Unlock instant, AI-driven research and patent intelligence for your innovation.

Alarm method and mobile terminal

A mobile terminal and alarm information technology, applied in the direction of instruments, electrical digital data processing, digital data protection, etc., can solve problems such as user privacy data security, and achieve the effect of ensuring security

Active Publication Date: 2019-09-24
VIVO MOBILE COMM CO LTD
View PDF10 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Embodiments of the present invention provide an alarm method and a mobile terminal to solve the security problem of user privacy data in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Alarm method and mobile terminal
  • Alarm method and mobile terminal
  • Alarm method and mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0017] refer to figure 1 , shows a flow chart of steps of an alarm method according to Embodiment 1 of the present invention.

[0018] The alarm method provided by the embodiment of the present invention includes the following steps:

[0019] Step 101: In the case that the application program is detected to call the target data of the mobile terminal, confirm whether the application program has authorization authority.

[0020] Monitor the invocation of the target data, and confirm whether the application program has the authorization authority if it is detected that there is an application program invoking the target data. For example, when the application program in the mobile terminal calls the target data, the application program has authorization authority. When a third-party application program not installed in the mobile terminal calls the target data, the application program has no authorization authority.

[0021] Specifically, root is used to monitor the calling da...

Embodiment 2

[0035] refer to figure 2 , shows a flow chart of steps of an alarm method according to Embodiment 2 of the present invention.

[0036] The alarm method provided by the embodiment of the present invention includes the following steps:

[0037] Step 201: In the case that the application program is detected to call the target data of the mobile terminal, confirm whether the application program has authorization authority.

[0038] Monitor the invocation of the target data, and confirm whether the application program has the authorization authority if it is detected that the application program calls the target data, for example: when the application program in the mobile terminal calls the target data, confirm that the application program has the authorization authority , when the third-party application program not installed in the mobile terminal calls the target data, it is confirmed that the application program has no authorization authority.

[0039] Specifically, root is...

Embodiment 3

[0064] refer to image 3 , shows a structural block diagram of a mobile terminal provided by an embodiment of the present invention.

[0065] The mobile terminal provided by the embodiment of the present invention includes: a first determination module 301, configured to confirm whether the application program has authorization authority when it is detected that the application program calls the target data of the mobile terminal; a first output module 302 , for if it is confirmed that the application program has no authorization authority, then output the first warning information on the first preset interface and display the call information corresponding to the target data; the second determination module 303 is used for confirming that the application program If the program has authorization authority, then confirm whether the target data meets the warning condition; the second output module 304 is used to output and display the second warning information on the first pres...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an alarm method and a mobile terminal, and the method comprises the steps: confirming whether an application program has an authorization permission or not when it is monitored that the application program calls target data; if it is confirmed that the application program does not have the authorization permission, outputting first alarm information a first preset interface, and displaying calling information corresponding to the target data; if it is determined that the application program has the authorization permission, determining whether the target data satisfies an alarm condition; and if it is determined that the target data satisfies the alarm condition, outputting second alarm information on a second preset interface and displaying call information corresponding to the target data. When it is monitored that the application program calls the target data, and under the conditions that that application program has no authorization permission, application program has authorization permission and target data meets an alarm condition, the alarm information and the calling information corresponding to the target data are output, so that a user knows the abnormal calling condition of the application program on the private data and is prompted to control the private data, thereby ensuring the security of the private data.

Description

technical field [0001] The invention relates to the technical field of mobile terminals, in particular to an alarm method and a mobile terminal. Background technique [0002] At present, during the use of the mobile terminal, some applications may call the user's private information, such as reading a picture containing personal private data, resulting in the leakage of the user's private data. However, users do not have a clear understanding of this situation, and cannot guarantee the security of private data. Contents of the invention [0003] Embodiments of the present invention provide an alarm method and a mobile terminal to solve the security problem of user private data in the prior art. [0004] In order to solve the problems of the technologies described above, the present invention is achieved in that: [0005] In the first aspect, the embodiment of the present invention provides an alarm method, which is applied to a mobile terminal, and the method includes: c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/604G06F21/6245
Inventor 黄莉莉
Owner VIVO MOBILE COMM CO LTD