Working method of safety certification device for information synchronization
A security authentication and information synchronization technology, applied in security devices, telephone communications, wireless communications, etc., can solve problems such as user privacy leakage risks, reduce the risk of leakage, and improve security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment approach
[0127] As an implementation manner, this step S20 may include:
[0128] Step S21, detecting whether the mobile terminal pops up a dialog box of the authentication request information of the application;
[0129] Step S22, if the mobile terminal does not pop up the dialog box of the application's authentication request information, then it is determined that the application has not sent the authentication request information.
[0130] For a class of legal applications, before reading information such as mobile phone contacts and short messages, the mobile terminal will generally pop up a dialog box for application authentication request information to allow the user to perform security authentication and authorization for the application. In this embodiment, the system records whether the mobile terminal pops up a dialog box of application authentication request information.
[0131] If the mobile terminal pops up a dialog box of application authentication request information,...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


