Information secure control method and mobile terminal
A mobile terminal, security control technology, applied in the field of communication, can solve the problem of leakage of user privacy, and achieve the effect of ensuring security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0025] refer to figure 1 , showing a flowchart of an information security control method according to an embodiment of the present invention, which is applied to a mobile terminal, and the method may specifically include the following steps:
[0026] Step 101, if it is detected that the user uses an input method to edit information, then monitor whether there is a background program to read the desktop frame interface of the mobile terminal, wherein the desktop frame interface is used to read the desktop frame;
[0027] Wherein, if the user uses the input method to edit information, the embodiment of the present invention can monitor the desktop frame interface of the mobile terminal (such as a mobile phone, a tablet elevator, etc.). Specifically, in the prior art, if any application program needs to record the screen or take a screenshot, it needs to read the desktop frame to obtain the video or picture, but reading the desktop frame needs to read the unified bottom layer in ...
no. 2 example
[0036] The information security control method of the present invention will be described in detail below in conjunction with a specific example.
[0037] The information security control method according to the embodiment of the present invention may include:
[0038] First, open the input method of the embodiment of the present invention;
[0039] Then, if it is detected that the user is using the input method to edit the information to be input, then monitoring whether there is a background program to read the desktop frame interface of the mobile terminal, wherein the desktop frame interface is used to read the desktop frame;
[0040] Among them, recording the screen or taking a screenshot requires reading the desktop frame interface to read the desktop frame. Screen recording is to combine all the desktop frames within a period of time into one video, while screenshot is to save the desktop frame at a certain moment as a picture. At present, the mobile phone system has ...
no. 3 example
[0058] refer to figure 2 , shows a block diagram of a mobile terminal according to an embodiment of the present invention. figure 2 The mobile terminals shown include:
[0059] The monitoring module 201 is used to monitor whether there is a background program to read the desktop frame interface of the mobile terminal if it is detected that the user uses the input method to edit information, wherein the desktop frame interface is used to read the desktop frame;
[0060] A determining module 202, configured to determine a list of application programs that are prohibited from running if it is detected that there is a background program that reads the desktop frame interface;
[0061] A matching module 203, configured to match the background program that reads the desktop frame interface with the prohibited programs in the list of prohibited applications;
[0062] The control module 204 is configured to control the background program that reads the desktop frame interface to s...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


