System lock screen protection method and system

A system lock and screen lock technology, applied in platform integrity maintenance, instruments, digital data authentication, etc., can solve the problems of personal privacy and the lack of security of important data, and achieve the effect of avoiding malicious program cracking and preventing malicious operations.

Inactive Publication Date: 2016-06-29
THUNDER SOFTWARE TECH
View PDF7 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, anyone can access any application in the mobile terminal, and t

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System lock screen protection method and system
  • System lock screen protection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0042] The embodiment of the invention discloses a system lock screen protection method and system, so as to realize the protection of the system lock screen and prevent malicious programs from breaking through the system lock screen.

[0043] see figure 1 , a flow chart of a system lock screen protection method provided in an embodiment of the present invention, including steps:

[0044] Step S11. When the third-party application calls the lock screen interf...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a system lock screen protection method and system. The method comprises the following steps of when a third-party application calls a lock screen interface, reminding a user of inputting a lock screen password; performing screen unlocking on an operating system according to the screen locking password; and then, telling the user that the third-party application executing the system lock screen function closing operation exists at present through reminding the user of whether to forbid the system lock screen or not at present. The reminding information includes identification information of the third-party application, so that the user can judge whether the third-party application is a rogue program or not according to the identification information, and effective measures can be adopted. The method and the system have the advantages that the lock-screen interface is subjected to real-time monitoring; reminding information is output when the lock screen interface is called; and the system lock screen protection is realized. Meanwhile, the right of an operator is set through enabling the user to input the lock screen password, so that only the user knowing the lock screen password has the right to decide whether to forbid the system lock screen or not; the malicious operation of others can be prevented; and the further protection on the system lock screen is realized.

Description

technical field [0001] The invention relates to the technical field of system lock screen protection, and more specifically, relates to a system lock screen protection method and system. Background technique [0002] Android is a free and open-source operating system based on Linux. Due to the openness of the Android system, more and more manufacturers and developers have joined the camp. During the use of the mobile terminal installed with the Android system, many application programs will be downloaded, and among the large number of application programs, there will inevitably be malicious programs released by criminals. These malicious programs will first start themselves by receiving the system boot broadcast through system security holes, and then turn off the system lock screen function by calling the lock screen interface provided by the Android system, and complete the cracking process without the user's knowledge. Therefore, anyone can access any application in the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/45G06F21/55
CPCG06F21/45G06F21/552
Inventor 吴明军
Owner THUNDER SOFTWARE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products