scenario.
  • the step of intervening the current running environment of the terminal includes: when the application running by the terminal system meets the preset scenario, Open a WLAN connection, initiate a data connection to the mobile communication network, and forcefully terminate all running non-system applications.
  • the method for operating the terminal trusted environment further includes determining the current terminal system. Whether the running application conforms to the preset scenario, if the preset scenario is not met, the mobile network data network connection is disconnected, and the disconnected WLAN connection is connected.
  • the application further provides a computer readable storage medium storing computer executable instructions that are implemented when the computer executable instructions are executed.
  • a terminal trusted environment running apparatus including:
  • the application monitoring module is configured to perform real-time monitoring on the application running on the terminal system
  • the scenario determining module is configured to determine whether the application running by the terminal system conforms to the preset scenario
  • the environment intervention module is configured to intervene in the current running environment of the terminal when the application running by the terminal system meets the preset scenario, so as to ensure that the terminal is in a trusted operating environment when receiving key information input by the user.
  • the preset scenario is preset by the system and/or preset by the user, and includes at least one of the following:
  • the apparatus further includes a whitelist setting module configured to preset a specific application type and a specific running scenario in the whitelist.
  • the scenario determining module is configured to: determine whether the package name of the application running by the terminal system is in the whitelist, and if it is in the whitelist, consider that the application running by the terminal system conforms to the preset scenario.
  • the environment intervention module is configured to: when the application running by the terminal system conforms to the preset scenario, disconnect the WLAN connection, initiate a data connection of the mobile communication network, and forcefully terminate all running non-operations. system applications.
  • the device further includes an environment recovery module, where the environment recovery module is configured to determine whether the application currently running by the terminal system meets a preset scenario, and if the preset scenario is not met, disconnect the mobile network data network. And connecting the disconnected WLAN connection.
  • the environment recovery module is configured to determine whether the application currently running by the terminal system meets a preset scenario, and if the preset scenario is not met, disconnect the mobile network data network. And connecting the disconnected WLAN connection.
  • the method for operating the trusted environment of the terminal is used to perform real-time intervention when the user accesses the network through the WLAN, so as to ensure that the key information of the user is not captured by the WLAN provider, and the security of the terminal is improved.
  • FIG. 1 is a flowchart of a method for operating a trusted environment of a terminal according to an embodiment of the present invention
  • FIG. 2 is a flowchart of an optional embodiment of a method for operating a trusted environment of a terminal according to an embodiment of the present invention
  • FIG. 3 is a flowchart of a method for using a whitelist in a method for operating a trusted environment of a terminal according to an embodiment of the present invention
  • FIG. 4 is a flowchart of a method for forcibly ending a non-system application of all running terminal systems in a terminal trusted environment operation method according to an embodiment of the present invention
  • FIG. 5 is a structural diagram of a terminal trusted environment running device according to an embodiment of the present invention.
  • FIG. 1 is a flowchart of a method for operating a trusted environment of a terminal according to an embodiment of the present invention. As shown in FIG. 1, the method includes: Step S102 to Step S106, where
  • S102 Perform real-time monitoring on an application running on the terminal system
  • the step is preset by the terminal system manufacturer, and has system-level authority to perform real-time monitoring on the application running on the terminal system.
  • S104 Determine whether the application running by the terminal system meets a preset scenario.
  • the preset scenario is preset by the system and/or preset by the user, and includes at least one of the following items:
  • the specific running scenario includes an interface when the account password is input, and the like, where a specific application type in the preset scenario is applied when a specific running scenario in the preset scenario is applied.
  • the preset scenario is preset by the user, including: a specific application type and a specific running scenario preset by the user in the whitelist, and the application type and the specific running scenario in the whitelist may be added, deleted, or modified.
  • the terminal can determine whether the application name of the application running in the terminal system is in the white list. If the application is in the white list, the application that the terminal system runs is consistent with the preset scenario.
  • FIG. 3 is a flowchart of a method for using a whitelist in a method for operating a trusted environment of a terminal according to an embodiment of the present invention, as shown in FIG. 3:
  • Step S303 The terminal system reads a whitelist built in the terminal system
  • Step S304 After the built-in whitelist is read, a whitelist queue is generated, and each time the terminal system starts the application, the package name of the application started this time and the package name of the application in the whitelist queue are compared. .
  • the user can add, delete, and modify the application type and running scenario in the whitelist in the whitelist configuration window provided by the system, and update the modified whitelist of the user, and the modified result is reflected in the whitelist queue.
  • the step of intervening the current running environment of the terminal includes: when the application running by the terminal system meets the preset scenario, Open a WLAN connection, initiate a data connection to the mobile communication network, and forcefully terminate all running non-system applications.
  • 4 is a flowchart of a method for forcibly ending a non-system application of all running terminal systems in a method for operating a terminal trusted environment according to an embodiment of the present invention. As shown in FIG. 4, the method includes the following steps:
  • step S402 determining, according to the package name of the application that is started this time, whether the terminal system needs to enter the trusted environment: if it is required to enter the trusted environment, step S403 is performed;
  • step S404 detecting whether the result of the cleaning meets the requirement: if the requirement is met, determining that all running non-system applications have been forcibly terminated; if the requirement is not met, executing step S406;
  • the terminal trusted environment running method further includes: determining whether the application currently running by the terminal system meets a preset scenario, and if the preset scenario is not met, Disconnect the mobile network data network connection and connect the disconnected WLAN connection.
  • FIG. 2 is a flowchart of an optional embodiment of a method for operating a trusted environment of a terminal according to an embodiment of the present invention; as shown in FIG. 2, the embodiment includes the following steps:
  • step S203 determining whether the terminal system needs to enter the trusted environment, if it is determined that the trusted environment needs to be entered, step S204 is performed;
  • S204 Switch the data channel of the terminal from the WLAN to the mobile communication network.
  • step S205 Terminate all terminal system non-system applications, and determine whether to complete the data transmission; if it is determined that the data transmission has been completed, step S207 is performed;
  • step S207 determining whether to exit the trusted environment; if it is necessary to exit the trusted environment, proceed to step S208;
  • the terminal indicates the direction in which the mobile terminal should move according to the location of the base station where the cell with the best signal strength is located, and the direction is the position coordinate from the location coordinate of the mobile terminal to the optimal base station of the signal strength.
  • Embodiments of the present invention further provide a computer readable storage medium storing computer executable instructions that are implemented when the computer executable instructions are executed.
  • FIG. 5 is a structural diagram of a terminal trusted environment running device according to an embodiment of the present invention. As shown in Figure 5, the device includes:
  • the application monitoring module 50 is configured to perform real-time monitoring on an application running on the terminal system
  • the scenario determining module 51 is configured to determine whether the application running by the terminal system meets a preset scenario
  • the scenario determining module 51 determines whether the application running by the terminal system conforms to the preset scenario, where The preset scene is preset by the system and/or preset by the user, and includes at least one of the following:
  • the specific running scenario includes an interface when the account password is input, and the like, where a specific application type in the preset scenario is applied when a specific running scenario in the preset scenario is applied.
  • the device further includes a whitelist setting module, configured to preset the specific application type and the specific running scenario in the whitelist, and add, delete, or modify the whitelist.
  • a whitelist setting module configured to preset the specific application type and the specific running scenario in the whitelist, and add, delete, or modify the whitelist.
  • the scenario judging module 51 determines whether the type of the application running in the terminal system is in the whitelist. If the application running in the terminal system is in the whitelist, the application running on the terminal system is considered to be in the preset scenario.
  • the environment intervention module 52 is configured to intervene in the current operating environment of the terminal to ensure that the terminal is in a trusted operating environment when receiving key information input by the user.
  • the environment intervention module 52 is further configured to: when the application running by the terminal system conforms to the preset scenario, automatically disconnect the WLAN connection, initiate a data connection of the mobile communication network, and forcefully terminate all running non-operations. system applications.
  • the device further includes an environment recovery module, configured to determine whether the application currently running by the terminal system meets a preset scenario, and if the preset scenario is not met, automatically disconnect the mobile network data network connection, and automatically connect the disconnected Wi-Fi connection.
  • an environment recovery module configured to determine whether the application currently running by the terminal system meets a preset scenario, and if the preset scenario is not met, automatically disconnect the mobile network data network connection, and automatically connect the disconnected Wi-Fi connection.
  • each module/unit in the above embodiment may be implemented in the form of hardware, for example, by implementing an integrated circuit to implement its corresponding function, or may be implemented in the form of a software function module, for example, executing a program stored in the memory by a processor. / instruction to achieve its corresponding function.
  • Embodiments of the invention are not limited to any specific form of combination of hardware and software.
  • modules or steps of the present application can be implemented by a general computing device, which can be concentrated on a single computing device, or distributed. Alternatively, on a network of computing devices, they may be implemented by program code executable by the computing device such that they may be stored in the storage device by the computing device and, in some cases, The steps shown or described may be performed in an order different than that herein, or they may be separately fabricated into individual integrated circuit modules, or a plurality of the modules or steps may be implemented as a single integrated circuit module. Thus, the application is not limited to any particular combination of hardware and software.
  • the terminal operates in a trusted environment to perform real-time intervention when the user accesses the network through the WLAN, ensuring that the key information of the user is not captured by the WLAN provider, thereby improving the security of the terminal.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Signal Processing (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

Provided are a trusted environment operating method and device for a terminal, and the trusted environment operating method for a terminal provided by the present application comprises: monitoring an application run by a terminal system in real time; judging whether the application run by the terminal system meets a pre-set scenario; and if the application run by the terminal system meets the pre-set scenario, intervening with the current operating environment of the terminal in order to ensure that the terminal is in a trusted operating environment when receiving key information input by a user.

Description

一种终端可信环境运行方法及装置Method and device for operating terminal trusted environment 技术领域Technical field
本申请涉及但不限于通信领域,尤其是一种终端可信环境运行方法及装置。The present application relates to, but is not limited to, the field of communications, and in particular, to a terminal trusted environment operating method and apparatus.
背景技术Background technique
目前能够通过无线通信技术访问网络的终端,例如手机,正在成为个人的信息中心,承载着越来越多的功能,除了传统的基于电路域的语音业务外,基于数据业务的移动互联网应用已经涉及了生活的各个方面。在移动支付、媒体传输、信息浏览、资源分享等领域,已经改变了人们的传统生活方式。在移动互联网迅猛发展的同时,移动互联网的信息安全也受到威胁。而终端作为移动互联网的入口和节点,其运行环境的安全已经成为业界的焦点。Terminals that are currently able to access the network through wireless communication technologies, such as mobile phones, are becoming personal information centers, carrying more and more functions. In addition to traditional circuit-based voice services, mobile Internet applications based on data services have been involved. Every aspect of life. In the fields of mobile payment, media transmission, information browsing, resource sharing, etc., people's traditional lifestyle has been changed. While the mobile Internet is developing rapidly, the information security of the mobile Internet is also threatened. As the entrance and node of the mobile Internet, the security of the operating environment has become the focus of the industry.
发明内容Summary of the invention
以下是对本文详细描述的主题的概述。本概述并非是为了限制权利要求的保护范围。The following is an overview of the topics detailed in this document. This Summary is not intended to limit the scope of the claims.
本申请提出一种终端可信环境运行方法及装置,在用户通过WLAN访问网络时进行实时干预,确保用户的关键信息不被WLAN的提供方捕获,提高了终端使用的安全性。The present application proposes a method and a device for operating a terminal trusted environment, and performs real-time intervention when a user accesses the network through the WLAN to ensure that key information of the user is not captured by the WLAN provider, thereby improving the security of the terminal.
根据本申请的一个方面,提供了一种终端可信环境运行方法,包括:According to an aspect of the present application, a method for operating a terminal trusted environment is provided, including:
对终端系统运行的应用进行实时监控;Real-time monitoring of applications running on the terminal system;
判断所述终端系统运行的应用是否符合预设场景;Determining whether the application running by the terminal system meets a preset scenario;
当所述终端系统运行的应用符合所述预设场景时,对终端当前运行环境进行干预,以保证接收用户输入的关键信息时,终端处于可信的运行环境中。When the application running by the terminal system conforms to the preset scenario, the terminal currently operates the environment to ensure that the terminal is in a trusted operating environment when receiving key information input by the user.
可选地,所述预设场景为系统默认设置和/或用户预先设置的,包括以下各项至少之一: Optionally, the preset scenario is preset by the system and/or preset by the user, and includes at least one of the following:
特定的应用类型,包括银行相关应用、支付相关应用的包名。Specific application types, including bank-related applications, package name for payment-related applications.
特定的运行场景,包括在输入账户密码时的界面。Specific operating scenarios, including the interface when entering the account password.
可选地,若所述预设场景为用户预先设置的,则所述预设场景包括:用户在白名单内预先设置的特定的应用类型和特定的运行场景。Optionally, if the preset scenario is preset by the user, the preset scenario includes: a specific application type preset by the user in the whitelist and a specific running scenario.
可选地,所述判断所述终端系统运行的应用是否符合预设场景的步骤包括:判断所述终端系统运行的应用的包名是否在白名单内,若在白名单内,则认为所述终端系统运行的应用符合所述预设场景。Optionally, the step of determining whether the application running by the terminal system meets a preset scenario comprises: determining whether a package name of an application running by the terminal system is in a white list, and if it is in a white list, determining that the The application running on the terminal system conforms to the preset scenario.
可选地,所述当所述终端系统运行的应用符合所述预设场景时,对终端当前运行环境进行干预的步骤包括:当所述终端系统运行的应用符合所述预设场景时,断开WLAN连接,启动移动通信网络的数据连接,并且强制结束所有正在运行的非系统应用。Optionally, when the application running by the terminal system meets the preset scenario, the step of intervening the current running environment of the terminal includes: when the application running by the terminal system meets the preset scenario, Open a WLAN connection, initiate a data connection to the mobile communication network, and forcefully terminate all running non-system applications.
可选地,在所述当所述终端系统运行的应用符合所述预设场景时,对终端当前运行环境进行干预的步骤之后,所述终端可信环境运行方法还包括判断当前所述终端系统运行的应用是否符合预设场景,如果不符合预设场景,则断开移动网络数据网络连接,并且连接所述断开的WLAN连接。Optionally, after the step of intervening in the current operating environment of the terminal when the application running by the terminal system meets the preset scenario, the method for operating the terminal trusted environment further includes determining the current terminal system. Whether the running application conforms to the preset scenario, if the preset scenario is not met, the mobile network data network connection is disconnected, and the disconnected WLAN connection is connected.
本申请另外提供一种计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令被执行时实现上述方法。The application further provides a computer readable storage medium storing computer executable instructions that are implemented when the computer executable instructions are executed.
根据本申请的另一方面,还提供了一种终端可信环境运行装置,包括:According to another aspect of the present application, a terminal trusted environment running apparatus is further provided, including:
应用监控模块,设置成对终端系统运行的应用进行实时监控;The application monitoring module is configured to perform real-time monitoring on the application running on the terminal system;
场景判断模块,设置成判断所述终端系统运行的应用是否符合预设场景;The scenario determining module is configured to determine whether the application running by the terminal system conforms to the preset scenario;
环境干预模块,设置成当所述终端系统运行的应用符合所述预设场景时,对终端当前运行环境进行干预,以保证接收用户输入的关键信息时,终端处于可信的运行环境中。The environment intervention module is configured to intervene in the current running environment of the terminal when the application running by the terminal system meets the preset scenario, so as to ensure that the terminal is in a trusted operating environment when receiving key information input by the user.
可选地,其中,所述预设场景为系统默认设置和/或用户预先设置的,包括以下各项至少之一:Optionally, the preset scenario is preset by the system and/or preset by the user, and includes at least one of the following:
特定的应用类型,包括银行相关应用、支付相关应用的包名。Specific application types, including bank-related applications, package name for payment-related applications.
特定的运行场景,包括在输入账户密码时的界面。 Specific operating scenarios, including the interface when entering the account password.
可选地,该装置还包括白名单设置模块,设置成在白名单内预先设置特定的应用类型和特定的运行场景。Optionally, the apparatus further includes a whitelist setting module configured to preset a specific application type and a specific running scenario in the whitelist.
可选地,场景判断模块是设置成包括判断所述终端系统运行的应用的包名是否在白名单内,若在白名单内,则认为所述终端系统运行的应用符合所述预设场景。Optionally, the scenario determining module is configured to: determine whether the package name of the application running by the terminal system is in the whitelist, and if it is in the whitelist, consider that the application running by the terminal system conforms to the preset scenario.
可选地,所述环境干预模块是设置成:当所述终端系统运行的应用符合所述预设场景时,断开WLAN连接,启动移动通信网络的数据连接,并且强制结束所有正在运行的非系统应用。Optionally, the environment intervention module is configured to: when the application running by the terminal system conforms to the preset scenario, disconnect the WLAN connection, initiate a data connection of the mobile communication network, and forcefully terminate all running non-operations. system applications.
可选地,该装置还包括环境恢复模块,所述环境恢复模块设置成判断当前所述终端系统运行的应用是否符合预设场景,如果不符合预设场景,则断开移动网络数据网络连接,并且连接所述断开的WLAN连接。Optionally, the device further includes an environment recovery module, where the environment recovery module is configured to determine whether the application currently running by the terminal system meets a preset scenario, and if the preset scenario is not met, disconnect the mobile network data network. And connecting the disconnected WLAN connection.
通过本发明实施例,采用终端可信环境运行的方法,在用户通过WLAN访问网络时进行实时干预,确保用户的关键信息不被WLAN的提供方捕获,提高了终端使用的安全性。In the embodiment of the present invention, the method for operating the trusted environment of the terminal is used to perform real-time intervention when the user accesses the network through the WLAN, so as to ensure that the key information of the user is not captured by the WLAN provider, and the security of the terminal is improved.
在阅读并理解了附图和详细描述后,可以明白其他方面。Other aspects will be apparent upon reading and understanding the drawings and detailed description.
附图概述BRIEF abstract
此处所说明的附图用来提供对本申请的进一步理解,构成本申请的一部分,本申请的示意性实施例及其说明用于解释本申请,并不构成对本申请的不当限定。在附图中:The drawings described herein are intended to provide a further understanding of the present application, and are intended to be a part of this application. In the drawing:
图1为根据本发明实施例的终端可信环境运行方法的流程图;1 is a flowchart of a method for operating a trusted environment of a terminal according to an embodiment of the present invention;
图2为根据本发明实施例的终端可信环境运行方法的可选实施例的流程图;2 is a flowchart of an optional embodiment of a method for operating a trusted environment of a terminal according to an embodiment of the present invention;
图3为根据本发明实施例的终端可信环境运行方法中使用白名单的方法的流程图;3 is a flowchart of a method for using a whitelist in a method for operating a trusted environment of a terminal according to an embodiment of the present invention;
图4为根据本发明实施例的终端可信环境运行方法中强制结束所有正在运行的终端系统的非系统应用的方法的流程图; 4 is a flowchart of a method for forcibly ending a non-system application of all running terminal systems in a terminal trusted environment operation method according to an embodiment of the present invention;
图5为根据本发明实施例的终端可信环境运行装置结构图。FIG. 5 is a structural diagram of a terminal trusted environment running device according to an embodiment of the present invention.
本发明的较佳实施方式Preferred embodiment of the invention
需要说明的是,在不冲突的情况下,本申请中的实施例及实施例中的特征可以相互组合。下面将参考附图并结合实施例来详细说明本申请。It should be noted that the embodiments in the present application and the features in the embodiments may be combined with each other without conflict. The present application will be described in detail below with reference to the accompanying drawings.
现在,用户在使用终端进行移动支付时,如果通过WLAN访问网络,其支付信息能够被WLAN的提供方捕获,导致其帐户、密码泄露,带来重大的安全风险。针对用户在通过使用WLAN访问网络而购物的过程中进行实时干预,从而确保用户的关键信息不被WLAN的提供方捕获,目前尚未提出有效的解决方案。Now, when a user uses a terminal for mobile payment, if the network is accessed through the WLAN, the payment information can be captured by the WLAN provider, causing the account and password to be leaked, posing a major security risk. Real-time intervention in the process of users shopping by using WLAN to access the network, so as to ensure that the user's key information is not captured by the WLAN provider, no effective solution has been proposed yet.
图1为根据本发明实施例的终端可信环境运行方法的流程图。如图1所示,该方法包括:步骤S102至步骤S106,其中,FIG. 1 is a flowchart of a method for operating a trusted environment of a terminal according to an embodiment of the present invention. As shown in FIG. 1, the method includes: Step S102 to Step S106, where
S102:对终端系统运行的应用进行实时监控;S102: Perform real-time monitoring on an application running on the terminal system;
在本发明实施例中,该步骤由终端系统厂商进行预置,具有系统级权限,对终端系统运行的应用进行实时监控。In the embodiment of the present invention, the step is preset by the terminal system manufacturer, and has system-level authority to perform real-time monitoring on the application running on the terminal system.
S104:判断所述终端系统运行的应用是否符合预设场景;S104: Determine whether the application running by the terminal system meets a preset scenario.
在本发明实施例中,所述预设场景为系统默认设置和/或用户预先设置的,包括以下各项至少之一:In the embodiment of the present invention, the preset scenario is preset by the system and/or preset by the user, and includes at least one of the following items:
特定的应用类型,包括银行相关应用、支付相关应用的包名等;Specific application types, including bank-related applications, package name for payment-related applications, etc.
特定的运行场景,包括在输入账户密码时的界面等;其中,在应用预设场景中的特定的运行场景时,会应用预设场景中的特定的应用类型。The specific running scenario includes an interface when the account password is input, and the like, where a specific application type in the preset scenario is applied when a specific running scenario in the preset scenario is applied.
预设场景为用户预先设置的,包括:用户在白名单内预先设置的特定的应用类型和特定的运行场景,并且白名单中的应用类型和特定的运行场景可以被增加、删除或修改。终端可以判断所述终端系统运行的应用的包名是否在白名单内,若在白名单内,则认为所述终端系统运行的应用符合所述预设场景。The preset scenario is preset by the user, including: a specific application type and a specific running scenario preset by the user in the whitelist, and the application type and the specific running scenario in the whitelist may be added, deleted, or modified. The terminal can determine whether the application name of the application running in the terminal system is in the white list. If the application is in the white list, the application that the terminal system runs is consistent with the preset scenario.
图3为本发明实施例的终端可信环境运行方法中使用白名单的方法的流程图,如图3所示: FIG. 3 is a flowchart of a method for using a whitelist in a method for operating a trusted environment of a terminal according to an embodiment of the present invention, as shown in FIG. 3:
步骤S303:终端系统读取终端系统内置的白名单;Step S303: The terminal system reads a whitelist built in the terminal system;
步骤S304:在读取所述内置的白名单后,生成一个白名单队列,每次终端系统启动应用时,都将本次启动的应用的包名和白名单队列中的应用的包名进行比对。Step S304: After the built-in whitelist is read, a whitelist queue is generated, and each time the terminal system starts the application, the package name of the application started this time and the package name of the application in the whitelist queue are compared. .
需要说明的是,用户可以在系统提供的白名单配置窗口对白名单中的应用类型和运行场景进行增加、删除、修改,更新用户修改后的白名单,将修改结果体现在白名单队列中。It should be noted that the user can add, delete, and modify the application type and running scenario in the whitelist in the whitelist configuration window provided by the system, and update the modified whitelist of the user, and the modified result is reflected in the whitelist queue.
S106:当所述终端系统运行的应用符合所述预设场景时,对终端当前运行环境进行干预,以保证接收用户输入的关键信息时,终端处于可信的运行环境中。S106: When the application running by the terminal system meets the preset scenario, intervene in the current operating environment of the terminal to ensure that the terminal is in a trusted operating environment when receiving key information input by the user.
可选地,所述当所述终端系统运行的应用符合所述预设场景时,对终端当前运行环境进行干预的步骤包括:当所述终端系统运行的应用符合所述预设场景时,断开WLAN连接,启动移动通信网络的数据连接,并且强制结束所有正在运行的非系统应用。图4为本发明实施例的终端可信环境运行方法中强制结束所有正在运行的终端系统的非系统应用的方法的流程图,如图4所示,该方法包括以下步骤:Optionally, when the application running by the terminal system meets the preset scenario, the step of intervening the current running environment of the terminal includes: when the application running by the terminal system meets the preset scenario, Open a WLAN connection, initiate a data connection to the mobile communication network, and forcefully terminate all running non-system applications. 4 is a flowchart of a method for forcibly ending a non-system application of all running terminal systems in a method for operating a terminal trusted environment according to an embodiment of the present invention. As shown in FIG. 4, the method includes the following steps:
S402:根据本次启动的应用的包名,判定终端系统是否需要进入可信环境:如果需要进入可信环境,则执行步骤S403;S402: determining, according to the package name of the application that is started this time, whether the terminal system needs to enter the trusted environment: if it is required to enter the trusted environment, step S403 is performed;
S403:结束终端系统所有非系统应用;S403: End all non-system applications of the terminal system;
S404:检测清理的结果是否达到要求:如果达到要求,则确定已强制结束所有正在运行的非系统应用;如果没有达到要求,则执行步骤S406;S404: detecting whether the result of the cleaning meets the requirement: if the requirement is met, determining that all running non-system applications have been forcibly terminated; if the requirement is not met, executing step S406;
S406:在提升终端系统应用结束的策略等级后,结束终端系统的非系统应用,并返回步骤S404。S406: After the policy level of the terminal system application end is raised, the non-system application of the terminal system is ended, and the process returns to step S404.
可选地,在步骤S106之后,所述终端可信环境运行方法还包括:判断当前所述终端系统运行的应用是否符合预设场景,如果不符合预设场景,则 断开移动网络数据网络连接,并且连接所述断开的WLAN连接。Optionally, after the step S106, the terminal trusted environment running method further includes: determining whether the application currently running by the terminal system meets a preset scenario, and if the preset scenario is not met, Disconnect the mobile network data network connection and connect the disconnected WLAN connection.
图2为根据本发明实施例的终端可信环境运行方法的可选实施例的流程图;如图2所示,该实施例包括如下步骤:FIG. 2 is a flowchart of an optional embodiment of a method for operating a trusted environment of a terminal according to an embodiment of the present invention; as shown in FIG. 2, the embodiment includes the following steps:
S203:判定所述终端系统是否需要进入可信环境,若判定需要进入可信环境,则执行步骤S204;S203: determining whether the terminal system needs to enter the trusted environment, if it is determined that the trusted environment needs to be entered, step S204 is performed;
S204:将终端的数据通道从WLAN切换到移动通信网络;S204: Switch the data channel of the terminal from the WLAN to the mobile communication network.
S205:终结所有的终端系统非系统应用,并判定是否完成数据传输;若判定已完成数据传输,则执行步骤S207;S205: Terminate all terminal system non-system applications, and determine whether to complete the data transmission; if it is determined that the data transmission has been completed, step S207 is performed;
S207:判定是否要退出可信环境;若需要退出可信环境,则执行步骤S208;S207: determining whether to exit the trusted environment; if it is necessary to exit the trusted environment, proceed to step S208;
S208:在终端退出可信环境之后,使终端重新通过WLAN访问网络。S208: After the terminal exits the trusted environment, enable the terminal to re-access the network through the WLAN.
此外,终端根据所述信号强度最佳的小区所在的基站位置,指示出移动终端应该移动的方向,该方向就是从移动终端的位置坐标指向信号强度最佳基站的位置坐标。In addition, the terminal indicates the direction in which the mobile terminal should move according to the location of the base station where the cell with the best signal strength is located, and the direction is the position coordinate from the location coordinate of the mobile terminal to the optimal base station of the signal strength.
本发明实施例另外提供一种计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令被执行时实现上述方法。Embodiments of the present invention further provide a computer readable storage medium storing computer executable instructions that are implemented when the computer executable instructions are executed.
在本实施例中还提供了终端可信环境运行装置结构图,用于实现上述实施例及可选实施方式,已经进行过说明的不再赘述,下面对该系统中涉及到的模块进行说明。如以下所使用的,术语“模块”可以实现预定功能的软件和/或硬件的组合。尽管以下实施例所描述的装置较佳地以软件来实现,但是硬件,或者软件和硬件的组合的实现也是可能并被构想的。图5为根据本发明实施例的终端可信环境运行装置结构图。如图5所示,该装置包括:In this embodiment, a structural diagram of the terminal trusted environment running device is also provided, which is used to implement the foregoing embodiment and the optional implementation manner. The descriptions of the modules involved in the system are omitted. . As used below, the term "module" may implement a combination of software and/or hardware of a predetermined function. Although the apparatus described in the following embodiments is preferably implemented in software, hardware, or a combination of software and hardware, is also possible and contemplated. FIG. 5 is a structural diagram of a terminal trusted environment running device according to an embodiment of the present invention. As shown in Figure 5, the device includes:
应用监控模块50,设置成对终端系统运行的应用进行实时监控;The application monitoring module 50 is configured to perform real-time monitoring on an application running on the terminal system;
场景判断模块51,设置成判断所述终端系统运行的应用是否符合预设场景;The scenario determining module 51 is configured to determine whether the application running by the terminal system meets a preset scenario;
所述场景判断模块51判断终端系统运行的应用是否符合预设场景,其中 所述预设场景为系统默认设置和/或用户预先设置的,包括以下至少之一:The scenario determining module 51 determines whether the application running by the terminal system conforms to the preset scenario, where The preset scene is preset by the system and/or preset by the user, and includes at least one of the following:
特定的应用类型,包括银行相关应用、支付相关应用的包名等。Specific application types, including bank-related applications, package name for payment-related applications, and more.
特定的运行场景,包括在输入账户密码时的界面等;其中,在应用预设场景中的特定的运行场景时,会应用预设场景中的特定的应用类型。The specific running scenario includes an interface when the account password is input, and the like, where a specific application type in the preset scenario is applied when a specific running scenario in the preset scenario is applied.
该装置还包括白名单设置模块,设置成用户在白名单内预先设置所述特定的应用类型和特定的运行场景,并且可以对白名单进行增加、删除或修改。The device further includes a whitelist setting module, configured to preset the specific application type and the specific running scenario in the whitelist, and add, delete, or modify the whitelist.
场景判断模块51判断所述终端系统运行的应用的类型是否在白名单内,若所述终端系统运行的应用在白名单内,则认为所述终端系统运行的应用符合所述预设场景。The scenario judging module 51 determines whether the type of the application running in the terminal system is in the whitelist. If the application running in the terminal system is in the whitelist, the application running on the terminal system is considered to be in the preset scenario.
环境干预模块52,设置成对终端当前运行环境进行干预,以保证在接收用户输入的关键信息时,终端处于可信的运行环境中。The environment intervention module 52 is configured to intervene in the current operating environment of the terminal to ensure that the terminal is in a trusted operating environment when receiving key information input by the user.
可选地,环境干预模块52还设置成:当所述终端系统运行的应用符合所述预设场景时,自动断开WLAN连接,启动移动通信网络的数据连接,并且强制结束所有正在运行的非系统应用。Optionally, the environment intervention module 52 is further configured to: when the application running by the terminal system conforms to the preset scenario, automatically disconnect the WLAN connection, initiate a data connection of the mobile communication network, and forcefully terminate all running non-operations. system applications.
该装置还包括环境恢复模块,设置成判断当前所述终端系统运行的应用是否符合预设场景,如果不符合预设场景,则自动断开移动网络数据网络连接,并且自动连接所述断开的WLAN连接。The device further includes an environment recovery module, configured to determine whether the application currently running by the terminal system meets a preset scenario, and if the preset scenario is not met, automatically disconnect the mobile network data network connection, and automatically connect the disconnected Wi-Fi connection.
本领域普通技术人员可以理解上述方法中的全部或部分步骤可通过程序来指令相关硬件(例如处理器)完成,所述程序可以存储于计算机可读存储介质中,如只读存储器、磁盘或光盘等。可选地,上述实施例的全部或部分步骤也可以使用一个或多个集成电路来实现。相应地,上述实施例中的各模块/单元可以采用硬件的形式实现,例如通过集成电路来实现其相应功能,也可以采用软件功能模块的形式实现,例如通过处理器执行存储于存储器中的程序/指令来实现其相应功能。本发明实施例不限制于任何特定形式的硬件和软件的结合。One of ordinary skill in the art will appreciate that all or a portion of the above steps may be performed by a program to instruct related hardware, such as a processor, which may be stored in a computer readable storage medium, such as a read only memory, disk or optical disk. Wait. Alternatively, all or part of the steps of the above embodiments may also be implemented using one or more integrated circuits. Correspondingly, each module/unit in the above embodiment may be implemented in the form of hardware, for example, by implementing an integrated circuit to implement its corresponding function, or may be implemented in the form of a software function module, for example, executing a program stored in the memory by a processor. / instruction to achieve its corresponding function. Embodiments of the invention are not limited to any specific form of combination of hardware and software.
显然,本领域的技术人员应该明白,上述的本申请的各模块或各步骤可以用通用的计算装置来实现,它们可以集中在单个的计算装置上,或者分布 在多个计算装置所组成的网络上,可选地,它们可以用计算装置可执行的程序代码来实现,从而,可以将它们存储在存储装置中由计算装置来执行,并且在某些情况下,可以以不同于此处的顺序执行所示出或描述的步骤,或者将它们分别制作成各个集成电路模块,或者将它们中的多个模块或步骤制作成单个集成电路模块来实现。这样,本申请不限制于任何特定的硬件和软件结合。Obviously, those skilled in the art should understand that the above modules or steps of the present application can be implemented by a general computing device, which can be concentrated on a single computing device, or distributed. Alternatively, on a network of computing devices, they may be implemented by program code executable by the computing device such that they may be stored in the storage device by the computing device and, in some cases, The steps shown or described may be performed in an order different than that herein, or they may be separately fabricated into individual integrated circuit modules, or a plurality of the modules or steps may be implemented as a single integrated circuit module. Thus, the application is not limited to any particular combination of hardware and software.
以上仅为本申请的可选实施例而已,并不用于限制本申请,对于本领域的技术人员来说,本申请可以有各种更改和变化。凡在本申请的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本申请的保护范围之内。The above is only an alternative embodiment of the present application, and is not intended to limit the application, and various changes and modifications may be made to the present application. Any modifications, equivalent substitutions, improvements, etc. made within the spirit and principles of this application are intended to be included within the scope of the present application.
工业实用性Industrial applicability
采用终端可信环境运行的方法,在用户通过WLAN访问网络时进行实时干预,确保用户的关键信息不被WLAN的提供方捕获,提高了终端使用的安全性。 The terminal operates in a trusted environment to perform real-time intervention when the user accesses the network through the WLAN, ensuring that the key information of the user is not captured by the WLAN provider, thereby improving the security of the terminal.

Claims (12)

  1. 一种终端可信环境运行方法,包括:A method for operating a terminal trusted environment, comprising:
    对终端系统运行的应用进行实时监控;Real-time monitoring of applications running on the terminal system;
    判断所述终端系统运行的应用是否符合预设场景;Determining whether the application running by the terminal system meets a preset scenario;
    当所述终端系统运行的应用符合所述预设场景时,对终端当前运行环境进行干预,以保证接收用户输入的关键信息时,终端处于可信的运行环境中。When the application running by the terminal system conforms to the preset scenario, the terminal currently operates the environment to ensure that the terminal is in a trusted operating environment when receiving key information input by the user.
  2. 根据权利要求1所述的终端可信环境运行方法,其中,所述预设场景为系统默认设置和/或用户预先设置的,包括以下各项至少之一:The method for operating a trusted environment of a terminal according to claim 1, wherein the preset scenario is preset by a system and/or preset by a user, and includes at least one of the following:
    特定的应用类型,包括银行相关应用、支付相关应用的包名;Specific application types, including bank-related applications, package name for payment-related applications;
    特定的运行场景,包括在输入账号密码时的界面。Specific operating scenarios, including the interface when entering an account password.
  3. 根据权利要求2所述的终端可信环境运行方法,其中,若所述预设场景为用户预先设置的,则所述预设场景包括:用户在白名单内预先设置的特定的应用类型和特定的运行场景。The method for operating a trusted environment of a terminal according to claim 2, wherein, if the preset scenario is preset by a user, the preset scenario includes: a specific application type and a specific preset by the user in the whitelist. Running scenario.
  4. 根据权利要求3所述的终端可信环境运行方法,其中,所述判断所述终端系统运行的应用是否符合预设场景的步骤包括:判断所述终端系统运行的应用的包名是否在白名单内,若在白名单内,则认为所述终端系统运行的应用符合所述预设场景。The method for operating a terminal trusted environment according to claim 3, wherein the step of determining whether the application running by the terminal system conforms to a preset scenario comprises: determining whether a package name of an application running by the terminal system is in a white list If the application is in the whitelist, the application running on the terminal system is considered to be in the preset scenario.
  5. 根据权利要求1所述的终端可信环境运行方法,其中,所述当所述终端系统运行的应用符合所述预设场景时,对终端当前运行环境进行干预的步骤包括:当所述终端系统运行的应用符合所述预设场景时,断开WLAN连接,启动移动通信网络的数据连接,并且强制结束所有正在运行的非系统应用。The method for operating a terminal trusted environment according to claim 1, wherein when the application running by the terminal system conforms to the preset scenario, the step of intervening the current operating environment of the terminal includes: when the terminal system When the running application conforms to the preset scenario, the WLAN connection is disconnected, the data connection of the mobile communication network is started, and all running non-system applications are forcibly terminated.
  6. 根据权利要求5所述的终端可信环境运行方法,在所述当所述终端系 统运行的应用符合所述预设场景时,对终端当前运行环境进行干预的步骤之后,所述终端可信环境运行方法还包括:判断当前所述终端系统运行的应用是否符合预设场景,如果不符合预设场景,则断开移动网络数据网络连接,并且连接所述断开的WLAN连接。The method for operating a terminal trusted environment according to claim 5, wherein said terminal system is After the step of performing the intervention on the current running environment of the terminal, the method for operating the trusted environment of the terminal further includes: determining whether the application running by the terminal system meets the preset scenario, if If the preset scenario is not met, the mobile network data network connection is disconnected and the disconnected WLAN connection is connected.
  7. 一种终端可信环境运行装置,包括:A terminal trusted environment running device includes:
    应用监控模块,设置成对终端系统运行的应用进行实时监控;The application monitoring module is configured to perform real-time monitoring on the application running on the terminal system;
    场景判断模块,设置成判断所述终端系统运行的应用是否符合预设场景;The scenario determining module is configured to determine whether the application running by the terminal system conforms to the preset scenario;
    环境干预模块,设置成当所述终端系统运行的应用符合所述预设场景时,对终端当前运行环境进行干预,以保证接收用户输入的关键信息时,终端处于可信的运行环境中。The environment intervention module is configured to intervene in the current running environment of the terminal when the application running by the terminal system meets the preset scenario, so as to ensure that the terminal is in a trusted operating environment when receiving key information input by the user.
  8. 根据权利要求7所述的终端可信环境运行装置,其中,所述预设场景为系统默认设置和/或用户预先设置的,包括以下各项至少之一:The terminal trusted environment running device according to claim 7, wherein the preset scenario is a system default setting and/or a user preset, and includes at least one of the following:
    特定的应用类型,包括银行相关应用、支付相关应用的包名;Specific application types, including bank-related applications, package name for payment-related applications;
    特定的运行场景,包括在输入账号密码时的界面。Specific operating scenarios, including the interface when entering an account password.
  9. 根据权利要求8所述的终端可信环境运行装置,还包括白名单设置模块,设置成在白名单内预先设置特定的应用类型和特定的运行场景。The terminal trusted environment running apparatus according to claim 8, further comprising a whitelist setting module configured to preset a specific application type and a specific running scenario in the whitelist.
  10. 根据权利要求9所述的终端可信环境运行装置,其中,场景判断模块是设置成包括判断所述终端系统运行的应用的包名是否在白名单内,若在白名单内,则认为所述终端系统运行的应用符合所述预设场景。The terminal trusted environment running device according to claim 9, wherein the scenario determining module is configured to include determining whether a package name of the application running by the terminal system is in a white list, and if in the white list, The application running on the terminal system conforms to the preset scenario.
  11. 根据权利要求7所述的终端可信环境运行装置,其中,所述环境干预模块是设置成:当所述终端系统运行的应用符合所述预设场景时,断开WLAN连接,启动移动通信网络的数据连接,并且强制结束所有正在运行的 非系统应用。The terminal trusted environment running device according to claim 7, wherein the environment intervention module is configured to: when the application running by the terminal system conforms to the preset scenario, disconnect the WLAN connection and start the mobile communication network. Data connection and forcefully end all running Non-system applications.
  12. 根据权利要求11所述的终端可信环境运行装置,还包括环境恢复模块,所述环境恢复模块设置成判断当前所述终端系统运行的应用是否符合预设场景,如果不符合预设场景,则断开移动网络数据网络连接,并且连接所述断开的WLAN连接。 The terminal trusted environment running device according to claim 11, further comprising an environment recovery module, wherein the environment recovery module is configured to determine whether the application currently running by the terminal system conforms to a preset scenario, and if the preset scenario is not met, Disconnect the mobile network data network connection and connect the disconnected WLAN connection.
PCT/CN2016/080392 2015-10-21 2016-04-27 Trusted environment operating method and device for terminal WO2016165674A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510690352.9A CN106612504A (en) 2015-10-21 2015-10-21 Method and device for running terminal in trusted environment
CN201510690352.9 2015-10-21

Publications (1)

Publication Number Publication Date
WO2016165674A1 true WO2016165674A1 (en) 2016-10-20

Family

ID=57127156

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/080392 WO2016165674A1 (en) 2015-10-21 2016-04-27 Trusted environment operating method and device for terminal

Country Status (2)

Country Link
CN (1) CN106612504A (en)
WO (1) WO2016165674A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115361470A (en) * 2022-08-26 2022-11-18 中国银行股份有限公司 Method and device for limiting mobile terminal APP operation network environment

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107621977B (en) * 2017-09-28 2021-06-18 努比亚技术有限公司 Application control method, terminal and computer readable storage medium
CN112416380B (en) * 2019-08-21 2024-03-29 成都鼎桥通信技术有限公司 Method and device for killing and freezing prevention by application

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100185953A1 (en) * 2009-01-19 2010-07-22 Compagnie Industrielle Et Financiere D'ingenierie Ingenico Method for securing an interface between a user and an application, corresponding system, terminal and computer program product
CN103595731A (en) * 2013-11-29 2014-02-19 北京网秦天下科技有限公司 System and method for protecting account security
CN104021339A (en) * 2014-06-10 2014-09-03 北京奇虎科技有限公司 Safety payment method and device for mobile terminal
CN104267994A (en) * 2014-09-30 2015-01-07 北京奇虎科技有限公司 Application running device and terminal device

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104463569A (en) * 2014-11-11 2015-03-25 北京奇虎科技有限公司 Secure connection payment method and device
CN104902479B (en) * 2015-05-20 2019-03-15 玉环看知信息科技有限公司 A kind of network security management equipment, method and mobile terminal
CN104821992B (en) * 2015-05-25 2018-01-19 广东欧珀移动通信有限公司 A kind of method and device of mobile phone automatically switching network connection type
CN104869565A (en) * 2015-05-28 2015-08-26 魅族科技(中国)有限公司 Communication information access method and terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100185953A1 (en) * 2009-01-19 2010-07-22 Compagnie Industrielle Et Financiere D'ingenierie Ingenico Method for securing an interface between a user and an application, corresponding system, terminal and computer program product
CN103595731A (en) * 2013-11-29 2014-02-19 北京网秦天下科技有限公司 System and method for protecting account security
CN104021339A (en) * 2014-06-10 2014-09-03 北京奇虎科技有限公司 Safety payment method and device for mobile terminal
CN104267994A (en) * 2014-09-30 2015-01-07 北京奇虎科技有限公司 Application running device and terminal device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115361470A (en) * 2022-08-26 2022-11-18 中国银行股份有限公司 Method and device for limiting mobile terminal APP operation network environment
CN115361470B (en) * 2022-08-26 2024-02-27 中国银行股份有限公司 Method and device for limiting mobile terminal APP operation network environment

Also Published As

Publication number Publication date
CN106612504A (en) 2017-05-03

Similar Documents

Publication Publication Date Title
US20220312166A1 (en) Network Access Method, Device, and System
TWI587674B (en) Methods and apparatus to support globalplatform usage on an embedded uicc
RU2622876C2 (en) Method, device and electronic device for connection control
RU2651800C1 (en) Method and device connection status checking
CN107784221B (en) Authority control method, service providing method, device and system and electronic equipment
WO2020007158A1 (en) Network access method and apparatus
EP3644636B1 (en) Secure access method, device and system
EP2974512A1 (en) Tethering of mobile wireless devices
CN105635084A (en) Apparatus and method for authenticating terminal
EP3163834B1 (en) Method and device for equipment control
JP2010068015A (en) Communication method, communication device, cell-phone terminal, and communication system
KR20190069574A (en) Wireless network type detection method and apparatus, and electronic device
WO2016150191A1 (en) Data sharing method and device
WO2019047708A1 (en) Resource configuration method and related product
WO2016165674A1 (en) Trusted environment operating method and device for terminal
CN104410969A (en) Wireless fidelity (WIFI) hotspot hiding method and terminal equipment
CN108541000B (en) Method, medium and device for detecting network connection
WO2017088294A1 (en) Method and device for establishing wireless connection
WO2017148337A1 (en) Methods of providing and acquiring terminal service, device, and terminal
CN114025412A (en) Service access method, system, device and storage medium
JP6301446B2 (en) Method and apparatus for providing an interface between a UICC and a processor in an access terminal that supports asynchronous command processing by UICC
KR20130123149A (en) Method for data network access authentication and an electronic device thereof
WO2022037619A1 (en) Method and apparatus for processing authentication failure, terminal and network side device
US11218491B2 (en) Security de-escalation for data access
EP3545703B1 (en) Method, apparatus, and system for controlling access to a local network

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16779649

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16779649

Country of ref document: EP

Kind code of ref document: A1