Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for monitoring mobile terminal privacy theft behavior

A mobile terminal and behavioral technology, applied in electrical components, wireless communication, security devices, etc., can solve the problem of easy theft of private information, and achieve the effect of accurate and fast screening of privacy theft behaviors and accurate and fast screening of privacy theft behaviors

Active Publication Date: 2017-12-22
WUHAN ANTIY MOBILE SECURITY
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The invention provides a method for monitoring privacy theft behaviors of mobile terminals, which solves the problem that private information in mobile terminals is easy to be stolen, and achieves the effect of accurately and quickly screening privacy theft behaviors

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for monitoring mobile terminal privacy theft behavior
  • Method and system for monitoring mobile terminal privacy theft behavior
  • Method and system for monitoring mobile terminal privacy theft behavior

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] In order to enable those skilled in the art to better understand the technical solutions in the embodiments of the present invention, and to make the above-mentioned purposes, features and advantages of the present invention more obvious and easy to understand, the technical solutions in the present invention will be further detailed below in conjunction with the accompanying drawings illustrate.

[0032] The invention provides a method for monitoring privacy stealing behaviors of mobile terminals, which solves the problem that private information in mobile terminals is easy to be stolen, and achieves the effect of accurately and quickly screening privacy stealing behaviors.

[0033] A monitoring method for mobile terminal privacy theft behavior, such as figure 1 shown, including:

[0034] S101: The prefabricated privacy information simulation configuration library is used to store simulated user usage information and mobile terminal hardware data information; the simu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a method and system for monitoring the privacy stealing behavior of a mobile terminal. The method mainly simulates user privacy information and hardware data information by presetting a privacy information simulation configuration library in the mobile terminal, and monitors the communication behavior of the mobile terminal, and simulates the configuration between the information carried in the communication behavior of the mobile terminal and the preset privacy information. The information in the library is compared. If the comparison is successful, it is considered that there is privacy stealing behavior, and the user is required to judge whether to allow the behavior to continue. Otherwise, it is considered that there is no privacy stealing behavior, and the behavior is filtered and released. The present invention also correspondingly provides a system structure corresponding to the method. Through the content of the present invention, the real user privacy information can be simulated without the need to know the user privacy information, so as to achieve the purpose of detecting the user privacy stealing behavior monitoring.

Description

technical field [0001] The invention relates to the field of mobile terminal security, in particular to a method and system for monitoring privacy theft behavior of a mobile terminal. Background technique [0002] With the open source development of intelligent operating systems, mobile terminals have entered a stage of rapid development, which in turn has also promoted a sharp increase in the number of applications. As long as the application obtains the corresponding authority of the system, it can perform any operation on the user's mobile terminal, which provides great convenience for the theft of user privacy. Compared with the rapid development of smart mobile terminals, the development of corresponding privacy protection is at a relatively lagging stage. [0003] In the application-level solutions, there are generally two methods for protecting the privacy of mobile terminals. One is to directly read the currently running application permission configuration table, a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/00H04W24/00
Inventor 栾文娟潘宣辰肖新光
Owner WUHAN ANTIY MOBILE SECURITY