Supercharge Your Innovation With Domain-Expert AI Agents!

Mobile intelligent terminal safety detection method based on boundary detection

A mobile smart terminal, security detection technology, applied in digital transmission systems, electrical components, transmission systems, etc., can solve problems such as poor platform compatibility, low efficiency, and unintuitiveness, and achieve good compatibility and high efficiency.

Active Publication Date: 2014-05-07
SOUTHEAST UNIV
View PDF3 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] Purpose of the invention: In order to overcome the deficiencies in the prior art, the present invention provides a mobile intelligent terminal security detection method based on boundary detection, which realizes the sensitive data leakage of the mobile intelligent terminal and the protocol compliance of the IP-based business layer protocol The security detection method solves the problems of poor platform compatibility, low efficiency, large resource consumption and unintuitive leakage of sensitive data during the use of existing security detection methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile intelligent terminal safety detection method based on boundary detection
  • Mobile intelligent terminal safety detection method based on boundary detection
  • Mobile intelligent terminal safety detection method based on boundary detection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The present invention will be further described below in conjunction with the accompanying drawings.

[0036] Such as figure 1 As shown, a mobile intelligent terminal security detection method based on boundary detection includes the following steps:

[0037] (1) Turn on the soft wireless access point on the detection device, connect the mobile smart terminal to the detection device, and connect the detection device to the Internet such as figure 2 As shown in , the detection device is a PC running the Linux platform and the detection tool has been installed.

[0038] The soft wireless access point is an open wireless access point established by switching the wireless network card to AP / Master mode through Hostapd and modifying the configuration file.

[0039] (2) The detection equipment obtains sensitive data from mobile smart terminals and establishes a sensitive database.

[0040] (3) Activate the application of IP-based business layer protocol and the applicatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a mobile intelligent terminal safety detection method based on boundary detection. The method comprises the steps that a soft wireless access point is started on a detection device; a mobile intelligent terminal is connected with the detection device; the detection device is connected with the Internet; the detection device acquires sensitive data from the mobile intelligent terminal and establishes a sensitive database; the application of a service layer protocol based on IP and the application of triggerable communication data are activated on the mobile intelligent terminal; a packet capturing program is started on the detection device, and a network communication data packet is captured in real time; a detection program is started on the detection device; whether a communication protocol, which is on a service layer based on IP, of the mobile intelligent terminal is consistent with a standard protocol is detected according to a protocol packet, and whether the data packet leaks sensitive data in a sensitive database is detected; and a detection result is produced into a detection report. According to the invention, the safety detection method for the sensitive data leakage of the mobile intelligent terminal and the protocol conformity of the service layer protocol based on IP is realized.

Description

technical field [0001] The invention relates to a security detection method for a mobile intelligent terminal, in particular to a security detection method for a mobile intelligent terminal based on boundary detection. Background technique [0002] With the development of mobile communication technology, mobile communication networks are constantly evolving, from 1G, 2G, 3G to LTE, and the deployment of a large number of WiFi hotspots; mobile terminals have also undergone tremendous changes, and are constantly moving towards the direction of intelligence. With the trend of terminal intelligence and network broadband, mobile Internet services emerge in an endless stream and become increasingly prosperous. But at the same time, more and more mobile terminals involve sensitive information such as business secrets and personal privacy. As the most important carrier in the mobile Internet era, mobile terminals are facing severe security challenges. [0003] The number of users ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/26H04L29/08
Inventor 李涛胡爱群王涛黄夷芯高尚姜丽丽邵辰
Owner SOUTHEAST UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More