CN104182704B - The method to set up of security strategy, the setting device of security strategy and terminal - Google Patents

The method to set up of security strategy, the setting device of security strategy and terminal Download PDF

Info

Publication number
CN104182704B
CN104182704B CN201410421597.7A CN201410421597A CN104182704B CN 104182704 B CN104182704 B CN 104182704B CN 201410421597 A CN201410421597 A CN 201410421597A CN 104182704 B CN104182704 B CN 104182704B
Authority
CN
China
Prior art keywords
security strategy
goal systems
current system
strategy
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410421597.7A
Other languages
Chinese (zh)
Other versions
CN104182704A (en
Inventor
岳蓬星
李炜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Coolpad Software Technology Shenzhen Co Ltd
Original Assignee
Coolpad Software Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Coolpad Software Technology Shenzhen Co Ltd filed Critical Coolpad Software Technology Shenzhen Co Ltd
Priority to CN201410421597.7A priority Critical patent/CN104182704B/en
Publication of CN104182704A publication Critical patent/CN104182704A/en
Application granted granted Critical
Publication of CN104182704B publication Critical patent/CN104182704B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2145Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention provides the setting device and a kind of terminal of a kind of method to set up of security strategy, a kind of security strategy, wherein, the method to set up of the security strategy includes:The current system of the terminal, when security strategy setting command is received, is that the Permission Levels in the plurality of system arrange security strategy less than arbitrary other goal systems of the current system.By technical scheme, it is possible to achieve in the case of not switched system, automatically General System is operated, some application programs in General System are turned off or on, improve the experience of user.

Description

The method to set up of security strategy, the setting device of security strategy and terminal
Technical field
The present invention relates to security strategy technical field, in particular to a kind of method to set up of security strategy, Yi Zhongan A kind of setting device and terminal of full strategy.
Background technology
At present, some users install dual system in terminal, and the dual system includes General System and security system (safety system The Permission Levels of system are higher than General System), when user enters security system, user may want to close certain in General System One application program (application program using data traffic such as QQ, wechat), to lift the safety of terminal, at this moment, terminal use It is accomplished by being switched to General System so as to these closing application programs, this brings very big inconvenience to user.
Therefore, when user is in security system, some application programs of General System how are automatically turned off or open, Make user avoid the switching of system, become problem demanding prompt solution.
The content of the invention
The present invention is based on the problems referred to above, it is proposed that a kind of new technical scheme, when user is in security system, can To realize, in the case of not switched system, automatically operating General System, turning off or in General System A little application programs, improve the experience of user.
In view of this, an aspect of of the present present invention proposes a kind of method to set up of security strategy, for terminal, the terminal Including multiple systems, the plurality of system has different Permission Levels, and the method to set up includes:The current system of the terminal System, when security strategy setting command is received, is that the Permission Levels in the plurality of system are arbitrary less than the current system Other goal systems arrange security strategy.
In the technical scheme, due to current system Permission Levels higher than goal systems Permission Levels, thus, when with When family wishes to operate the application program of goal systems by current system, QQ, wechat such as in closing goal systems, tune With short message application program in goal systems etc., by arranging security strategy for goal systems, you can realize in not switched system In the case of, automatically the application program of goal systems is controlled, this is conducive to the experience for improving user.
In above-mentioned technical proposal, it is preferable that also include:The current system is by the security strategy and the safe plan Slightly perform order to send to the goal systems, the goal systems perform life according to the security strategy and the security strategy Order performs the security strategy.
In the technical scheme, due to the security strategy of the acquiescence that is stored with goal systems, thus, arrange in current system After the security strategy of good goal systems, need to send to goal systems simultaneously the security strategy for performing order and arranging, so that mesh Mark system is controlled to the application program in goal systems again according to the security strategy that current system is arranged.
In above-mentioned technical proposal, it is preferable that the setting security strategy includes:Choosing of the current system according to user Select, the security strategy is set;Or the current system calls institute according to the security strategy historical record call instruction for receiving The security strategy historical record of goal systems is stated, the security strategy is arranged according to the security strategy historical record.
In the technical scheme, not only can currently select to arrange security strategy according to user, can also be by calling peace Full Policy History which increases the selection of user, while being also beneficial to further arranging the security strategy of goal systems The operation of user is reduced, is greatly facilitated user, is conducive to further lifting the experience of user.
In above-mentioned technical proposal, it is preferable that described that according to the security strategy historical record, the security strategy is set Specifically include:Come according at least one in the use time of the security strategy historical record, place to use and usage frequency The security strategy is set.
In the technical scheme, by the use time according to security strategy historical record, place to use and usage frequency In at least one arranging the security strategy of goal systems, security strategy can be made to more conform to the use habit of user, more Plus meet the real-time use demand of user, and then farthest meet the different use demands of user.For example, when user is in north During capital, usage frequency highest security strategy history note can be selected in being Pekinese's security strategy historical record from place to use Record is used as new security strategy.
In above-mentioned technical proposal, it is preferable that the security strategy includes one or a combination set of following strategy:Beat and open or close The GPS-capable that closes in the goal systems, open or close in the goal systems can networked application programs, Open or close the virtual location in the goal systems to arrange function and allow the current system to call the goal systems In destination application.
In the technical scheme, the destination application is included but is not limited to:Wechat application program, audio or video should With program and short message application program, and the security strategy includes but is not limited to the above, for example:The security strategy can also be wrapped Include:Goal systems are closed, forbids call function of goal systems etc..
Another aspect of the present invention proposes a kind of setting device of security strategy, and for terminal, the terminal includes many Individual system, the plurality of system have different Permission Levels, and the setting device includes:Setting unit, at the end The current system at end, when security strategy setting command is received, is the authority in the plurality of system using the current system Grade arranges security strategy less than arbitrary other goal systems of the current system.
In the technical scheme, due to current system Permission Levels higher than goal systems Permission Levels, thus, when with When family wishes to operate the application program of goal systems by current system, QQ, wechat such as in closing goal systems, tune With short message application program in goal systems etc., by arranging security strategy for goal systems, you can realize in not switched system In the case of, automatically the application program of goal systems is controlled, this is conducive to the experience for improving user.
In above-mentioned technical proposal, it is preferable that also include:Performance element, using the current system by the safe plan Slightly perform order and send to the goal systems with the security strategy so that the goal systems according to the security strategy and The security strategy performs order and performs the security strategy.
In the technical scheme, due to the security strategy of the acquiescence that is stored with goal systems, thus, arrange in current system After the security strategy of good goal systems, need to send to goal systems simultaneously the security strategy for performing order and arranging, so that mesh Mark system is controlled to the application program in goal systems again according to the security strategy that current system is arranged, certainly, if The higher system of multiple authorities sends the security strategy of setting to goal systems simultaneously and performs order, then goal systems will be to more The authority of individual system is judged, and then performs the security strategy that the highest-ranking system of authority is arranged.
In above-mentioned technical proposal, it is preferable that the setting unit is additionally operable to:Using the current system according to user's Select, the security strategy is set;Or to call life according to the security strategy historical record for receiving using the current system The security strategy historical record of the goal systems is called in order, arranges the safe plan according to the security strategy historical record Slightly.
In the technical scheme, not only can currently select to arrange security strategy according to user, can also be by calling peace Full Policy History which increases the selection of user, while being also beneficial to further arranging the security strategy of goal systems The operation of user is reduced, is greatly facilitated user, is conducive to further lifting the experience of user.
In above-mentioned technical proposal, it is preferable that the setting unit specifically for:According to the security strategy historical record Use time, at least one in place to use and usage frequency to be arranging the security strategy.
In the technical scheme, by the use time according to security strategy historical record, place to use and usage frequency In at least one arranging the security strategy of goal systems, security strategy can be made to more conform to the use habit of user, more Plus meet the real-time use demand of user, and then farthest meet the different use demands of user.For example, when user is in north During capital, usage frequency highest security strategy history note can be selected in being Pekinese's security strategy historical record from place to use Record is used as new security strategy.
In above-mentioned technical proposal, it is preferable that the security strategy includes one or a combination set of following strategy:Beat and open or close The GPS-capable that closes in the goal systems, open or close in the goal systems can networked application programs, Open or close the virtual location in the goal systems to arrange function and allow the current system to call the goal systems In destination application.
In the technical scheme, the destination application is included but is not limited to:Wechat application program, audio or video should With program and short message application program, and the security strategy includes but is not limited to the above, for example:The security strategy can also be wrapped Include:Goal systems are closed, forbids call function of goal systems etc..
Another aspect of the present invention proposes a kind of terminal, including the safe plan as any one of above-mentioned technical scheme Setting device slightly.
In the technical scheme, by using the setting device of security strategy, it is possible to achieve in the situation of not switched system Under, automatically General System is operated, some application programs in General System are turned off or on.
By above technical scheme, it is possible to achieve in the case of not switched system, automatically General System is grasped Make, turn off or on some application programs in General System, improve the experience of user.
Description of the drawings
Fig. 1 shows the schematic flow sheet of the method to set up of security strategy according to an embodiment of the invention;
Fig. 2 shows the schematic flow sheet of the method to set up of security strategy according to another embodiment of the invention;
Fig. 3 shows the structural representation of the setting device of security strategy according to an embodiment of the invention;
Fig. 4 A and 4B show the structural representation of dual system termi-nal according to an embodiment of the invention;
Fig. 5 shows the structural representation of dual system termi-nal according to another embodiment of the invention.
Specific embodiment
It is in order to the above objects, features and advantages of the present invention can be more clearly understood that, below in conjunction with the accompanying drawings and concrete real Apply mode to be further described in detail the present invention.It should be noted that in the case where not conflicting, the enforcement of the application Feature in example and embodiment can be mutually combined.
Many details are elaborated in the following description in order to fully understand the present invention, but, the present invention may be used also Implemented with being different from other modes described here using other, therefore, protection scope of the present invention is not by described below Specific embodiment restriction.
Fig. 1 shows the schematic flow sheet of the method to set up of security strategy according to an embodiment of the invention.
As shown in figure 1, the method to set up of security strategy according to an embodiment of the invention, including:Step 102, institute The current system of terminal is stated when security strategy setting command is received, is the Permission Levels in the plurality of system less than described Arbitrary other goal systems of current system arrange security strategy.
In the technical scheme, due to current system Permission Levels higher than goal systems Permission Levels, thus, when with When family wishes to operate the application program of goal systems by current system, QQ, wechat such as in closing goal systems, tune With short message application program in goal systems etc., by arranging security strategy for goal systems, you can realize in not switched system In the case of, automatically the application program of goal systems is controlled, this is conducive to the experience for improving user.
In above-mentioned technical proposal, it is preferable that also include:The current system is by the security strategy and the safe plan Slightly perform order to send to the goal systems, the goal systems perform life according to the security strategy and the security strategy Order performs the security strategy.
In the technical scheme, due to the security strategy of the acquiescence that is stored with goal systems, thus, arrange in current system After the security strategy of good goal systems, need to send to goal systems simultaneously the security strategy for performing order and arranging, so that mesh Mark system is controlled to the application program in goal systems again according to the security strategy that current system is arranged.
In above-mentioned technical proposal, it is preferable that the setting security strategy includes:Choosing of the current system according to user Select, the security strategy is set;Or the current system calls institute according to the security strategy historical record call instruction for receiving The security strategy historical record of goal systems is stated, and the security strategy is arranged according to the security strategy historical record.
In the technical scheme, not only can currently select to arrange security strategy according to user, can also be by calling peace Full Policy History which increases the selection of user, while being also beneficial to further arranging the security strategy of goal systems The operation of user is reduced, is greatly facilitated user, is conducive to further lifting the experience of user.
In above-mentioned technical proposal, it is preferable that described that according to the security strategy historical record, the security strategy is set Specifically include:Come according at least one in the use time of the security strategy historical record, place to use and usage frequency The security strategy is set.
In the technical scheme, by the use time according to security strategy historical record, place to use and usage frequency In at least one arranging the security strategy of goal systems, security strategy can be made to more conform to the use habit of user, more Plus meet the real-time use demand of user, and then farthest meet the different use demands of user.For example, when user is in north During capital, usage frequency highest security strategy history note can be selected in being Pekinese's security strategy historical record from place to use Record is used as new security strategy.
In above-mentioned technical proposal, it is preferable that the security strategy includes one or a combination set of following strategy:Beat and open or close The GPS-capable that closes in the goal systems, open or close in the goal systems can networked application programs, Open or close the virtual location in the goal systems to arrange function and allow the current system to call the goal systems In destination application.
In the technical scheme, the destination application is included but is not limited to:Wechat application program, audio or video should With program and short message application program, and the security strategy includes but is not limited to the above, for example:The security strategy can also be wrapped Include:Goal systems are closed, forbids call function of goal systems etc..
Fig. 2 shows the schematic flow sheet of the method to set up of security strategy according to another embodiment of the invention.
As shown in Fig. 2 the method to set up of security strategy according to another embodiment of the invention.In this embodiment, Terminal include dual system, system A and system B, wherein, system B be security system, system A be non-security system, its Permission Levels Less than system B, system B can arrange security strategy for system A.Specifically describe in this embodiment with reference to Fig. 2, dual system Terminal arrange security strategy method, including:
Step 202, user currently have been enter into system B, and system B is operated, and current system is system B.
Step 204, judges whether the user wishes to arrange new security strategy in system B for system A, and is judging knot When fruit is to be, execution step 206, otherwise, execution step 204.
Step 206, when confirming that user wishes to arrange new security strategy for system A in system B, system B shows peace Full policing option list, the function of the application program comprising system A and system A in the list.
Step 208, user are configured to the function of application program and system in the list, to generate new safe plan Slightly.
Step 210, judges whether using the new security strategy, and when judged result is to be, execution step 212;Instead It, re-executes step 208.
The new security strategy and security strategy are performed order and are sent to system A by step 212, system B, so that system A Some functions of application program or restriction system A of system A are automatically turned on, are closed according to the new security strategy (for example:System The phonetic function of A).
Fig. 3 shows the structural representation of the setting device of security strategy according to an embodiment of the invention.
As shown in figure 3, the setting device 300 of security strategy according to an embodiment of the invention, including:
Setting unit 302, in the current system of the terminal when security strategy setting command is received, using institute It is that the Permission Levels in the plurality of system arrange peace less than arbitrary other goal systems of the current system to state current system Full strategy.
In the technical scheme, due to current system Permission Levels higher than goal systems Permission Levels, thus, when with When family wishes to operate the application program of goal systems by current system, QQ, wechat such as in closing goal systems, tune With short message application program in goal systems etc., by arranging security strategy for goal systems, you can realize in not switched system In the case of, automatically the application program of goal systems is controlled, this is conducive to the experience for improving user.
In above-mentioned technical proposal, it is preferable that also include:Performance element 304, using the current system by the safety Tactful and described security strategy performs order and sends to the goal systems, so that the goal systems are according to the security strategy Order is performed with the security strategy and performs the security strategy.
In the technical scheme, due to the security strategy of the acquiescence that is stored with goal systems, thus, arrange in current system After the security strategy of good goal systems, need to send to goal systems simultaneously the security strategy for performing order and arranging, so that mesh Mark system is controlled to the application program in goal systems again according to the security strategy that current system is arranged, certainly, if The higher system of multiple authorities sends the security strategy of setting to goal systems simultaneously and performs order, then goal systems will be to more The authority of individual system is judged, and then performs the security strategy that the highest-ranking system of authority is arranged.
In above-mentioned technical proposal, it is preferable that the setting unit 302 is additionally operable to:Using the current system according to The selection at family, arranges the security strategy;Or to be adjusted according to the security strategy historical record for receiving using the current system With the security strategy historical record of goal systems described in command calls, the safety is arranged according to the security strategy historical record Strategy.
In the technical scheme, not only can currently select to arrange security strategy according to user, can also be by calling peace Full Policy History which increases the selection of user, while being also beneficial to further arranging the security strategy of goal systems The operation of user is reduced, is greatly facilitated user, is conducive to further lifting the experience of user.
In above-mentioned technical proposal, it is preferable that the setting unit 302 specifically for:According to the security strategy history At least one in the use time of record, place to use and usage frequency is arranging the security strategy.
In the technical scheme, by the use time according to security strategy historical record, place to use and usage frequency In at least one arranging the security strategy of goal systems, security strategy can be made to more conform to the use habit of user, more Plus meet the real-time use demand of user, and then farthest meet the different use demands of user.For example, when user is in north During capital, usage frequency highest security strategy history note can be selected in being Pekinese's security strategy historical record from place to use Record is used as new security strategy.
In above-mentioned technical proposal, it is preferable that the security strategy includes one or a combination set of following strategy:Beat and open or close The GPS-capable that closes in the goal systems, open or close in the goal systems can networked application programs, Open or close the virtual location in the goal systems to arrange function and allow the current system to call the goal systems In destination application.
In the technical scheme, the destination application is included but is not limited to:Wechat application program, audio or video should With program and short message application program, and the security strategy includes but is not limited to the above, for example:The security strategy can also be wrapped Include:Goal systems are closed, forbids call function of goal systems etc..
Fig. 4 A and 4B show the structural representation of dual system termi-nal according to an embodiment of the invention.
As shown in Figure 4 A and 4 B shown in FIG., show the dual system termi-nal 400 of one embodiment of the present of invention.In the embodiment In, terminal 400 includes dual system, system A and system B, wherein, system B is security system, and system A is non-security system, its power Limit grade is less than system B, and system B can arrange security strategy (such as the security strategy of system A in system B in Fig. 4 A for system A It is shown), after system B sets the new security strategy of system A, system B according to the new security strategy to the application program of system A or Systemic-function is controlled, in the QQ for such as closing in system A, the GPS-capable for closing system A, opening system A Virtual location arranges function (so as to the virtual location in system A arranges function running in system A), opens and calling system A In short message application program (so that the short message application program in system A is run in system B) etc.;
Meanwhile, Fig. 4 B show the security strategy historical record to system A of system B storage in terminal 400, from the system Visible in the security strategy historical record of A, every security strategy in the security strategy historical record all contains the safe plan Place to use slightly, nearest use time and usage frequency, so that user is according to these information included in security strategy, are arranged Suitable security strategy, and then realize being controlled the application program or systemic-function of system A.
Fig. 5 shows the structural representation of dual system termi-nal according to another embodiment of the invention.
As shown in figure 5, dual system termi-nal 500 according to another embodiment of the invention, including:The setting of security strategy Device 300, by using the setting device 300 of security strategy, it is possible to achieve in the case of not switched system, automatically to one As system operated, turn off or on some application programs in General System.
Technical scheme is described in detail above in association with accompanying drawing, it is possible to achieve in the case of not switched system, Automatically General System is operated, some application programs in General System are turned off or on, the use body of user is improved Test.
The preferred embodiments of the present invention are the foregoing is only, the present invention is not limited to, for the skill of this area For art personnel, the present invention can have various modifications and variations.It is all within the spirit and principles in the present invention, made any repair Change, equivalent, improvement etc., should be included within the scope of the present invention.

Claims (9)

1. a kind of method to set up of security strategy, for terminal, it is characterised in that the terminal includes multiple systems, described many Individual system has different Permission Levels, and the method to set up includes:
The current system of the terminal, when security strategy setting command is received, is that the Permission Levels in the plurality of system are low In arbitrary other goal systems of the current system, security strategy is set;
The security strategy and the security strategy are performed order and are sent to the goal systems, the mesh by the current system Mark system performs order according to the security strategy and the security strategy and performs the security strategy.
2. the method to set up of security strategy according to claim 1, it is characterised in that the setting security strategy includes:
Selection of the current system according to user, arranges the security strategy;Or
The current system calls the safe plan of the goal systems according to the security strategy historical record call instruction for receiving Slightly historical record, arranges the security strategy according to the security strategy historical record.
3. the method to set up of security strategy according to claim 2, it is characterised in that described to be gone through according to the security strategy Records of the Historian record arranges the security strategy and specifically includes:
According at least one in the use time of the security strategy historical record, place to use and usage frequency to arrange State security strategy.
4. the method to set up of security strategy according to any one of claim 1 to 3, it is characterised in that
The security strategy includes one or a combination set of following strategy:
Open or close the GPS-capable in the goal systems, open or close joining in the goal systems Net application program, the virtual location opened or closed in the goal systems arrange function and allow the current system to call institute State the destination application in goal systems.
5. the setting device of a kind of security strategy, for terminal, it is characterised in that the terminal includes multiple systems, described many Individual system has different Permission Levels, and the setting device includes:
Setting unit, for when the current system of the terminal receives security strategy setting command, using the current system Arbitrary other goal systems for the Permission Levels in the plurality of system less than the current system of uniting arrange security strategy;
The security strategy and the security strategy are performed order using the current system and are sent to the mesh by performance element Mark system, so that the goal systems perform order according to the security strategy and the security strategy performs the safe plan Slightly.
6. the setting device of security strategy according to claim 5, it is characterised in that the setting unit is additionally operable to:
Using the current system according to the selection of user, the security strategy is set;Or
To call the goal systems according to the security strategy historical record call instruction for receiving using the current system Security strategy historical record, arranges the security strategy according to the security strategy historical record.
7. the setting device of security strategy according to claim 6, it is characterised in that
The setting unit specifically for:According to the use time of the security strategy historical record, place to use and using frequency At least one in rate is arranging the security strategy.
8. the setting device of the security strategy according to any one of claim 5 to 7, it is characterised in that
The security strategy includes one or a combination set of following strategy:Open or close the global positioning system in the goal systems System function, open or close in the goal systems can networked application programs, the void opened or closed in the goal systems Intend position to arrange function and allow the current system to call the destination application in the goal systems.
9. a kind of terminal, it is characterised in that include:The setting dress of the security strategy as any one of claim 5 to 8 Put.
CN201410421597.7A 2014-08-25 2014-08-25 The method to set up of security strategy, the setting device of security strategy and terminal Active CN104182704B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410421597.7A CN104182704B (en) 2014-08-25 2014-08-25 The method to set up of security strategy, the setting device of security strategy and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410421597.7A CN104182704B (en) 2014-08-25 2014-08-25 The method to set up of security strategy, the setting device of security strategy and terminal

Publications (2)

Publication Number Publication Date
CN104182704A CN104182704A (en) 2014-12-03
CN104182704B true CN104182704B (en) 2017-04-05

Family

ID=51963734

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410421597.7A Active CN104182704B (en) 2014-08-25 2014-08-25 The method to set up of security strategy, the setting device of security strategy and terminal

Country Status (1)

Country Link
CN (1) CN104182704B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105550587A (en) * 2015-12-11 2016-05-04 北京元心科技有限公司 Method and device for controlling system resource access in multi-system terminal equipment
CN105631270A (en) * 2015-12-30 2016-06-01 浙江德景电子科技有限公司 Double-system resource management method and system
CN106201675B (en) * 2016-06-25 2019-10-25 依偎科技(南昌)有限公司 A kind of mobile terminal application freezing method and mobile terminal
CN106201603B (en) * 2016-06-30 2020-03-27 宇龙计算机通信科技(深圳)有限公司 Method and device for freezing application program
CN106874756B (en) * 2017-02-20 2019-07-23 北京信息科技大学 A kind of active defense method and system towards android system loophole
CN108959974A (en) * 2018-06-29 2018-12-07 中国科学院信息工程研究所 The safety protecting method and system of mobile terminal
CN114448709B (en) * 2022-02-16 2024-03-12 上海雾帜智能科技有限公司 Information security policy generation method, system, device and medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101854359A (en) * 2010-05-19 2010-10-06 南京联创科技集团股份有限公司 Access control method based on virtualized calculation
CN103413089A (en) * 2013-08-28 2013-11-27 天翼电信终端有限公司 Mobile terminal and method thereof for achieving dual system
CN103679007A (en) * 2013-12-19 2014-03-26 深圳全智达通信股份有限公司 Method and device for managing application program permission and mobile device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7945942B2 (en) * 2005-07-15 2011-05-17 Microsoft Corporation System and methods for exchanging user interface data in a multi-user system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101854359A (en) * 2010-05-19 2010-10-06 南京联创科技集团股份有限公司 Access control method based on virtualized calculation
CN103413089A (en) * 2013-08-28 2013-11-27 天翼电信终端有限公司 Mobile terminal and method thereof for achieving dual system
CN103679007A (en) * 2013-12-19 2014-03-26 深圳全智达通信股份有限公司 Method and device for managing application program permission and mobile device

Also Published As

Publication number Publication date
CN104182704A (en) 2014-12-03

Similar Documents

Publication Publication Date Title
CN104182704B (en) The method to set up of security strategy, the setting device of security strategy and terminal
CN104793995B (en) The method and device for controlling GPS to call
CN105828424B (en) Intelligent terminal and energy consumption quantitative control method thereof
WO2016045190A1 (en) Switching method, switching system and terminal for system and/or application program
CN105677477B (en) Method and device for optimizing application program resources and electronic equipment
CN103853610B (en) Method for optimizing resources and device
CN104503828B (en) A kind of process management method and terminal
CN102937870B (en) A kind of method and terminal of man machine operation interface unlock
CN102855430A (en) Process blacklist and whitelist control method based on Windows system
CN104007903B (en) Interface invoking method, interface invoking device, and electronic device
CN105631311A (en) Application program authority management method and device as well as terminal
CN104065822B (en) Standby flow control methods and standby volume control device
CN106256116A (en) A kind of method controlling application program and terminal
CN105117320B (en) Electric terminal middle pipe ought to method and its electric terminal
WO2012152049A2 (en) Method and device for shutting down application
CN106126327B (en) A kind of control method and control device of application program launching
CN104794402A (en) System switching method, system switching device and terminal
CN104573463B (en) system switching method, system switching device and terminal
CN106020907B (en) A kind of method for closing and device of application program
CN105025350B (en) A kind of playback terminal control method and playback terminal
CN105700663A (en) Background program cleaning method and system for mobile terminal
CN104517071B (en) System processing method, system processing meanss and terminal
CN105335146B (en) The method and portable electronic device of management software data traffic
CN105260004A (en) Screen rotating method and system for android system terminal
CN106022108B (en) A kind of synchronization management method and terminal device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant