Unlock instant, AI-driven research and patent intelligence for your innovation.

Information secure control method and mobile terminal

A mobile terminal, security control technology, applied in the field of communication, can solve the problem of leakage of user privacy, and achieve the effect of ensuring security

Active Publication Date: 2017-05-10
VIVO MOBILE COMM CO LTD
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present invention provide an information security control method and a mobile terminal to solve the problem in the prior art that there is a risk of leakage of user privacy when faced with a scene where a user uses an input method to edit information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information secure control method and mobile terminal
  • Information secure control method and mobile terminal
  • Information secure control method and mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0025] refer to figure 1 , showing a flowchart of an information security control method according to an embodiment of the present invention, which is applied to a mobile terminal, and the method may specifically include the following steps:

[0026] Step 101, if it is detected that the user uses an input method to edit information, then monitor whether there is a background program to read the desktop frame interface of the mobile terminal, wherein the desktop frame interface is used to read the desktop frame;

[0027] Wherein, if the user uses the input method to edit information, the embodiment of the present invention can monitor the desktop frame interface of the mobile terminal (such as a mobile phone, a tablet elevator, etc.). Specifically, in the prior art, if any application program needs to record the screen or take a screenshot, it needs to read the desktop frame to obtain the video or picture, but reading the desktop frame needs to read the unified bottom layer in ...

no. 2 example

[0036] The information security control method of the present invention will be described in detail below in conjunction with a specific example.

[0037] The information security control method according to the embodiment of the present invention may include:

[0038] First, open the input method of the embodiment of the present invention;

[0039] Then, if it is detected that the user is using the input method to edit the information to be input, then monitoring whether there is a background program to read the desktop frame interface of the mobile terminal, wherein the desktop frame interface is used to read the desktop frame;

[0040] Among them, recording the screen or taking a screenshot requires reading the desktop frame interface to read the desktop frame. Screen recording is to combine all the desktop frames within a period of time into one video, while screenshot is to save the desktop frame at a certain moment as a picture. At present, the mobile phone system has ...

no. 3 example

[0058] refer to figure 2 , shows a block diagram of a mobile terminal according to an embodiment of the present invention. figure 2 The mobile terminals shown include:

[0059] The monitoring module 201 is used to monitor whether there is a background program to read the desktop frame interface of the mobile terminal if it is detected that the user uses the input method to edit information, wherein the desktop frame interface is used to read the desktop frame;

[0060] A determining module 202, configured to determine a list of application programs that are prohibited from running if it is detected that there is a background program that reads the desktop frame interface;

[0061] A matching module 203, configured to match the background program that reads the desktop frame interface with the prohibited programs in the list of prohibited applications;

[0062] The control module 204 is configured to control the background program that reads the desktop frame interface to s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides an information secure control method and a mobile terminal. The method comprises the steps of if it is detected that a user edits information through utilization of an input method, monitoring whether a background program reads a desktop frame interface of the mobile terminal or not, wherein the desktop frame interface is used for reading a desktop frame; if it is monitored that the background program reads the desktop frame interface, determining an application program list of which operation is forbidden; matching the background program which reads the desktop frame interface with a forbidden program in the application program list of which operation is forbidden; and if the matching is successful, controlling the background program which reads the desktop frame interface to stop operating. According to the method and the mobile terminal, whether the monitored background program is the forbidden program or not is judged by monitoring whether the background program reads the desktop frame interface or not; if the background program is the forbidden program, the background program is controlled to stop operating, screenshot or screen record is prevented from being carried out on the sensitive information input by a user, and the security of the privacy information of the user is ensured.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to an information security control method and a mobile terminal. Background technique [0002] At present, with the development of communication technologies, mobile terminal devices (such as smart phones) generally support screen recording functions and screen capture functions. Among them, the screen capture function can capture the content displayed on the mobile phone screen for a moment and generate a picture; while the screen recording function is similar to the extension of the screen capture function, it can record a series of operations performed by the user on the mobile phone, and Generate video. In this way, the user can perform information preservation and demonstration operations based on the pictures generated by the screen capture function and the video generated by the screen recording function. [0003] Although the above two functions can bring convenienc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/566G06F2221/033
Inventor 沈志远
Owner VIVO MOBILE COMM CO LTD