Monitoring method of terminal and monitoring device of terminal

A monitoring device and terminal technology, applied in computer security devices, instruments, electrical digital data processing, etc., can solve the problems that protection measures cannot be taken, users cannot know that information has been viewed, etc., and achieve the effect of improving user experience

Inactive Publication Date: 2015-03-25
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF3 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, after the mobile phone is lost, once the password and other protection measures are cracked, the user's sensitive information will be leaked, but the user cannot know which information has been viewed, so corresponding protection measures cannot be taken

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Monitoring method of terminal and monitoring device of terminal
  • Monitoring method of terminal and monitoring device of terminal
  • Monitoring method of terminal and monitoring device of terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to understand the above-mentioned purpose, features and advantages of the present invention more clearly, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. It should be noted that, in the case of no conflict, the embodiments of the present application and the features in the embodiments can be combined with each other.

[0034] In the following description, many specific details are set forth in order to fully understand the present invention. However, the present invention can also be implemented in other ways different from those described here. Therefore, the protection scope of the present invention is not limited by the specific details disclosed below. EXAMPLE LIMITATIONS.

[0035] figure 1 A flow chart of a terminal monitoring method according to an embodiment of the present invention is shown.

[0036] like figure 1 As shown, the monitoring method according to the e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a monitoring method of a terminal and a monitoring device of the terminal. The monitoring method includes the steps that when it is detected that a designated program is started, a first screenshot picture is obtained; when it is detected that interface changes happen on the terminal in the designated application program, a second screenshot picture is obtained; the first screenshot picture and the second screenshot picture are sent to a preset target receiving party. By means of the technical scheme, an owner of a mobile phone can clearly know which sensitive information of the mobile phone is read or accessed, and therefore the use conditions by other people on the mobile phone of the user are monitored, the user can conveniently measure other remote control measures according to the use conditions, and the use experience of the user is improved.

Description

technical field [0001] The present invention relates to the technical field of terminals, in particular, to a terminal monitoring method and a terminal monitoring device. Background technique [0002] In the existing 3G / 4G mobile phones, the way of mobile phone security is generally to allow access to special applications by setting access passwords or through certain operations, so as to prevent other users from illegally entering their mobile phone systems to view their own sensitive information. . But after the mobile phone is lost, once the password and other protection measures are cracked, the sensitive information of the user will be leaked, but the user cannot know which information has been viewed, so corresponding protection measures cannot be taken. [0003] Therefore, a new technical solution is needed, so that the owner of the mobile phone can clearly know which sensitive information of the mobile phone has been read or accessed, so as to monitor other people's...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/50
CPCG06F21/604G06F2221/2107
Inventor 彭聪
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products