Safety management method and device based on user behavior

A security management and behavior technology, applied in the field of mobile communications, can solve the problems of reduced security and illegal operations, and achieve the effect of preventing illegal operations and improving security.

Active Publication Date: 2013-07-24
HUAWEI DEVICE CO LTD
View PDF4 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The above-mentioned security management method has the following problems: the installed application program is cracked or jailbroken, and the security is reduced; Will make illegal operations within the scope of authorization, posing security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety management method and device based on user behavior
  • Safety management method and device based on user behavior
  • Safety management method and device based on user behavior

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0024] For the basic flowchart of a security management method based on user behavior in Embodiment 1, please refer to figure 1 , including the following steps:

[0025] 101. Determine whether the operation performed by the application program is an operation with permission.

[0026] For applications, authorization is required to obtain security-related system services. Therefore, certain permissions are required to obtain security-related system services. For information security of the communication terminal, the communication terminal can monitor various operations performed by the application program, and determine whether the operation performed by the application program is an operation with authorization. If the operation is an operation with permission, it indicates that the operation is a security-related operation. Specifically, operations with permissions include operations related to information security, such as sending short messages, making calls, sending em...

Embodiment 2

[0040] Embodiment 2, a basic flowchart of a security management method based on user behavior can refer to figure 2 , including the following steps:

[0041] 201. Determine whether the current operation performed by the application program is an operation with permission.

[0042] 202. If the operation performed by the application program is an operation with permission, acquire a state condition of the operation performed by the application program.

[0043] 203 . Determine whether the state of the application program when performing the operation satisfies a preset state condition, where the preset state condition is a state condition that is required to perform the operation and conforms to user behavior logic.

[0044] If the state in which the application program performs the operation satisfies the preset state condition, execute:

[0045] 204. Allow the application program to continue operating.

[0046] For a better understanding of steps 201 to 204, reference may ...

Embodiment 3

[0066] Embodiment 3, a logical structure diagram of a security management device based on user behavior can refer to image 3 , including: a first judging unit 301 , an acquiring unit 302 , a second judging unit 303 and a processing unit 304 .

[0067] The first judging unit 301 is used to judge whether the operation performed by the application program is an operation with permission.

[0068] The obtaining unit 302 is configured to obtain a status condition for the application program to operate when the judgment result of the first judgment unit 301 is yes.

[0069] The second judging unit 303 is configured to judge whether the state of the application when the operation is in operation satisfies a preset state condition after the acquisition unit acquires the state in which the application is in operation. , the preset state condition is a state condition that conforms to user behavior logic required for performing the operation.

[0070] The processing unit 304 is confi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a safety management method and device based on a user behavior. By judging whether the operation is the user behavior or not, the illegal operation of malicious software is prevented, and loss brought to a user is avoided. The method provided by the embodiment mainly comprises the steps that whether a status meets a preset status condition when the operation is carried out by an application program is judged, the preset status condition is a status condition which accords with the user behavior logic and is required by the operation carried out by the application program, and relevant treatment is carried out according to a judging result. The invention further provides a corresponding safety management device based on the user behavior. By the adoption of the safety management method and device, illegal operation is avoided, and the safety management based on the user behavior is realized.

Description

technical field [0001] The invention relates to the field of mobile communication, in particular to a user behavior-based security management method and device. Background technique [0002] With the development of communication technology, mobile terminals are used more and more frequently, but more and more security problems are also generated. For example, malicious software is installed in the mobile phone, and some malicious software will automatically send text messages, emails, and surf the Internet in the background, causing losses to the user, but the user is not easy to detect. [0003] In order to prevent malicious software from operating mobile phones, current mobile phones generally have a security authority management mechanism. Many smartphones use sandbox technology to isolate applications and require applications to use the device's own functions only after obtaining authorization. For example, smart phones generally allow users to install applications by t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/30H04M1/725
Inventor 袁中举
Owner HUAWEI DEVICE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products