Apparatus and method for securing mobile terminal
First Claim
1. A mobile terminal, comprising:
- an application part to receive information related to an application and to receive reference information used for determining whether to block an unauthorized command, the application being an authorized application or an unauthorized application;
a determining unit to receive a request to execute a command issued by the application and to determine, using the set reference information, whether the command or the application is authorized to access a system resource of the mobile terminal;
a blocking unit to block an execution of the command in response to a determination that the execution of the command is unauthorized or issued by the unauthorized application; and
a service unit to execute the command in response to a determination that the execution command is authorized and issued by the authorized application.
5 Assignments
0 Petitions
Accused Products
Abstract
A mobile terminal and a method for securing information are provided. The mobile terminal includes an application part to receive information related to an application; a determining unit to receive a command issued by the application and to determine whether the command or the application is authorized to access a system resource of the mobile terminal; and a blocking unit to block an execution of the command in response to a determination that the execution of the command is unauthorized or issued by the unauthorized application. The method includes receiving information related to an application; receiving a request for executing a command issued by the application; determining whether the requested command or the application is authorized to access a system resource of a mobile terminal; and blocking execution of the command in response to a determination that the execution of the command is unauthorized or issued by an unauthorized application.
34 Citations
22 Claims
-
1. A mobile terminal, comprising:
-
an application part to receive information related to an application and to receive reference information used for determining whether to block an unauthorized command, the application being an authorized application or an unauthorized application; a determining unit to receive a request to execute a command issued by the application and to determine, using the set reference information, whether the command or the application is authorized to access a system resource of the mobile terminal; a blocking unit to block an execution of the command in response to a determination that the execution of the command is unauthorized or issued by the unauthorized application; and a service unit to execute the command in response to a determination that the execution command is authorized and issued by the authorized application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method for securing information in a mobile terminal, comprising:
-
receiving information related to an application; receiving reference information for determining whether to block an unauthorized command; receiving a request for executing a command issued by the application; determining, using the reference information, whether the requested command or the application is authorized to access a system resource of a mobile terminal; blocking execution of the command in response to a determination that the execution of the command is unauthorized or issued by an unauthorized application; and executing the command in response to a determination that the execution of the command is authorized or issued by an authorized application. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A method for securing information in a mobile terminal, comprising:
-
storing a reference value corresponding to a command and a list of authorized applications; receiving reference information for determining whether to block an unauthorized command; receiving a request for executing a command issued by an application; extracting the command and information related to the application from the request; comparing the extracted command and information to a stored reference value for determining whether the requested command or the application is authorized; blocking the execution of the command in response to a determination that the execution of the command or the application is unauthorized; and executing the command in response to a determination that the execution command and the application are authorized, wherein the determination of whether the requested command and the application are authorized is made using the reference information.
-
Specification