Unlock instant, AI-driven research and patent intelligence for your innovation.

A security control method and device for smart terminal mobile applications

A mobile application and security control technology, applied in the direction of safety devices, electrical components, wireless communications, etc., can solve problems that do not involve mobile application security behavior monitoring, and achieve the effect of ensuring safe operation

Active Publication Date: 2018-04-17
CHINA UNITED NETWORK COMM GRP CO LTD +1
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In response to these security threats, existing security mechanisms can solve some security problems to a certain extent, but each method only solves a certain aspect of the problem:
[0007] Existing security control methods solve some security issues at a certain stage of mobile applications, but do not involve security behavior monitoring issues when mobile applications are running

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security control method and device for smart terminal mobile applications
  • A security control method and device for smart terminal mobile applications
  • A security control method and device for smart terminal mobile applications

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0129] Embodiment 1. The security assurance client registers with the security assurance platform

[0130] Combine image 3 Describe this embodiment:

[0131] 1) The user starts the security client for the first time;

[0132] 2) The security assurance client collects terminal information and applies for a digital certificate to the security assurance platform;

[0133] 3) The security assurance platform applies for a digital certificate from the CA center based on the information reported by the security assurance client, and binds it to the terminal as an ID, so that various security operations on the terminal can be performed based on this ID;

[0134] 4) The security assurance platform reports the successful certificate application to the security assurance client and provides downloads;

[0135] 5) The security assurance client initiates a certificate download request to the security assurance platform;

[0136] 6) The security assurance client downloads the digital certificate from ...

Embodiment 2

[0140] Embodiment 2. The heartbeat request of the security assurance client and the heartbeat response of the security assurance platform;

[0141] Combine Figure 4 Describe this embodiment:

[0142] 1) The security assurance client periodically sends heartbeat requests to the security assurance platform so that the security assurance platform can perceive the online status of the security assurance client;

[0143] 2) After the security assurance platform receives the client's heartbeat request, it judges whether there are operations that need to be performed on the terminal based on the terminal ID (ie digital certificate), such as application permission changes, control instructions issued by the administrator, etc.; if so, organize The corresponding feedback information is fed back to the security client with the subsequent heartbeat response message;

[0144] 3) The security assurance platform feeds back the heartbeat response to the security assurance client;

[0145] 4) If ther...

Embodiment 3

[0147] Example 3: Register the mobile application with the security assurance platform

[0148] Combine Figure 5 Describe this embodiment:

[0149] 1) Receive the information of the mobile application, including the application name, function description, contact information, etc.;

[0150] 2) Receive registration information initiated by the user or administrator on the security assurance platform;

[0151] 3) The security assurance platform determines whether the newly entered mobile application data already exists and whether the existing data is valid;

[0152] 4) If the information is wrong, or it already exists, prompt the administrator;

[0153] 5) If the information is correct, add a new mobile application to the security assurance platform and generate corresponding permission configuration information, application system ID and other data;

[0154] 6) The security assurance platform receives the heartbeat request initiated by the security assurance client;

[0155] 7) The securi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security control method and device for mobile applications of intelligent terminals, and relates to the field of security assurance for mobile applications of intelligent terminals. The security guarantee client monitors the operation of the mobile application running on the user terminal; and periodically sends a heartbeat request to the security guarantee platform; when it is found that one or more mobile applications perform malicious operations or stop security service operations, the The security guarantee client reports the malicious operation or stops the security service to the security guarantee platform in the heartbeat request message; the security guarantee platform generates a control instruction according to the received heartbeat request message, and sends the The security guarantee client issues a control instruction; the security guarantee client updates the authority information of the one or more mobile applications according to the control instruction; and feeds back the processing result to the security guarantee platform. The invention can guarantee the safe operation of the mobile application and prevent the malicious operation of the application in time.

Description

Technical field [0001] The invention relates to the field of security assurance of smart terminal mobile applications. Background technique [0002] The era of popularization of smart terminals has come, and mobile internet applications based on smart terminals, such as mobile office, mobile payment, copyright protection, and identity authentication, have taken off and are developing rapidly, increasingly permeating all aspects of consumers' daily lives. At present, there is no unified standard for the security of mobile applications, and each manufacturer defines and implements them individually. When users use it, they will face security issues such as mobile phone viruses, application credibility, and mobile phone information confidentiality. In response to these security threats, the existing security assurance mechanism can solve some security problems to a certain extent, but each method only solves a certain aspect of the problem: [0003] Existing mobile phone virus checki...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04W12/12
Inventor 范勇杰姚韬蒋小燕
Owner CHINA UNITED NETWORK COMM GRP CO LTD