Unlock instant, AI-driven research and patent intelligence for your innovation.

Security configuration method, security control apparatus and security configuration apparatus

A security configuration and security technology, applied in the field of communication, can solve problems such as complex procedures, poor user experience, and inability of end users to choose applications individually, so as to simplify procedures and improve user experience

Active Publication Date: 2017-07-25
CHINA MOBILE COMM GRP CO LTD
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, due to the large number of applications that need to be protected in the Android system, and the sources of each application are different, the developers are different, and their signatures are also different. Therefore, it is necessary to write a corresponding security policy for each application to provide protection for the application, resulting in The procedure for configuring security policies for applications is complex, and since the security policies for each application are pushed to the terminal by the server, end users cannot individually select applications that require security policy protection, resulting in poor user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security configuration method, security control apparatus and security configuration apparatus
  • Security configuration method, security control apparatus and security configuration apparatus
  • Security configuration method, security control apparatus and security configuration apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0077] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the drawings in the embodiments of the present invention.

[0078] An embodiment of the present invention provides a security configuration method for a terminal, and the terminal may be a mobile phone, a tablet computer, etc., which is not limited in this embodiment of the present invention. like figure 1 As shown, the security configuration method includes:

[0079] Step 101. Receive a marking instruction input by a user.

[0080] For example, the terminal can refer to figure 2 As shown, it includes a user configuration module 201, a signature mapping module 202, and a SeLinux security policy protection module 203, wherein the user configuration module 201 is connected to the signature mapping module 202, and the signature mapping module 202 is connected to the SeLinux security policy protection module. The module 203 is connecte...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a security configuration method. The method comprises the following steps: determining whether an application has a security identifier; and when the application is provided with the security identifier, using a local preset compulsive access control security system SeLinux security strategy to protect the security of the application. The embodiment of the invention further discloses a security configuration method. The method comprises the following steps: receiving a mark indicator input by a user; and setting a security identifier for the application according to the mark indicator. Further, the embodiment of the invention further discloses a security control apparatus and a security configuration apparatus.

Description

technical field [0001] The present invention relates to terminal security technology in the communication field, in particular to a security configuration method, a security control device and a security configuration device. Background technique [0002] Due to the flexibility and good compatibility of the Android system, more and more terminals adopt the Android system, and a large number of Android applications also appear, a large part of which may involve the user's private information. If the information is leaked, it is likely to be Threats to the personal safety or property safety of users. In order to ensure the security of the Android system, the kernel of the Android system integrates a mandatory access control security system (Security-Enhanced Linux, SeLinux), and the SeLinux adopts a security policy to ensure the security of the file, that is, a security policy is set for each file. All access to a file is illegal unless permitted by the file's security policy...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/02H04L29/06H04L12/24
CPCH04L41/0823H04L63/205H04W12/02
Inventor 刘玮哲
Owner CHINA MOBILE COMM GRP CO LTD