Unlock instant, AI-driven research and patent intelligence for your innovation.

Working method of safety certification device for information synchronization

A security authentication and information synchronization technology, applied in security devices, telephone communications, wireless communications, etc., can solve problems such as user privacy leakage risks, reduce the risk of leakage, and improve security

Active Publication Date: 2020-08-14
上海圣庸工程科技有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Taking mobile phone backup as an example, the process of mobile phone backup generally involves the reading of private information such as the user's address book and text messages by related applications. For a class of legitimate applications, the mobile phone may request the user's mobile phone contacts in the form of a pop-up box. , text messages and other information to obtain user authorization, and for some malicious applications, there will be no pop-up box but direct use of special means (such as Trojans) to steal user personal information, which brings great privacy to users leakage risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Working method of safety certification device for information synchronization
  • Working method of safety certification device for information synchronization
  • Working method of safety certification device for information synchronization

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0127] As an implementation manner, this step S20 may include:

[0128] Step S21, detecting whether the mobile terminal pops up a dialog box of the authentication request information of the application;

[0129] Step S22, if the mobile terminal does not pop up the dialog box of the application's authentication request information, then it is determined that the application has not sent the authentication request information.

[0130] For a class of legal applications, before reading information such as mobile phone contacts and short messages, the mobile terminal will generally pop up a dialog box for application authentication request information to allow the user to perform security authentication and authorization for the application. In this embodiment, the system records whether the mobile terminal pops up a dialog box of application authentication request information.

[0131] If the mobile terminal pops up a dialog box of application authentication request information,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a working method of a safety certification device for information synchronization, and the device comprises: a first judgment module which is used for judging whether an application is a preset safety application or not when a mobile terminal detects an information synchronization request of the application; a detection module which is used for detecting whether the application sends out authentication request information or not if the application is not the preset security application; a display module which is used for displaying an authentication interface if the application does not send out the authentication request information; and an authentication module which is used for receiving an authentication instruction triggered by a user based on the authentication interface and carrying out security authentication on the application according to the authentication instruction. The invention further discloses a security authentication method for information synchronization. According to the invention, the security of information synchronization of the mobile terminal can be improved.

Description

technical field [0001] The invention relates to the technical field of mobile terminals, in particular to a working method of a security authentication device for information synchronization. Background technique [0002] Mobile phone information synchronization means that the user writes the local information of the mobile phone to the cloud server, computer, SD card or other terminals with the help of related applications to achieve data synchronization, and then achieve the purpose of data backup or sharing. [0003] Taking mobile phone backup as an example, the process of mobile phone backup generally involves the reading of private information such as the user's address book and text messages by related applications. For a class of legitimate applications, the mobile phone may request the user's mobile phone contacts in the form of a pop-up box. , text messages and other information to obtain user authorization, and for some malicious applications, there will be no pop-...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/06H04M1/725
CPCH04W12/02H04W12/06H04M1/72463H04M1/72484H04W12/37
Inventor 不公告发明人
Owner 上海圣庸工程科技有限公司