Application program monitoring method and terminal

An application and program technology, applied in the field of information security, can solve problems such as personal information leakage and user economic loss, and achieve the effect of improving security and preventing theft

Inactive Publication Date: 2015-09-16
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
View PDF4 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Nowadays, some application software in the terminal can use special authority to access the user's personal data in the background of the terminal without the user's complete knowledge, a

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application program monitoring method and terminal
  • Application program monitoring method and terminal
  • Application program monitoring method and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0021] In specific implementation, the terminals mentioned in the embodiments of the present invention include, but are not limited to: electronic devices such as smart phones (such as Android phones, IOS phones), tablet computers, notebook computers, palmtop computers, or wearable smart devices.

[0022] The following will combine Figure 1 to Figure 6 A method for monitoring an application program and a terminal provided in the embodiments of th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an application program monitoring method and a terminal. The application program monitoring method comprises the following steps: when the condition that a to-be-monitored behavior occurs is detected, acquiring the identification information of a target application program for executing the to-be-monitored behavior; according to the identification information of the target application program, judging the target application program is a preset a monitored application program or not; if yes, according to the target application program, recording the to-be-monitored behavior. By adopting the application program monitoring method and the terminal disclosed by the embodiment of the invention, a behavior, which threatens the security of user data, executed by the application program can be monitored and recorded, therefore data stored in the terminal is prevented from being stolen, and the security of the terminal is enhanced.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to an application program monitoring method and a terminal. Background technique [0002] With the continuous development of communication technology, a variety of terminal application software also develops accordingly, such as various instant messaging application software, game application software, and audio-visual application software. Users can use these application software to carry out business activities, contact relatives and friends, share personal life status information, etc. through the terminal, which greatly facilitates the work and daily life of users. At the same time, more and more privacy data are carried in the terminal, such as: contact phone number, contact address, call recording, various payment account numbers and passwords, etc. Therefore, protecting privacy and strengthening personal information security is gradually valued by users. Nowaday...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56
CPCG06F21/566G06F2221/033G06F2221/2141
Inventor 邓志成
Owner GUANGDONG OPPO MOBILE TELECOMM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products