Application behavior intercepting method and application behavior intercepting device

A technology of application programs and behaviors, applied in the direction of platform integrity maintenance, etc., can solve problems such as service system crashes, poor user experience, loss of data information, and personal privacy information

Active Publication Date: 2015-02-25
BEIJING QIHOO TECH CO LTD
View PDF5 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] While the use of applications brings convenience and services to users’ work and life, it will also bring troubles to users. For example, if an application contains a virus, it will not only maliciously attack the service system, causing the service system to crash, Cause the loss of the user's personal data information; also steal the user's account name and corresponding password of other applications, for example, if the user's Alipay account name and corresponding password are stolen and logged in, it will cause the user's property loss ; If the account name and corresponding password of the mailbox used by the user are stolen and logged in, the user's work data information and personal privacy information will be leaked
[0004] However, the inventors of the present invention have found that existing mobile terminals will automatically execute corresponding operations of application program behaviors without the user's knowledge due to attacks by malicious programs (such as computer viruses, Trojan horses), resulting in user experience Poor; even makes users lose important data information and personal privacy information due to the execution of the application

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application behavior intercepting method and application behavior intercepting device
  • Application behavior intercepting method and application behavior intercepting device
  • Application behavior intercepting method and application behavior intercepting device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0020] Those skilled in the art will understand that unless otherwise stated, the singular forms "a", "an", "said" and "the" used herein may also include plural forms. It should be further understood that the word "comprising" used in the description of the present invention refers to the presence of said features, integers, steps, operations, elements and / or components, but does not exclude the presence or addition of one or more other features, Integers, steps, operations, elements, components, and / or groups thereof. It will be unders...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An embodiment of the invention provides an application behavior intercepting method and an application behavior intercepting device. The method comprises the following steps of transmitting corresponding inquiry information to an application after dangerous operation information of the application is intercepted by an intercepting module which is injected into a system service process in advance; popping a corresponding prompt box by using the application according to the inquiry information; receiving confirmation information of a corresponding operation inputted by a user; returning the confirmation information to the intercepting module; and allowing or stopping a dangerous operation of the system service process on the application by using the intercepting module according to the received confirmation information. By the method and the device, behaviors of the application can be intercepted effectively; after the behaviors of the application are intercepted, the corresponding operation is stopped temporarily, the temporary stopping operation is notified to the user, the corresponding operation only can be carried out after the confirmation information of the user is obtained, so that the leakage possibility of data information and individual privacy information which are stored in the application is reduced, the safety of personal data is improved, and the user experience is also improved.

Description

technical field [0001] The present invention relates to the technical field of terminal equipment, in particular, the present invention relates to a method and device for intercepting application program behavior. Background technique [0002] Mobile terminals refer to computer devices that can be used on the move, including mobile phones, tablet computers, etc. With the popularization of mobile terminals, applications of various applications are also widely used. For example, mobile assistants can manage application programs intelligently and in a classified manner for the convenience of users. [0003] While the use of applications brings convenience and services to users’ work and life, it will also bring troubles to users. For example, if an application contains a virus, it will not only maliciously attack the service system, causing the service system to crash, Cause the loss of the user's personal data information; also steal the user's account name and corresponding ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/52
Inventor 张勇
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products