Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and apparatus for protecting system security of mobile terminal

A mobile terminal and system security technology, applied in the field of information security, can solve the problems of low system security level, limited system protection of mobile terminals, and inability to realize the integrity protection of files in mobile terminals, so as to achieve a good user experience and solve system security problems. Effect

Active Publication Date: 2015-12-02
PRANUS BEIJING TECH CO LTD
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the protection of the security application program on the mobile terminal system is limited, and it cannot realize the integrity protection of the files in the mobile terminal
That is to say, when the files in the mobile terminal are damaged (such as being modified, replaced, etc.), the security application program cannot detect
The root of mobile terminal system security lies in the security of its internal files. Therefore, the above method of using security applications to protect mobile terminal systems cannot fundamentally solve the system security problems of mobile terminals.
Moreover, its system security level of existing mobile terminals is relatively low, and when its internal files are damaged, self-recovery of the damaged files cannot be realized.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for protecting system security of mobile terminal
  • Method and apparatus for protecting system security of mobile terminal
  • Method and apparatus for protecting system security of mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] In order to better understand and illustrate the present invention, the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0033] The invention provides a method for protecting the security of a mobile terminal system. Please refer to figure 1 , figure 1 It is a flow chart of a specific embodiment of the mobile terminal system safety protection method according to the present invention. As shown in the figure, the protection method includes the following steps:

[0034] In step S101, when it is detected that the mobile terminal starts for the first time, a mandatory access control label is configured for each file in the mobile terminal, and an integrity check is performed on each file to obtain an initial check value of the file and store the initial check value;

[0035] In step S102, after the mobile terminal is started, the integrity check is performed on each file according to a preset frequency to obtai...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for protecting system security of a mobile terminal, which comprises: when the mobile terminal is detected to be started at the first time, each of files in the mobile terminal is configured with a mandatory access control tab and integrity checking to each of the files is performed to acquire initiate checking values and the initial checking values are stored; after the mobile terminal is started, integrity checking to each of the files is performed to acquire intermediate checking values based on the preset frequency, and the intermediate checking values are compared with the initial checking values of the files; if the compared result shows that the intermediate checking values are different from the initial checking values of one or more files, then one or more files are determined to be damaged and the mandatory access control tab of one or more files is changed; and the mandatory access control tab of one or more files is automatically restored. The invention also provides an apparatus for protecting the system security of the mobile terminal. By adopting the method and the apparatus provided herein, the system security of the mobile terminal is greatly improved.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method and device for protecting the security of a mobile terminal system. Background technique [0002] With the development of technology, mobile terminals (such as smart phones, tablet computers, etc.) are becoming more and more intelligent, and people can install different application programs in the mobile terminals to meet their individual needs. Although these applications have brought great convenience to people's lives, they have also brought a lot of security risks to people. Once a security problem occurs in the system of the mobile terminal, it is likely to bring serious losses to the user of the mobile terminal, so the system security of the mobile terminal has become the most concerned issue of the user. [0003] Aiming at the system security issues of mobile terminals, the application market has launched various security applications, which can real...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/56
CPCG06F21/568
Inventor 田更宝
Owner PRANUS BEIJING TECH CO LTD
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More