Security check system and security check method of mobile terminal

A security detection and mobile terminal technology, applied in computer security devices, instruments, electrical digital data processing, etc., can solve the problems of reducing system operating speed, increasing mobile terminal resource occupation, large network bandwidth and traffic, etc., to improve operating speed , reduce computing power, and reduce workload

Inactive Publication Date: 2015-12-30
PHICOMM (SHANGHAI) CO LTD
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the need for matching processing on the mobile terminal, the resource occupation of the mobile terminal will be increased, the system running speed will be reduced, and

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security check system and security check method of mobile terminal
  • Security check system and security check method of mobile terminal
  • Security check system and security check method of mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0039] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0040] It should be noted that, in the case of no conflict, the embodiments of the present invention and the features in the embodiments can be combined with each other.

[0041] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments, but not as a limitation of the present invention.

[0042] like figure 1 As shown, a security detection system for a mobile terminal includes:

[0043] Client 1 i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security check system and a security check method of a mobile terminal. The security check system of the mobile terminal comprises a client terminal and a server, wherein the client terminal is connected with the mobile terminal and is used for acquiring and outputting a public key value of an installation package in the mobile terminal; the server is remotely connected with the client terminal, the server provides a storage unit for storing a set of standard public key values, and the server is used for matching the public key value with the standard public key values in the storage unit to acquire the security check result of the installation package. The security check system of the mobile terminal extracts fewer characteristic data of the mobile terminal through the client terminal and synchronizes the extracted characteristic data to the server on a cloud side, the server performs matching to the characteristic data to acquire the security monitoring result of the mobile terminal, thereby the workload of the client terminal is reduced and the operating speed of the client terminal is improved.

Description

technical field [0001] The invention relates to the technical field of mobile terminals, in particular to a security detection system and a security detection method of a mobile terminal. Background technique [0002] With the rapid integration and development of mobile Internet of Things and computer communication technology, smart mobile terminals bring convenience to users but also bring some troubles to users, especially the virus of mobile terminals is increasing year by year, forming its own black industry chain , There are also many anti-virus software for mobile terminal viruses on the market, but many anti-virus software generally perform anti-virus in the local library. Existing Trojan horse detection technology generally is to update the Trojan horse signature database on the mobile terminal, and then match the local files with this dynamically updated "local" signature database, and then determine whether there is a Trojan horse on the mobile terminal. Due to th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/51G06F21/56
CPCG06F21/51G06F21/56G06F2221/033
Inventor 金果
Owner PHICOMM (SHANGHAI) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products