Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Strategy customization-based Android mobile phone security protection system and protection method thereof

A security protection technology for Android mobile phones, applied in security devices, telephone communications, electrical components, etc., can solve problems such as software management troubles, high bills, leakage, etc., and achieve effective protection strategies

Active Publication Date: 2016-05-25
FUZHOU BOKE WANGAN INFORMATION TECH CO LTD
View PDF2 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] (1) Due to the leakage of personal information, various small advertisements, insurance, banks, operators, and personal text messages, telephone harassment is also a major problem that plagues smartphone users.
[0004] (2) The Android application market situation is not as unified as Apple’s. It is inevitable that some rogue software will run in the background and absorb traffic through the Internet. Facing high data traffic fees, many users are miserable.
Unlike the pseudo-background of IOS, this causes the background process to secretly occupy a large part of system resources and memory without the user's knowledge, affecting the smoothness of the entire system and program operation
[0006] (4) There is no difference between a smart phone without APP and a non-smart phone. Today's application market has various types of applications. Most users have installed dozens or even hundreds of applications to manage these numerous software. is also a troublesome thing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Strategy customization-based Android mobile phone security protection system and protection method thereof
  • Strategy customization-based Android mobile phone security protection system and protection method thereof
  • Strategy customization-based Android mobile phone security protection system and protection method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0036] see Figure 1-5 , a strategy-customized security protection system for Android mobile phones, including a mobile phone anti-theft module, a communication guard module, a traffic statistics module, a process management module and a system optimization module, a process management module and a system optimization module;

[0037] The mobile phone anti-theft module is used to protect the user's address book, short messages and important information. The mobile phone anti-theft module adopts SharedPreferences to store passwords, and inserts a key whose key value is password into the config.xml file under Sdcard to store passwords.

[0038] The communication guard module realizes the protection and control of mobile phone communication data. The communication guard module intercepts system short message broadcasts, uses AIDL to o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a security protection system and a protection method thereof, in particular to a strategy customization-based Android mobile phone security protection system and a protection method thereof. The protection system and the protection method are mainly applied to data security protection in the mobile field and belong to the wireless communication field. The strategy customization-based Android mobile phone security protection system includes a mobile phone anti-theft module, a communication guard module, a traffic statistics module, a process management module and a system optimization module; the system is applicable to various kinds of Android devices; the functions of the modules can be turned on and turned off by users autonomously, and therefore, different security demands of different users can be satisfied, and protection strategies can be more effective. The invention also provides a strategy customization-based Android mobile phone security protection method.

Description

technical field [0001] The invention relates to a security protection system and a protection method thereof, in particular to a policy-customized Android phone security protection system and a protection method thereof, which are mainly applied to data security protection in the mobile field and belong to the field of wireless communication networks. Background technique [0002] According to the security mechanism of the Android system, there is no better way to protect user security. Third-party applications can easily and simply obtain user data and install malicious apk without the user's knowledge. [0003] (1) Due to the leakage of personal information, various small advertisements, insurance, banks, operators, and personal text messages, telephone harassment is also a major problem that plagues smartphone users. [0004] (2) The situation in the Android application market is not as unified as that of Apple. It is inevitable that some rogue software will run in the b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04M1/725H04M1/665H04W12/12H04W12/126
CPCH04M1/665H04W12/12H04M1/72406
Inventor 王琦张冬青黄可臻
Owner FUZHOU BOKE WANGAN INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products