CN106156645A - Terminal data protection method, terminal and equipment - Google Patents

Terminal data protection method, terminal and equipment Download PDF

Info

Publication number
CN106156645A
CN106156645A CN201510143804.1A CN201510143804A CN106156645A CN 106156645 A CN106156645 A CN 106156645A CN 201510143804 A CN201510143804 A CN 201510143804A CN 106156645 A CN106156645 A CN 106156645A
Authority
CN
China
Prior art keywords
terminal
competence profile
file
user
accessing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510143804.1A
Other languages
Chinese (zh)
Inventor
王会彩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201510143804.1A priority Critical patent/CN106156645A/en
Priority to PCT/CN2015/079834 priority patent/WO2016155102A1/en
Publication of CN106156645A publication Critical patent/CN106156645A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of terminal data protection method, terminal and equipment, described method includes: when terminal accesses wireless access point AP, call the default corresponding competence profile with described AP;According to the security strategy of described competence profile definition, security control is carried out to described terminal.Visible; the method of the invention and terminal; when terminal accesses Wi-Fi hotspot; the competence profile that can set according to user; security control is carried out to terminal; it such as automatic hidden file, file, application icon etc., is automatically stopped application program, the disabling systemic-function etc. of operation, thus reaches the purpose protected privacy of user and ensure secure user data.

Description

Terminal data protection method, terminal and equipment
Technical field
The present invention relates to wireless communication technology field, particularly relate to a kind of terminal data protection method, terminal and Equipment.
Background technology
With the extensively application of intelligent terminal and popularizing of wireless network, WiFi increasingly becomes people's life In indispensable means of communication.The thing followed is privacy and safe problem emerges in an endless stream.For example, when When user accesses unsafe Wi-Fi hotspot (i.e. AP), lawless person can steal what user was currently in use Application account and password, once these information are trapped, and lawless person just can be with straightway login user All of application, even includes bank's class application.In addition to account number cipher, the data that application is uploading are also Can be trapped, such as photo, shopping information, chat content, even address list, lawless person is according to these Content can disguise oneself as you completely, then goes to deceive your friends and family, causes larger range of loss.
Visible, WiFi safety problem is very urgent.So, when terminal is accessing Wi-Fi hotspot (i.e. AP) During network, how can protect the safety of terminal data, become the technical problem to be solved.
Content of the invention
In view of the above problems, it is proposed that the present invention is to provide a kind of protecting terminal data solving the problems referred to above Method, terminal and equipment.
According to one aspect of the present invention, provide a kind of terminal data protection method, comprising:
When terminal accesses wireless access point AP, call the default corresponding competence profile with described AP;
According to the security strategy of described competence profile definition, security control is carried out to described terminal.
Alternatively, in the method for the invention, described when terminal accesses wireless access point AP, call default The corresponding competence profile with described AP, comprising:
When terminal accesses AP, obtain in the AP being pre-configured with and competence profile mapping table with The corresponding competence profile of AP accessing, and call the competence profile of acquisition.
Alternatively, the method for the invention also includes:
When AP pair not getting and accessing in the AP being pre-configured with competence profile mapping table During the competence profile answered, obtain and call default default privilege configuration file or user for access The newly configured competence profile of AP.
Alternatively, in the method for the invention, described security strategy includes one or more of following strategy: The file specified, file and/or application program are set to safe mode, the appointment automatically terminating running should The terminal system function specified by program and disabling;Wherein, described safe mode includes: hide or Forbid accessing.
Alternatively, the method for the invention also includes: when terminal disconnects from the AP accessing, stop safety control System, recovers the reset condition of terminal.
According to another aspect of the present invention, provide a kind of terminal, comprising:
File calling module, for when terminal accesses AP, calling the default corresponding authority with described AP Configuration file;
Safety control module, for the security strategy according to the definition of described competence profile, to described terminal Carry out security control.
Alternatively, in terminal of the present invention, described file calling module, specifically for accessing AP when terminal When, obtain in the AP being pre-configured with competence profile mapping table and the corresponding power of AP accessing Limit configuration file, and call the competence profile of acquisition.
Alternatively, in terminal of the present invention, described file calling module, it is additionally operable to when being pre-configured with The corresponding competence profile of AP not getting and accessing in AP and competence profile mapping table When, obtain and call default default privilege configuration file or user and join for the newly configured authority of the AP of access Put file.
Alternatively, in terminal of the present invention, described security strategy includes one or more of following strategy: The file specified, file and/or application program are set to safe mode, automatically terminate the application journey specified The terminal system function that sequence and disabling are specified;Wherein, described safe mode includes: hides or forbids Access.
Alternatively, terminal of the present invention, also includes:
Recover module, for when terminal disconnects from the AP accessing, stopping security control, recovering the former of terminal Beginning state.
According to the present invention in one aspect, providing a kind of protecting terminal data equipment, this equipment includes:
Pick-up part, by the competence profile write memory of user setup;
Controller, when terminal accesses wireless access point AP, reads described memory, calls and described AP pair The competence profile answered, and according to the security strategy of this competence profile definition, described terminal is carried out Security control.
The present invention has the beneficial effect that:
The method of the invention, terminal and equipment, when terminal accesses Wi-Fi hotspot, can set according to user Fixed competence profile, carries out security control to terminal, such as automatic hidden file, file, application journey Sequence icons etc., are automatically stopped application program, the disabling systemic-function etc. of operation, thus it are hidden to reach protection user Purpose that is private and that ensure secure user data.
Brief description
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to enforcement In example or description of the prior art, the accompanying drawing of required use is briefly described, it should be apparent that, retouch below Accompanying drawing in stating is only some embodiments of the present invention, for those of ordinary skill in the art, not On the premise of paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
The flow chart of a kind of terminal data protection method that Fig. 1 provides for the embodiment of the present invention;
Fig. 2 is to add focus and the flow chart configuring corresponding competence profile in the embodiment of the present invention;
Fig. 3 is the flow chart of editing authority configuration file in the embodiment of the present invention;
Fig. 4 is the flow chart carrying out protecting terminal data in the embodiment of the present invention when terminal accesses focus;
Fig. 5 is the implementing procedure figure of the present invention when terminal disconnects from focus in the embodiment of the present invention;
The structured flowchart of a kind of terminal that Fig. 6 provides for the embodiment of the present invention;
The another structured flowchart of a kind of terminal that Fig. 7 provides for the embodiment of the present invention;
The structured flowchart of a kind of protecting terminal data equipment that Fig. 8 provides for the embodiment of the present invention;
The another structured flowchart of a kind of protecting terminal data equipment that Fig. 9 provides for the embodiment of the present invention.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clearly It Chu, is fully described by, it is clear that described embodiment is only a part of embodiment of the present invention, rather than Whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art are not making creation Property work under the premise of the every other embodiment that obtained, broadly fall into the scope of protection of the invention.
Embodiment one
The embodiment of the present invention provides a kind of terminal data protection method, as it is shown in figure 1, specifically include following step Rapid:
Step 101, when terminal accesses wireless access point AP, calls the default corresponding power with described AP Limit configuration file;
Step 102, according to the security strategy of described competence profile definition, carries out safe control to described terminal System.
It is to say, the method for the invention, when terminal accesses different Wi-Fi hotspot (i.e. AP), Carry out security control by the different rights configuration file that user sets, to reach protection privacy of user, guarantee The purpose of user information safety.
Illustrate based on above-mentioned principle, several concrete and preferred embodiment is given below, in order to refine and to optimize The function of the method for the invention, so that the enforcement of the present invention program is more convenient, accurately.It should be noted that In the case of not conflicting, following feature can be combined mutually.
In the embodiment of the present invention, when terminal accesses AP, at the AP being pre-configured with and competence profile pair Answer and relation table obtains and the corresponding competence profile of AP accessing, and call the authority configuration literary composition of acquisition Part.It is to say, for different AP, user can be pre-configured with multiple authority corresponding with each AP and join Put file, form AP and competence profile corresponding relation list, carry out authority for terminal when accessing AP Configuration file calls.
Certainly, owing to AP distribution is very wide, user can not predict all of AP and configure authority configuration for it File.So, user can arrange one or more acquiescence competence profile (i.e. not with certain AP pair Should), if the AP that terminal is linked into is not in mapping table, it is possible to prompt the user whether to use acquiescence Competence profile, if user allows, then can directly transfer the competence profile of acquiescence.Certainly, use It when family can not comprise, in mapping table, the AP being currently accessed yet, is the newly configured corresponding authority of this AP Configuration file, and upon configuration, call newly configured competence profile.
Further, in the embodiment of the present invention, described security strategy includes one of following strategy or many Individual: the file specified, file and/or application program are set to safe mode, the finger automatically terminating operation Determine application program and disable the terminal system function specified;Wherein, described safe mode includes: hide Or forbid accessing, it may be assumed that hide file, file and/or the application icon specified, or, forbid Access file, file and/or the application program specified.
It should be noted that above-mentioned security strategy is simply enumerated not exhaustive, those skilled in the art can root Set security strategy according to self-demand flexibly.
Further, in the embodiment of the present invention, when terminal disconnects from the AP accessing, security control is stopped, Recover the reset condition of terminal.
In summary, the embodiment of the present invention proposes a kind of when terminal accesses different focuses by WiFi, energy Enough demands according to user, hide the file, file, application program desktop icons etc. that user specifies automatically, And the specified application of automatic terminating terminal, disabling part system function etc., protect privacy of user, protect Barrier user information safety.Such as user's configuration, when accessing a certain public hot spot " A ", terminates automatically as paid The application programs such as treasured, bank client, ensure user information safety;Access carrier focus " B " is worked as in configuration When, automatically terminate such as the application programs such as video playback, prevent consuming a large amount of flow and bring economic loss;Configuration When accessing such as the public hot spots such as company " C ", or when accessing his other focus " D ", automatically hide and specify Photo, video etc., automatically hide such as the desktop icons of the application programs such as game, protect privacy of user not by Reveal.
Provide one specific embodiment of the present invention below according to Fig. 2~Fig. 5, and combine the description to embodiment, Provide the ins and outs of the present invention further so that it is method concrete that the present invention provide can be better described Realize process.
As in figure 2 it is shown, for adding focus and the flow chart configuring corresponding competence profile, concrete configuration Process is as follows:
Step 201: authority configuration feature item is opened;
Wherein, opening can be that user arranges actively click unlatching in function in terminal, it is also possible to be terminal When accessing focus, after user allows, opened by backstage.
Step 202: present configuration interface, this configuration interface comprises: add focus option and newly-built configuration literary composition Part option;If user have selected interpolation focus option, then illustrate that user is corresponding for the focus configuration added Competence profile, step 203;If user have selected newly-built Profile option, then illustrate that user wants Set up default privilege configuration file, step 204;
Step 203, obtains the hotspot name that user adds, step 204;
Step 204: present file, file, application program and the systemic-function list of terminal, for user's choosing Select;
Step 205: preserve file, file, application program and/or the systemic-function that user selects;
Step 206: built-in with system for the information preserving or the foundation of user-defined security strategy are mated Relation, forms competence profile;It is to say, it is to need security control that user selects the information preserving Information, when competence profile is transferred, implements corresponding security strategy to the information preserving.
Step 207: if formed is the corresponding competence profile of focus, then by focus and corresponding authority thereof Configuration file is stored in focus and competence profile mapping table;If formed is civilian for default privilege configuration Part, then store the default privilege configuration file of configuration in mapping table.
In the present embodiment, when file, file, application program and the systemic-function list presenting terminal, Preferably, the competence profile being configured can also be presented, select for user.It is to say, If user have selected certain competence profile, illustrate that user wants the configuration identical with this competence profile, The then competence profile of direct Replica Selection, it is not necessary to user selects one by one, improves allocative efficiency.
In the present embodiment, focus and competence profile mapping table have editability and (such as modification, delete Remove), described mapping table can be entered edlin by user, as it is shown on figure 3, be editing authority configuration file Flow chart, specifically include following steps:
Step 301: obtain the competence profile to be edited that user selects;
Step 302: present file, file, application program and the systemic-function list of terminal, enter for user Row selects.
Preferably, when presenting list, the item chosen for current entitlement configuration file is marked display, Check preceding selection situation for user.
Step 303: preserve file, file, application program and/or the systemic-function that user reselects;
Step 304: based on the information preserving, form new competence profile.
Said process is the process of modification competence profile.In like manner, if user will be to focus and corresponding Competence profile is deleted, then, after getting the deletion item that user selects, directly delete.
As shown in Figure 4, for carrying out the flow chart of protecting terminal data when terminal accesses focus, specifically include Following steps:
Step 401: terminal accesses focus;
Step 402: judge whether the focus accessing is focus and the focus in authority configured list, if so, then Step 403;Otherwise, step 404;
Step 403: obtain in focus with permissions list and the corresponding competence profile of focus accessing, add Carry and perform competence profile, terminate;
Step 404: if focus is not in lists, it is judged that whether this focus is the focus accessing first;If so, Step 405;Otherwise, step 406;
Step 405, asks the user whether to add list to;If user confirms to add, then according to shown in Fig. 2 Flow process is added competence profile and preserves execution, terminates;If user confirms without then step 406;
Step 406, whether inquiry user sets loading default privilege configuration file, if so, loads default privilege Configuration file simultaneously performs, and terminates;If it is not, directly terminate.
In the case that user has accessed focus load and execution competence profile, when enabling application program, Judge that application program, whether in competence profile, if not existing, normally starts;If, eject prompting frame, Require that user reaffirms startup.If user confirms, normally start;If user cancels or do not operates, do not open Dynamic.
As it is shown in figure 5, be the implementing procedure figure of the present invention when terminal disconnects from focus.Comprise the steps:
Step 501: terminal disconnects from focus;
Step 502: judge whether to load and perform competence profile;
Step 503: if so, return to reset condition, terminates;If it is not, terminate.
Embodiment two
The embodiment of the present invention provides a kind of terminal, as shown in Figure 6, specifically includes:
File calling module 610, for when terminal accesses AP, calls default corresponding with described AP Competence profile;
Safety control module 620, for the security strategy according to the definition of described competence profile, to described end End carries out security control.
Based on said structure framework and implement principle, under the above constitution several concrete and preferably is given below Embodiment, in order to refine and to optimize the function of terminal of the present invention, so that the enforcement of the present invention program is more Convenient, accurately.It is specifically related to following content:
In the embodiment of the present invention, file calling module 610, when terminal accesses AP, be pre-configured with AP and competence profile mapping table obtain and the corresponding competence profile of AP accessing, and adjusts With the competence profile obtaining.It is to say, for different AP, user can be pre-configured with respectively The corresponding multiple competence profile of AP, form AP and competence profile corresponding relation list, for terminal Carry out competence profile when accessing AP to call.
And be directed to not get in the AP being pre-configured with competence profile mapping table and access The situation of the corresponding competence profile of AP, can obtain and call default default privilege configuration file or Person user is the newly configured competence profile of the AP accessing.
Further, in the embodiment of the present invention, described security strategy includes one or more of following strategy: The file specified, file and/or application program are set to safe mode, automatically terminate the application journey specified The terminal system function that sequence and disabling are specified;Wherein, described safe mode includes: hides or forbids Access.It should be noted that above-mentioned security strategy is simply enumerated not exhaustive, those skilled in the art are permissible Set security strategy according to self-demand flexibly.
Further, in the embodiment of the present invention, described terminal, also include:
Recover module 630, for when terminal disconnects from the AP accessing, stopping security control, recovering terminal Reset condition.
In sum, it is known that terminal of the present invention, different Wi-Fi hotspot (i.e. AP) is accessed in terminal When, carry out security control by the different rights configuration file that user sets, with reach protection privacy of user, Ensure the purpose of user information safety.
Provide one specific embodiment of the present invention below according to Fig. 7, and combine the description to embodiment, enter One step provides the ins and outs of the present invention so that it is the concrete knot of terminal that the present invention provide can be better described Structure and function.
The embodiment of the present invention provides a kind of terminal, as it is shown in fig. 7, comprises:
Configuration module 710, is used for generating the competence profile of acquiescence, or, it is right that the focus for specifying generates The competence profile answered.Concrete, the mode that configuration module generates competence profile is: end of scan Current all application programs and the current All Files of reading terminals, file and systemic-function, will Scanning and the information reading form list, select for user.When user have selected file, the file specified After folder, application program and/or systemic-function, the information selecting user is built-in with system or user makes by oneself The security strategy of justice sets up matching relationship, generates competence profile.
Memory module 720, for storing the competence profile that recording configuration module 710 generates, authority configures Corresponding relation between file and focus, and default privilege configuration file.Provide the user edition interface simultaneously, Make user can carry out edit operation to information therein.
File calling module 730, for when terminal accesses focus, by current hotspot and the letter in memory module Cease into line retrieval contrast, it is judged that this focus whether in a storage module, if being present in memory module, then directly Connect and call corresponding competence profile;If being not present in memory module, then user is pointed out to select acquiescence power Limit configuration file is still the newly configured competence profile of this focus, if the configuration of user's Selection and call default privilege File, then directly invoke corresponding default privilege configuration file, if user is chosen as focus, newly configured authority is joined Put file, then trigger configuration module 710, and call newly configured competence profile.
Cache module 740, for recording original state during terminal access focus, including application program runs feelings Condition etc..
Safety control module 750, for according to the competence profile calling, carrying out security control to terminal.
Recover module 760, for when terminal disconnects from focus, it is judged that whether terminal applies authority configuration literary composition Part, the if so, then original state of reading terminals from cache module 740, and call background program and carry out shape State is recovered;Otherwise, any operation is not done.
Embodiment three
The embodiment of the present invention provides a kind of protecting terminal data equipment, and as shown in Figure 8, this equipment includes:
Pick-up part 810, by the competence profile write memory 820 of user setup;
Controller 830, when terminal accesses AP, reads memory 820, calls the corresponding authority with this AP Configuration file, and according to the security strategy of this competence profile definition, security control is carried out to terminal.
Visible, equipment described in the present embodiment is when terminal accesses different Wi-Fi hotspot (i.e. AP), logical The different rights configuration file crossing user's setting carries out security control, reaches protection privacy of user, ensures user The purpose of information security.
9 provide one specific embodiment of the present invention below in conjunction with the accompanying drawings so that it is this can be better described The concrete structure of the equipment of bright offer and function.
As it is shown in figure 9, protecting terminal data equipment described in the present embodiment, comprising: GUI (graphic user interface) 910th, pick-up part the 920th, memory the 930th, controller 940 and buffer 950.Wherein:
GUI 910, provides the user the operation interface arranging competence profile.User can pass through GUI The competence profile of acquiescence is set, or, for the focus specified, corresponding competence profile is set.If The process of putting is: user selects to arrange the competence profile of acquiescence in GUI or is chosen as the focus specified Corresponding competence profile is set, the current all application programs of GUI end of scan and reading terminals Scanning and the information reading are formed list by current All Files, file and systemic-function, for Family selects.
Pick-up part 920, is connected with GUI 910, gather user select in GUI the file specified, File, application program and/or systemic-function information, by user select information built-in with system or use The self-defining security strategy in family sets up matching relationship, generates competence profile, and the authority configuration that will generate File is stored in memory 930;
Memory 930, is connected with pick-up part 920, the competence profile that storage pick-up part 920 generates, Corresponding relation between competence profile and focus, and default privilege configuration file.Provide the user simultaneously Edition interface so that user can carry out edit operation to information therein.
Controller 940, when terminal accesses focus, enables buffer 950, simultaneously by current hotspot and storage Information in device 930 enters line retrieval contrast, it is judged that whether this focus is in memory 930, if being present in In reservoir 930, then directly invoke corresponding competence profile;If being not present in memory 930, then It is still the newly configured competence profile of this focus that prompting user selects default privilege configuration file, if user's choosing Select and call default privilege configuration file, then directly invoke corresponding default privilege configuration file, if user selects For the newly configured competence profile of focus, then trigger GUI 910, and call newly configured competence profile, And according to the competence profile calling, security control is carried out to terminal.Further, break from focus in terminal When opening, it is judged that whether terminal applies competence profile, if so, then reading terminals from buffer 950 Original state, and call background program and carry out state recovery;Otherwise, any operation is not done.
Buffer 950, under the enable of controller 940 controls, record terminal accesses original state during focus, Including application program ruuning situation etc..
Obviously, those skilled in the art can carry out various change and modification without deviating from this to the present invention Bright spirit and scope.So, if the present invention these modification and modification belong to the claims in the present invention and Within the scope of its equivalent technologies, then the present invention is also intended to comprise these changes and modification.

Claims (11)

1. a terminal data protection method, it is characterised in that include:
When terminal accesses wireless access point AP, call the default corresponding competence profile with described AP;
According to the security strategy of described competence profile definition, security control is carried out to described terminal.
2. the method for claim 1, it is characterised in that described at terminal access WAP During AP, call the default corresponding competence profile with described AP, comprising:
When terminal accesses AP, obtain in the AP being pre-configured with and competence profile mapping table with The corresponding competence profile of AP accessing, and call the competence profile of acquisition.
3. method as claimed in claim 2, it is characterised in that described method also includes:
When AP pair not getting and accessing in the AP being pre-configured with competence profile mapping table During the competence profile answered, obtain and call default default privilege configuration file or user for access The newly configured competence profile of AP.
4. the method for claim 1, it is characterised in that described security strategy includes in following strategy One or more: the file specified, file and/or application program are set to safe mode, automatically eventually The terminal system function that the specified application only run and disabling are specified;Wherein, described safe mode Including: hide or forbid accessing.
5. the method as described in Claims 1-4 any one, it is characterised in that described method also includes: When terminal disconnects from the AP accessing, stop security control, recover the reset condition of terminal.
6. a terminal, it is characterised in that include:
File calling module, for when terminal accesses AP, calling the default corresponding authority with described AP Configuration file;
Safety control module, for the security strategy according to the definition of described competence profile, to described terminal Carry out security control.
7. terminal as claimed in claim 6, it is characterised in that described file calling module, specifically for When terminal accesses AP, obtain in the AP being pre-configured with competence profile mapping table and access The corresponding competence profile of AP, and call the competence profile of acquisition.
8. terminal as claimed in claim 7, it is characterised in that described file calling module, is additionally operable to work as The corresponding power of AP not getting and accessing in the AP being pre-configured with competence profile mapping table During limit configuration file, obtain and call default default privilege configuration file or user and newly join for the AP accessing The competence profile put.
9. terminal as claimed in claim 6, it is characterised in that described security strategy includes in following strategy One or more: the file specified, file and/or application program are set to safe mode, automatically eventually The terminal system function that the application program only specified and disabling are specified;Wherein, described safe mode includes: Hide or forbid accessing.
10. the terminal as described in claim 6 to 9 any one, it is characterised in that also include:
Recover module, for when terminal disconnects from the AP accessing, stopping security control, recovering the former of terminal Beginning state.
11. 1 kinds of protecting terminal data equipment, it is characterised in that this equipment includes:
Pick-up part, by the competence profile write memory of user setup;
Controller, when terminal accesses wireless access point AP, reads described memory, calls and described AP pair The competence profile answered, and according to the security strategy of this competence profile definition, described terminal is carried out Security control.
CN201510143804.1A 2015-03-30 2015-03-30 Terminal data protection method, terminal and equipment Pending CN106156645A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510143804.1A CN106156645A (en) 2015-03-30 2015-03-30 Terminal data protection method, terminal and equipment
PCT/CN2015/079834 WO2016155102A1 (en) 2015-03-30 2015-05-26 Terminal data protection method, terminal and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510143804.1A CN106156645A (en) 2015-03-30 2015-03-30 Terminal data protection method, terminal and equipment

Publications (1)

Publication Number Publication Date
CN106156645A true CN106156645A (en) 2016-11-23

Family

ID=57003925

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510143804.1A Pending CN106156645A (en) 2015-03-30 2015-03-30 Terminal data protection method, terminal and equipment

Country Status (2)

Country Link
CN (1) CN106156645A (en)
WO (1) WO2016155102A1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106529341A (en) * 2016-12-14 2017-03-22 北京小米移动软件有限公司 Application program hiding method and apparatus
CN107343279A (en) * 2017-07-07 2017-11-10 广东欧珀移动通信有限公司 Method for connecting network, device, terminal device and storage medium
CN107391543A (en) * 2017-05-24 2017-11-24 阿里巴巴集团控股有限公司 The kind identification method and device of a kind of hotspot
WO2018187961A1 (en) * 2017-04-12 2018-10-18 华为技术有限公司 Security policy processing method and related device
CN111310161A (en) * 2020-01-20 2020-06-19 Oppo(重庆)智能科技有限公司 Application management method and device and computer readable storage medium
CN116193018A (en) * 2022-12-08 2023-05-30 中国联合网络通信集团有限公司 Method, device, equipment and storage medium for executing security policy

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101668293A (en) * 2009-10-21 2010-03-10 杭州华三通信技术有限公司 Control method and system of network access authority in WLAN
CN102413220A (en) * 2011-11-24 2012-04-11 中兴通讯股份有限公司 Method for controlling right of using connection function and mobile terminal
CN103796278A (en) * 2014-02-27 2014-05-14 成都悟空科技有限公司 Mobile terminal wireless network access control method
CN104066088A (en) * 2014-06-06 2014-09-24 Tcl通讯(宁波)有限公司 Wireless internet access strategy method, system and definition method for mobile terminal
WO2015026622A1 (en) * 2013-08-20 2015-02-26 Ebay Inc. Systems and methods for location-based device security

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101572931A (en) * 2008-04-29 2009-11-04 中兴通讯股份有限公司 User access control method based on Iu framework and system
CN103632073A (en) * 2013-12-05 2014-03-12 北京网秦天下科技有限公司 Method and device used for controlling terminal application permission
CN104125335B (en) * 2014-06-24 2017-08-25 小米科技有限责任公司 Right management method, apparatus and system
CN104239764B (en) * 2014-10-15 2017-07-07 北京奇虎科技有限公司 The management-control method and device of terminal device and its systemic-function

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101668293A (en) * 2009-10-21 2010-03-10 杭州华三通信技术有限公司 Control method and system of network access authority in WLAN
CN102413220A (en) * 2011-11-24 2012-04-11 中兴通讯股份有限公司 Method for controlling right of using connection function and mobile terminal
WO2015026622A1 (en) * 2013-08-20 2015-02-26 Ebay Inc. Systems and methods for location-based device security
CN103796278A (en) * 2014-02-27 2014-05-14 成都悟空科技有限公司 Mobile terminal wireless network access control method
CN104066088A (en) * 2014-06-06 2014-09-24 Tcl通讯(宁波)有限公司 Wireless internet access strategy method, system and definition method for mobile terminal

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王常杰: "网络安全接入控制技术研究", 《中兴通讯技术》 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106529341A (en) * 2016-12-14 2017-03-22 北京小米移动软件有限公司 Application program hiding method and apparatus
WO2018187961A1 (en) * 2017-04-12 2018-10-18 华为技术有限公司 Security policy processing method and related device
CN109863772A (en) * 2017-04-12 2019-06-07 华为技术有限公司 A kind of processing method and relevant device of security strategy
CN107391543A (en) * 2017-05-24 2017-11-24 阿里巴巴集团控股有限公司 The kind identification method and device of a kind of hotspot
CN107391543B (en) * 2017-05-24 2020-08-14 阿里巴巴集团控股有限公司 Wireless hotspot type identification method and device
CN107343279A (en) * 2017-07-07 2017-11-10 广东欧珀移动通信有限公司 Method for connecting network, device, terminal device and storage medium
CN111310161A (en) * 2020-01-20 2020-06-19 Oppo(重庆)智能科技有限公司 Application management method and device and computer readable storage medium
CN111310161B (en) * 2020-01-20 2022-11-25 Oppo(重庆)智能科技有限公司 Application management method and device and computer readable storage medium
CN116193018A (en) * 2022-12-08 2023-05-30 中国联合网络通信集团有限公司 Method, device, equipment and storage medium for executing security policy

Also Published As

Publication number Publication date
WO2016155102A1 (en) 2016-10-06

Similar Documents

Publication Publication Date Title
CN106156645A (en) Terminal data protection method, terminal and equipment
CA2814852C (en) Method for establishing a plurality of modes of operation on a mobile device
CN104657213B (en) Using the method and terminal of switching between a kind of system
CN103347116A (en) System and method for setting multi-security modes in smart phone
CN103413095B (en) The method and apparatus of management mobile terminal
CN103577735B (en) A kind of multi-user system quick registration and the method and system of switching
CN103164264B (en) Application manager, application management method and access method
CN103036768B (en) The method and apparatus of management application
CN106973376A (en) Application program is selected to access the method and device of network
CN104008350A (en) Mobile terminal and method entering different user modes in different unlocking ways
CN104134036B (en) Method and device for obtaining Root permission
CN108023805A (en) The collocation method and device of interaction authority
CN105025165A (en) Interface unlocking method and system corresponding to multiple passwords
CN109886013A (en) Enterprise's authority control method, equipment, storage medium and device
CN106022148A (en) File encryption method and device
CN102917098A (en) Method and device for preventing important linkman from being wrongly deleted
CN107343279A (en) Method for connecting network, device, terminal device and storage medium
CN105227358A (en) The method to set up of network type and system
CN105447365A (en) Control based privacy protection method and user terminal
CN106203159A (en) A kind of method and apparatus of application program operation file
EP2950561B1 (en) Method and system for domain creation and bootstrapping
CN103428370B (en) Mobile phone and multi-user control method thereof
CN106503570A (en) The method and device of protection Root authority
CN106445532A (en) Unified management method and device for application program and terminal
CN106332207A (en) Network connection switching method and system and mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20161123

WD01 Invention patent application deemed withdrawn after publication