Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A mobile Internet security service system

A mobile Internet and security service technology, applied in security devices, electrical components, wireless communications, etc., can solve problems such as insufficient supervision and control capabilities, hidden dangers to user safety, and theft of user privacy information

Active Publication Date: 2017-09-22
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Apple establishes and operates its ecosystem, and users' private information is completely exposed to Apple, which poses a major security risk to users, especially Chinese users
[0004] Compared with the iOS system ecosystem, the Android ecosystem also has security risks
First of all, the Android system application signature mechanism lacks the certification of the authoritative organization, and the supervision and control capabilities are insufficient. Any software developer freely releases the application program in the form of self-signing without being tested and certified by the authoritative organization.
Secondly, if the attacker illegally obtains the root privilege of the system, he can obtain the data in the file system and SD card, and then leak all the contents of the system
During the application installation process, the required permissions are requested. If the declared permissions are not met, the user will not be able to use the application. As a result, malicious applications can illegally obtain SMS, address book, camera, microphone and other permissions, stealing the user's privacy information
Finally, limited by the profit mechanism of the Android application market, third-party application developers may load a large number of advertisements and backdoors to collect users' personal information privately
[0005] It can be seen that there are security risks in the mobile Internet ecosystem established by Apple and Google. How to restrict third-party application developers, application software and application stores, improve mobile Internet supervision capabilities, and strive to create benign mobile Internet security services system, building a secure mobile Internet ecosystem is imminent

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A mobile Internet security service system
  • A mobile Internet security service system
  • A mobile Internet security service system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The present invention will be described in detail below through specific embodiments and accompanying drawings.

[0027] figure 1 It is a diagram describing the relationship between devices of the mobile Internet security service system of the present invention. Such as figure 1 As shown, the security operation management device 101 provides functions of key distribution and management, mobile device control, malware detection and evaluation, and software testing and evaluation, including key management platform, device management and control platform, and Trojan horse detection and killing platform, which are the core of the entire security service system core manager. The key management platform distributes the key during the registration process of the smart terminal, manages the entire life cycle of the terminal key, and performs identity authentication during the user login process. The device management and control platform and the smart terminal operating syst...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a mobile Internet security service system, comprising: a security operation management device, including a key management platform, a device management and control platform, and a Trojan killing platform; a security application service device, including a short message encryption server, a voice encryption server, and an email encryption server and mobile office servers, providing security services for encrypted text messages, encrypted voice, encrypted emails, and mobile office; virtual security communication devices, including security gateways and policy management servers, providing virtual security channels and security protection functions; secure electronic market servers, storage security A set of security application programs reviewed and released by the operation management device for user terminals to download application software. The present invention can provide functions of mobile device management, secure and confidential communication, and malicious code detection and killing, and provides users with anti-theft, anti-leakage and secure communication services, ensures safe and reliable communication, and improves mobile Internet monitoring and management capabilities.

Description

technical field [0001] The invention belongs to the technical field of computer networks, and relates to a mobile Internet security service system, which provides functions of mobile device management, secure and confidential communication, and malicious code checking and killing, and realizes providing anti-theft, anti-leakage and secure communication services for users. Background technique [0002] With the rapid popularization of smart terminals and the rapid development of the mobile Internet, the current security environment of the mobile Internet is facing huge challenges, malicious deduction, traffic consumption, remote control, privacy theft, malicious transmission and other behaviors emerge in endlessly. Apple's iOS and Google's Android are two mainstream smart terminal operating systems, and there are security risks in the mobile Internet ecosystem established by them. [0003] Apple's iOS is a closed operating system, and there is a possibility that Apple may emb...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/00H04W12/03H04W12/122H04W12/128
Inventor 朱大立邱峰冯维淼张艳芳荆鹏飞马璐萍
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products