WO2014187038A1 - 智能移动终端及其数据处理方法 - Google Patents

智能移动终端及其数据处理方法 Download PDF

Info

Publication number
WO2014187038A1
WO2014187038A1 PCT/CN2013/082078 CN2013082078W WO2014187038A1 WO 2014187038 A1 WO2014187038 A1 WO 2014187038A1 CN 2013082078 W CN2013082078 W CN 2013082078W WO 2014187038 A1 WO2014187038 A1 WO 2014187038A1
Authority
WO
WIPO (PCT)
Prior art keywords
signature information
mobile terminal
file
signature
application
Prior art date
Application number
PCT/CN2013/082078
Other languages
English (en)
French (fr)
Inventor
余立艳
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2014187038A1 publication Critical patent/WO2014187038A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/565Static detection by checking file integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/128Anti-malware arrangements, e.g. protection against SMS fraud or mobile malware
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity

Definitions

  • the present invention relates to the field of mobile communication technologies, and in particular, to an intelligent mobile terminal and a data processing method thereof.
  • the main purpose of the embodiments of the present invention is to provide a data processing method for an intelligent mobile terminal, so as to solve the technical problem that the file or the application cannot be filtered in the prior art.
  • An embodiment of the present invention provides an intelligent mobile terminal, including an operating system and a processor, where the operating system includes a system side signature library, and is used to intercept a file or an application's preset signature when the smart mobile terminal processes a file or an application. Information and determine whether the signature information format is correct, if the format is correct, the signature information is packaged and transmitted to the processor;
  • the processor includes a processor side signature library, and the operating system for the signature information when the signature information is received further includes a filtering module, configured to filter the file or the application according to the verification result of the signature information illegally deal with.
  • the processor side signature library comprises: An encryption module, configured to encrypt the signature information;
  • the module is configured to compare the encryption result of the encryption module with the preset encryption result. If the two are consistent, the file or the application is determined to be legal, otherwise the determination is illegal.
  • the system side signature inventory is in a storage area of the operating system and is in a hidden state.
  • the system side signature library is further configured to directly feed back to the operating system whether the signature information of the file or the application is illegal when the signature information or the signature information format error is not intercepted.
  • the smart mobile terminal is a mobile phone or a tablet.
  • the filtering module filters the file or the application according to the verification result of the signature information illegally, including:
  • the embodiment of the present invention further provides a data processing method for an intelligent mobile terminal, including the following steps: when the smart mobile terminal processes a file or an application, intercepting the preset signature information of the file or the application program, and determining whether the format of the signature information is correct, If the format is correct, the signature information is packaged and transmitted to the processor of the smart mobile terminal;
  • the processor performs legality verification on the signature information when receiving the signature information, and transmits the verification result to an operating system of the smart mobile terminal;
  • the operating system filters the files or applications based on the results of the illegal verification.
  • the step of performing legality verification on the signature information when the processor receives the signature information includes:
  • the encryption result is compared with the preset encryption result. If the two are consistent, the file or the application is determined to be legal, otherwise the determination is illegal.
  • the step of intercepting the signature information of the file or the application and determining whether the signature information format is correct comprises:
  • the step of encrypting the signature information is performed on the handset processor side.
  • the operating system filters the file or the application according to the illegal verification result, including:
  • the smart mobile terminal when processing the file or the application program, the smart mobile terminal first intercepts the preset signature information of the file or the application program and determines whether the signature information meets the requirements, and if not, the file or the application program is filtered. Realize the control of files and applications on the smart mobile terminal, so that the files and applications operated by the user need to be verified by the signature, so as to filter the bad files or applications, and avoid the negatively affected files or applications being operated. Lead people astray.
  • the segmented signature verification method proposed by the embodiment of the present invention not only ensures the user experience, but also ensures the security of the signature database. BRIEF abstract
  • FIG. 1 is a schematic structural diagram of an intelligent mobile terminal according to an embodiment of the present invention.
  • FIG. 2 is a working architecture diagram of an intelligent mobile terminal according to an embodiment of the present invention.
  • FIG. 3 is a schematic flowchart of a data processing method of an intelligent mobile terminal according to an embodiment of the present invention
  • FIG. 4 is a schematic flowchart of a processor verifying legality of signature information according to an embodiment of the present invention.
  • the smart mobile terminal includes an operating system 10 and a processor (not referred to as a CPU) 20, and the operating system 10 includes a system-side signature library 11 for processing a file or an application by the smart mobile terminal. Intercepting the preset signature information of the file or the application and determining whether the format of the signature information is correct. If the format is correct, the signature information is packaged and transmitted to the processor 20; the processor 20 includes a processor side (which can be understood as the modem side of the smart mobile terminal).
  • a signature library 21 configured to perform legality verification on the signature information when the signature information is received, and transmit the verification result to the operating system 10;
  • the operating system 10 further includes a filtering module 12, configured to verify the illegal verification result according to the signature information.
  • Files or applications are filtered (such as deleting or blocking or disabling operations, etc.).
  • the smart mobile terminal embodiment of the present invention may further include a bipolar communication module 30 for the processor 20 and the operating system 10 Data transfer between.
  • operating system 10 transmits signature information to processor 20 via bipolar communication module 30.
  • the processor 20 transmits the validity verification result to the operating system 10 or the like through the bipolar communication module 30.
  • the signature information of the file or the application is pre-made by the source file creation unit.
  • the source file creation unit is the organization that makes the files and applications suitable for underage, and can be a mobile communication carrier.
  • the mobile communication carrier has a signature library that automatically performs signature information operations on some public-facing files or applications.
  • the signature database can be set by the mobile operator. After the signature database is set, when files or applications are created, the files or applications can be signed and generated to generate signature information.
  • the signature library of the intelligent mobile terminal can also be issued by the mobile communication carrier and then set by the mobile terminal manufacturer into the smart mobile terminal.
  • the mobile terminal manufacturer can apply to the relevant state agencies, and the relevant state agencies can inspect the manufacturer's production capacity and social influence and reputation. If the national requirements are met, the relevant signature database (for example, the processor side)
  • the signature library 21 and the system side signature library 11) are loaded so that the handset manufacturer loads the processor side signature library 21 and the system side signature library 11 when the mobile phone is manufactured.
  • the signature library loaded here refers to the corresponding code, and when it is loaded, it becomes the corresponding function module in the intelligent mobile terminal.
  • the processor-side signature database 21 may include: an encryption module 211, configured to encrypt the signature information.
  • the encryption module 211 stores an encryption algorithm, which may be used for signature. The information is encrypted.
  • the comparison module 212 is configured to perform the encryption result of the encryption module 211 and the preset encryption result. If the two match, the file or application is determined to be legal, otherwise the decision is illegal. In the embodiment of the present invention, the comparison result is preset in the comparison module 212. If the encryption result of the signature information by the encryption module 211 is inconsistent with the preset encryption result, the comparison module 212 determines that the file or the application is illegal, which is bad. information. In another embodiment, the signature information may also include the signature content and the signature obtained by encrypting the content or its hash result, and the comparison module 212 encrypts the encryption module 211 and the signature in the signature information (ie, Encryption results) It is also possible to compare.
  • the signature information includes a signature content and a signature (ie, an encryption result) obtained by encrypting the signature content or a hash result thereof by using a signature authority private key.
  • the processor side signature library includes a decryption module and a comparison module, wherein the decryption module is configured to decrypt the signature in the signature information by using the signature authority public key; the comparison module is configured to compare the signature content or the hash result thereof with the decryption result, and if the two are consistent, determine the file or the application Legal, otherwise it is illegal.
  • the system side signature library 11 may exist in a storage area of the operating system and is in a hidden state.
  • a storage area for storing the system side signature library 11 may be specifically opened on the mobile phone operating system 10 side. This storage area is hidden from the user, and the ordinary mobile terminal user cannot view the information of the area, thereby implementing the signature database. Hidden, improve the security of the signature library.
  • the system side signature database 11 is also used to directly feed back the file or the signature information of the application to the operating system 10 when the signature information is not intercepted or the signature information is in an incorrect format. For example, if the signature information is not intercepted in the signature system 11 of the mobile phone system side or the format of the signature information is not correct, the FALSE result is directly returned to the operating system 10, and the operating system 10 cannot perform operations on the file and the application, and can only be deleted.
  • the smart mobile terminal may be a mobile phone or a tablet computer.
  • the smart mobile terminal can obtain a file or an application through a network or through Bluetooth, MMS, Email, wifi, etc., or shared by other mobile terminals.
  • the process of processing a file or an application by the smart mobile terminal of the present invention will be described below by taking a mobile phone as an example according to the system architecture of FIG. 2.
  • the mobile phone obtains the file or the application through the network or Bluetooth, MMS, email, wifi, etc., and the obtained file or application needs to perform signature verification before the user performs the operation, and the verification process includes:
  • the mobile phone system side signature library 11 reads the signature information of the file and the application, and determines that the signature information is If there is a presence or a correct format, if the signature information exists and the information format is correct, the information is packaged, and after being packaged, the information needs to be transmitted to the mobile phone processor 20 through the bipolar communication module 30.
  • the mobile phone processor 20 side further judges the legality of the information.
  • the legality judgment is that the processor signature database 21 verifies the signature information transmitted from the mobile phone operating system 10 side, such as encrypting the signature information, and then comparing whether the result of the encryption is consistent with the preset encryption result, if consistent, Then it is judged to be legal and returns TRUE. If it is inconsistent, it is judged to be illegal, and it returns FALSE.
  • the returned result is transmitted to the mobile phone operating system 10 through the bipolar communication module 30, and the mobile operating system 10 side can further perform operations on the file and the application according to the returned result. For example, if TRUE is returned, the description is legal, and the user can This file or application does operations such as opening, previewing, copying, moving, sharing, and so on. Otherwise, the operating system 10 filters the files or filters the application (for example, deleting or blocking or prohibiting operations, etc.), and the user cannot perform corresponding operations on them. If the file and application have not been signed or the signature information is invalid on the mobile operating system 10 side, return directly.
  • the user can not open, preview, copy, move, share, etc. files and applications.
  • the present invention also provides a data processing method for an intelligent mobile terminal, which can be implemented based on the above smart mobile terminal.
  • the data processing method includes the following steps:
  • Step S10 When the smart mobile terminal processes the file or the application, intercepting the preset signature information of the file or the application;
  • Step S20 determining whether the format of the signature information is correct, and if the format is correct, executing step S30, packaging the signature information and transmitting the signature information to the processor of the smart mobile terminal;
  • the smart mobile terminal can download through the network, or through Bluetooth, multimedia messaging, email, wifi, etc., or can obtain files or applications through sharing with other mobile terminals.
  • the system-side signature library in the smart mobile terminal reads the signature information of the file and the application, determines whether the signature information exists or is in the correct format, if the signature information exists, and the information format is correct.
  • the package information, after packaging, the information needs to be transmitted to the processor side of the smart mobile terminal through the bipolar communication module.
  • Step S40 The processor validates the signature information when receiving the signature information, and transmits the verification result to the operating system of the smart mobile terminal;
  • the processor side further judges the legality of the information. Legitimacy judgment is the processor signature library
  • the signature information transmitted from the operating system side is encrypted, and then the result of the comparison is compared with the preset encryption result. If they are consistent, the judgment is legal and returns TRUE. If it is inconsistent, it is judged to be illegal, and it returns FALSE.
  • Step S50 The operating system filters the file or the application according to the illegal verification result.
  • the operating system 10 side can further perform operations on files and applications according to the returned result. For example, if TRUE is returned, the description is legal, and the user can open, preview, copy, move, share, etc. the file and the application. Otherwise, Users can't do it accordingly.
  • step S40 may include:
  • Step S21 encrypting the signature information
  • step S22 the encryption result is compared with the preset encryption result. If the two are consistent, the file or the application is determined to be legal, otherwise the determination is illegal.
  • the processor stores an encryption algorithm, and the signature information may be encrypted.
  • the encryption result is preset in the processor. If the encryption result of the signature information is inconsistent with the preset encryption result, the processor determines that the file or the application is illegal and is bad information.
  • other methods may be used to verify the validity of the signature information, and details are not described herein.
  • the foregoing step S10 may include: when the signature information is not intercepted or the signature information is in an incorrect format, the signature information of the file or the application is directly reported to the operating system. For example, if the signature information is not intercepted in the signature system of the mobile phone system or the signature information is not in the correct format, the FALSE result is directly returned to the operating system, and the operating system cannot operate on the file and the application.
  • the method may include: setting the system side signature inventory in a storage area of the operating system, in a hidden state.
  • a storage area for storing the system side signature library may be specifically opened on the mobile phone operating system side. This storage area is hidden from the user, and the ordinary mobile terminal user cannot view the information of the area, thereby realizing the hiding of the signature library. , improve the security of the signature library.
  • the data processing method of the intelligent mobile terminal or the intelligent mobile terminal first intercepts the preset signature information of the file or the application and determines the signature letter when processing the file or the application program. Whether the information meets the requirements, if it is not met, the file or application is filtered, and the files and applications on the smart mobile terminal can be controlled, so that the files and applications operated by the user need to be verified by signature, thereby avoiding Negatively affected files or applications are manipulated to lead people astray.
  • the segmented signature verification method proposed by the invention not only ensures the user experience, but also ensures the security of the signature library.
  • each module/unit in the foregoing embodiment may be implemented in the form of hardware, or may use software functions.
  • the form of the module is implemented. The invention is not limited to any specific form of combination of hardware and software.
  • the data processing method of the smart mobile terminal and the smart mobile terminal provided by the embodiments of the present invention can control the files and applications on the smart mobile terminal, so that the files and applications operated by the user need to pass through. Signature verification to avoid negatively affected files or applications being manipulated.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Virology (AREA)
  • General Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)
  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

一种智能移动终端,包括操作***和处理器,操作***包括***侧签名库,用于在智能移动终端处理文件或应用程序时,截取文件或应用程序的预置签名信息并判断签名信息格式的是否正确,如果格式正确则打包签名信息并传送至所述处理器;所述处理器包括处理器侧签名库,用于在接收到所述签名信息时对所述签名信息进行合法性验证,并将验证结果传送至所述操作***;所述操作***还包括过滤模块,用于根据签名信息非法的验证结果对文件或应用程序进行过滤处理。该智能移动终端可对不良文件或应用程序进行过滤,避免有负面影响的文件或应用程序***作,将人引入歧途。

Description

智能移动终端及其数据处理方法 技术领域
本发明涉及移动通信技术领域, 特别涉及一种智能移动终端及其数据处 理方法。
背景技术
随着计算机网络的飞速发展, 加之移动通信技术的普及, 社会已进入信 息化时代。 平时人们通过智能移动终端 (例如手机、 平板电脑等)就可以接 触到社会上的各种资讯, 例如通过网络下载各种文本、 图片、 音频、 视频、 应用程序等形式的文件, 这些文件有积极向上的、 有消极堕落的。 对于已经 有判断能力的成年人, 可以对这些文件做 选, 但是对于未成年人, 还没有 对这些文件做正确判断的能力, 很容易被一些有负面影响的文件带入歧途, 尤其是带有暴力、 色情的多媒体文件, 或者是应用程序。 而现有技术中, 尚 未出现可对不良信息进行过滤的智能移动终端。
发明内容
本发明实施例的主要目的在于提供一种智能移动终端的数据处理方法, 以解决现有技术中不能对文件或应用程序进行过滤的技术问题。
本发明实施例提供一种智能移动终端, 包括操作***和处理器, 所述操 作***包括***侧签名库, 用于在智能移动终端处理文件或应用程序时, 截 取文件或应用程序的预置签名信息并判断签名信息格式的是否正确, 如果格 式正确则打包签名信息并传送至所述处理器;
所述处理器包括处理器侧签名库, 用于在接收到所述签名信息时对所述 签名信息进行操作***还包括过滤模块, 用于根据签名信息非法的验证结果 对文件或应用程序进行过滤处理。
优选地, 所述处理器侧签名库包括: 加密模块, 用于对所述签名信息进行加密;
比对合法性验证, 并将验证结果传送至所述操作***;
所述模块, 用于将加密模块的加密结果和预置的加密结果进行比对, 如 果两者一致, 则判定文件或应用程序合法, 否则判定非法。
优选地, 所述***侧签名库存在于操作***的存储区, 处于隐藏状态。 优选地, 所述***侧签名库还用于在未截取到签名信息或者签名信息格 式错误时, 直接向操作***反馈文件或应用程序的签名信息非法。
优选地, 该智能移动终端为手机或平板电脑。
优选地, 所述过滤模块根据签名信息非法的验证结果对文件或应用程序 进行过滤处理, 包括:
如果验证结果是非法, 用户就不能对所述文件或应用程序做操作。
本发明实施例还提供一种智能移动终端的数据处理方法,包括以下步骤: 在智能移动终端处理文件或应用程序时, 截取文件或应用程序的预置签 名信息并判断签名信息格式的是否正确, 如果格式正确则打包签名信息并传 送至智能移动终端的处理器;
处理器接收到所述签名信息时对所述签名信息进行合法性验证, 并将验 证结果传送至智能移动终端的操作***;
操作***根据非法验证结果对文件或应用程序进行过滤处理。
优选地, 所述处理器接收到所述签名信息时对所述签名信息进行合法性 验证的步骤包括:
对所述签名信息进行加密;
将加密结果和预置的加密结果进行比对, 如果两者一致, 则判定文件或 应用程序合法, 否则判定非法。
优选地, 所述截取文件或应用程序的签名信息并判断签名信息格式的是 否正确的步骤包括:
在未截取到签名信息或者签名信息格式错误时, 直接向操作***反馈文 件或应用程序的签名信息非法。
优选地, 对签名信息进行加密的步骤在手机处理器侧进行。
优选地, 所述操作***根据非法验证结果对文件或应用程序进行过滤处 理, 包括:
如果验证结果是非法, 用户就不能对所述文件或应用程序做操作。
本发明实施例智能移动终端在对文件或应用程序进行处理时, 先截取文 件或应用程序的预置签名信息并判断签名信息是否符合要求, 如果不符合则 对文件或应用程序进行过滤处理, 可以实现对智能移动终端上的文件和应用 程序进行控制, 使得用户操作的文件和应用程序都需要经过签名验证, 从而 对不良文件或应用程序进行过滤 ,避免有负面影响的文件或应用程序***作 , 将人引入歧途。 另外本发明实施例提出的分段式签名验证方法, 既保证了用 户体验, 也保证了签名库的安全。 附图概述
图 1为本发明一实施例中智能移动终端的结构示意图;
图 2为本发明一实施例中智能移动终端的工作架构图;
图 3为本发明一实施例中智能移动终端的数据处理方法的流程示意图; 图 4为本发明一实施例中处理器对签名信息进行合法性验证的流程示意 图。
本发明的较佳实施方式
为使本发明的目的、 技术方案和优点更加清楚明白, 下文中将结合附图 对本发明的实施例进行详细说明。 需要说明的是, 在不冲突的情况下, 本申 请中的实施例及实施例中的特征可以相互任意组合。
参照图 1 , 图 1为本发明智能移动终端一实施例的结构示意图。 该实施 例中, 智能移动终端包括操作*** 10和处理器 (非指 CPU ) 20, 所述操作 *** 10包括***侧签名库 11 ,用于在智能移动终端处理文件或应用程序时, 截取文件或应用程序的预置签名信息并判断签名信息格式的是否正确, 如果 格式正确则打包签名信息并传送至处理器 20; 处理器 20包括处理器侧 (可 以理解为智能移动终端的调制解调器侧)签名库 21 , 用于在接收到签名信息 时对签名信息进行合法性验证, 并将验证结果传送至操作*** 10; 操作*** 10还包括过滤模块 12 ,用于根据签名信息非法的验证结果对文件或应用程序 进行过滤 (例如删除或屏蔽或禁止操作等)处理。
应当说明的是,本发明智能移动终端实施例中,除了操作*** 10和处理 器 20夕卜, 还可以包括双极通讯模块 30 , 该双极通讯模块 30用于处理器 20 与操作*** 10之间的数据传输。 例如, 操作*** 10通过双极通讯模块 30 将签名信息传送至处理器 20。处理器 20通过双极通讯模块 30将合法性验证 结果传输到操作*** 10等。
本发明实施例中, 文件或应用程序的签名信息由源文件制作单位预先制 作。 该源文件制作单位就是制作适合未成年的文件和应用程序的机构, 可以 是移动通信运营商。 该移动通信运营商具有签名库, 对一些面向公众的文件 或应用程序自动进行签名信息的操作。 签名库可以由移动运营商自行设定, 在设定了签名库以后, 制作文件或应用程序时, 就可以对这些文件或应用程 序做签名操作, 生成签名信息。
文件或应用程序制作好后上传网络, 用户可以通过本发明实施例的智能 移动终端从网络下载源文件。 智能移动终端的签名库也可由移动通信运营商 发放, 然后由移动终端制造商设置到智能移动终端中。 另外, 还可由移动终 端制造商到国家有关机构申请, 国家有关机构可对此制造商的生产能力和社 会影响力及信誉做考察, 如果符合国家要求, 则发放相关的签名库(例如处 理器侧签名库 21和***侧签名库 11 ) , 以便手机制造商在生产手机时, 加 载处理器侧签名库 21和***侧签名库 11。此处加载的签名库指相应的代码, 加载后运行时, 即成为智能移动终端中相应的功能模块。
参见图 1所示, 本发明实施例中, 处理器侧签名库 21可以包括: 加密模块 211 , 用于对签名信息进行加密; 本发明实施例中, 加密模块 211存储有加密算法, 可以对签名信息进行加密。
比对模块 212 , 用于将加密模块 211的加密结果和预置的加密结果进行 比对, 如果两者一致, 则判定文件或应用程序合法, 否则判定非法。 本发明 实施例中, 比对模块 212中预置有加密结果, 如果加密模块 211对签名信息 的加密结果与该预置的加密结果不一致, 则比对模块 212判定文件或应用程 序非法, 为不良信息。 在另一实施例中, 签名信息也可以包括签名内容和对 所述内容或其哈希结果加密得到的签名两部分,比对模块 212将加密模块 211 的加密结果和签名信息中的签名 (即加密结果) 比对, 也是可以的。 在另一 实施例中, 签名信息中包括签名内容和用签名机构私钥对该签名内容或其哈 希结果加密得到的签名 (即加密结果) , 此时, 处理器侧签名库包括解密模 块和比对模块,其中解密模块用于使用签名机构公钥解密签名信息中的签名; 比对模块用于将签名内容或其哈希结果与解密结果比较, 如果两者一致, 则 判定文件或应用程序合法, 否则判定非法。 关于签名验证的方法很多, 本发 明对此不做任何局限。
本发明实施例中, ***侧签名库 11可存在于操作***的存储区,处于隐 藏状态。 例如, 可在手机操作*** 10 侧专门开辟一用于存储***侧签名库 11的存储区域, 这一存储区域对用户是隐藏的, 普通手机终端用户无法查看 此区域的信息, 从而实现对签名库的隐藏, 提高签名库的安全性。
本发明实施例中,***侧签名库 11还用于在未截取到签名信息或者签名 信息格式错误时, 直接向操作*** 10反馈文件或应用程序的签名信息非法。 例如,如果在手机***侧签名库 11未截取到签名信息或者签名信息格式不正 确, 则直接给操作*** 10返回 FALSE结果, 操作*** 10就不能对文件和 应用程序做操作, 只能删除。
本发明实施例中, 上述智能移动终端可以为手机或平板电脑。
如图 2所示, 智能移动终端可以通过网络或者通过蓝牙、 彩信、 Email、 wifi等手段, 也可由其它移动终端共享获得文件或应用程序。 下面根据图 2 ***架构,以手机为例描述本发明智能移动终端处理文件或应用程序的流程。
手机通过网络或者蓝牙、彩信、 Email、 wifi等手段获取文件或应用程序, 获得的文件或应用程序在用户进行操作前, 首先需要做签名验证, 验证流程 包括:
手机***侧签名库 11读取文件和应用程序的签名信息,判断签名信息是 否存在或者格式是否正确, 如果签名信息存在, 并且信息格式正确, 则打包 信息, 打包后需要把信息经过双极通讯模块 30传到手机处理器 20侧。 手机 处理器 20 侧再对信息进一步做合法性判断。 合法性判断就是处理器签名库 21对从手机操作*** 10侧传过来的签名信息进行验证, 如对签名信息进行 加密, 然后比对加密的结果是否跟预置的加密结果是否一致, 如果一致, 则 判断为合法, 返回 TRUE。 如果不一致, 则判断为非法, 返回 FALSE。 返回 的结果再通过双极通讯模块 30传输到手机操作*** 10侧,手机操作*** 10 侧根据返回结果, 就可以对文件和应用程序做进一步操作, 例如如果返回 TRUE, 说明合法, 用户就可对此文件或应用程序做打开、 预览、 复制、 移 动、共享等操作。 否则操作*** 10就过滤文件或应用程序过滤(例如删除或 屏蔽或禁止操作等) , 用户就不能对其做相应操作。 如果在手机操作*** 10 侧已经发现文件和应用程序没有经过签名或者签名信息无效, 则直接返回
FALSE, 则用户也不能对文件和应用程序做打开、 预览、 复制、 移动、 共享 等操作。
本发明还提供一种智能移动终端的数据处理方法, 该方法可基于上述智 能移动终端实现。 参见图 3所示, 该数据处理方法包括以下步骤:
步骤 S10, 在智能移动终端处理文件或应用程序时, 截取文件或应用程 序的预置签名信息;
步骤 S20,判断签名信息格式的是否正确,如果格式正确则执行步骤 S30, 打包签名信息并传送至智能移动终端的处理器;
本发明实施例中, 智能移动终端可以通过网络下载, 或者通过蓝牙、 彩 信、 Email、 wifi等手段, 也可由其它移动终端共享获得文件或应用程序。 当 用户通过操作***操作文件或应用程序时, 智能移动终端中的***侧签名库 读取文件和应用程序的签名信息,判断签名信息是否存在或者格式是否正确, 如果签名信息存在, 并且信息格式正确, 则打包信息, 打包后需要把信息经 过双极通讯模块传到智能移动终端的处理器侧。
步骤 S40, 处理器接收到签名信息时对签名信息进行合法性验证, 并将 验证结果传送至智能移动终端的操作***;
处理器侧再对信息进一步做合法性判断。 合法性判断就是处理器签名库 对从操作***侧传过来的签名信息进行加密, 然后比对加密的结果是否跟预 置的加密结果是否一致, 如果一致, 则判断为合法, 返回 TRUE。 如果不一 致, 则判断为非法, 返回 FALSE。
步骤 S50,操作***根据非法验证结果对文件或应用程序进行过滤处理。 操作*** 10侧根据返回结果, 就可以对文件和应用程序做进一步操作, 例如如果返回 TRUE, 说明合法, 用户就可对此文件和应用程序做打开、 预 览、 复制、 移动、 共享等操作, 否则用户就不能对其做相应操作。
参见图 4所示, 本发明实施例中, 上述步骤 S40中可包括:
步骤 S21 , 对签名信息进行加密;
步骤 S22, 将加密结果和预置的加密结果进行比对, 如果两者一致, 则 判定文件或应用程序合法, 否则判定非法。
本发明实施例中, 处理器存储有加密算法, 可以对签名信息进行加密。 本发明实施例中, 处理器中预置有加密结果, 如果对签名信息的加密结果与 该预置的加密结果不一致,则处理器判定文件或应用程序非法,为不良信息。 但在其他实施例中, 如前所述, 对签名信息的合法性验证也可以釆用其他方 法, 不再赘述。
本发明实施例中, 上述步骤 S10可包括, 在未截取到签名信息或者签名 信息格式错误时, 直接向操作***反馈文件或应用程序的签名信息非法。 例 如, 如果在手机***侧签名库未截取到签名信息或者签名信息格式不正确, 则直接给操作***返回 FALSE结果, 操作***就不能对文件和应用程序做 操作。
上述实施例中, 在执行所有步骤之前可包括: 设置所述***侧签名库存 在于操作***的存储区, 处于隐藏状态。 例如, 可在手机操作***侧专门开 辟一用于存储***侧签名库的存储区域, 这一存储区域对用户是隐藏的, 普 通手机终端用户无法查看此区域的信息, 从而实现对签名库的隐藏, 提高签 名库的安全性。
本发明实施例智能移动终端或智能移动终端的数据处理方法在对文件或 应用程序进行处理时, 先截取文件或应用程序的预置签名信息并判断签名信 息是否符合要求, 如果不符合则对文件或应用程序进行过滤处理, 可以实现 对智能移动终端上的文件和应用程序进行控制, 使得用户操作的文件和应用 程序都需要经过签名验证, 从而避免有负面影响的文件或应用程序***作, 将人引入歧途。另外本发明提出的分段式签名验证方法,既保证了用户体验, 也保证了签名库的安全。
本领域普通技术人员可以理解上述方法中的全部或部分步骤可通过程序 来指令相关硬件完成, 所述程序可以存储于计算机可读存储介质中, 如只读 存储器、 磁盘或光盘等。 可选地, 上述实施例的全部或部分步骤也可以使用 一个或多个集成电路来实现, 相应地, 上述实施例中的各模块 /单元可以釆用 硬件的形式实现, 也可以釆用软件功能模块的形式实现。 本发明不限制于任 何特定形式的硬件和软件的结合。
需要说明的是, 本发明还可有其他多种实施例, 在不背离本发明精神及 和变形, 但这些相应的改变和变形都应属于本发明所附的权利要求的保护范 围。
工业实用性
与有关技术相比, 本发明实施方式所提供的智能移动终端和智能移动终 端的数据处理方法可以实现对智能移动终端上的文件和应用程序进行控制, 使得用户操作的文件和应用程序都需要经过签名验证, 从而避免有负面影响 的文件或应用程序***作。

Claims

权 利 要 求 书
1、 一种智能移动终端, 包括操作***和处理器, 其中,
所述操作***包括***侧签名库, 用于在智能移动终端处理文件或应用 程序时, 截取文件或应用程序的预置签名信息并判断签名信息格式的是否正 确, 如果格式正确则打包签名信息并传送至所述处理器;
所述处理器包括处理器侧签名库, 用于在接收到所述签名信息时对所述 签名信息进行合法性验证, 并将验证结果传送至所述操作***;
所述操作***还包括过滤模块, 用于根据签名信息非法的验证结果对文 件或应用程序进行过滤处理。
2、如权利要求 1所述的智能移动终端,其中,所述处理器侧签名库包括: 加密模块, 用于对所述签名信息进行加密;
比对模块, 用于将加密模块的加密结果和预置的加密结果进行比对, 如 果两者一致, 则判定文件或应用程序合法, 否则判定非法。
3、如权利要求 2所述的智能移动终端, 其中, 所述***侧签名库存在于 操作***的存储区, 处于隐藏状态。
4、如权利要求 1至 3中任一项所述的智能移动终端, 其中, 所述***侧 签名库还用于在未截取到签名信息或者签名信息格式错误时, 直接向操作系 统反馈文件或应用程序的签名信息非法。
5、如权利要求 4所述的智能移动终端, 其中, 该智能移动终端为手机或 平板电脑。
6、如权利要求 1所述的智能移动终端, 其中, 所述过滤模块根据签名信 息非法的验证结果对文件或应用程序进行过滤处理, 包括:
如果验证结果是非法, 用户就不能对所述文件或应用程序做操作。
7、 一种智能移动终端的数据处理方法, 其中, 包括以下步骤: 在智能移动终端处理文件或应用程序时, 截取文件或应用程序的预置签 名信息并判断签名信息格式的是否正确, 如果格式正确则打包签名信息并传 送至智能移动终端的处理器;
处理器接收到所述签名信息时对所述签名信息进行合法性验证, 并将验 证结果传送至智能移动终端的操作***;
操作***根据非法验证结果对文件或应用程序进行过滤处理。
8、如权利要求 7所述的智能移动终端的数据处理方法, 其中, 所述处理 器接收到所述签名信息时对所述签名信息进行合法性验证的步骤包括: 对所述签名信息进行加密;
将加密结果和预置的加密结果进行比对, 如果两者一致, 则判定文件或 应用程序合法, 否则判定非法。
9、如权利要求 7或 8所述的智能移动终端的数据处理方法, 其中, 所述 截取文件或应用程序的签名信息并判断签名信息格式的是否正确的步骤包 括:
在未截取到签名信息或者签名信息格式错误时, 直接向操作***反馈文 件或应用程序的签名信息非法。
10、 如权利要求 8所述的智能移动终端的数据处理方法, 其中, 对签名 信息进行加密的步骤在手机处理器侧进行。
11、 如权利要求 7所述的智能移动终端的数据处理方法, 其中, 所述操 作***根据非法验证结果对文件或应用程序进行过滤处理, 包括:
如果验证结果是非法, 用户就不能对所述文件或应用程序做操作。
PCT/CN2013/082078 2013-05-22 2013-08-22 智能移动终端及其数据处理方法 WO2014187038A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201310192460.4 2013-05-22
CN201310192460.4A CN104184574B (zh) 2013-05-22 2013-05-22 智能移动终端及其数据处理方法

Publications (1)

Publication Number Publication Date
WO2014187038A1 true WO2014187038A1 (zh) 2014-11-27

Family

ID=51932752

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2013/082078 WO2014187038A1 (zh) 2013-05-22 2013-08-22 智能移动终端及其数据处理方法

Country Status (2)

Country Link
CN (1) CN104184574B (zh)
WO (1) WO2014187038A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105718788B (zh) * 2016-01-19 2018-12-25 宇龙计算机通信科技(深圳)有限公司 一种恶意应用程序处理方法、装置以及终端

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101238710A (zh) * 2005-08-12 2008-08-06 移动代理有限公司 用于移动通信设备的内容过滤***及其使用方法
CN101281521A (zh) * 2007-04-05 2008-10-08 中国科学院自动化研究所 一种基于多分类器融合的敏感网页过滤方法及***
CN103093236A (zh) * 2013-01-15 2013-05-08 北京工业大学 一种基于图像语义分析的移动终端色情过滤方法

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6345307B1 (en) * 1999-04-30 2002-02-05 General Instrument Corporation Method and apparatus for compressing hypertext transfer protocol (HTTP) messages
CN100484232C (zh) * 2005-06-03 2009-04-29 中国科学院研究生院 数字电视广播***及方法
CN100574524C (zh) * 2006-07-19 2009-12-23 王李琰 一种基于标识的密码技术的短消息认证及可靠分类传递方法
CN102546604B (zh) * 2011-12-22 2014-12-24 四川长虹电器股份有限公司 智能电视应用程序安全控制方法

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101238710A (zh) * 2005-08-12 2008-08-06 移动代理有限公司 用于移动通信设备的内容过滤***及其使用方法
CN101281521A (zh) * 2007-04-05 2008-10-08 中国科学院自动化研究所 一种基于多分类器融合的敏感网页过滤方法及***
CN103093236A (zh) * 2013-01-15 2013-05-08 北京工业大学 一种基于图像语义分析的移动终端色情过滤方法

Also Published As

Publication number Publication date
CN104184574A (zh) 2014-12-03
CN104184574B (zh) 2019-04-16

Similar Documents

Publication Publication Date Title
KR102399582B1 (ko) 모바일 디바이스를 사용한 시스템 액세스
JP6262278B2 (ja) アクセス制御クライアントの記憶及び演算に関する方法及び装置
JP6430449B2 (ja) アクセス制御を管理するためのポリシーベース技法
CN106797383B (zh) 多租户环境中的安全性上下文管理的方法、***和介质
US10721075B2 (en) Web of trust management in a distributed system
US8925055B2 (en) Device using secure processing zone to establish trust for digital rights management
JP4912879B2 (ja) プロセッサの保護された資源へのアクセスに対するセキュリティ保護方法
KR102361884B1 (ko) 전자 장치의 불법 복제 및 불법 행위 방지에 하드웨어 기반 보안 격리 영역의 사용
US11972637B2 (en) Systems and methods for liveness-verified, biometric-based encryption
US20190327239A1 (en) Managing data access
WO2016019790A1 (zh) 一种安装包的校验方法、客户端、服务器及***
WO2015042981A1 (zh) 加解密处理方法、装置和设备
WO2017112641A1 (en) Dynamic management of protected file access
WO2020186457A1 (zh) 网络摄像机的认证方法和装置
CN107766701A (zh) 电子设备、动态库文件保护方法及装置
US20210232662A1 (en) Methods to protect stakeholders' algorithms and information in untrusted environments
CN115022091B (zh) 一种基于数字证书的自主授权方法和***
US10311240B1 (en) Remote storage security
US20110154436A1 (en) Provider Management Methods and Systems for a Portable Device Running Android Platform
WO2017112640A1 (en) Obtaining a decryption key from a mobile device
CN116686316A (zh) 加密文件控制
JP6344170B2 (ja) 機器、管理モジュール、プログラムおよび制御方法
WO2014187038A1 (zh) 智能移动终端及其数据处理方法
US8495749B2 (en) Method, apparatus and computer program product for a content protection system for protecting personal content
EP3942770B1 (en) Chained trusted platform modules (tpms) as a secure bus for pre-placement of device capabilities

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13885052

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 13885052

Country of ref document: EP

Kind code of ref document: A1