Movatterモバイル変換


[0]ホーム

URL:


CN106850701B - Mobile terminal sharing isolation method and system - Google Patents

Mobile terminal sharing isolation method and system
Download PDF

Info

Publication number
CN106850701B
CN106850701BCN201710240824.XACN201710240824ACN106850701BCN 106850701 BCN106850701 BCN 106850701BCN 201710240824 ACN201710240824 ACN 201710240824ACN 106850701 BCN106850701 BCN 106850701B
Authority
CN
China
Prior art keywords
behavior
application
sharing
screening
result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710240824.XA
Other languages
Chinese (zh)
Other versions
CN106850701A (en
Inventor
黄诗智
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sangfor Technologies Co Ltd
Original Assignee
Sangfor Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sangfor Technologies Co LtdfiledCriticalSangfor Technologies Co Ltd
Priority to CN201710240824.XApriorityCriticalpatent/CN106850701B/en
Publication of CN106850701ApublicationCriticalpatent/CN106850701A/en
Application grantedgrantedCritical
Publication of CN106850701BpublicationCriticalpatent/CN106850701B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Classifications

Landscapes

Abstract

The application discloses a mobile terminal sharing isolation method and a system, and the method comprises the following steps: intercepting the application behavior to obtain a corresponding interception result; screening out behaviors related to the target sharing behaviors from the interception results to obtain corresponding screening results; the target sharing behavior is a sharing behavior between the enterprise application and the personal application; and carrying out blocking processing on the sharing behavior corresponding to the screening result. The method and the device have the advantages that the applied behaviors are intercepted firstly, if the behaviors related to the target sharing behaviors exist in the intercepting result, the behaviors are screened out, and the sharing behaviors corresponding to the screened behaviors are prevented from being processed. The target sharing behavior refers to the sharing behavior between the enterprise application and the personal application, so that the phenomenon that the personal application steals enterprise data through interaction with the enterprise application can be avoided, and the security of the enterprise data in the mobile office process is improved.

Description

Mobile terminal sharing isolation method and system
Technical Field
The invention relates to the technical field of information security, in particular to a mobile terminal sharing and isolating method and system.
Background
Currently, with the popularization of consumer-grade intelligent terminals, mobile office is also developing at a high speed. At present, when people perform mobile Office, various applications, such as OA (Office Automation), Office application, mail client, browser, etc., are required. Some of the applications (hereinafter referred to as enterprise applications collectively) are developed by enterprises, and some of the applications are internet applications, so that the control right is not completely on the enterprise, which easily causes the enterprise applications to leak data to personal applications through a sharing way, thereby reducing the security of the data. Therefore, how to improve the security of enterprise data in the mobile office process is a problem to be solved at present.
Disclosure of Invention
In view of the above, the present invention provides a method and a system for sharing and isolating a mobile terminal, which can improve the security of enterprise data in a mobile office process. The specific scheme is as follows:
a mobile terminal sharing isolation method comprises the following steps:
intercepting the application behavior to obtain a corresponding interception result;
screening out behaviors related to the target sharing behaviors from the interception results to obtain corresponding screening results; the target sharing behavior is a sharing behavior between an enterprise application and a personal application;
and carrying out blocking processing on the sharing behavior corresponding to the screening result.
Optionally, the process of intercepting the application behavior to obtain a corresponding interception result includes:
intercepting a query behavior of the enterprise application when the sharable application list is queried to obtain a corresponding query result;
correspondingly, the process of screening out behaviors related to the target sharing behavior from the interception results to obtain corresponding screening results includes:
and screening all personal applications from the query result to obtain the screening result.
Optionally, the process of intercepting the application behavior to obtain a corresponding interception result includes:
intercepting the behavior of the enterprise application for directly sharing data with other applications to obtain the interception result;
correspondingly, the process of screening out behaviors related to the target sharing behavior from the interception results to obtain corresponding screening results includes:
and screening the behavior of the enterprise application for directly sharing data to the personal application from the interception result to obtain the screening result.
Optionally, the process of intercepting the application behavior to obtain a corresponding interception result includes:
intercepting the behavior of calling enterprise application by the application through a system sharing interface to obtain the interception result;
correspondingly, the process of screening out behaviors related to the target sharing behavior from the interception results to obtain corresponding screening results includes:
and screening out the behavior of calling enterprise application by the personal application through a system sharing interface from the interception result to obtain the screening result.
Optionally, the process of intercepting the behavior of the application includes:
and intercepting the behavior of the application by using Hook technology.
The invention also correspondingly discloses a mobile terminal sharing and isolating system, which comprises:
the interception module is used for intercepting the application behavior to obtain a corresponding interception result;
the screening module is used for screening out behaviors related to the target sharing behaviors from the intercepting results to obtain corresponding screening results; the target sharing behavior is a sharing behavior between an enterprise application and a personal application;
and the blocking module is used for blocking the sharing behavior corresponding to the screening result.
Optionally, the intercepting module is specifically configured to intercept a query behavior of the enterprise application when querying the sharable application list, so as to obtain a corresponding query result;
correspondingly, the screening module is specifically configured to screen all personal applications from the query results to obtain the screening results.
Optionally, the intercepting module is specifically configured to intercept a behavior of the enterprise application directly sharing data with other applications, so as to obtain the intercepting result;
correspondingly, the screening module is specifically configured to screen out a behavior of the enterprise application directly sharing data with the personal application from the interception result, so as to obtain the screening result.
Optionally, the interception module is specifically configured to intercept a behavior of an application calling an enterprise application through a system sharing interface, so as to obtain the interception result;
correspondingly, the screening module is specifically configured to screen out a behavior that the personal application calls the enterprise application through a system sharing interface from the interception result, so as to obtain the screening result.
Optionally, the intercepting module is specifically configured to intercept the behavior of the application by using a Hook technology.
In the invention, the mobile terminal sharing and isolating method comprises the following steps: intercepting the application behavior to obtain a corresponding interception result; screening out behaviors related to the target sharing behaviors from the interception results to obtain corresponding screening results; the target sharing behavior is a sharing behavior between the enterprise application and the personal application; and carrying out blocking processing on the sharing behavior corresponding to the screening result.
Therefore, the application behaviors are intercepted, if the behaviors related to the target sharing behaviors exist in the intercepting result, the behaviors are screened out, and the sharing behaviors corresponding to the screened behaviors are prevented. The target sharing behavior refers to the sharing behavior between the enterprise application and the personal application, and accordingly, the phenomenon that the personal application steals enterprise data through interaction with the enterprise application can be avoided, and the security of the enterprise data in the mobile office process is improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is a flowchart of a mobile terminal sharing and isolating method disclosed in an embodiment of the present invention;
fig. 2 is a flowchart of a specific mobile terminal sharing and isolating method disclosed in the embodiment of the present invention;
fig. 3 is a flowchart of a specific mobile terminal sharing and isolating method disclosed in the embodiment of the present invention;
fig. 4 is a flowchart of a specific mobile terminal sharing and isolating method disclosed in the embodiment of the present invention;
fig. 5 is a schematic structural diagram of a mobile terminal sharing and isolating system according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The embodiment of the invention discloses a mobile terminal sharing and isolating method, which is shown in a figure 1 and comprises the following steps:
step S11: and intercepting the application behavior to obtain a corresponding interception result.
Specifically, the present embodiment may intercept the behavior of the application by using a Hook technology.
Step S12: and screening out behaviors related to the target sharing behavior from the interception results to obtain corresponding screening results.
The target sharing behavior is a sharing behavior between the enterprise application and the personal application.
Step S13: and carrying out blocking processing on the sharing behavior corresponding to the screening result.
Therefore, the embodiment of the invention intercepts the application behaviors first, and if the interception result has the behaviors related to the target sharing behaviors, the embodiment of the invention screens the behaviors and performs blocking processing on the sharing behaviors corresponding to the screened behaviors. The target sharing behavior refers to the sharing behavior between the enterprise application and the personal application, and accordingly, the phenomenon that the personal application steals enterprise data through interaction with the enterprise application can be avoided, and the security of the enterprise data in the mobile office process is improved.
Referring to fig. 2, an embodiment of the present invention discloses a specific mobile terminal sharing and isolating method, including the following steps:
step S21: and intercepting the query behavior of the enterprise application when the sharable application list is queried to obtain a corresponding query result.
Specifically, in this embodiment, a Hook technology may be used to intercept a query behavior of the enterprise application when querying the sharable application list, so as to obtain the query result.
Step S22: and screening all personal applications from the query results to obtain screening results.
Step S23: and carrying out blocking processing on the sharing behavior corresponding to the screening result.
In this embodiment, the screening result is a personal application on the list obtained after the enterprise application queries the sharable application list, and in order to avoid acquiring enterprise data by the personal application, after determining the personal application on the sharable application list, the embodiment of the present invention performs blocking processing on a sharing behavior between the enterprise application and the personal application on the list.
Therefore, in this embodiment, after the query result is obtained, all the personal applications are screened out from the query result, and then the blocking processing is performed on the sharing behaviors corresponding to all the screened personal applications, so that all the sharing behaviors that can cause the data of the enterprise application to be leaked can be blocked in one-time interception of the enterprise application, and thus, efficient enterprise data security maintenance is realized.
Referring to fig. 3, an embodiment of the present invention discloses a specific mobile terminal sharing and isolating method, including the following steps:
step S31: and intercepting the behavior of the enterprise application for directly sharing data with other applications to obtain an interception result.
Specifically, in this embodiment, a Hook technology may be used to intercept a behavior of the enterprise application directly sharing data with other applications, so as to obtain the above-mentioned interception result.
Step S32: and screening the behavior of the enterprise application for directly sharing data to the personal application from the interception result to obtain a screening result.
Step S33: and carrying out blocking processing on the sharing behavior corresponding to the screening result.
Therefore, the embodiment can effectively avoid the problem of enterprise data leakage caused by the sharing behavior initiator by monitoring the behavior of the sharing behavior initiator, thereby effectively improving the security of the enterprise data.
Referring to fig. 4, an embodiment of the present invention discloses a specific mobile terminal sharing and isolating method, including the following steps:
step S41: and intercepting the behavior of calling the enterprise application by the application through the system sharing interface to obtain an interception result.
Specifically, in this embodiment, a Hook technology may be used to intercept a behavior of an application calling an enterprise application through a system sharing interface, so as to obtain an interception result.
Step S42: and screening out the behavior of calling the enterprise application by the personal application through the system sharing interface from the interception result to obtain a screening result.
Step S43: and carrying out blocking processing on the sharing behavior corresponding to the screening result.
It can be seen that this embodiment monitors through enterprise application's caller's action, can avoid effectively because enterprise application's caller and enterprise data that causes reveals the problem to improve enterprise data's security effectively.
Further, an embodiment of the present invention also discloses a mobile terminal sharing and isolating system, and as shown in fig. 5, the system includes:
theinterception module 11 is configured to intercept an application behavior to obtain a corresponding interception result;
thescreening module 12 is configured to screen a behavior related to the target sharing behavior from the interception result to obtain a corresponding screening result; the target sharing behavior is a sharing behavior between the enterprise application and the personal application;
and the blockingmodule 13 is configured to block the sharing behavior corresponding to the screening result.
It should be noted that, in this embodiment, the interceptingmodule 11 may be specifically configured to intercept the behavior of the application by using a Hook technology.
In a specific embodiment, the interceptingmodule 11 may be specifically configured to intercept a query behavior of the enterprise application when querying the sharable application list, so as to obtain a corresponding query result. Correspondingly, thescreening module 12 is specifically configured to screen all the personal applications from the query results to obtain the screening results. Therefore, in the embodiment, all sharing behaviors which can cause the data of the enterprise application to be leaked can be prevented in one interception action aiming at the enterprise application, and the efficient enterprise data security maintenance is realized.
In another specific embodiment, the interceptingmodule 11 may be specifically configured to intercept a behavior of the enterprise application directly sharing data with other applications, so as to obtain the intercepting result. Correspondingly, thescreening module 12 is specifically configured to screen a behavior of the enterprise application sharing data directly to the personal application from the interception result, so as to obtain the screening result. Therefore, the embodiment can effectively avoid the problem of enterprise data leakage caused by the sharing behavior initiator by monitoring the behavior of the sharing behavior initiator, thereby effectively improving the security of the enterprise data.
In another specific embodiment, the interceptingmodule 11 may be specifically configured to intercept a behavior of an application calling an enterprise application through a system sharing interface, so as to obtain the intercepting result. Correspondingly, thescreening module 12 is specifically configured to screen a behavior of the personal application calling the enterprise application through the system sharing interface from the interception result, so as to obtain the screening result. It can be seen that this embodiment can monitor through enterprise application's caller's action, can avoid effectively because enterprise data that enterprise application's caller and cause reveals the problem to improve enterprise data's security effectively.
Therefore, the embodiment of the invention intercepts the application behaviors first, and if the interception result has the behaviors related to the target sharing behaviors, the embodiment of the invention screens the behaviors and performs blocking processing on the sharing behaviors corresponding to the screened behaviors. The target sharing behavior refers to the sharing behavior between the enterprise application and the personal application, and accordingly, the phenomenon that the personal application steals enterprise data through interaction with the enterprise application can be avoided, and the security of the enterprise data in the mobile office process is improved.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The method and the system for sharing and isolating the mobile terminal provided by the invention are described in detail, a specific example is applied in the text to explain the principle and the implementation mode of the invention, and the description of the embodiment is only used for helping to understand the method and the core idea of the invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (8)

CN201710240824.XA2017-04-132017-04-13Mobile terminal sharing isolation method and systemActiveCN106850701B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201710240824.XACN106850701B (en)2017-04-132017-04-13Mobile terminal sharing isolation method and system

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201710240824.XACN106850701B (en)2017-04-132017-04-13Mobile terminal sharing isolation method and system

Publications (2)

Publication NumberPublication Date
CN106850701A CN106850701A (en)2017-06-13
CN106850701Btrue CN106850701B (en)2020-10-27

Family

ID=59146812

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201710240824.XAActiveCN106850701B (en)2017-04-132017-04-13Mobile terminal sharing isolation method and system

Country Status (1)

CountryLink
CN (1)CN106850701B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN112153637B (en)*2019-06-282025-06-24北京奇虎科技有限公司 Method and device, router and medium for preventing illegal users from accessing wireless network
CN110365760A (en)*2019-07-092019-10-22广东美的制冷设备有限公司Household appliance, the control method of household appliance, device and computer equipment

Citations (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN105530175A (en)*2016-01-292016-04-27腾讯科技(深圳)有限公司Message processing method, device and system

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9043480B2 (en)*2011-10-112015-05-26Citrix Systems, Inc.Policy-based application management
US10073971B2 (en)*2013-06-282018-09-11Microsoft Technology Licensing, LlcTraffic processing for network performance and security
CN104202357A (en)*2014-08-082014-12-10深信服网络科技(深圳)有限公司Content sharing method and content sharing system
CN104361282A (en)*2014-10-312015-02-18中国联合网络通信集团有限公司Mobile terminal security protecting method and device
CN104462997B (en)*2014-12-042017-05-24北京奇虎测腾科技有限公司Method, device and system for protecting work data in mobile terminal
US9740877B2 (en)*2015-09-222017-08-22Google Inc.Systems and methods for data loss prevention while preserving privacy
CN105554144A (en)*2015-12-252016-05-04北京奇虎科技有限公司Application data processing method, device and system
CN106506807A (en)*2016-10-092017-03-15乐视控股(北京)有限公司The method and device that a kind of end message is shared

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN105530175A (en)*2016-01-292016-04-27腾讯科技(深圳)有限公司Message processing method, device and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
严格控制数据访问以提高BYOD的安全;无名;《计算机与网络》;20120512;第41页*

Also Published As

Publication numberPublication date
CN106850701A (en)2017-06-13

Similar Documents

PublicationPublication DateTitle
US20210089644A1 (en)Method, means, system, processor, and memory for intercepting malicious websites
DE112012000744B4 (en) Detection of a Trojan horse
US10102372B2 (en)Behavior profiling for malware detection
US10121000B1 (en)System and method to detect premium attacks on electronic networks and electronic devices
US9697353B2 (en)Method and device for intercepting call for service by application
RU2726032C2 (en)Systems and methods for detecting malicious programs with a domain generation algorithm (dga)
EP3324325B1 (en)Method, client, and system for testing application
KR102355973B1 (en)Apparatus and method for detecting smishing message
US9058490B1 (en)Systems and methods for providing a secure uniform resource locator (URL) shortening service
CN110809010B (en)Threat information processing method, device, electronic equipment and medium
CN103577757A (en)Virus defending method and device
US12074903B2 (en)Passive detection of digital skimming attacks
CN105491539A (en)Message push management method and device
US11023607B1 (en)Detecting behavioral anomalies in user-data access logs
CN104796406A (en)Method and device for identifying application
CN103179552A (en)Method and device for inquiring information of opposite call party
US10958668B1 (en)Finding malicious domains with DNS query pattern analysis
US10313369B2 (en)Blocking malicious internet content at an appropriate hierarchical level
CN105939320A (en)Message processing method and device
CN106850701B (en)Mobile terminal sharing isolation method and system
CN108509228B (en)Page loading method, terminal equipment and computer readable storage medium
US11356486B2 (en)Dynamic code injection by policy enforcement point
CN112948831B (en)Application risk identification method and device
CN113162937A (en)Application safety automatic detection method, system, electronic equipment and storage medium
CN107786413B (en)Method for browsing e-mail and user terminal

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp