CN110309628B - Method for safely sharing application of mobile terminal - Google Patents

Method for safely sharing application of mobile terminal Download PDF

Info

Publication number
CN110309628B
CN110309628B CN201910438851.7A CN201910438851A CN110309628B CN 110309628 B CN110309628 B CN 110309628B CN 201910438851 A CN201910438851 A CN 201910438851A CN 110309628 B CN110309628 B CN 110309628B
Authority
CN
China
Prior art keywords
application
mobile
control
management
strategy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910438851.7A
Other languages
Chinese (zh)
Other versions
CN110309628A (en
Inventor
赵洪巍
王伟
桂艳峰
陈电波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Zhizhangyi Technology Co ltd
Original Assignee
Beijing Zhizhangyi Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Zhizhangyi Technology Co ltd filed Critical Beijing Zhizhangyi Technology Co ltd
Priority to CN201910438851.7A priority Critical patent/CN110309628B/en
Publication of CN110309628A publication Critical patent/CN110309628A/en
Application granted granted Critical
Publication of CN110309628B publication Critical patent/CN110309628B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a method for safely sharing application of a mobile terminal, which comprises the following steps: step 1, a server configures a control strategy and issues the control strategy to a mobile control end; step 2, the mobile management and control terminal receives the strategy to start management and control and triggers a checking mechanism when waiting for application access; step 3, when the first application needs to share the content to other applications, the first application forwards the shared message carrier to the mobile control end, and the mobile control end analyzes the message carrier and judges whether the accessed target application allows access or not; step 4, if the access is allowed, the mobile management and control end returns to the access allowing state of the first application, and the first application continues to send the message carrier to other applications; and if the access is not allowed, the mobile management and control terminal returns to the state that the access of the first application is forbidden, and the first application cancels the sending of the message carrier. The invention can dynamically update the strategy at any time and take effect dynamically; the management and control strategy can be expanded, and classification and distinguishing are carried out on the application, so that more detailed management and control are achieved.

Description

Method for safely sharing application of mobile terminal
Technical Field
The invention belongs to the field of mobile application management, and particularly relates to a method for safely sharing mobile terminal applications.
Background
With the development of mobile informatization, mobile office becomes a common scheme for efficient operation of enterprises. However, when mobile office work is convenient, a series of problems such as increased mobile safety and enterprise safety information management exist, especially when non-company requirements or appointed office software is installed on mobile equipment, a great potential safety hazard exists, and when workers work, key information, links, documents and other confidential contents on the enterprise software can be sent to the non-appointed requirement safety office software through the sharing function of the mobile equipment, and then the information and other key problems can be revealed through the shared third-party safety software, so that unnecessary potential safety hazards and losses are brought to the enterprise.
Disclosure of Invention
In order to overcome the defects of the prior art, the invention provides a method for safely sharing a mobile terminal application, which effectively solves the problems.
In order to achieve the purpose, the invention adopts the following technical scheme:
a method for safely sharing application of a mobile terminal comprises the following steps:
step 1, a server configures a control strategy and issues the control strategy to a mobile control end;
step 2, the mobile management and control terminal receives the strategy to start management and control, and triggers a checking mechanism when waiting for the access of the application terminal;
step 3, when the first application needs to share the content to other applications, the first application forwards the shared message carrier to the mobile control end, and the mobile control end analyzes the message carrier and judges whether the accessed target application allows access or not;
step 4, if the access is allowed, the mobile management and control end returns to the access allowing state of the first application, and the first application continues to send the message carrier to other applications; and if the access is not allowed, the mobile management and control terminal returns to the state that the access of the first application is forbidden, and the first application cancels the sending of the message carrier.
Compared with the prior art, the invention has the following advantages and beneficial effects: a set of complete remote control scheme is provided, the strategy can be dynamically updated at any time, and the dynamic effect is achieved; the control strategy can be expanded, and classification and distinction are carried out on the application, so that more detailed control is achieved; the sharing of the application can be managed and controlled, and the normal use of the original application is not influenced.
Drawings
FIG. 1 is a schematic diagram of the principles of the present invention;
FIG. 2 is a flowchart of the application side workflow of the present invention;
fig. 3 is a flowchart of the work flow of the service manager according to the present invention.
Detailed Description
The present invention will be described in further detail with reference to examples, but the embodiments of the present invention are not limited thereto.
The invention relates to a security management and control scheme of a mobile terminal application sharing function, which is used for realizing the sharing management and control of different applications on mobile equipment. By the technical scheme, an enterprise administrator can configure the sharing and shared strategies of the designated work application through the server and send the strategies to the terminal through the server, so that the sharing operation of the staff when using the office series software is controlled by the sent strategies and can only be shared in the designated application and the specified strategies. Therefore, the enterprise management burden can be reduced, the safety is improved, and the office efficiency is improved.
Example (b):
as shown in fig. 1, a method for secure sharing of a mobile application includes the following steps:
and S1, the server configures a control strategy and issues the control strategy to the mobile control terminal.
And S2, the mobile management and control terminal receives the strategy to start management and control, and triggers a checking mechanism when waiting for the access of the application.
And S3, when the application A needs to share the content to other applications, the application A forwards the shared message carrier to the control end, and the control end analyzes the message carrier and judges whether the accessed target application belongs to the application which is allowed to be accessed.
S4, if the access is allowed, the control end returns to the state that the access is allowed by the application A, and the application A can continue to send the message carrier to other applications C through the system. And if the access is not allowed, the management and control end returns to the state that the access is forbidden by the application A, and the application A cancels the sending of the message carrier.
S5, when the application A is received by other applications through sharing the sending content, the application A acquires who the message source is, and decides whether to receive the message content according to the policy of the control end, otherwise, the application A discards the message content.
As shown in fig. 2, the application workflow is as follows:
and Y1, performing initialization configuration when the application is started, and performing proxy through an ActivityManagerService service of a dynamic proxy function multi-android system of Java, namely, a proxy IActityManager interface.
Y2, then we can start Activity method to intercept in the interface method, so as to obtain the content required to share. And a handler object mH in the code activityThread can intercept the Activity of the starting self.
Y3, during use, the code waiting action is triggered.
Y4, when the application shares operation to other applications, the method of IActivityManager interface of the agent is intercepted (eg: startActivity, etc.), and we can obtain the carrier Intent of the operation transfer information at this time from the parameters of the method.
Y1, at this time, we encapsulate and redirect the message carrier Intent to the mobile management and control end, and let the management and control end receive this Intent information.
Y5, the to-be-managed terminal analyzes Intent and obtains a result of whether the information is allowed to be sent to the target App according to the strategy, and the result is returned, so that the application receives the result.
Y6, if the sending is allowed according to the result, passes on the information carrier Intent to the real system service, then operates according to the normal application.
Y7, discarding the information carrier if transmission is not allowed. And finally, continuously waiting for triggering the next sharing action in the two cases, and carrying out corresponding management and control.
Y8, when the application is shared, it will enter into the Handler agent, at which time we only care about the msg object that starts Activity. From this object we can obtain the ActivityClientRecord object.
Y9, in the ActivityClientRecord object, we can get the package name that we can launch the Activity Source application from the referrer variable.
And Y10, checking the strategy configured by the mobile management and control terminal to the application, and judging whether the sharer application is allowed to start the application. If not, the message is discarded and Activity is not started.
Y11, if sharing is allowed, continuing to execute the system operation. And then continues to wait for the next trigger.
As shown in fig. 3, the service manager has the following workflow:
f1, initializing relevant configuration and necessary conditions when the mobile management terminal is started.
F2, starting network communication to establish connection with the server, and waiting for the server to push the management and control strategy.
F3, receiving the management and control strategy of the server, and storing the strategy in a local database.
F4, waiting for the application to trigger the sharing action and transmitting the information carrier Intent.
F5, obtaining Intent by analyzing and transferring, obtaining the package name in Intent, or inquiring (query) the package name of the application corresponding to Intent by a PackageManager.
F6, inquiring the configured strategy, judging whether the sharing to the target application is allowed, and returning the result to the current inquiry application.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the present invention in any way, and all simple modifications and equivalent variations of the above embodiments according to the technical spirit of the present invention are included in the scope of the present invention.

Claims (3)

1. A method for safely sharing application of a mobile terminal is characterized by comprising the following steps:
step 1, a server configures a control strategy and issues the control strategy to a mobile control end;
step 2, the mobile management and control terminal receives the strategy to start management and control, and triggers a checking mechanism when waiting for the access of the application terminal;
the working process of the application end is as follows:
y1, carrying out initialization configuration when the first application is started, and carrying out proxy through a proxy interface;
y2, waiting for a trigger share or shared action;
y3, intercepting and acquiring an information carrier Intent to be shared when the application carries out sharing operation to the target application;
y4, redirecting the information carrier Intent to the mobile control end;
y5, analyzing Intent by the to-be-moved management and control terminal, obtaining a result of whether to allow information to be sent to the target application according to the strategy, returning the result, and receiving the result by the first application;
y6, if the sending is allowed according to the result, the information is sent to the target application, and then the triggering of the next sharing action is waited;
y7, discarding the information carrier if transmission is not allowed, and then waiting for the triggering of the next sharing action;
y8, intercepting the transmitted recording information when the first application is shared;
y9, acquiring the application name of the sharer;
y10, checking a policy configured by the mobile management and control terminal to the first application, and judging whether the sharer application is allowed to start the first application; if not, discarding the recording message and not starting to receive;
y11, if sharing is allowed, continuing to execute the system operation, and then continuing to wait for the next trigger;
step 3, when the first application needs to share the content to the target application, the first application forwards the shared message carrier to the mobile control end, and the mobile control end analyzes the message carrier and judges whether the target application allows access or not;
step 4, if the access is allowed, the mobile management and control end returns to the access allowing state of the first application, and the first application continues to send the message carrier to the target application; and if the access is not allowed, the mobile management and control terminal returns to the state that the access of the first application is forbidden, and the first application cancels the sending of the message carrier.
2. The method according to claim 1, further comprising:
and 5, when the first application is received by the target application through sharing and sending the message content, the first application acquires a message source and determines whether to receive the message content according to the strategy of the mobile control end.
3. The method as claimed in claim 1, wherein the mobile application security sharing method,
the work flow of the mobile control end is as follows:
f1, starting initialization related configuration and necessary conditions by the mobile management and control terminal;
f2, starting network communication to establish connection with the server, and waiting for the server to push a management and control strategy;
f3, receiving a management and control strategy of the server, and storing the strategy in a local database;
f4, waiting for the first application to trigger the sharing action, and transmitting the message carrier Intent;
f5, analyzing the transferred Intent, obtaining the package name in the Intent, or inquiring the package name of the target application corresponding to the Intent through a PackageManager;
f6, inquiring whether the configured strategy allows sharing to the target application, and returning the result to the first application.
CN201910438851.7A 2019-05-24 2019-05-24 Method for safely sharing application of mobile terminal Active CN110309628B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910438851.7A CN110309628B (en) 2019-05-24 2019-05-24 Method for safely sharing application of mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910438851.7A CN110309628B (en) 2019-05-24 2019-05-24 Method for safely sharing application of mobile terminal

Publications (2)

Publication Number Publication Date
CN110309628A CN110309628A (en) 2019-10-08
CN110309628B true CN110309628B (en) 2021-06-01

Family

ID=68075012

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910438851.7A Active CN110309628B (en) 2019-05-24 2019-05-24 Method for safely sharing application of mobile terminal

Country Status (1)

Country Link
CN (1) CN110309628B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110856012B (en) * 2019-12-05 2022-05-03 网易(杭州)网络有限公司 Method, device, equipment and storage medium for sharing virtual product to live broadcast platform
CN114553809A (en) * 2020-11-11 2022-05-27 中兴通讯股份有限公司 Client device, information processing method, and computer-readable storage medium

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104066090A (en) * 2013-03-21 2014-09-24 联想(北京)有限公司 Information processing method and electronic device
CN104253834A (en) * 2013-06-27 2014-12-31 中国电信股份有限公司 Method, mobile terminal, and system for controlling mobile application data copying
CN104462478A (en) * 2014-12-18 2015-03-25 北京奇虎科技有限公司 Mobile browser client and webpage interacting method, device and client
CN105556469A (en) * 2013-09-12 2016-05-04 苹果公司 Mediated data exchange for sandboxed applications
CN106454999A (en) * 2015-08-13 2017-02-22 ***通信集团公司 Access control method and device
CN106845252A (en) * 2016-12-21 2017-06-13 北京奇虎科技有限公司 Terminal data access method, device and mobile terminal
CN107133513A (en) * 2017-05-10 2017-09-05 中南大学 It is a kind of support Android run when authority mechanism third-party application between communications access control method
CN108229158A (en) * 2018-01-10 2018-06-29 西安电子科技大学 A kind of guard method of the user privacy information stored in Android
CN108287987A (en) * 2017-12-20 2018-07-17 杭州云屏科技有限公司 Data managing method, device, equipment and readable storage medium storing program for executing
CN109165517A (en) * 2018-08-16 2019-01-08 腾讯科技(深圳)有限公司 A kind of method, apparatus preventing information leakage, medium and equipment

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9922378B2 (en) * 2011-12-27 2018-03-20 Nokia Technologies Oy Method and apparatus for providing intent-based monitoring using sensory information
US9817960B2 (en) * 2014-03-10 2017-11-14 FaceToFace Biometrics, Inc. Message sender security in messaging system

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104066090A (en) * 2013-03-21 2014-09-24 联想(北京)有限公司 Information processing method and electronic device
CN104253834A (en) * 2013-06-27 2014-12-31 中国电信股份有限公司 Method, mobile terminal, and system for controlling mobile application data copying
CN105556469A (en) * 2013-09-12 2016-05-04 苹果公司 Mediated data exchange for sandboxed applications
CN104462478A (en) * 2014-12-18 2015-03-25 北京奇虎科技有限公司 Mobile browser client and webpage interacting method, device and client
CN106454999A (en) * 2015-08-13 2017-02-22 ***通信集团公司 Access control method and device
CN106845252A (en) * 2016-12-21 2017-06-13 北京奇虎科技有限公司 Terminal data access method, device and mobile terminal
CN107133513A (en) * 2017-05-10 2017-09-05 中南大学 It is a kind of support Android run when authority mechanism third-party application between communications access control method
CN108287987A (en) * 2017-12-20 2018-07-17 杭州云屏科技有限公司 Data managing method, device, equipment and readable storage medium storing program for executing
CN108229158A (en) * 2018-01-10 2018-06-29 西安电子科技大学 A kind of guard method of the user privacy information stored in Android
CN109165517A (en) * 2018-08-16 2019-01-08 腾讯科技(深圳)有限公司 A kind of method, apparatus preventing information leakage, medium and equipment

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Android APP安全测试Checklist;拥春飞翔;《https://blog.csdn.net/iamhuanggua/article/details/53513312》;20161208;第1-9页 *
基于特征匹配的android应用漏洞分析框架;董国伟等;《清华大学学报(自然科学版)》;20160515(第05期);第461-467页 *

Also Published As

Publication number Publication date
CN110309628A (en) 2019-10-08

Similar Documents

Publication Publication Date Title
US10148565B2 (en) OPENFLOW communication method and system, controller, and service gateway
US9155117B2 (en) Directly transferring data between devices
CN110309628B (en) Method for safely sharing application of mobile terminal
CN101635726B (en) Service end of C/S architecture and service executing method and service executing system of client
CN102484655B (en) Public robot management method and system in private networks
JP4410608B2 (en) Web service providing method
US7774423B2 (en) Remote start system, remote start server and communication terminal
CN112187532A (en) Node control method and system
CN105165035A (en) Transmission of multimedia message doubled with transmission of text message
WO2024103943A1 (en) Service processing method and apparatus, storage medium, and device
US20170279686A1 (en) Terminal Topology Management Service Method, Device, and System for Internet of Things
US20140173635A1 (en) System and method for adding local resources for use by a mobile agent object
EP3416351A1 (en) Implementation method, apparatus and system for remote access
KR100597405B1 (en) System and method for relaying data by use of socket applicaton program
KR100811882B1 (en) Method and apparatus for multimedia messaging service using Parlay X Web service
CN103944802A (en) Method and device for controlling mobile equipment to use Exchange mailbox
CN100421493C (en) Method for implementing waiting in time delay in conversation procedure for devices connection
JP3557514B2 (en) Network management system
US6836470B1 (en) Method for reliable message delivery in a network of mobile computers
CN115208739B (en) Cross-multi-network-area docking method and method for docking one-way network areas in safe operation and maintenance areas
WO2024131602A1 (en) Data access control method, apparatus and device, and storage medium
KR100613856B1 (en) Fault management method using communication protocol api for fault management system
US20080025232A1 (en) Method and system for network connection
CN114390088B (en) Interaction method and device of EDPS (electronic data transfer protocol) through OPC UA client and OPC UA server
EP4387310A1 (en) Computing session release method, and device and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant