Access operation monitoring method and device, mobile terminal and readable storage medium

An access operation, mobile terminal technology, applied in hardware monitoring, platform integrity maintenance, etc., can solve problems such as difficulty in effectively protecting personal information and inability to monitor application access operations.

Inactive Publication Date: 2018-01-09
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
View PDF6 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The main purpose of the embodiments of the present invention is to provide an access operation monitoring method, device, mobile terminal, and readable storage medium, which can solve the problem that the access operation of the application program cannot be monitored in the prior art, resulting in the personal information stored in the mobile terminal by the user. Technical issues that are difficult to obtain effective protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access operation monitoring method and device, mobile terminal and readable storage medium
  • Access operation monitoring method and device, mobile terminal and readable storage medium
  • Access operation monitoring method and device, mobile terminal and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to make the purpose, features and advantages of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described The embodiments are only some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making creative efforts belong to the protection scope of the present invention.

[0028] figure 1 A structural block diagram of a mobile terminal is shown. The access operation monitoring method provided by the embodiment of the present invention can be applied to such as figure 1 In the mobile terminal 10 shown, the mobile terminal 10 may include, but is not limited to: smart phones, notebooks, tablet computers, wearabl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an access operation monitoring method and device, a mobile terminal and a readable storage medium. The method comprises the steps of monitoring an access operation of each application inside the mobile terminal, judging whether or not the monitored access operation belongs to a sensitive operation, if the monitored access operation belongs to the sensitiveoperation, generating access information according to the access operation and an application name of the application to which the access operation belongs, and then generating and displaying promptinformation according to the access information so as to prompt whether or not the access operation is allowed to be executed. By monitoring the access operations of the applications, when the currentaccess operation of the monitored application belongs to the sensitive operation, the corresponding prompt information is generated, a user can find the sensitive operation existing in the mobile terminal and the application of the existing sensitive operation for the first time, and the sensitive operation of the application is stopped in time, so that personal information stored in the mobile terminal is effectively protected.

Description

technical field [0001] The present invention relates to the technical field of mobile terminals, in particular to an access operation monitoring method and device, a mobile terminal and a readable storage medium. Background technique [0002] With the popularization of mobile terminals, the importance of mobile terminals in people's daily life is getting higher and higher, and it also brings great convenience to people's lives. It is precisely because mobile terminals have penetrated into all aspects of people's lives, so A large amount of privacy and information related to personal safety of the user will be stored in the mobile terminal. [0003] Because the permissions of the current smart operating system cannot monitor all aspects, some applications can always use the existing system vulnerabilities to steal user information, or monitor the user's operation behavior in the background without the user's knowledge, such as listening to the user's call, scanning The user'...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/52G06F21/55G06F11/30
Inventor 张伟超欧双
Owner GUANGDONG OPPO MOBILE TELECOMM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products