Data protection method and user terminal

A data protection, user-end technology, applied in the field of communication, can solve the problems of user-end data leakage and inability to monitor and manage

Active Publication Date: 2015-09-02
深圳市立鳌科技有限公司
View PDF3 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, because some security applications also need to send and receive data through the network, these security applications are generally not restricted or deleted by antivirus software, but due to the existence of some unsafe networks, if the network itself connected to the client is an unsafe network, Th

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data protection method and user terminal
  • Data protection method and user terminal
  • Data protection method and user terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] An embodiment of the present invention provides a data protection method for monitoring and managing applications on a client terminal according to an application blacklist corresponding to a security level of a target network to which the client terminal is currently connected.

[0067] In order to enable those skilled in the art to better understand the solutions of the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is an embodiment of a part of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0068] The terms "first", "second", "third", "f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An embodiment of the invention discloses a data protection method used for monitoring management of applications on a user terminal according to an application black list corresponding to a safety level of a target network to which the user terminal is currently connected. The method includes that the user terminal determines the safety level of the currently connected target WIFI network; the user terminal determines the application black list corresponding to the safety level; the user terminal performs monitoring management on the applications of the user terminal. According to the invention, the user terminal can obtain the safety level of the current connected WIFI network and determines different application black lists according to the safety level. The user terminal can perform monitoring management on the applications on the user terminal according to the application black list. Namely, the user terminal can perform monitoring on the applications on the user terminal by adopting different monitoring strategies according to different network safety levels, so that data leakage when the user terminal runs safe applications due to unsafe network connection is avoided.

Description

technical field [0001] The present invention relates to the communication field, in particular to a data protection method and a user terminal. Background technique [0002] As a kind of client, mobile phones are increasingly entering people's daily life, but at the same time, the exposure of mobile phone privacy is becoming more and more serious, and there are more and more ways for user privacy to be leaked. Data is protected. [0003] An existing client data protection method is to detect a dangerous application on the client according to the built-in virus library of the antivirus software, and then restrict the operation of the dangerous application or directly delete the dangerous operation, thereby protecting the client data without Disclosed because of this hazardous application. [0004] However, because some security applications also need to send and receive data through the network, these security applications are generally not restricted or deleted by antiviru...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/02H04W12/08H04W12/12H04W12/122
CPCH04W12/02H04W12/08H04W12/12
Inventor 刘洋张延东孙超杨云
Owner 深圳市立鳌科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products