Security monitoring method and mobile terminal based on packet data protocol activation request

A packet data protocol, activation request technology, applied in security devices, digital data protection, electrical digital data processing, etc., can solve the problems of installation software security hidden dangers that are difficult to find and control, so as to protect data information and improve experience. Effect

Inactive Publication Date: 2011-12-07
ZTE CORP
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In addition, many mobile terminals support the installation and use of third-party software Java programs, but if these third-party installation software has security risks, it is difficult to find and control

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security monitoring method and mobile terminal based on packet data protocol activation request
  • Security monitoring method and mobile terminal based on packet data protocol activation request
  • Security monitoring method and mobile terminal based on packet data protocol activation request

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The technical solutions of the present invention will be further elaborated below in conjunction with the accompanying drawings and specific embodiments.

[0027] The present invention realizes the security monitoring of the communication of the mobile terminal by maintaining a security list in the mobile terminal, and the security list includes the applications considered as safe. Before the application of the mobile terminal initiates the PS data service, security detection is performed on the PDP activation request initiated by the application, including detecting whether the application is an application in the safety list and whether the application is allowed to initiate the PS data service.

[0028] figure 1 It is a schematic flow diagram of the security monitoring method based on the PDP activation request of the present invention, such as figure 1 As shown, the specific processing flow includes:

[0029] In step 101, the application of the mobile terminal app...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safety monitoring method based on a packet data protocol (PDP) activation request. The application in the application module of the mobile terminal side constructs a PDP request message, and initiates a PDP activation request according to the PDP request message. The method includes: PDP The management module intercepts the PDP activation request, and obtains the name of the application that initiated the PDP activation request; judges whether the current application is an application in the safe list according to the obtained application name; if the current application is an application in the safe list, and the current application When being allowed to initiate a packet switching (PS) data service, the current application is allowed to initiate a PDP activation request to the network side; the invention also discloses a mobile terminal, which can filter out illegal applications based on the method and the mobile terminal of the invention , Effectively protect user data information.

Description

technical field [0001] The invention relates to the field of security monitoring of mobile terminals, in particular to a security monitoring method and a mobile terminal based on a packet data protocol (PDP, Packet Data Protocol) activation request. Background technique [0002] With the development of mobile terminal application software technology, mobile terminals have more and more functions, from voice calls, to sending and receiving short messages, and later developed to multimedia messages, Wireless Application Protocol (WAP, Wireless Application Protocol) web pages, e-mail sending and receiving, etc. . With the development of communication technology, there will be more and more packet switched (PS, Packet Switched) services on mobile terminals, and at the same time, the security issue of PS data services will become more and more important. [0003] The process of initiating the PS data service of the mobile terminal is as follows: the application process of the mo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/08G06F21/00G06F21/57G06F21/60
Inventor 周本文
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products