Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A malicious information transmission defense method and system of a mobile intelligent terminal

A mobile intelligent terminal, malicious information technology, applied in wireless communication, electrical components, security devices, etc., can solve the problems of poor user interaction, incomplete security inspection of sent information, user economic losses, etc., to improve real-time and efficient The effect of preventing malicious information from being sent and solving the problem of malicious sending

Inactive Publication Date: 2015-12-09
BEIJING UNIV OF POSTS & TELECOMM
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] From the behavioral characteristics and feasibility analysis of malicious applications, the security check of sending information is not perfect. Malicious application developers can use service (the name of the program running in the background) technology to run malicious sending information programs in the background, illegally steal local information, and send Send information to a specific destination address; you can also use the background to continuously send information, causing economic losses to users
[0006] In order to prevent the losses caused by the above-mentioned malicious applications to users, since the android1. Sending, however, this kind of prevention method only prevents from setting the amount of information to be sent, which has great limitations. When a problem is found, the user needs to be reminded, and the user needs to make a judgment every time, and the interaction with the user is poor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A malicious information transmission defense method and system of a mobile intelligent terminal
  • A malicious information transmission defense method and system of a mobile intelligent terminal
  • A malicious information transmission defense method and system of a mobile intelligent terminal

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0058] figure 1 A schematic flowchart of a method for defending malicious information transmission by a mobile smart terminal according to the first embodiment of the present invention is given. The steps of this embodiment will be described in detail below with reference to the accompanying drawings:

[0059] Judging step (110), when the application program of the mobile intelligent terminal is to send information, it is judged whether the sending object of the information is in the preset blacklist or whitelist;

[0060] In the processing step (120), if it is judged to be in the preset blacklist, then block the sending of the information; if it is judged to be in the preset whitelist, then allow the sending of the information.

[0061] Wherein, the blacklist is a list of application software not trusted by the smart mobile terminal; the white list is a list of application software trusted by the smart mobile terminal.

[0062] Each application program can be set in the trus...

no. 2 example

[0070] This embodiment describes in detail a method for defending against malicious information sent by an Android operating system terminal. figure 2 A flow example of a method for defending malicious information transmission by an Android operating system terminal according to this embodiment is given, and the steps of this embodiment will be described in detail below with reference to the accompanying drawings.

[0071] For ease of description, the same steps as those in the foregoing embodiments will not be described in detail, but only the differences from the foregoing embodiments will be highlighted. exist figure 1 and figure 2 In the same or similar steps as those in the foregoing embodiments, the same reference numerals are used.

[0072] In this example, refer to image 3 , by adding the checkWhiteList method and the CheckUnknownNumber method in the Android system, and modifying the method for sending the information in the framework layer of the Android system,...

no. 3 example

[0076] Figure 4 According to the third embodiment of the present invention, a schematic structural diagram of a malicious information transmission defense system of a mobile intelligent terminal, refer to the following Figure 4 To illustrate the composition of each part of this embodiment.

[0077] refer to Figure 4 , the module 41 , module 42 , module 43 , module 44 , and module 45 of this embodiment respectively execute the processing of step 110 , step 120 , step 130 , step 140 and step 150 of the first embodiment. It will not be expanded in detail here.

[0078] In addition, similar to the second embodiment, the malicious information transmission defense system of the third embodiment can also be a system using the Android operating system, and steps 110 and 120 are implemented by modifying the relevant methods of the Android operating system framework layer, and then by calling handleReachSentUnknown function to realize the function of prompting the user. It will n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a malicious information transmission preventing method and system of a mobile intelligent terminal. The method comprises the following steps of: judging, namely judging whether an information transmission object is in a preset blacklist or whitelist or not when the application program of the mobile intelligent terminal is about to transmit information; and processing, stopping the transmission of the information if the information transmission object is in the preset blacklist and allowing the transmission of the information if the information transmission object is in the preset whitelist, wherein the blacklist is a list of application software untrusted by the mobile intelligent terminal, and the whitelist is a list of application software trusted by the mobile intelligent terminal. By applying the method and system disclosed by the invention, the transmission of the malicious information can be efficiently prevented.

Description

technical field [0001] The present invention relates to the technical field of mobile intelligent terminals, in particular to a method and system for preventing malicious information transmission of mobile intelligent terminals. Background technique [0002] At present, with the development and application of various operating systems, smart terminal products are replacing traditional electronic products more and more quickly, and these terminal products include mobile phones, tablet computers, notebook computers, and the like. The existing operating systems used in smart terminal products mainly include PalmOS, Symbian, Windowsmobile, Linux, Android, iPhoneOS, BlackBerry, etc. [0003] Among them, Android is an open source mobile phone operating system based on the linux kernel. Since the official birth of Android, due to its open source, a large number of mobile phone applications have appeared. When Android was launched, Google designed certain security measures for poss...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/55H04W12/00H04W12/12G06F21/50H04W12/08H04W12/122H04W12/128
Inventor 邝坚邵洁卞佳丽唐硕
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products