WO2016184136A1 - 一种保障终端安全的方法和装置 - Google Patents

一种保障终端安全的方法和装置 Download PDF

Info

Publication number
WO2016184136A1
WO2016184136A1 PCT/CN2016/070483 CN2016070483W WO2016184136A1 WO 2016184136 A1 WO2016184136 A1 WO 2016184136A1 CN 2016070483 W CN2016070483 W CN 2016070483W WO 2016184136 A1 WO2016184136 A1 WO 2016184136A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
security
area
control
securing
Prior art date
Application number
PCT/CN2016/070483
Other languages
English (en)
French (fr)
Inventor
王建修
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2016184136A1 publication Critical patent/WO2016184136A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • H04W12/37Managing security policies for mobile devices or for controlling mobile applications
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/101Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
    • G06F21/1013Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities to locations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment

Definitions

  • This paper deals with the technical field of securing terminals, and in particular relates to a method and device for securing terminals.
  • smartphones are already integrated into our work life. Since the mobile phone contains a large amount of user privacy information, the user generally protects the information or software related to personal privacy with a password.
  • the technical problem to be solved by the present invention is to provide a method and device for securing a terminal, which can automatically adjust the security control of the terminal when the terminal is in different areas.
  • a method for securing a terminal comprising:
  • the security control of the terminal is adjusted according to the change of security of the area where the terminal is located.
  • the method further includes:
  • the method further includes:
  • the security control object on the terminal and the access control policy corresponding to the security control object are preset.
  • the step of determining, according to the positioning result, whether the area where the terminal is located is:
  • the step of adjusting the security control of the terminal according to the change of the security of the area where the terminal is located includes:
  • the terminal is security controlled
  • the step of pre-setting the security zone includes:
  • preset security zone reference point is: one or more familiar locations pre-calibrated on the electronic map;
  • the parameter indicating the range of the area is: a radius of a circular area centered on the reference point of the safety area.
  • the security control object includes at least one of the following information: user sensitive data, an application related to user privacy, and system control authority of the terminal;
  • the type of the access control policy includes at least one of the following control policies: anti-tracking control, anti-consumption flow control, anti-leak control, and anti-absorption control.
  • the step of performing security control on the terminal includes: controlling access to the security control object on the terminal according to an access control policy corresponding to the preset security control object system;
  • the step of releasing the security control of the terminal before the disarming comprises: releasing the security control previously performed on the security control object on the terminal according to the access control policy.
  • a device for securing a terminal comprising a positioning module, a security determination module and a security control module, wherein:
  • the positioning module is configured to: position the terminal;
  • the security determination module is configured to: determine, according to the positioning result, security of an area where the terminal is located;
  • the security control module is configured to adjust security control of the terminal according to a change in security of an area in which the terminal is located.
  • the device further includes a setting module, wherein
  • the setting module is configured to: preset a security area.
  • the setting module is further configured to: preset a security control object on the terminal, and an access control policy corresponding to the security control object.
  • the security determination module is configured to determine, according to the positioning result, whether the area where the terminal is located is safe according to the following manner:
  • the security control module is configured to adjust security control of the terminal according to a change in security of the area where the terminal is located as follows:
  • the terminal is security controlled
  • the setting module is configured to preset a security area as follows:
  • preset security zone reference point is: one or more familiar locations pre-calibrated on the electronic map;
  • the parameter indicating the range of the area is: a radius of a circular area centered on the reference point of the safety area.
  • the security control object includes at least one of the following information: user sensitive data, an application related to user privacy, and system control authority of the terminal;
  • the type of the access control policy includes at least one of the following control policies: anti-tracking control, anti-consumption flow control, anti-leak control, and anti-absorption control.
  • the security control module is configured to perform security control on the terminal according to the following manner: controlling access to the security control object on the terminal according to an access control policy corresponding to the preset security control object;
  • the security control module is configured to release the previous security control of the terminal in the following manner: releasing the security control before the security control object on the terminal according to the access control policy.
  • the technical solution of the present invention provides a method and device for securing a terminal.
  • the security control of the terminal is automatically enhanced when the terminal is in a strange location, thereby effectively protecting the user. Privacy, and when the terminal returns to a familiar place, the security control is automatically released, thereby ensuring the terminal's ease of use in the familiar environment.
  • FIG. 1 is a flowchart of a method for securing a terminal according to an embodiment of the present invention.
  • FIG. 2 is a schematic structural diagram of an apparatus for securing a terminal according to an embodiment of the present invention.
  • an embodiment of the present invention provides a method for securing a terminal, where the method includes:
  • S20 Determine, according to the positioning result, the security of the area where the terminal is located;
  • S30 Adjust security control of the terminal according to a change in security of the area where the terminal is located.
  • the method may also include the following features:
  • the method further includes: setting a security area in advance.
  • the steps of presetting the security zone include:
  • the preset security area reference point may be: one or more familiar places pre-calibrated on the electronic map;
  • the parameter indicating the area range may be: a radius r of a circular area centered on the reference point of the safety area;
  • the parameters indicating the range of the area corresponding to different security area reference points may be the same or different;
  • the user may set “home” and “office” as safety area reference points respectively, but the safety radius corresponding to “home” and “office” may be set to be the same or different;
  • the setting of the security zone may be performed according to the user's instruction, or may be performed in other manners, and details are not described herein again.
  • the security area is determined according to the security area reference point preset by the user and the parameter indicating the area range.
  • the security area reference point preset by the user may be: one of the users pre-calibrated on the electronic map or Multiple familiar locations.
  • the step of locating the terminal includes: fixing the terminal by using at least one of the following positioning modes: WIFI positioning, base station positioning, and GPS (Global Positioning System) positioning;
  • the method further includes: pre-setting a security control object on the terminal, and an access control policy corresponding to the security control object;
  • the security control object includes at least one of the following information: user sensitive data, an application related to user privacy, and system control authority of the terminal;
  • user sensitive data such as: text messages, pictures, videos, contacts, documents;
  • applications involving user privacy such as: financial applications, payment applications, securities applications, and social applications;
  • the type of the access control policy includes at least one of the following control policies: anti-tracking control, anti-consumption flow control, anti-leakage control, and anti-absorption control;
  • the anti-tracking control refers to: prohibiting the application from obtaining the terminal location information, photographing/camera, etc.; for example, the security of the application can be controlled by the security software (or through the framework function of the android system). (open or forbidden).
  • the anti-consumption flow control refers to: prohibiting the application from obtaining access to the Internet (using traffic), switching data network connection, switching WLAN (Wireless Local Area Networks), switching Bluetooth devices, etc.; for example, it can pass the security class.
  • the software or through the framework function of the android system) controls (opens or disables) such permissions of the application.
  • the anti-leakage control means prohibiting the application from obtaining the read SMS/MMS, writing/deleting the SMS/MMS record, reading the contact record, writing/deleting the contact record, reading the call record, writing/deleting the call record, For recording, obtaining mobile phone identification information, accessing calendar information, etc.; for example, such permissions of the application can be controlled (opened or disabled) through security software (or through the framework function of the Android system).
  • the anti-absorption fee control means that the application is prohibited from obtaining the right to make a call, send a text message, and send a multimedia message; for example, the security of the application can be controlled by the security software (or through the framework function of the Android system). (open or forbidden).
  • the step of determining whether the area where the terminal is located according to the positioning result includes:
  • the terminal is in the preset security area according to the positioning result, it is determined that the area where the terminal is located is safe; if it is determined that the terminal is not in the preset security area according to the positioning result, it is determined that the area where the terminal is located is not secure;
  • the step of adjusting the security control of the terminal according to the security change of the area where the terminal is located includes:
  • the terminal If it is detected that the terminal enters the non-secure area from the security area, the terminal is security-controlled; if the terminal is detected to enter the security area from the non-secure area, the security control of the terminal is released;
  • the steps of performing security control on the terminal include:
  • the step of releasing the previous security control on the terminal includes:
  • the rights management module (security software) of the Android framework puts The corresponding permissions of the application are prohibited to enhance security controls, prevent such software from reading the user's sensitive data, etc., and protect the user's terminal, privacy and property security.
  • the security control is released, that is, the rights management module (security software) of the Android framework reopens the above-mentioned prohibited permission of such an application.
  • an embodiment of the present invention provides an apparatus for securing a terminal, including:
  • the positioning module 201 is configured to: locate the terminal;
  • the security determining module 202 is configured to: determine, according to the positioning result, the security of the area where the terminal is located;
  • the security control module 203 is configured to adjust security control of the terminal according to changes in security of the area in which the terminal is located.
  • the device may also include the following features:
  • the device further comprises a setting module
  • the setting module is configured to: preset a security area
  • the setting module is configured to preset a security area as follows:
  • the security area is determined according to the security area reference point and the parameter indicating the area range;
  • the security area reference point may be: one or more familiar locations pre-calibrated on the electronic map;
  • the parameter indicating the area range may be: a radius r of a circular area centered on the reference point of the safety area;
  • the setting of the security zone may be performed according to the user's instruction, or may be performed in other manners, and details are not described herein again.
  • the security area is determined according to the security area reference point preset by the user and the parameter indicating the area range.
  • the security area reference point preset by the user may be: one of the users pre-calibrated on the electronic map or Multiple familiar locations.
  • the positioning module is configured to locate the terminal according to the following manner: the terminal is fixed by at least one of the following positioning modes: WIFI positioning, base station positioning, and global positioning system GPS positioning;
  • the setting module is further configured to: preset a security control object on the terminal and an access control policy corresponding to the security control object;
  • the setting module is further configured to: preset the security control object on the terminal and the access control policy corresponding to the security control object according to the user indication.
  • the security control object includes at least one of the following: user sensitive data, an application related to user privacy, and system control authority of the terminal;
  • user sensitive data such as: text messages, pictures, videos, contacts, documents;
  • applications involving user privacy such as: financial applications, payment applications, securities applications, and social applications;
  • the type of the access control policy includes at least one of the following: anti-tracking control, anti-consumption flow control, anti-leakage control, and anti-absorption control;
  • the security determination module is configured to determine, according to the positioning result, whether the area where the terminal is located is safe according to the following manner:
  • the terminal is in the preset security area according to the positioning result, it is determined that the area where the terminal is located is safe; if it is determined that the terminal is not in the preset security area according to the positioning result, it is determined that the area where the terminal is located is not secure;
  • the security control module is configured to adjust the security control of the terminal according to the change of the security of the area where the terminal is located as follows:
  • the terminal If it is detected that the terminal enters the non-secure area from the security area, the terminal is security-controlled; if the terminal is detected to enter the security area from the non-secure area, the security control of the terminal is released;
  • the security control module is configured to perform security control on the terminal as follows:
  • the security control module is configured to release the previous security control of the terminal as follows:
  • the embodiment of the invention further discloses a computer program, comprising program instructions, which when executed by a computer, enable the computer to perform any of the above methods for securing the terminal.
  • the embodiment of the invention also discloses a carrier carrying the computer program.
  • the method and device for securing a terminal provided by the foregoing embodiment, by placing the terminal
  • the decision is made to automatically strengthen the security control of the terminal when the terminal is in a strange location, thereby effectively protecting the privacy of the user, and automatically releasing the enhanced security control when the terminal returns to the familiar place, thereby ensuring that the terminal is in the familiar environment. Ease of use.
  • the method and device for securing a terminal provided by the technical solution of the present invention automatically determine the security control of the terminal when the terminal is in a strange location by determining the location of the terminal, thereby effectively protecting the privacy of the user, and When it comes to a familiar place, the enhanced security control is automatically removed, thus ensuring the terminal's ease of use in the familiar environment. Therefore, the present invention has strong industrial applicability.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

一种保障终端安全的方法和装置,该方法包括:对终端进行定位(S10);根据定位结果判定终端所处区域的安全性(S20);根据终端所处区域的安全性的变化调整对终端的安全控制(S30)。该方法和装置能够在终端处于不同区域时自动调整对终端的安全控制。

Description

一种保障终端安全的方法和装置 技术领域
本文涉及保障终端安全的技术领域,尤其涉及的是一种保障终端安全的方法和装置。
背景技术
现在,智能手机已经融入了我们的工作生活之中。由于手机上包含了大量用户隐私信息,因此,用户一般会对涉及个人隐私的信息或软件采用密码进行保护。
但是,实际上用户在不同环境中时,手机面临的安全性风险是不同的。比如,用户在家里时,其实不用担心个人信息泄露或手机丢失,如果在这种安全的环境中访问自己的隐私信息还需要输入密码,就显得非常不方便。另一方面,如果用户来到一个陌生的环境中,则对手机上各种数据或软件的访问安全性的要求会增高。
因此,如何既能保证手机上用户隐私信息的安全性,又能保障手机的易用性,是需要解决的问题。
发明内容
本发明所要解决的技术问题是提供一种保障终端安全的方法和装置,能够在终端处于不同区域时自动调整对终端的安全控制。
为了解决上述技术问题,采用如下技术方案:
一种保障终端安全的方法,该方法包括:
对终端进行定位;
根据定位结果判定所述终端所处区域的安全性;
根据所述终端所处区域的安全性的变化调整对所述终端的安全控制。
可选地,该方法还包括:
预先设置安全区域。
可选地,该方法还包括:
预先设置所述终端上的安全控制对象、以及安全控制对象对应的访问控制策略。
可选地,所述根据定位结果判定终端所处区域是否安全的步骤包括:
如根据所述定位结果判定所述终端处于预设的安全区域中,则确定所述终端所处区域是安全的;
如根据所述定位结果判定所述终端不处于预设的安全区域中,则确定所述终端所处区域是不安全的。
可选地,所述根据终端所处区域的安全性的变化调整对终端的安全控制的步骤包括:
如检测到终端从安全区域进入非安全区域,则对所述终端进行安全控制;
如检测到终端从非安全区域进入安全区域,则解除之前对所述终端的安全控制。
可选地,所述预先设置安全区域的步骤包括:
根据预先设置的安全区域参考点和表示区域范围的参数确定所述安全区域;
其中,所述预先设置的安全区域参考点是:在电子地图上预先标定的一个或多个熟悉地点;
其中,所述表示区域范围的参数是:以所述安全区域参考点为圆心的圆形区域的半径。
可选地,所述安全控制对象包括以下信息中的至少一种:用户敏感数据、涉及用户隐私的应用程序、和所述终端的系统控制权限;
所述访问控制策略的类型包括以下控制策略中的至少一种:防跟踪控制、防耗费流量控制、防泄密控制、防吸费控制。
可选地,所述对所述终端进行安全控制的步骤包括:根据预先设置的安全控制对象对应的访问控制策略对所述终端上的安全控制对象的访问进行控 制;
所述解除之前对所述终端的安全控制的步骤包括:解除之前根据访问控制策略对所述终端上的安全控制对象进行的安全控制。
一种保障终端安全的装置,包括定位模块、安全性判定模块和安全控制模块,其中:
所述定位模块设置成:对终端进行定位;
所述安全性判定模块设置成:根据定位结果判定所述终端所处区域的安全性;
所述安全控制模块设置成:根据所述终端所处区域的安全性的变化调整对所述终端的安全控制。
可选地,该装置还包括设置模块,其中
所述设置模块设置成:预先设置安全区域。
可选地,所述设置模块还设置成:预先设置所述终端上的安全控制对象、以及安全控制对象对应的访问控制策略。
可选地,所述安全性判定模块设置成按照如下方式根据定位结果判定所述终端所处区域是否安全:
如根据所述定位结果判定所述终端处于预设的安全区域中,则确定所述终端所处区域是安全的;
如根据所述定位结果判定所述终端不处于预设的安全区域中,则所述确定终端所处区域是不安全的。
可选地,所述安全控制模块设置成按照如下方式根据终端所处区域的安全性的变化调整对终端的安全控制:
如检测到所述终端从安全区域进入非安全区域,则对所述终端进行安全控制;
如检测到所述终端从非安全区域进入安全区域,则解除之前对所述终端的安全控制。
可选地,所述设置模块设置成按照如下方式预先设置安全区域:
根据预先设置的安全区域参考点和表示区域范围的参数确定所述安全区域;
其中,所述预先设置的安全区域参考点是:在电子地图上预先标定的一个或多个熟悉地点;
其中,所述表示区域范围的参数是:以所述安全区域参考点为圆心的圆形区域的半径。
可选地,所述安全控制对象包括以下信息中的至少一种:用户敏感数据、涉及用户隐私的应用程序、和终端的系统控制权限;
所述访问控制策略的类型包括以下控制策略中的至少一种:防跟踪控制、防耗费流量控制、防泄密控制、防吸费控制。
可选地,所述安全控制模块设置成按照如下方式对所述终端进行安全控制:根据预先设置的安全控制对象对应的访问控制策略对所述终端上的安全控制对象的访问进行控制;
所述安全控制模块设置成按照如下方式解除之前对所述终端的安全控制:解除之前根据访问控制策略对所述终端上的安全控制对象进行的安全控制。
与相关技术相比,本发明技术方案提供的一种保障终端安全的方法和装置,通过对终端所处位置的判定,在终端处于陌生地点时自动加强对终端的安全控制,从而有效保障用户的隐私,而在终端回到熟悉的地方时,自动地解除安全控制,从而保障终端在熟悉环境中的易用性。
附图概述
图1为本发明实施例的一种保障终端安全的方法的流程图。
图2为本发明实施例的一种保障终端安全的装置的结构示意图。
本发明的较佳实施方式
以下是对本文详细描述的主题的概述。本概述并非是为了限制权利要求的保护范围。
下文中将结合附图对本发明的实施例进行详细说明。需要说明的是,在不冲突的情况下,本申请中的实施例及实施例中的特征可以相互任意组合。
如图1所示,本发明实施例提供了一种保障终端安全的方法,该方法包括:
S10,对终端进行定位;
S20,根据定位结果判定终端所处区域的安全性;
S30,根据终端所处区域的安全性的变化调整对终端的安全控制。
所述方法还可以包括下述特点:
其中,所述方法还包括:预先设置安全区域。
其中,预先设置安全区域的步骤包括:
根据预先设置的安全区域参考点和表示区域范围的参数确定安全区域;
其中,预先设置的安全区域参考点可以是:在电子地图上预先标定的一个或多个熟悉地点;
其中,表示区域范围的参数可以是:以所述安全区域参考点为圆心的圆形区域的半径r;
其中,不同的安全区域参考点对应的表示区域范围的参数可以相同或不相同;
比如,用户可以将“家”与“办公室”分别设置为安全区域参考点,但是,“家”与“办公室”对应的安全半径可以设定为相同或不相同;
其中,安全区域的设置可以根据用户指示来进行,也可以按照其他方式来进行,在此不再赘述。当根据用户指示来设置安全区域时,根据用户预先设置的安全区域参考点和表示区域范围的参数确定安全区域,用户预先设置的安全区域参考点可以是:用户在电子地图上预先标定的一个或多个熟悉地点。
其中,对终端进行定位的步骤包括:通过以下定位方式的至少一种对终端进行定文:WIFI定位、基站定位和GPS(Global Positioning System,全球定位系统)定位;
其中,所述方法还包括:预先设置终端上的安全控制对象、以及安全控制对象对应的访问控制策略;
其中,所述安全控制对象包括以下信息中的至少一种:用户敏感数据、涉及用户隐私的应用程序、和终端的系统控制权限;
其中,用户敏感数据,比如:短信、图片、视频、联系人、文档;
其中,涉及用户隐私的应用程序,比如:金融类应用程序、支付类应用程序、证券类应用程序和社交类应用程序;
其中,所述访问控制策略的类型包括以下控制策略中的至少一种:防跟踪控制、防耗费流量控制、防泄密控制、防吸费控制;
其中,防跟踪控制是指:禁止应用程序获得获取终端位置信息、拍照/摄像等权限;比如,可以通过安全类软件(或者说通过android系统的框架功能)可以对应用程序的这类权限进行控制(打开或禁止)。
其中,防耗费流量控制是指:禁止应用程序获得上网(使用流量)、开关数据网络连接、开关WLAN(Wireless Local Area Networks,无线局域网)网络连接、开关蓝牙设备等权限;比如,可以通过安全类软件(或者说通过android系统的框架功能)对应用程序的这类权限进行控制(打开或禁止)。
其中,防泄密控制是指:禁止应用程序获得读取短信/彩信、写/删除短信/彩信记录、读取联系人记录、写/删除联系人记录、读取通话记录、写/删除通话记录、录音、获取手机识别信息、访问日程表信息等权限;比如,可以通过安全类软件(或者说通过android系统的框架功能)对应用程序的这类权限进行控制(打开或禁止)。
其中,防吸费控制是指:禁止应用程序获得拨打电话、发送短信、发送彩信等权限;比如,可以通过安全类软件(或者说通过android系统的框架功能)对应用程序的这类权限进行控制(打开或禁止)。
其中,根据定位结果判定终端所处区域是否安全的步骤包括:
如根据定位结果判定终端处于预设的安全区域中,则确定终端所处区域是安全的;如根据定位结果判定终端不处于预设的安全区域中,则确定终端所处区域是非安全的;
其中,根据终端所处区域的安全性的变化调整对终端的安全控制的步骤包括:
如检测到终端从安全区域进入非安全区域,则对所述终端进行安全控制;如检测到终端从非安全区域进入安全区域,则解除之前对所述终端的安全控制;
其中,对所述终端进行安全控制的步骤包括:
根据预先设置的安全控制对象对应的访问控制策略对所述终端上的各安全控制对象的访问进行控制;
其中,解除之前对所述终端的安全控制的步骤包括:
解除之前根据访问控制策略对所述终端上的安全控制对象进行的安全控制;
比如,用户到了陌生区域后,使用QQ、微信等应用程序时,这类应用程序不再有获取终端位置信息、读取短信等权限,也即,Android框架的权限管理模块(安全类软件)把应用程序的相应权限禁止掉以加强安全控制,防止这类软件读取用户的敏感数据等,保护用户的终端、隐私和财产安全。等用户回到熟悉区域后,解除安全性控制,也即,Android框架的权限管理模块(安全类软件)把这类应用程序的上述禁止的权限重新打开。
如图2所示,本发明实施例提供了一种保障终端安全的装置,包括:
定位模块201,设置成:对终端进行定位;
安全性判定模块202,设置成:根据定位结果判定终端所处区域的安全性;
安全控制模块203,设置成:根据终端所处区域的安全性的变化调整对终端的安全控制。
所述装置还可以包括下述特点:
其中,所述装置还包括设置模块;
所述设置模块设置成:预先设置安全区域;
其中,所述设置模块设置成按照如下方式预先设置安全区域:
根据安全区域参考点和表示区域范围的参数确定安全区域;
其中,安全区域参考点可以是:在电子地图上预先标定的一个或多个熟悉地点;
其中,表示区域范围的参数可以是:以所述安全区域参考点为圆心的圆形区域的半径r;
其中,安全区域的设置可以根据用户指示来进行,也可以按照其他方式来进行,在此不再赘述。当根据用户指示来设置安全区域时,根据用户预先设置的安全区域参考点和表示区域范围的参数确定安全区域,用户预先设置的安全区域参考点可以是:用户在电子地图上预先标定的一个或多个熟悉地点。
其中,定位模块设置成按照如下方式对终端进行定位:通过以下定位方式的至少一种对终端进行定文:WIFI定位、基站定位和全球定位系统GPS定位;
其中,所述设置模块还设置成:预先设置终端上的安全控制对象、以及安全控制对象对应的访问控制策略;
当根据用户指示来设置安全区域时,此处设置模块还设置成:根据用户指示预先设置终端上的安全控制对象、以及安全控制对象对应的访问控制策略。
其中,所述安全控制对象包括以下至少一种:用户敏感数据、涉及用户隐私的应用程序、和终端的系统控制权限;
其中,用户敏感数据,比如:短信、图片、视频、联系人、文档;
其中,涉及用户隐私的应用程序,比如:金融类应用程序、支付类应用程序、证券类应用程序和社交类应用程序;
其中,所述访问控制策略的类型包括以下至少一种:防跟踪控制、防耗费流量控制、防泄密控制、防吸费控制;
其中,安全性判定模块设置成按照如下方式根据定位结果判定终端所处区域是否安全:
如根据定位结果判定终端处于预设的安全区域中,则确定终端所处区域是安全的;如根据定位结果判定终端不处于预设的安全区域中,则确定终端所处区域是非安全的;
其中,安全控制模块设置成按照如下方式根据终端所处区域的安全性的变化调整对终端的安全控制:
如检测到终端从安全区域进入非安全区域,则对所述终端进行安全控制;如检测到终端从非安全区域进入安全区域,则解除之前对所述终端的安全控制;
其中,安全控制模块设置成按照如下方式对所述终端进行安全控制:
根据预先设置的安全控制对象对应的访问控制策略对所述终端上的各安全控制对象的访问进行控制;
其中,安全控制模块设置成按照如下方式解除之前对所述终端的安全控制:
解除之前根据访问控制策略对所述终端上的安全控制对象进行的安全控制;
本发明实施例还公开了一种计算机程序,包括程序指令,当该程序指令被计算机执行时,使得该计算机可执行上述任意的保障终端安全的方法。
本发明实施例还公开了一种载有所述的计算机程序的载体。
在阅读并理解了附图和详细描述后,可以明白其他方面。
上述实施例提供的一种保障终端安全的方法和装置,通过对终端所处位 置的判定,在终端处于陌生地点时自动加强对终端的安全控制,从而有效保障用户的隐私,而在终端回到熟悉的地方时,自动地解除加强的安全控制,从而保障终端在熟悉环境中的易用性。
本领域普通技术人员可以理解上述方法中的全部或部分步骤可通过程序来指令相关硬件完成,所述程序可以存储于计算机可读存储介质中,如只读存储器、磁盘或光盘等。可选地,上述实施例的全部或部分步骤也可以使用一个或多个集成电路来实现,相应地,上述实施例中的各模块/单元可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。本发明不限制于任何特定形式的硬件和软件的结合。
需要说明的是,本发明还可有其他多种实施例,在不背离本发明精神及其实质的情况下,熟悉本领域的技术人员可根据本发明作出各种相应的改变和变形,但这些相应的改变和变形都应属于本发明所附的权利要求的保护范围。
工业实用性
本发明技术方案提供的一种保障终端安全的方法和装置,通过对终端所处位置的判定,在终端处于陌生地点时自动加强对终端的安全控制,从而有效保障用户的隐私,而在终端回到熟悉的地方时,自动地解除加强的安全控制,从而保障终端在熟悉环境中的易用性。因此本发明具有很强的工业实用性。

Claims (16)

  1. 一种保障终端安全的方法,该方法包括:
    对终端进行定位;
    根据定位结果判定所述终端所处区域的安全性;
    根据所述终端所处区域的安全性的变化调整对所述终端的安全控制。
  2. 如权利要求1所述的保障终端安全的方法,该方法还包括:
    预先设置安全区域。
  3. 如权利要求2所述的保障终端安全的方法,该方法还包括:
    预先设置所述终端上的安全控制对象、以及安全控制对象对应的访问控制策略。
  4. 如权利要求2所述的保障终端安全的方法,其中,所述根据定位结果判定终端所处区域是否安全的步骤包括:
    如根据所述定位结果判定所述终端处于预设的安全区域中,则确定所述终端所处区域是安全的;
    如根据所述定位结果判定所述终端不处于预设的安全区域中,则确定所述终端所处区域是不安全的。
  5. 如权利要求2所述的保障终端安全的方法,其中,所述根据终端所处区域的安全性的变化调整对终端的安全控制的步骤包括:
    如检测到终端从安全区域进入非安全区域,则对所述终端进行安全控制;
    如检测到终端从非安全区域进入安全区域,则解除之前对所述终端的安全控制。
  6. 如权利要求2所述的保障终端安全的方法,其中,所述预先设置安全区域的步骤包括:
    根据预先设置的安全区域参考点和表示区域范围的参数确定所述安全区域;
    其中,所述预先设置的安全区域参考点是:在电子地图上预先标定的一个或多个熟悉地点;
    其中,所述表示区域范围的参数是:以所述安全区域参考点为圆心的圆形区域的半径。
  7. 如权利要求3所述的保障终端安全的方法,其中:
    所述安全控制对象包括以下信息中的至少一种:用户敏感数据、涉及用户隐私的应用程序、和所述终端的系统控制权限;
    所述访问控制策略的类型包括以下控制策略中的至少一种:防跟踪控制、防耗费流量控制、防泄密控制、防吸费控制。
  8. 如权利要求5所述的保障终端安全的方法,其中,
    所述对所述终端进行安全控制的步骤包括:根据预先设置的安全控制对象对应的访问控制策略对所述终端上的安全控制对象的访问进行控制;
    所述解除之前对所述终端的安全控制的步骤包括:解除之前根据访问控制策略对所述终端上的安全控制对象进行的安全控制。
  9. 一种保障终端安全的装置,包括定位模块、安全性判定模块和安全控制模块,其中:
    所述定位模块设置成:对终端进行定位;
    所述安全性判定模块设置成:根据定位结果判定所述终端所处区域的安全性;
    所述安全控制模块设置成:根据所述终端所处区域的安全性的变化调整对所述终端的安全控制。
  10. 如权利要求9所述的保障终端安全的装置,该装置还包括设置模块,其中
    所述设置模块设置成:预先设置安全区域。
  11. 如权利要求10所述的保障终端安全的装置,其中:
    所述设置模块还设置成:预先设置所述终端上的安全控制对象、以及安全控制对象对应的访问控制策略。
  12. 如权利要求10所述的保障终端安全的装置,其中,所述安全性判定模块设置成按照如下方式根据定位结果判定所述终端所处区域是否安全:
    如根据所述定位结果判定所述终端处于预设的安全区域中,则确定所述终端所处区域是安全的;
    如根据所述定位结果判定所述终端不处于预设的安全区域中,则所述确定终端所处区域是不安全的。
  13. 如权利要求11所述的保障终端安全的装置,其中,所述安全控制模块设置成按照如下方式根据终端所处区域的安全性的变化调整对终端的安全控制:
    如检测到所述终端从安全区域进入非安全区域,则对所述终端进行安全控制;
    如检测到所述终端从非安全区域进入安全区域,则解除之前对所述终端的安全控制。
  14. 如权利要求10所述的保障终端安全的装置,其中,所述设置模块设置成按照如下方式预先设置安全区域:
    根据预先设置的安全区域参考点和表示区域范围的参数确定所述安全区域;
    其中,所述预先设置的安全区域参考点是:在电子地图上预先标定的一个或多个熟悉地点;
    其中,所述表示区域范围的参数是:以所述安全区域参考点为圆心的圆形区域的半径。
  15. 如权利要求11所述的保障终端安全的装置,其中:
    所述安全控制对象包括以下信息中的至少一种:用户敏感数据、涉及用户隐私的应用程序、和终端的系统控制权限;
    所述访问控制策略的类型包括以下控制策略中的至少一种:防跟踪控制、防耗费流量控制、防泄密控制、防吸费控制。
  16. 如权利要求13所述的保障终端安全的装置,其中:
    所述安全控制模块设置成按照如下方式对所述终端进行安全控制:根据预先设置的安全控制对象对应的访问控制策略对所述终端上的安全控制对象的访问进行控制;
    所述安全控制模块设置成按照如下方式解除之前对所述终端的安全控制:解除之前根据访问控制策略对所述终端上的安全控制对象进行的安全控制。
PCT/CN2016/070483 2015-05-15 2016-01-08 一种保障终端安全的方法和装置 WO2016184136A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510251338.9A CN106295344A (zh) 2015-05-15 2015-05-15 一种保障终端安全的方法和装置
CN201510251338.9 2015-05-15

Publications (1)

Publication Number Publication Date
WO2016184136A1 true WO2016184136A1 (zh) 2016-11-24

Family

ID=57319309

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/070483 WO2016184136A1 (zh) 2015-05-15 2016-01-08 一种保障终端安全的方法和装置

Country Status (2)

Country Link
CN (1) CN106295344A (zh)
WO (1) WO2016184136A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106993083A (zh) * 2017-02-21 2017-07-28 北京奇虎科技有限公司 一种推荐智能终端操作提示信息的方法和装置

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107729759B (zh) * 2017-09-22 2020-12-15 惠州Tcl移动通信有限公司 一种app操作权限控制方法、存储设备及移动终端
CN109711169A (zh) * 2018-05-04 2019-05-03 360企业安全技术(珠海)有限公司 系统文件的防护方法及装置、系统、存储介质、电子装置

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101854581A (zh) * 2009-03-31 2010-10-06 联想(北京)有限公司 基于位置信息设置移动终端安全级别的方法及移动终端
US20110154442A1 (en) * 2009-12-18 2011-06-23 Electronics And Telecommunications Research Institute Security control system and method for personal communication terminals
CN103874021A (zh) * 2014-04-02 2014-06-18 上海坤士合生信息科技有限公司 安全区域识别方法、识别设备及用户终端
US20150042449A1 (en) * 2013-08-09 2015-02-12 Lg Cns Co., Ltd. Method of controlling mobile terminal based on location information and applying security policy based on priority rules, and system thereof

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE602006014968D1 (de) * 2006-09-01 2010-07-29 Research In Motion Ltd Verfahren zur ortsabhängigen Sperrung von Funktionen eines Mobilfunkendgerätes, und Vorrichtung dafür

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101854581A (zh) * 2009-03-31 2010-10-06 联想(北京)有限公司 基于位置信息设置移动终端安全级别的方法及移动终端
US20110154442A1 (en) * 2009-12-18 2011-06-23 Electronics And Telecommunications Research Institute Security control system and method for personal communication terminals
US20150042449A1 (en) * 2013-08-09 2015-02-12 Lg Cns Co., Ltd. Method of controlling mobile terminal based on location information and applying security policy based on priority rules, and system thereof
CN103874021A (zh) * 2014-04-02 2014-06-18 上海坤士合生信息科技有限公司 安全区域识别方法、识别设备及用户终端

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106993083A (zh) * 2017-02-21 2017-07-28 北京奇虎科技有限公司 一种推荐智能终端操作提示信息的方法和装置

Also Published As

Publication number Publication date
CN106295344A (zh) 2017-01-04

Similar Documents

Publication Publication Date Title
US10623962B2 (en) System and method for geo-location-based mobile user authentication
US9923902B2 (en) Remote processsing of mobile applications
EP2448303B1 (en) Method and system for securing data of a mobile communications device
TWI461958B (zh) 應用程式的權限控管方法、電子裝置及電腦可讀取媒體
CN107211019B (zh) 用于基于自动检测安全环境来处理数据的方法和装置
US9275221B2 (en) Context-aware permission control of hybrid mobile applications
ES2746985T3 (es) Aparato y procedimiento de notificación de información de seguridad en un dispositivo electrónico y medio de grabación legible por ordenador para el mismo
US10311247B2 (en) Method and system for isolating secure communication events from a non-secure application
US8990348B2 (en) Information processing system, server device, information device for personal use, and access management method
KR101732019B1 (ko) 내방객 출입시 보안 통제 시스템 및 그 방법
US10820204B2 (en) Security management on a mobile device
WO2016188319A1 (zh) 虚拟sim卡信息管理方法、装置及移动终端
WO2016184136A1 (zh) 一种保障终端安全的方法和装置
US11741245B2 (en) Self-management of devices using personal mobile device management
Di Cerbo et al. Sticky policies for mobile devices
CN107924433B (zh) 由受控制的加密密钥管理保护的软件模块的安全进入和退出
US10931446B2 (en) Method and system for protecting sharing information
CN106570424A (zh) 一种拍摄文件安全管理装置、方法及终端
KR101603988B1 (ko) 상황인식 서비스 시스템
CN112632518A (zh) 数据访问方法、装置、终端及存储介质
US8195127B1 (en) Systems and methods for protecting emails
US11934544B2 (en) Securing data via encrypted geo-located provenance metadata
KR20190071494A (ko) 열람이력 추적의 위치기반 문서보안 방법 및 문서보안 장치
JP2008219375A (ja) 携帯端末データ管理装置および方法
Pierer Categorization of MDM features

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16795623

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16795623

Country of ref document: EP

Kind code of ref document: A1