A security control method and device for smart terminal mobile applications
A mobile application and security control technology, applied in the direction of safety devices, electrical components, wireless communications, etc., can solve problems that do not involve mobile application security behavior monitoring, and achieve the effect of ensuring safe operation
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0129] Embodiment 1. The security assurance client registers with the security assurance platform
[0130] Combine image 3 Describe this embodiment:
[0131] 1) The user starts the security client for the first time;
[0132] 2) The security assurance client collects terminal information and applies for a digital certificate to the security assurance platform;
[0133] 3) The security assurance platform applies for a digital certificate from the CA center based on the information reported by the security assurance client, and binds it to the terminal as an ID, so that various security operations on the terminal can be performed based on this ID;
[0134] 4) The security assurance platform reports the successful certificate application to the security assurance client and provides downloads;
[0135] 5) The security assurance client initiates a certificate download request to the security assurance platform;
[0136] 6) The security assurance client downloads the digital certificate from ...
Embodiment 2
[0140] Embodiment 2. The heartbeat request of the security assurance client and the heartbeat response of the security assurance platform;
[0141] Combine Figure 4 Describe this embodiment:
[0142] 1) The security assurance client periodically sends heartbeat requests to the security assurance platform so that the security assurance platform can perceive the online status of the security assurance client;
[0143] 2) After the security assurance platform receives the client's heartbeat request, it judges whether there are operations that need to be performed on the terminal based on the terminal ID (ie digital certificate), such as application permission changes, control instructions issued by the administrator, etc.; if so, organize The corresponding feedback information is fed back to the security client with the subsequent heartbeat response message;
[0144] 3) The security assurance platform feeds back the heartbeat response to the security assurance client;
[0145] 4) If ther...
Embodiment 3
[0147] Example 3: Register the mobile application with the security assurance platform
[0148] Combine Figure 5 Describe this embodiment:
[0149] 1) Receive the information of the mobile application, including the application name, function description, contact information, etc.;
[0150] 2) Receive registration information initiated by the user or administrator on the security assurance platform;
[0151] 3) The security assurance platform determines whether the newly entered mobile application data already exists and whether the existing data is valid;
[0152] 4) If the information is wrong, or it already exists, prompt the administrator;
[0153] 5) If the information is correct, add a new mobile application to the security assurance platform and generate corresponding permission configuration information, application system ID and other data;
[0154] 6) The security assurance platform receives the heartbeat request initiated by the security assurance client;
[0155] 7) The securi...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


