CN106650442A - Information secure control method and mobile terminal - Google Patents

Information secure control method and mobile terminal Download PDF

Info

Publication number
CN106650442A
CN106650442A CN201610941855.3A CN201610941855A CN106650442A CN 106650442 A CN106650442 A CN 106650442A CN 201610941855 A CN201610941855 A CN 201610941855A CN 106650442 A CN106650442 A CN 106650442A
Authority
CN
China
Prior art keywords
program
frame interface
mobile terminal
desktop frame
read
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610941855.3A
Other languages
Chinese (zh)
Other versions
CN106650442B (en
Inventor
沈志远
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201610941855.3A priority Critical patent/CN106650442B/en
Publication of CN106650442A publication Critical patent/CN106650442A/en
Application granted granted Critical
Publication of CN106650442B publication Critical patent/CN106650442B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Virology (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the invention provides an information secure control method and a mobile terminal. The method comprises the steps of if it is detected that a user edits information through utilization of an input method, monitoring whether a background program reads a desktop frame interface of the mobile terminal or not, wherein the desktop frame interface is used for reading a desktop frame; if it is monitored that the background program reads the desktop frame interface, determining an application program list of which operation is forbidden; matching the background program which reads the desktop frame interface with a forbidden program in the application program list of which operation is forbidden; and if the matching is successful, controlling the background program which reads the desktop frame interface to stop operating. According to the method and the mobile terminal, whether the monitored background program is the forbidden program or not is judged by monitoring whether the background program reads the desktop frame interface or not; if the background program is the forbidden program, the background program is controlled to stop operating, screenshot or screen record is prevented from being carried out on the sensitive information input by a user, and the security of the privacy information of the user is ensured.

Description

A kind of method of controlling security and mobile terminal of information
Technical field
The present invention relates to communication technical field, more particularly to a kind of method of controlling security and mobile terminal of information.
Background technology
At present, with the development of the communication technology, mobile terminal device(Such as smart mobile phone)Generally support to record screen work( Can be with screenshotss function.Wherein, screenshotss function can be intercepted the content shown in a flash on mobile phone screen, and generate figure Piece;And screen function is recorded, similar to the extension to screenshotss function, the sequence of operations that it can be carried out user on mobile phone Recorded, and generated video.So, user can be according to regarding that the picture, recording screen function that screenshotss function is generated is generated Frequency come enter row information preserve and demonstrate operation etc..
Although the life that above two function can give people offers convenience, if the user while using input method, disliking Meaning program then can be opened on backstage in the case of user is unwitting and record screen and/or screenshotss function, so as to record use The input data at family, steals privacy of user.
As can be seen here, prior art in the face of user using input method editor's information scene when, there is leakage privacy of user Risk.
The content of the invention
The embodiment of the present invention provides a kind of method of controlling security and mobile terminal of information, to solve prior art in the face of using When family uses the scene of input method editor's information, there is a problem of the risk for leaking privacy of user.
In a first aspect, embodiments providing a kind of method of controlling security of information, mobile terminal is applied to, it is described Method includes:
If detecting user uses input method editor's information, monitor whether that there is background program reads the mobile terminal Desktop frame interface, wherein, the desktop frame interface be used for read tabletop frame;
If monitoring, there is background program reads the desktop frame interface, it is determined that forbid the application list for running;
The background program of the desktop frame interface will be read, with the banned journey in described the application list forbidden and running Sequence is matched;
If the match is successful, the background program that the desktop frame interface is read in control is out of service.
Second aspect, the embodiment of the present invention additionally provides a kind of mobile terminal, and the mobile terminal includes:
Monitoring modular, if using input method editor's information for detecting user, monitors whether there is background program reading The desktop frame interface of the mobile terminal is taken, wherein, the desktop frame interface is used to read tabletop frame;
Determining module, if for monitoring that there is background program reads the desktop frame interface, it is determined that forbid what is run The application list;
Matching module, for the background program by the desktop frame interface is read, with the application program forbidden and running Banned program in list is matched;
Control module, if for the match is successful, the background program that the desktop frame interface is read in control is out of service.
So, the embodiment of the present invention reads desktop frame interface by monitoring whether to exist background program, and will monitor Background program forbids the application list for running to be matched with determined by, so as to judge whether the background program is banned Program, after finding that it is banned program, then controls that its is out of service, so can use input method editor's information in user During, monitor in real time is intended to carry out screenshotss or recording to the information of user input with the presence or absence of rogue program, and after discovery It can be in time forbidden to run, it is to avoid the sensitive information of user input is by screenshotss or screen recording, it is ensured that privacy of user is believed The safety of breath.
Description of the drawings
In order to be illustrated more clearly that the technical scheme of the embodiment of the present invention, below by institute in the description to the embodiment of the present invention The accompanying drawing that needs are used is briefly described, it should be apparent that, drawings in the following description are only some enforcements of the present invention Example, for those of ordinary skill in the art, without having to pay creative labor, can be with according to these accompanying drawings Obtain other accompanying drawings.
Fig. 1 is the flow chart of the method for controlling security of the information of first embodiment of the invention;
Fig. 2 is the block diagram of the mobile terminal of third embodiment of the invention;
Fig. 3 is the block diagram of the mobile terminal of fourth embodiment of the invention;
Fig. 4 is the block diagram of the mobile terminal of fifth embodiment of the invention;
Fig. 5 is the structural representation of the mobile terminal of sixth embodiment of the invention.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described, it is clear that described embodiment is a part of embodiment of the invention, rather than the embodiment of whole.Based on this Embodiment in bright, the every other enforcement that those of ordinary skill in the art are obtained under the premise of creative work is not made Example, belongs to the scope of protection of the invention.
First embodiment
With reference to Fig. 1, the flow chart of the method for controlling security of the information of one embodiment of the invention is shown, be applied to movement Terminal, methods described specifically may include steps of:
Step 101, if detecting user uses input method editor's information, monitors whether exist described in background program reading The desktop frame interface of mobile terminal, wherein, the desktop frame interface is used to read tabletop frame;
Wherein, if the user while during using input method editor's information, the embodiment of the present invention just can be to mobile terminal(For example Mobile phone, flat board elevator etc.)Desktop frame interface be monitored.Specifically, in the prior art, if any application program is needed Record screen or carry out screenshotss and be required for obtaining video or picture by reading tabletop frame, but read tabletop frame and be required for The unified physical layer interface in the system of mobile terminal, i.e. desktop frame interface are read, to read tabletop frame, so as to complete screen recording Or picture screenshotss.That is, read desktop frame interface be carry out screen recording or screenshotss must Jing steps, therefore, this Bright embodiment directly can be monitored to the desktop frame interface, monitor whether that there is background program reads the desktop frame interface, To avoid rogue program from stealing sensitive information of the user using input method editor.
Step 102, if monitoring, there is background program reads the desktop frame interface, it is determined that forbid the application journey run Sequence table;
So, once having monitored that background program reads the desktop frame interface, then be assured that current setting is Which forbids the application list for running.
Step 103, will read the background program of the desktop frame interface, in described the application list forbidden and running Banned program matched;
Then, by the background program and the application program for forbidding running of current setting of the reading desktop frame interface for monitoring Banned program in list is matched.
Step 104, if the match is successful, the background program that the desktop frame interface is read in control is out of service.
So, once the match is successful, then illustrate that the background program is rogue program, in order to protect privacy of user not stolen Take, need control the background program it is out of service.
So, the embodiment of the present invention reads desktop frame interface by monitoring whether to exist background program, and will monitor Background program forbids the application list for running to be matched with determined by, so as to judge whether the background program is banned Program, after finding that it is banned program, then controls that its is out of service, so can use input method editor's information in user During, monitor in real time is intended to carry out screenshotss or recording to the information of user input with the presence or absence of rogue program, and after discovery It can be in time forbidden to run, it is to avoid the sensitive information of user input is by screenshotss or screen recording, it is ensured that privacy of user is believed The safety of breath.
Second embodiment
The method of controlling security of the information of the present invention is described in detail with reference to an instantiation.
The method of controlling security of information according to embodiments of the present invention can include:
First, the input method of the embodiment of the present invention is opened;
Then, if detecting user using the input method editor information to be input into, is monitoring whether exist Background program reads the desktop frame interface of the mobile terminal, wherein, the desktop frame interface is used to read tabletop frame;
Wherein, record screen or screenshotss are required for reading the auspicious interface of desktop to read tabletop frame.It is by one to record screen Whole desktops one video of auspicious synthesis in the section time, and screenshotss are then to save as picture by the desktop at a certain moment is auspicious. At present cell phone system has unified physical layer interface, i.e. desktop frame interface when reading desktop is auspicious, then by monitoring the interface, Just can be when an existing application read the interface, i.e. notifier processes system is processed.
Also, before monitoring whether to there is the desktop frame interface that background program reads the mobile terminal, according to this The method of bright embodiment can also pre-set program inhibition pattern;In the program inhibition pattern for pre-setting, to different Program inhibition pattern pre-sets different the application lists for forbidding running;Wherein, the program inhibition pattern for pre-setting Type at least include:The all programming modes for forbidding the mobile terminal to install;Forbid Virus pattern.
That is, pattern one:The all programming modes for forbidding the mobile terminal to install;
Pattern one is corresponding to forbid the application list for running to be set up applications list, specifically includes the movement The attribute information of all application programs that terminal is installed(Such as application name, application package name etc.).
Pattern two:Forbid Virus pattern;
Pattern two is corresponding to forbid the application list for running to be Virus list, specifically includes the category of Virus Property information(Such as Virus title, Virus bag name etc.), and the attribute information of the Virus can derive from high in the clouds Trojan horse storehouse and/or the Virus storehouse of user's setting.
Certainly, two patterns here are simply schematically easy to those skilled in the art to understand the technical side of the present invention Case, in practical application, user can also arrange other polytype program inhibition patterns and the corresponding application for forbidding running Program listing, you can to forbid demand according to actual, the setting of prohibited mode is carried out to any program for needing to forbid.I.e. The present invention is not limited to above two pattern.
So, user can in advance arrange above-mentioned any one program inhibition pattern.
Then, if not monitoring that background program reads the desktop frame interface, monitoring is proceeded;
And if monitoring that background program reads the desktop frame interface, then just can be according to the program inhibition of current setting Pattern, it is determined that forbidding the application list for running;
If that is, the program inhibition pattern of current setting is above-mentioned pattern one, forbidding the application program run List is above-mentioned set up applications list.
And if the program inhibition pattern of current setting is above-mentioned pattern two, then forbid the application list for running to be upper State Virus list.
Then, it is possible to report processing system to process background program, specifically, can be by the reading for monitoring The attribute information of the background program of the desktop frame interface with it is described forbid run the application list in banned journey The attribute information of sequence is matched;
Wherein, in one embodiment, if the program inhibition pattern of the current setting is above-mentioned pattern one, will read All installations in the attribute information of the background program of the desktop frame interface and set up applications list The attribute information of application program(Such as application name or application package name)Matched;
And in another embodiment, if the program inhibition pattern of the current setting is to forbid Virus pattern, i.e., Pattern two, then will read the disease in the attribute information and Virus list of the background program of the desktop frame interface The attribute information of malicious program(Such as application name or application package name)Matched;
Finally, once the match is successful, it is necessary to which the background program of the reading desktop frame interface that control is monitored stops Operation.
By means of above-mentioned technical proposal of the present invention, if current setting is above-mentioned pattern one, can control mobile whole Any application program that end is installed forbids stealing information of the user using input method input;And if current setting is above-mentioned mould Formula two, then can prevent all Viruses and user is stolen by screen shot or screen recording using input method input Information, improves the security of user profile, and improves the safety coefficient of input method.
3rd embodiment
With reference to Fig. 2, the block diagram of the mobile terminal of one embodiment of the invention is shown.Mobile terminal includes shown in Fig. 2:
Monitoring modular 201, if using input method editor's information for detecting user, monitors whether there is background program The desktop frame interface of the mobile terminal is read, wherein, the desktop frame interface is used to read tabletop frame;
Determining module 202, if for monitoring that there is background program reads the desktop frame interface, it is determined that forbid operation The application list;
Matching module 203, for the background program by the desktop frame interface is read, forbids that what is run to answer with described Matched with the banned program in program listing;
Control module 204, if for the match is successful, control is read the background program of the desktop frame interface and is stopped Operation.
So, the embodiment of the present invention reads desktop frame interface by monitoring whether to exist background program, and will monitor Background program forbids the application list for running to be matched with determined by, so as to judge whether the background program is banned Program, after finding that it is banned program, then controls that its is out of service, so can use input method editor's information in user During, monitor in real time is intended to carry out screenshotss or recording to the information of user input with the presence or absence of rogue program, and after discovery It can be in time forbidden to run, it is to avoid the sensitive information of user input is by screenshotss or screen recording, it is ensured that privacy of user is believed The safety of breath.
Fourth embodiment
With reference to Fig. 3, the block diagram of the mobile terminal of another embodiment of the present invention is shown.Mobile terminal includes shown in Fig. 3:
Mode module 205 is pre-set, for pre-setting program inhibition pattern;
List block 206 is pre-set, in the program inhibition pattern for pre-setting, to different program inhibition moulds Formula pre-sets different the application lists for forbidding running;
Wherein, the type of the program inhibition pattern for pre-setting at least includes:
The all programming modes for forbidding the mobile terminal to install;
Forbid Virus pattern.
Monitoring modular 201, if being in use state for the input method, monitors whether that there is background program reads institute The desktop frame interface of mobile terminal is stated, wherein, the desktop frame interface is used to read tabletop frame;
Determining module 202 includes:
Determination sub-module 2021, for according to the program inhibition pattern of current setting, it is determined that forbidding the application program run List.
Matching module 203, including:
First matched sub-block 2031, if the program inhibition pattern for the current setting is to forbid Virus mould Formula, then will read the viral journey in the attribute information and Virus list of the background program of the desktop frame interface The attribute information of sequence is matched.
Second matched sub-block 2032, for the attribute letter of the background program by the desktop frame interface is read Cease and matched with the attribute information of the banned program in described the application list forbidden and running.
Control module 204, if for the match is successful, controlling the background program out of service.
Mobile terminal can realize that mobile terminal in the method for controlling security embodiment of the first and second information realizes User using during input method, monitor in real time with the presence or absence of rogue program be intended to carry out the information of user input screenshotss or Record, and can in time forbid it to run after discovery, it is to avoid the sensitive information of user input is protected by screenshotss or screen recording The safe effect of user privacy information is demonstrate,proved, to avoid repeating, has been repeated no more here.
5th embodiment
Fig. 4 is the block diagram of the mobile terminal of another embodiment of the invention.Mobile terminal 400 shown in Fig. 4 includes:At least One processor 401, memory 402, at least one network interface 404 and user interface 403.Each in mobile terminal 400 Component is coupled by bus system 405.It is understood that bus system 405 is used to realize that the connection between these components is led to Letter.Bus system 405 except including in addition to data/address bus, also including power bus, controlling bus and status signal bus in addition.It but is For the sake of clear explanation, in the diagram various buses are all designated as into bus system 405.
Wherein, user interface 403 can include display, keyboard or pointing device (for example, mouse, trace ball (trackball), touch-sensitive plate or touch-screen etc..
It is appreciated that the memory 402 in the embodiment of the present invention can be volatile memory or nonvolatile memory, Or may include both volatibility and nonvolatile memory.Wherein, nonvolatile memory can be read-only storage (Read- Only Memory, ROM), programmable read only memory (Programmable ROM, PROM), the read-only storage of erasable programmable Device (Erasable PROM, EPROM), Electrically Erasable Read Only Memory (Electrically EPROM, EEPROM) or Flash memory.Volatile memory can be random access memory (Random Access Memory, RAM), and it is used as outside height Speed caching.By exemplary but be not restricted explanation, the RAM of many forms can use, such as static RAM (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), Synchronous Dynamic Random Access Memory (Synchronous DRAM, SDRAM), double data speed synchronous dynamic RAM (Double Data Rate SDRAM, DDRSDRAM), enhancement mode Synchronous Dynamic Random Access Memory (Enhanced SDRAM, ESDRAM), synchronized links Dynamic random access memory (Synchlink DRAM, SLDRAM) and direct rambus random access memory (Direct Rambus RAM, DRRAM).The embodiment of the present invention description system and method memory 402 be intended to including but not limited to these With the memory of any other suitable type.
In some embodiments, memory 402 stores following element, can perform module or data structure, or Person their subset, or their superset:Operating system 4021 and application program 4022.
Wherein, operating system 4021, comprising various system programs, such as ccf layer, core library layer, driving layer etc., are used for Realize various basic businesses and process hardware based task.Application program 4022, comprising various application programs, such as media Player (Media Player), browser (Browser) etc., for realizing various applied business.Realize the embodiment of the present invention The program of method may be embodied in application program 4022.
In embodiments of the present invention, by call memory 402 store program or instruction, specifically, can be application The program stored in program 4022 or instruction, if processor 401 is used to detect user using input method editor's information, monitor The desktop frame interface of the mobile terminal is read with the presence or absence of background program, wherein, the desktop frame interface is used to read desktop Frame;If monitoring, there is background program reads the desktop frame interface, it is determined that forbid the application list for running;To read The background program of the desktop frame interface, is matched with the banned program in described the application list forbidden and running;If The match is successful, then the background program of the control reading desktop frame interface is out of service.
The method that the embodiments of the present invention are disclosed can apply in processor 401, or be realized by processor 401. A kind of possibly IC chip of processor 401, the disposal ability with signal.During realization, said method it is each Step can be completed by the instruction of the integrated logic circuit of the hardware in processor 401 or software form.Above-mentioned process Device 401 can be general processor, digital signal processor (Digital Signal Processor, DSP), special integrated electricity Road (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field Programmable Gate Array, FPGA) either other PLDs, discrete gate or transistor logic, Discrete hardware components.Can realize or perform disclosed each method in the embodiment of the present invention, step and logic diagram.It is general Processor can be microprocessor or the processor can also be any conventional processor etc..With reference to embodiment of the present invention institute The step of disclosed method, can be embodied directly in hardware decoding processor and perform and complete, or with the hardware in decoding processor And software module combination execution is completed.Software module may be located at random access memory, and flash memory, read-only storage may be programmed read-only In the ripe storage medium in this area such as memory or electrically erasable programmable memory, register.The storage medium is located at Memory 402, processor 401 reads the information in memory 402, the step of complete said method with reference to its hardware.
It is understood that the embodiment of the present invention description these embodiments can with hardware, software, firmware, middleware, Microcode or its combination are realizing.For hardware is realized, processing unit can be realized in one or more special ICs (Application Specific Integrated Circuits, ASIC), digital signal processor (Digital Signal Processing, DSP), digital signal processing appts (DSP Device, DSPD), programmable logic device (Programmable Logic Device, PLD), field programmable gate array (Field-Programmable Gate Array, FPGA), general place In reason device, controller, microcontroller, microprocessor, other electronic units for performing herein described function or its combination.
For software realize, can pass through perform the embodiment of the present invention described in function module (such as process, function etc.) come Realize the technology described in the embodiment of the present invention.Software code is storable in memory and by computing device.Memory can To realize within a processor or outside processor.
Alternatively, processor 401 is additionally operable to:Pre-set program inhibition pattern;In the program inhibition pattern for pre-setting In, different the application lists for forbidding running are pre-set to different program inhibition patterns;Wherein, the journey for pre-setting The type of sequence prohibited mode at least includes:The all programming modes for forbidding the mobile terminal to install;Forbid Virus Pattern.
Alternatively, processor 401 is additionally operable to:According to the program inhibition pattern of current setting, it is determined that forbidding the application for running Program listing.
Alternatively, processor 401 is additionally operable to:To read the attribute information of the background program of the desktop frame interface with The attribute information of the Virus in Virus list is matched.
Alternatively, processor 401 is additionally operable to:To read the desktop frame interface background program attribute information with it is described The attribute information for forbidding the banned program in the application list for running is matched.
Mobile terminal 400 can realize that what mobile terminal in previous embodiment realized uses the process of input method in user In, monitor in real time is intended to carry out screenshotss or recording to the information of user input with the presence or absence of rogue program, and can after discovery It is forbidden to run in time, it is to avoid the sensitive information of user input is by screenshotss or screen recording, it is ensured that user privacy information The effect of safety, to avoid repeating, repeats no more here.
Sixth embodiment
Fig. 5 is the structural representation of the mobile terminal of another embodiment of the present invention.Specifically, the mobile terminal in Fig. 5 500 can be mobile phone, panel computer, personal digital assistant (Personal Digital Assistant, PDA) or vehicle mounted electric Brain etc..
Mobile terminal 500 in Fig. 5 includes radio frequency (Radio Frequency, RF) circuit 510, memory 520, input Unit 530, display unit 540, processor 560, voicefrequency circuit 570, WiFi (Wireless Fidelity) module 580 and electricity Source 590.
Wherein, input block 530 can be used for receive mobile phone users input numeral or character information, and produce with The signal input that the mobile phone users of mobile terminal 500 are arranged and function control is relevant.Specifically, the embodiment of the present invention In, the input block 530 can include contact panel 531.Contact panel 531, also referred to as touch-screen, can collect mobile terminal use Family thereon or neighbouring touch operation (such as mobile phone users use any suitable object or the annexes such as finger, stylus Operation on contact panel 531), and corresponding attachment means are driven according to formula set in advance.Optionally, contact panel 531 may include two parts of touch detecting apparatus and touch controller.Wherein, touch detecting apparatus detect mobile phone users Touch orientation, and the signal that touch operation brings is detected, transmit a signal to touch controller;Touch controller is from touch detection Touch information is received on device, and is converted into contact coordinate, then give the processor 560, and can receiving processor 560 Come order and performed.Furthermore, it is possible to using the polytype reality such as resistance-type, condenser type, infrared ray and surface acoustic wave Existing contact panel 531.Except contact panel 531, input block 530 can also include other input equipments 532, and other inputs set Standby 532 can include but is not limited to physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse One or more in mark, action bars etc..
Wherein, display unit 540 can be used to show the information being input into by mobile phone users or be supplied to mobile terminal to use The information at family and the various menu interfaces of mobile terminal 500.Display unit 540 may include display floater 541, optionally, can To configure display using the form such as LCD or Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) Panel 541.
It should be noted that contact panel 531 can cover display floater 541, touch display screen is formed, when the touch display screen inspection Measure thereon or after neighbouring touch operation, processor 560 is sent to determine the type of touch event, with preprocessor 560 provide corresponding visual output according to the type of touch event in touch display screen.
Touch display screen includes Application Program Interface viewing area and conventional control viewing area.The Application Program Interface viewing area And the arrangement mode of the conventional control viewing area is not limited, can be arranged above and below, left-right situs etc. can distinguish two and show Show the arrangement mode in area.The Application Program Interface viewing area is displayed for the interface of application program.Each interface can be with The interface element such as the icon comprising at least one application program and/or widget desktop controls.The Application Program Interface viewing area It can also be the empty interface not comprising any content.The conventional control viewing area be used for show the higher control of utilization rate, for example, Application icons such as settings button, interface numbering, scroll bar, phone directory icon etc..
Wherein processor 560 is the control centre of mobile terminal 500, using various interfaces and connection whole mobile phone Various pieces, the software program and/or module being stored in by operation or execution in first memory 521, and call storage Data in second memory 522, perform the various functions and processing data of mobile terminal 500, so as to mobile terminal 500 Carry out integral monitoring.Optionally, processor 560 may include one or more processing units.
In embodiments of the present invention, by call store the first memory 521 in software program and/or module and/ Or the data in the second memory 522, if processor 560 is used to detect user using input method editor's information, monitor The desktop frame interface of the mobile terminal is read with the presence or absence of background program, wherein, the desktop frame interface is used to read desktop Frame;If monitoring, there is background program reads the desktop frame interface, it is determined that forbid the application list for running;To read The background program of the desktop frame interface, is matched with the banned program in described the application list forbidden and running;If The match is successful, then the background program of the control reading desktop frame interface is out of service.
Alternatively, processor 560 is additionally operable to:Pre-set program inhibition pattern;In the program inhibition pattern for pre-setting In, different the application lists for forbidding running are pre-set to different program inhibition patterns;Wherein, the journey for pre-setting The type of sequence prohibited mode at least includes:The all programming modes for forbidding the mobile terminal to install;Forbid Virus Pattern.
Alternatively, processor 560 is additionally operable to:According to the program inhibition pattern of current setting, it is determined that forbidding the application for running Program listing.
Alternatively, processor 560 is additionally operable to:To read the attribute information of the background program of the desktop frame interface with The attribute information of the Virus in Virus list is matched.
Alternatively, processor 560 is additionally operable to:To read the desktop frame interface background program attribute information with it is described The attribute information for forbidding the banned program in the application list for running is matched.
It can be seen that, the embodiment of the present invention can realize user use input method during, monitor in real time whether there is Rogue program is intended to carry out screenshotss or recording to the information of user input, and can in time forbid it to run after discovery, it is to avoid The sensitive information of user input is by screenshotss or screen recording, it is ensured that the safe effect of user privacy information, to avoid weight It is multiple, repeat no more here.
Those of ordinary skill in the art it is to be appreciated that with reference to disclosed in the embodiment of the present invention embodiment description it is each The unit and algorithm steps of example, being capable of being implemented in combination in electronic hardware or computer software and electronic hardware.These Function is performed with hardware or software mode actually, depending on the application-specific and design constraint of technical scheme.Specialty Technical staff can use different methods to realize described function to each specific application, but this realization should not Think beyond the scope of this invention.
Those skilled in the art can be understood that, for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, may be referred to the corresponding process in preceding method embodiment, will not be described here.
In embodiment provided herein, it should be understood that disclosed apparatus and method, can pass through other Mode is realized.For example, device embodiment described above is only schematic, and for example, the division of the unit is only A kind of division of logic function, can there is an other dividing mode when actually realizing, such as multiple units or component can with reference to or Person is desirably integrated into another system, or some features can be ignored, or does not perform.Another, shown or discussed is mutual Between coupling or direct-coupling or communication connection can be INDIRECT COUPLING or communication link by some interfaces, device or unit Connect, can be electrical, mechanical or other forms.
The unit as separating component explanation can be or may not be it is physically separate, it is aobvious as unit The part for showing can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple On NE.Some or all of unit therein can according to the actual needs be selected to realize the mesh of this embodiment scheme 's.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing unit, it is also possible to It is that unit is individually physically present, it is also possible to which two or more units are integrated in a unit.
If the function is realized and as independent production marketing or when using using in the form of SFU software functional unit, can be with In being stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially in other words The part contributed to prior art or the part of the technical scheme can be embodied in the form of software product, the meter Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be individual People's computer, server, or network equipment etc.) perform all or part of step of each embodiment methods described of the invention. And aforesaid storage medium includes:USB flash disk, portable hard drive, ROM, RAM, magnetic disc or CD etc. are various can be with store program codes Medium.
The above, the only specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, any Those familiar with the art the invention discloses technical scope in, change or replacement can be readily occurred in, all should contain Cover within protection scope of the present invention.Therefore, protection scope of the present invention should be defined by scope of the claims.

Claims (10)

1. a kind of method of controlling security of information, is applied to mobile terminal, it is characterised in that methods described includes:
If detecting user uses input method editor's information, monitor whether there is the table that background program reads the mobile terminal Face frame interface, wherein, the desktop frame interface is used to read tabletop frame;
If monitoring, there is background program reads the desktop frame interface, it is determined that forbid the application list for running;
The background program of the desktop frame interface will be read, entered with the banned program in described the application list forbidden and running Row matching;
If the match is successful, the background program that the desktop frame interface is read in control is out of service.
2. method according to claim 1, it is characterised in that described to monitor whether that there is background program reads the movement Before the step of desktop frame interface of terminal, methods described also includes:
Pre-set program inhibition pattern;
In the program inhibition pattern for pre-setting, different program inhibition patterns is pre-set it is different forbid running should Use program listing;
Wherein, the type of the program inhibition pattern for pre-setting at least includes:
The all programming modes for forbidding the mobile terminal to install;
Forbid Virus pattern.
3. method according to claim 2, it is characterised in that the step of the application list for running is forbidden in the determination Suddenly, including:
According to the program inhibition pattern of current setting, it is determined that forbidding the application list for running.
4. method according to claim 3, it is characterised in that if the program inhibition pattern of the current setting is to forbid disease Malicious program schema, then it is described to read the background program of the desktop frame interface, with described the application list forbidden and running The step of interior banned program is matched, including:
By the Virus read in the attribute information and Virus list of the background program of the desktop frame interface Attribute information is matched.
5. method according to claim 1, it is characterised in that the background program that the desktop frame interface will be read, The step of being matched with the banned program in described the application list forbidden and running, including:
In attribute information and described the application list forbidden and running of the background program that the desktop frame interface will be read The attribute information of banned program is matched.
6. a kind of mobile terminal, it is characterised in that the mobile terminal includes:
Monitoring modular, if using input method editor's information for detecting user, monitors whether that there is background program reads institute The desktop frame interface of mobile terminal is stated, wherein, the desktop frame interface is used to read tabletop frame;
Determining module, if for monitoring that there is background program reads the desktop frame interface, it is determined that forbid the application for running Program listing;
Matching module, for the background program by the desktop frame interface is read, with described the application list forbidden and running Interior banned program is matched;
Control module, if for the match is successful, the background program that the desktop frame interface is read in control is out of service.
7. mobile terminal according to claim 6, it is characterised in that the mobile terminal also includes:
Mode module is pre-set, for pre-setting program inhibition pattern;
List block is pre-set, it is advance to different program inhibition patterns in the program inhibition pattern for pre-setting Different the application lists for forbidding running are set;
Wherein, the type of the program inhibition pattern for pre-setting at least includes:
The all programming modes for forbidding the mobile terminal to install;
Forbid Virus pattern.
8. mobile terminal according to claim 7, it is characterised in that the determining module includes:
Determination sub-module, for according to the program inhibition pattern of current setting, it is determined that forbidding the application list for running.
9. mobile terminal according to claim 8, it is characterised in that the matching module includes:
First matched sub-block, if the program inhibition pattern for the current setting is to forbid Virus pattern, will read Take the attribute information of the Virus in the attribute information and Virus list of the background program of the desktop frame interface Matched.
10. mobile terminal according to claim 6, it is characterised in that the matching module includes:
Second matched sub-block, the attribute information for the background program by the desktop frame interface is read is forbidden with described The attribute information of the banned program in the application list of operation is matched.
CN201610941855.3A 2016-10-31 2016-10-31 Information security control method and mobile terminal Active CN106650442B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610941855.3A CN106650442B (en) 2016-10-31 2016-10-31 Information security control method and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610941855.3A CN106650442B (en) 2016-10-31 2016-10-31 Information security control method and mobile terminal

Publications (2)

Publication Number Publication Date
CN106650442A true CN106650442A (en) 2017-05-10
CN106650442B CN106650442B (en) 2020-06-23

Family

ID=58821131

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610941855.3A Active CN106650442B (en) 2016-10-31 2016-10-31 Information security control method and mobile terminal

Country Status (1)

Country Link
CN (1) CN106650442B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107958168A (en) * 2017-12-19 2018-04-24 广东欧珀移动通信有限公司 Record screen method, apparatus and terminal
CN108520186A (en) * 2018-03-09 2018-09-11 广东欧珀移动通信有限公司 Record screen method, mobile terminal and computer readable storage medium
CN116361847A (en) * 2023-02-20 2023-06-30 海道(深圳)教育科技有限责任公司 Mobile device-based screen capturing prevention method and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070136596A1 (en) * 2005-12-14 2007-06-14 Matthew Adiletta Secure wireless network
CN103957223A (en) * 2014-05-20 2014-07-30 深圳市中兴移动通信有限公司 Information safe transmission device and method
CN104123498A (en) * 2014-07-18 2014-10-29 广州金山网络科技有限公司 Method and device for determining safety of Activity of Android system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070136596A1 (en) * 2005-12-14 2007-06-14 Matthew Adiletta Secure wireless network
CN103957223A (en) * 2014-05-20 2014-07-30 深圳市中兴移动通信有限公司 Information safe transmission device and method
CN104123498A (en) * 2014-07-18 2014-10-29 广州金山网络科技有限公司 Method and device for determining safety of Activity of Android system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
R. SANGEETHA ET AL: "Detection of malicious code in user mode", 《2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES)》 *
潘景新: "VB编程中使用钩子技术实现程序窗口监控", 《计算机与现代化》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107958168A (en) * 2017-12-19 2018-04-24 广东欧珀移动通信有限公司 Record screen method, apparatus and terminal
CN108520186A (en) * 2018-03-09 2018-09-11 广东欧珀移动通信有限公司 Record screen method, mobile terminal and computer readable storage medium
CN116361847A (en) * 2023-02-20 2023-06-30 海道(深圳)教育科技有限责任公司 Mobile device-based screen capturing prevention method and system
CN116361847B (en) * 2023-02-20 2024-03-12 海道(深圳)教育科技有限责任公司 Mobile device-based screen capturing prevention method and system

Also Published As

Publication number Publication date
CN106650442B (en) 2020-06-23

Similar Documents

Publication Publication Date Title
CN106445392A (en) Operating method of status bar icon and mobile terminal
CN106126077A (en) A kind of application program image target display control method and mobile terminal
CN106844067A (en) The processing method and mobile terminal of a kind of content
CN106951335A (en) A kind of process guard method and mobile terminal
CN106484303A (en) A kind of method preventing maloperation and electronic equipment
CN106125984A (en) The touch-control processing method of a kind of mobile terminal and mobile terminal
CN106127076A (en) The inspection method of a kind of photograph album photo and mobile terminal
CN107450773A (en) A kind of false-touch prevention method, terminal and computer-readable recording medium
CN106325753A (en) Payment interface display method and mobile terminal
CN106445116A (en) Method for calling message notification bar, and mobile terminal
CN106991319A (en) The right management method and mobile terminal of a kind of application program
CN106227488A (en) The display packing of a kind of reminder message and mobile terminal
CN106484301A (en) A kind of method of hiden application and terminal
CN106371745A (en) Interface switching method and mobile terminal
CN106650442A (en) Information secure control method and mobile terminal
CN107450799A (en) The display methods and mobile terminal of a kind of message
CN106507176A (en) A kind of method of video playback and mobile terminal
CN106874046A (en) The operating method and mobile terminal of a kind of application program
CN106228085A (en) The method for secret protection of application program and mobile terminal
CN107329586A (en) A kind of data inputting method, mobile terminal and computer-readable recording medium
CN106446614A (en) Permission management method of application program, and mobile terminal
CN106886409A (en) A kind of method for information display and mobile terminal
CN106547358A (en) A kind of display packing and terminal of terminal time information
CN106599246A (en) Display content interception method, mobile terminal and control server
CN106156600A (en) The unlocking method of a kind of application program and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant