Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Client program monitoring method, device and client

A technology of client programs and monitoring devices, which is applied in hardware monitoring, computer security devices, instruments, etc., can solve the problems of client user losses, increase usage costs, etc., and achieve the effects of avoiding malicious uploads, protecting security and user interests

Inactive Publication Date: 2011-12-14
QIZHI SOFTWARE (BEIJING) CO LTD
View PDF2 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These viruses or Trojan horse programs usually cause losses to client users. For example, Trojan horse programs that create malicious deductions and malicious networking will automatically connect to the Internet to generate traffic, or automatically link to a certain website, which will Increase usage fee

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Client program monitoring method, device and client
  • Client program monitoring method, device and client
  • Client program monitoring method, device and client

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0062] refer to figure 1 , showing Embodiment 1 of the client program monitoring method of the present invention, including the following steps:

[0063] Step 101, monitor the program action after the client is in the locked state.

[0064] The client here refers to mobile terminals or PCs, such as mobile phones, notebook computers, desktop computers and other devices with application programs.

[0065] The locked state here refers to client idle states such as standby, screen locked, computer locked, input device locked, etc.

[0066] The actions of the program after the client is in the locked state include new dynamics of the program, for example, scanning at the start of the program, installation at the start of the program, uploading or downloading data at the start of the program, networking at the start of the program, deleting data or uninstalling software, closing anti-virus software or firewall, modifying the registration table information, etc.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for monitoring a client program, comprising the following steps: monitoring the program action after the client is in a locked state; and stopping the action if the monitored action of the program is a dangerous action in the locked state. The present invention also provides a client program monitoring device for realizing the aforementioned method and a client with the monitoring device. The client program monitoring method, device and client of the present invention can monitor the programs in the client in idle state such as standby, and avoid malicious programs from performing dangerous actions.

Description

technical field [0001] The invention relates to the technical field of client software information security detection, in particular to a client program monitoring method, device and client. Background technique [0002] With the development of industries such as computers and mobile phones, software applicable to clients such as computers or mobile phones is more and more widely used. In addition, in order to better share information, software development tools provided by some companies enable anyone to develop programs based on certain operating systems, for example, Symbian operating system. This brings convenience to most people and meets the diverse needs of users for software, but it also makes some people use this tool to develop malicious programs such as viruses or Trojan horses for these mobile phone operating systems. [0003] Because a general virus or Trojan horse program will occupy system resources when it is installed or running, which will cause the runnin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/00G06F11/30G06F21/51
Inventor 李涛徐江涛曹建峰谢尧裕
Owner QIZHI SOFTWARE (BEIJING) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products