Information security protecting system and method of mobile terminal

A mobile terminal and information security technology, applied in computer security devices, digital data protection, instruments, etc., can solve problems such as high system resources and poor user experience, and achieve strong scalability, good user experience, and comprehensive protection Effect

Active Publication Date: 2011-11-23
慧盾信息安全科技(苏州)股份有限公司
View PDF5 Cites 39 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If it is necessary to protect the SMS, the user needs to abandon the original SMS application and switch to the SMS application with the protec

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information security protecting system and method of mobile terminal
  • Information security protecting system and method of mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0023] An Anroid smart phone is taken as an example to illustrate the application of the present invention.

[0024] The Android system is divided into four levels: Applications (application layer), Application Frameworks (application framework layer), Libraries and Android Runtime (class library and real-time runtime layer), Linux Kernel (Linux kernel layer).

[0025] 1. Applications (application layer)

[0026] Android will be pre-installed with a set of core applications, including email client, short message service, calendar schedule, map service, browser, contacts and other applications. All applications are written in the Java programming language.

[0027] At the application layer, all applications that store information based on files can implement dynamic encryption and decryption protection for files operated by the application by calling the API provided by the interface module of the present invention.

[0028] 2. Application Frameworks (application framework layer)

[0029...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an information security protecting system and method of a mobile terminal. The system comprises an interface module, a security policy setting module, a file access controlling module, a file access log recording module and a dynamic encrypting/decrypting module. The interface module provides an API (Application Program Interface) for being called. The security policy setting module can set a corresponding security policy according to a command sent by the interface module. The file access controlling module realizes controlling of access operation to file objects in the mobile terminal. The file access log recording module realizes recording of all operations to files. The dynamic encrypting/decrypting module is located at a kernel layer of a mobile operating system and realizes encrypting/decrypting treatment to the files according to the set security policy. The system and the method provided by the invention can be applied to mobile terminals which take a file as an information storage manner so as to provide encrypted protection; and in addition, the invention has the advantages of comprehensive protection, strong expandability, high security, low occupancy of system resource and good user experience.

Description

technical field [0001] The invention relates to a mobile terminal information security protection system and method. Based on the dynamic encryption and decryption technology at the kernel level of the mobile operating system, various applications of the mobile terminal can be encrypted and protected to avoid leakage of information stored in the mobile terminal. [0002] Abbreviations and explanations: [0003] API: Application Programming Interface [0004] PIN: The full name is Personal Identification Number, which is the personal identification password of the SIM card of the mobile terminal. [0005] SD card: The full name is Secure Digital Memory Card, translated into Chinese as a secure digital card. It is a storage device based on semiconductor flash memory. It is widely used in portable devices, such as mobile phones and digital cameras. Background technique [0006] With the continuous popularization of smart mobile terminals (including smart phones and tablet com...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/22G06F21/62
Inventor 周亮王晓波
Owner 慧盾信息安全科技(苏州)股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products