Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Content monitoring method, device, equipment and medium

A technology for content and display content, applied in the field of information security, can solve problems such as low accuracy, inability to accurately locate and analyze, and achieve the effect of improving accuracy

Pending Publication Date: 2020-12-01
北京指掌易科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method conducts information security audits by analyzing all network requests sent by mobile devices. Although the audit scope is wide, the accuracy is low, and the specific content of many requests cannot be accurately located and analyzed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Content monitoring method, device, equipment and medium
  • Content monitoring method, device, equipment and medium
  • Content monitoring method, device, equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0042] figure 1 It is a flow chart of a content monitoring method in Embodiment 1 of the present invention. The technical solution of this embodiment is applicable to the situation where the VSA application is managed through the mobile management platform. This method can be executed by a content monitoring device, and the device It can be implemented by software and / or hardware, and can be integrated in various general-purpose computer devices, specifically including the following steps:

[0043] Step 110, installing the installation package of at least one virtual security domain VSA application program delivered by the server on the mobile device to obtain at least one VSA application program;

[0044] Wherein, the VSA application program is used to monitor the set display content in the application program interface, and send the monitored display content to the mobile management platform.

[0045] In this embodiment, the virtual security area (Virtual Security Area, VSA...

Embodiment 2

[0062] figure 2 It is a flow chart of a content monitoring method in Embodiment 2 of the present invention. The technical solution of this embodiment is applicable to the situation where the display content obtained by the VSA application program is analyzed and warned by the server. This method can be implemented by the content monitoring device Execution, the device can be implemented by software and / or hardware, and can be integrated in various general-purpose computer equipment, specifically including the following steps:

[0063] Step 210: Receive the original installation package of the target application program imported by the user, and encapsulate the original installation package through VSA technology to obtain a VSA application installation package.

[0064] In this embodiment, after receiving the original installation package of the target application imported by the user, the server encapsulates the original installation package through VSA technology to obtain ...

Embodiment 3

[0078] image 3 It is a flow chart of a content monitoring method in Embodiment 3 of the present invention. The technical solution of this embodiment is applicable to the situation of monitoring the content displayed by the application program through the VSA application program. The method can be executed by a content monitoring device, which can It is realized by software and / or hardware, and can be integrated in various general-purpose computer devices, specifically including the following steps:

[0079] Step 310, obtain the current application program interface in the VSA application program in real time.

[0080] In this embodiment, the VSA application program obtains the current application program interface in the VSA application program in real time during the running process, so as to monitor the display content of the current VSA application program. Among them, the VSA application program can be started after receiving the start instruction from the user, or it ca...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a content monitoring method and device, equipment and a medium. The content monitoring method comprises the following steps: installing an installation package of at least one virtual safety domain (VSA) application program issued by a server on mobile equipment to obtain at least one VSA application program; wherein the VSA application program is used formonitoring set display content in an application program interface and sending the monitored display content to the mobile management platform side; and when the target display content sent by the current VSA application program is received, reporting the target display content to the server to indicate the server to monitor the target display content. According to the technical scheme of the embodiment of the invention, the content monitoring of the granularity of the application program is realized while the running logic of the application program is not influenced, and the content monitoring accuracy is improved.

Description

technical field [0001] The embodiments of the present invention relate to the field of information security, and in particular, to a content monitoring method, device, equipment and medium. Background technique [0002] With the rapid development of Internet technology, more and more people conduct office business on mobile devices such as mobile phones and tablet computers. Therefore, the risk of information security of application software installed on mobile devices has an increasing impact on business. Large, it is necessary to audit the behavior, operation and display information of mobile device holders on mobile devices to prevent information leakage. [0003] In the prior art, in order to prevent information leakage, the most used method is to monitor the network requests of mobile devices, judge whether there is a risk of information leakage according to the addresses and contents accessed by users through mobile devices, and give timely warnings. This method condu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/30G06F9/455
CPCG06F11/301G06F9/45558G06F2009/45587
Inventor 韩东生王伟陈电波桂艳峰
Owner 北京指掌易科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products