Abnormal application prompt method, mobile terminal and computer-readable storage medium
A mobile terminal, abnormal technology, applied in the field of data analysis, to achieve the effect of protecting user rights and improving user experience
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0060] Such as image 3 As shown, the first embodiment of the present invention proposes a method for prompting abnormal applications, which includes the following steps:
[0061] S300. Obtain the file growth amount and opening times corresponding to each application in the mobile terminal.
[0062] Specifically, each application will generate a corresponding folder under the / sdcard directory to save the local data generated by the application. From this folder, the file size generated by the application can be obtained, so as to obtain the file size of the application in a certain period of time. The amount of file growth within. After each application is opened by the user, the corresponding activity (activity) in the system will be placed on the top of the stack in the memory, so the number of times each application is opened can be detected.
[0063] S302, regularly calculate the file growth rate and opening frequency of each application.
[0064] Specifically, because...
Embodiment 2
[0072] Such as Figure 4 As shown, the second embodiment of the present invention proposes a method for prompting abnormal applications. In the second embodiment, on the basis of the first embodiment, the abnormal application prompting method further includes the following steps:
[0073] S400. Set sensitive data in the mobile terminal.
[0074] Specifically, for mobile terminal users, personal data is very sensitive, such as phonebooks, call records, text messages, multimedia messages, location information, photos, etc. If an application frequently operates sensitive data, the application may be abnormal. The mobile terminal can set which data belongs to sensitive data, or receive the range of sensitive data set by the user.
[0075] S402, regularly acquire the number of operations of each application on the sensitive data.
[0076] Specifically, the operations mainly refer to operations such as reading, adding, deleting, modifying, and transmitting the sensitive data. Th...
Embodiment 3
[0085] Such as Figure 5 As shown, the fourth embodiment of the present invention proposes a mobile terminal 2 . The mobile terminal 2 includes a memory 20 , a processor 22 , a screen 26 and an abnormal application prompting system 28 .
[0086] Wherein, the memory 20 includes at least one type of readable storage medium for storing the operating system installed in the mobile terminal 2 and various application software, such as the program code of the abnormal application prompting system 28 . In addition, the memory 20 can also be used to temporarily store various types of data that have been output or will be output.
[0087] The processor 22 may be a central processing unit (Central Processing Unit, CPU), controller, microcontroller, microprocessor, or other data processing chips in some embodiments. The processor 22 is generally used to control the overall operation of the mobile terminal 2 . In this embodiment, the processor 22 is configured to run the program codes s...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


