Mobile Internet security service system

A mobile Internet and security service technology, applied in security devices, electrical components, wireless communications, etc., can solve the problems of Android ecosystem security risks, insufficient supervision and control capabilities, stealing user privacy information, etc.

Active Publication Date: 2014-04-09
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF5 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Apple establishes and operates its ecosystem, and users' private information is completely exposed to Apple, which poses a major security risk to users, especially Chinese users
[0004] Compared with the iOS system ecosystem, the Android ecosystem also has security risks
First of all, the Android system application signature mechanism lacks the certification of the authoritative organization, and the supervision and control capabilities are insufficient. Any software developer freely releases the application program in the form of self-signing without being tested and certified by the authoritative organization.
Secondly, if the attacker illegally obtains the root privilege of the system, he can obtain the data in the file system and SD card, and then leak all the contents of the system
During the application installation process, the required permissions are requested. If the declared permissions are not met, the user will not be able to use the application. As a result, malicious applications can illegally obtain SMS, address book, camera, microphone and other permissions, stealing the user's privacy information
Finally, limited by the profit mechanism of the Android application market, third-party application developers may load a large number of advertisements and backdoors to collect users' personal information privately
[0005] It can be seen that there are security risks in the mobile Internet ecosystem established by Apple and Google. How to restrict third-party application developers, application software and application stores, improve mobile Internet supervision capabilities, and strive to create benign mobile Internet security services system, building a secure mobile Internet ecosystem is imminent

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile Internet security service system
  • Mobile Internet security service system
  • Mobile Internet security service system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The present invention will be described in detail below through specific embodiments and accompanying drawings.

[0027] figure 1 It is a diagram describing the relationship between devices of the mobile Internet security service system of the present invention. Such as figure 1 As shown, the security operation management device 101 provides functions of key distribution and management, mobile device control, malware detection and evaluation, and software testing and evaluation, including key management platform, device management and control platform, and Trojan horse detection and killing platform, which are the core of the entire security service system core manager. The key management platform distributes the key during the registration process of the smart terminal, manages the entire life cycle of the terminal key, and performs identity authentication during the user login process. The device management and control platform and the smart terminal operating syst...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a mobile Internet security service system. The system comprises a safety operation management device, a safety application service device, a virtual safety communication device and a safety electronic market server. The safety operation management device comprises a key management platform, an equipment management and control platform and an Anvi Smart Defender platform. The safety application service device comprises a short message encryption server, a voice encryption server, an E-mail encryption server and a mobile office server and provides the short message encryption, voice encryption, E-mail encryption and mobile office service. The virtual safety communication device comprises a safety gateway and a strategy management server and provides a virtual safety channel and the safety protection function. The safety electronic market server stores a safety application program set checked and issued by the safety operation management device so that a user terminal can download application software. The system can provide the functions of mobile equipment management, safety secrete communication and malicious code searching and killing, the anti-secrete-leakage, anti-leakage and secrete communication service is provided for a user, safety and reliability of communication are guaranteed, and the supervision control and management capacity of a mobile Internet is improved.

Description

technical field [0001] The invention belongs to the technical field of computer networks, and relates to a mobile Internet security service system, which provides functions of mobile device management, secure and confidential communication, and malicious code checking and killing, and realizes providing anti-theft, anti-leakage and secure communication services for users. Background technique [0002] With the rapid popularization of smart terminals and the rapid development of the mobile Internet, the current security environment of the mobile Internet is facing huge challenges, malicious deduction, traffic consumption, remote control, privacy theft, malicious transmission and other behaviors emerge in endlessly. Apple's iOS and Google's Android are two mainstream smart terminal operating systems, and there are security risks in the mobile Internet ecosystem established by them. [0003] Apple's iOS is a closed operating system, and there is a possibility that Apple may emb...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/00H04W12/03H04W12/122H04W12/128
Inventor 朱大立邱峰冯维淼张艳芳荆鹏飞马璐萍
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products