Mobile terminal security monitoring method, device, electronic equipment and storage medium
A mobile terminal and security monitoring technology, applied in the computer field, can solve the problems of inability to achieve application security monitoring, lack of application security and effective monitoring, etc., and achieve the effects of safe and effective monitoring, easy execution, and improved security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0041] The specific embodiments of the present invention will be further described below in conjunction with the accompanying drawings. The following examples are only used to illustrate the technical solution of the present invention more clearly, but not to limit the protection scope of the present invention.
[0042] figure 1 It shows a schematic flowchart of a security monitoring method for a mobile terminal provided in this embodiment, including:
[0043] S101. Acquire the collected data of each application program in the mobile terminal, and divide the collected data into several types of data according to a preset data classification rule.
[0044] Wherein, the collected data includes at least one of the following: hardware information, system information, application information, location information, function hijacking information, configuration information, instruction result information, crash stack information, system root information, time information, process Zy...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


