Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Application program behavior interception method and device, computer equipment and storage medium

A technology of application programs and behaviors, applied in the field of information security, can solve problems such as user information security threats, and achieve the effect of improving security

Pending Publication Date: 2019-05-03
ONE CONNECT SMART TECH CO LTD SHENZHEN
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when installing applications on the terminal, many applications will pop up a prompt to ask for permission to use the camera. After obtaining the permission to use the camera, the application may call the camera to take pictures without the user's knowledge
If the application leaks multimedia information such as photos or videos taken, it will pose a security threat to user information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application program behavior interception method and device, computer equipment and storage medium
  • Application program behavior interception method and device, computer equipment and storage medium
  • Application program behavior interception method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0086] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0087] The application behavior interception method provided by this application can be applied to such as figure 1 shown in the application environment. Wherein, the terminal 102 communicates with the background server 104 through the network. Terminal 102 monitors the application program that is in running state, and when detecting that the application program in operation invokes the camera to shoot multimedia information that includes photos and / or videos, it detects whether the application program sends multimedia information to the background server 104; The server...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a safety protection technology, in particular to an application program behavior interception method and device, computer equipment and a storage medium. The method comprisesthe following steps: monitoring an application program in a running state; when it is monitored that the running application program calls a camera to take multimedia information including pictures and / or videos, whether the application program sends the multimedia information to a background server or not is detected; if yes, pausing to send the multimedia information to a background server; Outputting prompt information for prompting the user; and when feedback information responding to the prompt information is received, prohibiting the application program from sending the multimedia information to a background server according to the feedback information. By adopting the method, the application program can be prevented from leaking user information.

Description

technical field [0001] The present application relates to the technical field of information security, in particular to a method, device, computer equipment and storage medium for intercepting application program behavior. Background technique [0002] With the continuous development of computer technology and mobile network technology, more and more users use applications on smart terminals to enjoy various digital services. However, when installing applications on the terminal, many applications will pop up a prompt to obtain the permission to use the camera. After obtaining the permission to use the camera, the application may call the camera to take pictures without the user's knowledge. If the application program leaks multimedia information such as photos or videos taken, it will pose a security threat to user information. Contents of the invention [0003] Based on this, it is necessary to provide an interception method, device, computer equipment and storage mediu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/50
Inventor 王俊涛
Owner ONE CONNECT SMART TECH CO LTD SHENZHEN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products