Alarm method and mobile terminal
A mobile terminal and alarm information technology, applied in the direction of instruments, electrical digital data processing, digital data protection, etc., can solve problems such as user privacy data security, and achieve the effect of ensuring security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0017] refer to figure 1 , shows a flow chart of steps of an alarm method according to Embodiment 1 of the present invention.
[0018] The alarm method provided by the embodiment of the present invention includes the following steps:
[0019] Step 101: In the case that the application program is detected to call the target data of the mobile terminal, confirm whether the application program has authorization authority.
[0020] Monitor the invocation of the target data, and confirm whether the application program has the authorization authority if it is detected that there is an application program invoking the target data. For example, when the application program in the mobile terminal calls the target data, the application program has authorization authority. When a third-party application program not installed in the mobile terminal calls the target data, the application program has no authorization authority.
[0021] Specifically, root is used to monitor the calling da...
Embodiment 2
[0035] refer to figure 2 , shows a flow chart of steps of an alarm method according to Embodiment 2 of the present invention.
[0036] The alarm method provided by the embodiment of the present invention includes the following steps:
[0037] Step 201: In the case that the application program is detected to call the target data of the mobile terminal, confirm whether the application program has authorization authority.
[0038] Monitor the invocation of the target data, and confirm whether the application program has the authorization authority if it is detected that the application program calls the target data, for example: when the application program in the mobile terminal calls the target data, confirm that the application program has the authorization authority , when the third-party application program not installed in the mobile terminal calls the target data, it is confirmed that the application program has no authorization authority.
[0039] Specifically, root is...
Embodiment 3
[0064] refer to image 3 , shows a structural block diagram of a mobile terminal provided by an embodiment of the present invention.
[0065] The mobile terminal provided by the embodiment of the present invention includes: a first determination module 301, configured to confirm whether the application program has authorization authority when it is detected that the application program calls the target data of the mobile terminal; a first output module 302 , for if it is confirmed that the application program has no authorization authority, then output the first warning information on the first preset interface and display the call information corresponding to the target data; the second determination module 303 is used for confirming that the application program If the program has authorization authority, then confirm whether the target data meets the warning condition; the second output module 304 is used to output and display the second warning information on the first pres...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


