Method and apparatus for protecting system security of mobile terminal

A mobile terminal and system security technology, applied in the field of information security, can solve the problems of low system security level, limited system protection of mobile terminals, and inability to realize the integrity protection of files in mobile terminals, so as to achieve a good user experience and solve system security problems. Effect

Active Publication Date: 2015-12-02
PRANUS BEIJING TECH CO LTD
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the protection of the security application program on the mobile terminal system is limited, and it cannot realize the integrity protection of the files in the mobile terminal
That is to say, when the files in the mobile terminal are damaged (such as being modified, replaced, etc.), the security application program cannot detect
The root of mobile terminal system security lies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for protecting system security of mobile terminal
  • Method and apparatus for protecting system security of mobile terminal
  • Method and apparatus for protecting system security of mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0032] In order to better understand and explain the present invention, the present invention will be further described in detail with reference to the accompanying drawings.

[0033] The invention provides a method for protecting the safety of a mobile terminal system. Please refer to figure 1 , figure 1 It is a flowchart of a specific implementation of the method for protecting the security of the mobile terminal system according to the present invention. As shown in the figure, the protection method includes the following steps:

[0034] In step S101, when it is detected that the mobile terminal is started for the first time, a mandatory access control label is configured for each file in the mobile terminal, and the integrity check is performed on each file to obtain the initial check value of the file and Store the initial check value;

[0035] In step S102, after the mobile terminal is started, the integrity check is performed on each file according to a preset frequency to o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for protecting system security of a mobile terminal, which comprises: when the mobile terminal is detected to be started at the first time, each of files in the mobile terminal is configured with a mandatory access control tab and integrity checking to each of the files is performed to acquire initiate checking values and the initial checking values are stored; after the mobile terminal is started, integrity checking to each of the files is performed to acquire intermediate checking values based on the preset frequency, and the intermediate checking values are compared with the initial checking values of the files; if the compared result shows that the intermediate checking values are different from the initial checking values of one or more files, then one or more files are determined to be damaged and the mandatory access control tab of one or more files is changed; and the mandatory access control tab of one or more files is automatically restored. The invention also provides an apparatus for protecting the system security of the mobile terminal. By adopting the method and the apparatus provided herein, the system security of the mobile terminal is greatly improved.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method and device for protecting the security of a mobile terminal system. Background technique [0002] With the development of technology, mobile terminals (such as smart phones, tablet computers, etc.) are becoming more and more intelligent, and people can install different application programs in the mobile terminals to meet their individual needs. Although these applications have brought great convenience to people's lives, they have also brought a lot of security risks to people. Once a security problem occurs in the system of the mobile terminal, it is likely to bring serious losses to the user of the mobile terminal, so the system security of the mobile terminal has become the most concerned issue of the user. [0003] Aiming at the system security issues of mobile terminals, the application market has launched various security applications, which can real...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56
CPCG06F21/568
Inventor 田更宝
Owner PRANUS BEIJING TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products