Unlock instant, AI-driven research and patent intelligence for your innovation.

Apparatus and method for providing security information on background process

A security information and security technology, applied in the direction of digital output to display devices, platform integrity maintenance, program/content distribution protection, etc.

Inactive Publication Date: 2013-05-15
PANTECH CO LTD
View PDF9 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, malicious background processes that may cause damage to the device or system may run until they are detected and terminated

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Apparatus and method for providing security information on background process
  • Apparatus and method for providing security information on background process
  • Apparatus and method for providing security information on background process

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The present invention will be described more fully hereinafter with reference to the accompanying drawings, in which embodiments of the invention are shown. However, this invention may be embodied in different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure is thorough and will fully convey the scope of the invention to those skilled in the art. It will be understood that for the purposes of this disclosure, "at least one of X, Y, and Z" can be understood to mean only X, only Y, only Z, or any combination of two or more items X, Y, and Z ( For example, XYZ, XZ, XYY, YZ, ZZ). In the drawings and the detailed description, unless otherwise stated, the same reference numerals will be understood to refer to the same elements, features and structures. The relative size and depiction of these elements may be exaggerated for clarity.

[0024] figure 1 is a diagram illustrating a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An apparatus and method for providing security information on a background process are provided. The method includes executing an application, detecting an event associated with the execution of the application, identifying a security related permission associated with the application, determining whether the security related permission matches a registered security related permission, determining an application identifier in response to the security related permission matching the registered security related permission, determining whether the event is associated with the background process, and displaying a security risk alert icon based on the detected event. The apparatus includes an application execution unit to execute an application; a security risk detection unit to detect an event associated with a background process of the application; and a screen configuration unit to configure a security risk alert icon to be displayed based on the detected event.

Description

technical field [0001] The present application relates to a device and method for providing security information of a background process. Background technique [0002] If malicious code is executed as a background process in a system or device storing sensitive information, sensitive information including personal information may be exposed. Also, the device or system may be vulnerable to malicious viruses that may compromise the device or system without the user noticing. For example, if an infected program is executed in a mobile phone, various operations such as sending messages, accessing the network, intercepting personal information, etc. may be performed as background processes without being noticed. However, malicious background processes that may cause damage to the device or system may run until they are detected and terminated. [0003] This application claims priority from Korean Patent Application No. 10-2011-0084789 filed on Aug. 24, 2011 at the Korean Intell...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/52
CPCG06F21/55G06F21/10G06F3/14
Inventor 金美淑朴慧淑申贤晤李哲基
Owner PANTECH CO LTD