CN107563187A - Access operation monitoring method, device, mobile terminal and readable storage medium storing program for executing - Google Patents
Access operation monitoring method, device, mobile terminal and readable storage medium storing program for executing Download PDFInfo
- Publication number
- CN107563187A CN107563187A CN201710761500.0A CN201710761500A CN107563187A CN 107563187 A CN107563187 A CN 107563187A CN 201710761500 A CN201710761500 A CN 201710761500A CN 107563187 A CN107563187 A CN 107563187A
- Authority
- CN
- China
- Prior art keywords
- access
- access information
- information
- record
- mobile terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
Accessing operation monitoring method, device, mobile terminal and readable storage medium storing program for executing, method the embodiment of the invention discloses one kind includes:Monitor the access operation of each application in mobile terminal, whether the access operation for judging to monitor belongs to sensitive operation, if the access operation monitored belongs to sensitive operation, the then Apply Names of the application according to belonging to operating the access and above-mentioned access operation generation access information, then according to access information generation and display reminding message, whether allow to perform above-mentioned access operation with prompting.Access of the embodiment of the present invention by monitoring each application operates; when the current access operation of the application monitored belongs to sensitive operation; corresponding prompting message can then be generated; allowing users to the very first time finds existing sensitive operation in mobile terminal and the application of sensitive operation be present; the sensitive operation of application is prevented in time, so as to be effectively protected the personal information of storage in the terminal.
Description
Technical field
The present invention relates to technical field of mobile terminals, more particularly to a kind of access to operate monitoring method, device, mobile terminal
And readable storage medium storing program for executing.
Background technology
With the popularization of mobile terminal, the importance of mobile terminal in people's daily life also more and more higher, while
Life to people brings great convenience, and has goed deep into the every aspect of people's life just because of mobile terminal, therefore
The substantial amounts of privacy of user can be stored in mobile terminal and is related to the information of personal safety.
Because the authority of current intelligent operating system can not monitor various aspects, some applications are caused to utilize existing
System vulnerability steal user profile, or such as supervised in the operation behavior of background monitoring user in the case of user is unwitting
User's communication is listened, the storage dish of user is scanned, obtains contact person in address list, short message reading content etc., cause user to store
Personal information in the terminal can not be effectively protected.
The content of the invention
The main purpose of the embodiment of the present invention, which is to provide, a kind of accesses operation monitoring method, device, mobile terminal and can
Storage medium is read, the access operation that can not monitor application program in the prior art can be solved, cause user to be stored in mobile whole
Personal information in end is difficult to the technical problem being effectively protected.
To achieve the above object, first aspect of the embodiment of the present invention provides a kind of access and operates monitoring method, this method bag
Include:
The access operation of each application in mobile terminal is monitored, whether the access operation for judging to monitor belongs to sensitive behaviour
Make;
If the access operation monitored belongs to sensitive operation, according to the Apply Names for accessing the application belonging to operating
And described access operates generation access information;
According to access information generation and display reminding message, whether allow to perform the access operation with prompting.
To achieve the above object, second aspect of the embodiment of the present invention provides a kind of access and operates supervising device, the device bag
Include:
Monitoring modular, the access for monitoring each application in mobile terminal operate, and the access operation for judging to monitor is
It is no to belong to sensitive operation;
Information generating module, if belonging to sensitive operation for the access operation monitored, institute is operated according to described access
The Apply Names of the application of category and described access operate generation access information;
Reminding module, for according to access information generation and display reminding message, whether allowing to perform institute with prompting
State access operation.
To achieve the above object, the third aspect of the embodiment of the present invention provides a kind of mobile terminal, including memory, processor
And store the computer program that can be run on a memory and on a processor, computer program described in the computing device
When, realize each step in the access operation monitoring method that first aspect provides.
To achieve the above object, fourth aspect of the embodiment of the present invention provides a kind of readable storage medium storing program for executing, the readable storage
Medium is computer-readable recording medium, is stored thereon with computer program, real when the computer program is executed by processor
Each step in the access operation monitoring method that existing first aspect provides.
The embodiments of the invention provide one kind to access operation monitoring method, and this method includes:Monitor each in mobile terminal
The access operation of application, and whether the access operation for judging to monitor belongs to sensitive operation, if the access operation monitored belongs to
Sensitive operation, the then Apply Names of the application according to belonging to operating the access and above-mentioned access operation generation access information, and root
According to access information generation and display reminding message, whether allow to perform above-mentioned access operation with prompting.Compared to prior art
For, access of the embodiment of the present invention by monitoring each application operates, when the current access operation of the application monitored belongs to
During sensitive operation, then corresponding prompting message can be generated so that user can have found existing quick in mobile terminal the very first time
Sense operation and the application that sensitive operation be present, prevent the sensitive operation of application, shifting are stored in so as to be effectively protected in time
Personal information in dynamic terminal.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only this
Some embodiments of invention, for those skilled in the art, on the premise of not paying creative work, can also basis
These accompanying drawings obtain other accompanying drawings.
Fig. 1 is a kind of structured flowchart of mobile terminal;
Fig. 2 is the schematic flow sheet that operation monitoring method is accessed in first embodiment of the invention;
Fig. 3 is the schematic diagram of a scenario of display reminding message in first embodiment of the invention;
Fig. 4 is the schematic flow sheet of the refinement step of step 201 in first embodiment of the invention;
Fig. 5 is the schematic flow sheet that operation monitoring method is accessed in second embodiment of the invention;
Fig. 6 is the schematic flow sheet that operation monitoring method is accessed in third embodiment of the invention;
Fig. 7 is the program module schematic diagram that operation supervising device is accessed in fourth embodiment of the invention;
Fig. 8 is the elaborator module diagram that monitoring modular 701 is walked in fourth embodiment of the invention;
Fig. 9 is the program module schematic diagram that operation supervising device is accessed in fifth embodiment of the invention;
Figure 10 is the program module schematic diagram that operation supervising device is accessed in sixth embodiment of the invention.
Embodiment
To enable goal of the invention, feature, the advantage of the present invention more obvious and understandable, below in conjunction with the present invention
Accompanying drawing in embodiment, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described reality
It is only part of the embodiment of the present invention to apply example, and not all embodiments.Based on the embodiment in the present invention, people in the art
The every other embodiment that member is obtained under the premise of creative work is not made, belongs to the scope of protection of the invention.
Fig. 1 shows a kind of structured flowchart of mobile terminal.Access operation monitoring method provided in an embodiment of the present invention can
Applied in mobile terminal 10 as shown in Figure 1, mobile terminal 10 can be, but not limited to include:Battery need to be relied on to maintain normal fortune
Row and support network and the smart mobile phone of download function, notebook, tablet personal computer, wearing smart machine etc..
As shown in figure 1, mobile terminal 10 includes memory 101, storage control 102, one or more (is only shown in figure
One) processor 103, Peripheral Interface 104, radio-frequency module 105, key-press module 106, audio-frequency module 107, Touch Screen 108.This
A little components are mutually communicated by one or more communication bus/signal wire 109.
It is appreciated that the structure shown in Fig. 1 is only to illustrate, it does not cause to limit to the structure of mobile terminal.It is mobile whole
End 10 may also include more either less components than shown in Fig. 1 or have the configuration different from shown in Fig. 1.Shown in Fig. 1
Each component can use hardware, software or its combination to realize.
Memory 101 can be used for storage software program and module, as the access in the embodiment of the present invention operates monitoring side
Programmed instruction/module corresponding to method and mobile terminal, processor 103 are stored in the software program in memory 101 by operation
And module, so as to perform various function application and data processing, that is, realize above-mentioned access operation monitoring method.
Memory 101 may include high speed random access memory, may also include nonvolatile memory, such as one or more magnetic
Property storage device, flash memory or other non-volatile solid state memories.In some instances, memory 101 can further comprise
Relative to the remotely located memory of processor 103, these remote memories can pass through network connection to mobile terminal 10.On
The example for stating network includes but is not limited to internet, intranet, LAN, mobile radio communication and combinations thereof.Processor 103
And access of other possible components to memory 101 can be carried out under the control of storage control 102.
Various input/output devices are coupled to CPU and memory 101 by Peripheral Interface 104.The operation of processor 103 is deposited
Various softwares in reservoir 101, instruction are to perform the various functions of mobile terminal 10 and carry out data processing.
In certain embodiments, Peripheral Interface 104, processor 103 and storage control 102 can be in one single chips
Realize.In some other example, they can be realized by independent chip respectively.
Radio-frequency module 105 is used to receiving and sending electromagnetic wave, realizes the mutual conversion of electromagnetic wave and electric signal, so that with
Communication network or other equipment are communicated.Radio-frequency module 105 may include the various existing electricity for being used to perform these functions
Circuit component, for example, antenna, RF transceiver, digital signal processor, encryption/deciphering chip, subscriber identity module (SIM) card,
Memory etc..Radio-frequency module 105 can be with the wireless network progress of various networks such as internet, intranet, preset type
Communication is communicated by the wireless network of preset type with other equipment.The wireless network of above-mentioned preset type can wrap
Include cellular telephone networks, WLAN or Metropolitan Area Network (MAN).The wireless network of above-mentioned preset type can use various communications
Standard, agreement and technology, including but not limited to global system for mobile communications (Global System for Mobile
Communication, GSM), enhanced mobile communication technology (Enhanced Data GSM Environment, EDGE) is wide
Band CDMA (Wideband Code Division Multiple Access, W-CDMA), CDMA
(Code Division Access, CDMA), TDMA (Time Division Multiple Access, TDMA),
Bluetooth, adopting wireless fidelity technology (Wireless-Fidelity, WiFi) (such as American Institute of Electrical and Electronics Engineers's standard IEEE
802.11a, IEEE 802.11b, IEEE802.11g and/or IEEE 802.11n), the networking telephone (Voice over
Internet Protocal, VoIP), worldwide interoperability for microwave accesses (Worldwide Interoperability for
Microwave Access, Wi-Max), other are used for the agreement of mail, instant messaging and short message, and any other is suitable
Communications protocol.
Key-press module 106 provides the interface that is inputted to mobile terminal of user, user can by press it is different by
Key is so that mobile terminal 10 performs different functions.
Audio-frequency module 107 provides a user COBBAIF, and it may include one or more microphones, one or more raises
Sound device and voicefrequency circuit.Voicefrequency circuit receives voice data at Peripheral Interface 104, and voice data is converted into power information,
Power information is transmitted to loudspeaker.Loudspeaker is converted to power information the sound wave that human ear can hear.Voicefrequency circuit is also from microphone
Place receives power information, converts electrical signals to voice data, and by data transmission in network telephony into Peripheral Interface 104 to enter traveling one
The processing of step.Voice data can obtain at memory 101 or by radio-frequency module 105.In addition, voice data can also
Store into memory 101 or be transmitted by radio-frequency module 105.In some instances, audio-frequency module 107 may also include
One earphone broadcasts hole, for providing COBBAIF to earphone or other equipment.
Touch Screen 108 provides an output and inputting interface simultaneously between mobile terminal and user.Specifically, touch-control
Screen 108 shows video frequency output to user, and the contents of these video frequency outputs may include word, figure, video and its any group
Close.Some output results correspond to some user interface objects.Touch Screen 108 also receives the input of user, such as user
Click, the gesture operation such as slip, so that input of the user interface object to these users responds.Detect user's input
Technology can be based on resistance-type, condenser type or other any possible touch control detection technologies.The display unit of Touch Screen 108
Instantiation include but is not limited to liquid crystal display or light emitting polymer displays.
Describe to access operation monitoring method in the embodiment of the present invention based on above-mentioned mobile terminal.
Because the access that in the prior art, can not monitor application program operates, user is caused to store in the terminal
Personal information is difficult to the technical problem being effectively protected.
In order to solve the above problems, the present invention proposes that a kind of access operates monitoring method, in the method:It is each by monitoring
The access operation of individual application, when arbitrarily belonging to sensitive operation using current access operation, then generation is corresponding reminds item,
Allow users to find to be intended to the application for accessing personal information in time, so as to be effectively protected storage in the terminal
Personal information.
Referring to Fig. 2, Fig. 2 is the schematic flow sheet that operation monitoring method is accessed in first embodiment of the invention, this method
Including:
Whether the access operation of each application in step 201, monitoring mobile terminal, the access operation for judging to monitor belong to
Sensitive operation;
In the present embodiment, the access operation of each application in mobile terminal is monitored in real time, including monitoring background application is with before
The access operation of platform application, above-mentioned access operation mainly include:The data manipulation of mobile terminal memory storage is accessed, such as accesses and moves
The data stored in dynamic terminal memory;The operation of any functional module of mobile terminal is called, such as calls the bat of mobile terminal
According to function, sound-recording function etc.;The other application having in mobile terminal is accessed, such as accesses photograph album, address list, notepad etc..
Wherein, after some access applied operation in mobile terminal is monitored, the access operation monitored is judged
Whether sensitive operation is belonged to.Wherein, above-mentioned sensitive operation includes access camera operation, acquisition geographical position operates, it is short to read
Letter operation, accessing address list operation, access photograph album operation, recording operation etc..
If step 202, the access monitored operation belong to sensitive operation, affiliated application is operated according to described access
Apply Names and described access operate generation access information;
In the present embodiment, when the access operation monitored belongs to above-mentioned sensitive operation, then access operation institute is obtained
The Apply Names of the application of category, then according to the Apply Names and above-mentioned access operation generation access information.Monitored for example, working as
When application " microblogging " in mobile terminal has recording operation, then the access information of " microblogging-recording " is generated.
Step 203, according to the access information generation and display reminding message, with prompting whether allow to perform the access
Operation.
In the present embodiment, after above-mentioned access information is generated, prompting message is generated according to the access information, then should
Prompting message is shown in the display interface of mobile terminal, to cause the notice of user, prompts the user whether to allow in execution
State access operation.For example, when above-mentioned access information is " microblogging-recording ", then the prompting of " microblogging is recorded from the background " is generated
Message, the display interface of mobile terminal is then shown in, to remind whether user allows " microblogging " to carry out recording operation.
Wherein, the display mode of above-mentioned prompting message can be shown in the status bar of mobile terminal display interface,
Or it can also be shown with the form of pop-up in mobile terminal display interface.
In order to be better understood from the present invention, reference picture 3, Fig. 3 is the field of display reminding message in first embodiment of the invention
Scape schematic diagram.In figure 3, if " microblogging " of mobile terminal running background has recording operation, in the state of mobile terminal
Column is shown:Prompting message of " microblogging " backstage recording, allow users to the very first time recognize in mobile terminal it is existing
Sensitive operation and the application that sensitive operation be present.
In the present embodiment, the access by monitoring each application in mobile terminal operates, and judges the access monitored
Whether operation belongs to sensitive operation, if the access operation monitored belongs to sensitive operation, answering according to belonging to operating the access
Apply Names and above-mentioned access operation generation access information, and simultaneously display reminding message is generated according to the access information, with
Whether prompting allows to perform above-mentioned access operation.Compared to existing technologies, the present embodiment is by monitoring the visit of each application
Operation is asked, when the current access operation of the application monitored belongs to sensitive operation, then can generate corresponding prompting message so that
User can have found existing sensitive operation in mobile terminal the very first time and the application of sensitive operation be present, prevent application in time
Sensitive operation, so as to be effectively protected storage personal information in the terminal.
Further, based on first embodiment, referring to Fig. 4, Fig. 4 is the thin of step 201 in first embodiment of the invention
Change the schematic flow sheet of step, the step 201 includes:
Step 401, obtain the target interface for accessing operation requests and accessing;
Access interface set corresponding to the sensitive operation that step 402, lookup are pre-set, if in the access interface set
The target interface be present, it is determined that the access operation belongs to sensitive operation.
In the present embodiment, the access operation that sensitive operation is belonged in mobile terminal is first set, such as sets in mobile terminal
" recording ", " access camera ", " acquisition geographical position ", " accessing address list ", the access such as " reading memory " operation belong to
Sensitive operation, the title of access interface corresponding to each sensitive operation is then obtained again, such as recording access, camera are accessed and connect
Mouth, geographical position obtain interface, address list access interface, memory read/write interface etc., and each access interface that will be got
Title be stored in the memory or database specified.It is understood that third-party application is being accessed in mobile terminal
When some application or function, it is necessary to conducted interviews by corresponding access interface.
Specifically, first monitoring the access operation of each application in mobile terminal, then obtaining the access operation monitored please
The target interface of access is sought, then searches the target interface in the access interface set of above-mentioned sensitive operation, if above-mentioned access
The target interface in set of interfaces be present, then it is assumed that the access operation monitored belongs to sensitive operation;If above-mentioned access interface collection
The target interface is not present in conjunction, then it is assumed that the access operation monitored is not belonging to sensitive operation.
Wherein, user can self-defined addition or deletion sensitive operation, movement in the system setup menu of mobile terminal
Addition or deletion action of the terminal according to user, the access interface set of the sensitive operation of real-time update mobile terminal memory storage.
In the present embodiment, the target interface that the access operation requests monitored by obtaining access, then judge sensitive
It whether there is the target interface in access interface set corresponding to operation, if in the presence of, it is determined that the access operation monitored belongs to
Sensitive operation, so as to detect the sensitive operation that whether there is in mobile terminal in real time, it is effectively protected and is stored in movement
Personal information in terminal.
Further, referring to Fig. 5, Fig. 5 is the flow signal that operation monitoring method is accessed in second embodiment of the invention
Figure, this method include:
Whether the access operation of each application in step 501, monitoring mobile terminal, the access operation for judging to monitor belong to
Sensitive operation;
If step 502, the access monitored operation belong to sensitive operation, affiliated application is operated according to described access
Apply Names and described access operate generation access information;
Step 503, according to the access information generation and display reminding message, with prompting whether allow to perform the access
Operation;
In embodiments of the present invention, step 201 in step 501 describes to step 503 content and first embodiment to
The content that step 203 describes is similar, refers to step 201 to step 203, does not repeat herein.
If step 504, the Authorized operation instruction for detecting user's triggering, allow to perform the access in the access information
Operation, and the access information is preserved to access record;
In the present embodiment, include by above-mentioned prompting message after display interface, if detecting, user's clicking trigger should
Prompting message, then in the prompting frame of display interface ejection " whether allow the access operate ", the prompting frame comprising " permissions " and
" refusal " two kinds of trigger events, for prompting the user whether to allow to perform current access operation, and grasped according to the triggering of user
Make to control above-mentioned access to operate.
Wherein, if detecting the Authorized operation instruction of user's triggering, that is, detect that user triggers " permission " trigger event,
Then allow to perform the access operation in above-mentioned access information, and above-mentioned access information is preserved to access record.
If step 505, the refusal operational order for detecting user's triggering, refusal performs the access in the access information
Operation.
In the present embodiment, if detecting the refusal operational order of user's triggering, that is, detect that user triggers " refusal " and touched
Hair event, the then access that refusal is performed in above-mentioned access information operate.
In the present embodiment, after according to the generation of above-mentioned access information and display reminding message, if detecting, user triggers
Authorized operation instruction, then allow to perform in above-mentioned access information access operation;If detect the refusal operation of user's triggering
Instruction, the then access that refusal is performed in above-mentioned access information operate, i.e., the present embodiment can be according to the trigger action of user, to moving
Existing sensitive operation is managed in dynamic terminal, on the premise of mobile terminal normal operation is not influenceed, is effectively protected and is deposited
The personal information of storage in the terminal.
Further, referring to Fig. 6, Fig. 6 is the flow signal that operation monitoring method is accessed in third embodiment of the invention
Figure, this method include:
Whether the access operation of each application in step 601, monitoring mobile terminal, the access operation for judging to monitor belong to
Sensitive operation;
If step 602, the access monitored operation belong to sensitive operation, affiliated application is operated according to described access
Apply Names and described access operate generation access information;
In embodiments of the present invention, step 201 in step 601 describes to step 602 content and first embodiment to
The content that step 202 describes is similar, refers to step 201 to step 202, does not repeat herein.
Step 603, judge that described access in record whether there is the access information;
In the present embodiment, after according to the generation of above-mentioned access information and display reminding message, if detecting, user triggers
Authorized operation instruction, then allow the access in access information described above to operate, and above-mentioned access information is preserved to access
In record, when generating new access information next time, searched in the access records identical with the newly-generated access information
Access information, then controlled the access in newly-generated access information to operate according to lookup result.
If step 604, described access in record have the access information, allow to perform the visit in the access information
Ask operation;
If the access information is not present in step 605, described access in record, continue executing with according to the access information
The step of generating simultaneously display reminding message.
Specifically, if presence and newly-generated access information identical access information in above-mentioned access record, allow to hold
Access operation in the newly-generated access information of row, if being not present and newly-generated access information identical in above-mentioned access record
Access information, then regenerated according to newly-generated access information and show new prompting message.User i.e. for monitoring
The access information of authorized mistake, it is not necessary to regenerate and show above-mentioned prompting message, can directly allow to perform newly-generated
Access operation in access information, to avoid same access frequent operation mandate of the user to same application.
Further, above-mentioned steps 604 are further comprising the steps of:
If there is the access information in described access in record, it is determined that allow the access in the access information to operate
The number of execution;
When the number is equal to the frequency threshold value of setting, then the access letter for accessing and being preserved in record is deleted
Breath, and continue executing with described according to the step of access information generation and display reminding message.
Wherein, for user's authorized access information, the access information is being preserved to after accessing and record, can be with
The access is recorded a frequency threshold value (such as 10 times) is set, then recording, which has allowed the access in the access information to operate, performs
Number, when the number is equal to above-mentioned frequency threshold value, then delete the above-mentioned access information preserved in above-mentioned access record, and root
Generated according to newly-generated access information and show new prompting message.For example, it is assumed that above-mentioned access information is " microblogging-communication
Record ", then microblogging is allowed to access 9 address lists, within this 9 times, it is not necessary to generate simultaneously display reminding message;But work as and monitor
During the 10th accessing address list of microblogging, then generate and show the prompting message of " microblogging is just in accessing address list ".
Relative, can also be after according to the generation of above-mentioned access information and display reminding message, if inspection in the present embodiment
The refusal operational order of user's triggering is measured, then refuses the access operation in access information described above, and above-mentioned access is believed
Breath is preserved to accessing in record, when generating new access information next time, is searched in the access records newly-generated with this
Access information identical access information, if presence and newly-generated access information identical access information in above-mentioned access record,
Then refusal performs the access operation in newly-generated access information, believes if being not present in above-mentioned access record with newly-generated access
Identical access information is ceased, then is regenerated according to newly-generated access information and shows new prompting message.I.e. for monitoring
To the access information refused of user, it is not necessary to regenerate and show above-mentioned prompting message, can directly refuse to perform
Access operation in newly-generated access information, to avoid user from refusing the same access frequent operation of same application
Operation.
In the present embodiment, after the access in allowing access information described above operates, and by above-mentioned access information
Preserve to access record, when generating new access information next time, judge to access in record with the presence or absence of newly-generated with this
Access information identical access information, if in the presence of, allow to perform in newly-generated access information access operation;If no
Deposit, then regenerated according to newly-generated access information and show new prompting message.Awarded for the user monitored
The access information weighed, it is not necessary to regenerate simultaneously display reminding message, can directly allow to perform in newly-generated access information
Access operation, to avoid same access frequent operation mandate of the user to same application.
Referring to Fig. 7, Fig. 7 is the program module schematic diagram that operation supervising device is accessed in fourth embodiment of the invention, should
Device includes:
Monitoring modular 701, the access for monitoring each application in mobile terminal operate, and judge the access operation monitored
Whether sensitive operation is belonged to;
In the present embodiment, monitoring modular 701 monitors the access operation of each application in mobile terminal in real time, including after monitoring
Platform applies the access with foreground application to operate, and above-mentioned access operation mainly includes:The data manipulation of mobile terminal memory storage is accessed,
Such as access the data stored in mobile terminal memory;The operation of any functional module of mobile terminal is called, such as calls and moves
Move camera function, sound-recording function of terminal etc.;The other application having in mobile terminal is accessed, such as accesses photograph album, address list, note
Thing this etc..
Wherein, after monitoring modular 701 monitors some access applied operation in mobile terminal, judge what is monitored
Whether access operation belongs to sensitive operation.Wherein, above-mentioned sensitive operation includes accessing camera operation, obtains geographical position behaviour
Make, short message reading operates, accessing address list operates, accesses photograph album operation, recording operation etc..
Information generating module 702, if belonging to sensitive operation for the access operation monitored, operated according to described access
The Apply Names of affiliated application and described access operate generation access information;
In the present embodiment, when the access operation monitored when monitoring modular 701 belongs to above-mentioned sensitive operation, then information is given birth to
The Apply Names of the application belonging to access operation is obtained into module 702, is then operated according to the Apply Names and above-mentioned access
Generate access information.For example, when monitoring that the application " microblogging " in mobile terminal has recording operation, then " microblogging-record is generated
The access information of sound ".
Reminding module 703, for according to access information generation and display reminding message, whether allowing to perform with prompting
It is described to access operation.
In the present embodiment, after above-mentioned access information is generated, reminding module 703 generates prompting according to the access information and disappeared
Breath, then the prompting message is included in the display interface of mobile terminal, to cause the notice of user, prompted the user whether
Allow to perform above-mentioned access operation.For example, when above-mentioned access information is " microblogging-recording ", then " microblogging is recorded from the background for generation
The prompting message of sound ", the display interface of mobile terminal is then shown in, to remind whether user allows " microblogging " to carry out recording behaviour
Make.
Wherein, the display mode of above-mentioned prompting message can be shown in the status bar of mobile terminal display interface,
Or it can also be shown with the form of pop-up in mobile terminal display interface.
In the present embodiment, monitoring modular 701 monitors the access operation of each application in mobile terminal, and judges to monitor
Access operation whether belong to sensitive operation, if monitor access operation belong to sensitive operation, information generating module 702
According to the Apply Names and above-mentioned access operation generation access information of the application belonging to access operation, reminding module 703 is according to this
Access information generation and display reminding message, whether allow to perform above-mentioned access operation with prompting.Compared to existing technologies,
Access of the present embodiment by monitoring each application operates, when the current access operation of the application monitored belongs to sensitive operation
When, then can generate corresponding prompting message so that user can find the very first time in mobile terminal existing sensitive operation and
The application of sensitive operation be present, prevent the sensitive operation of application in time, so as to be effectively protected storage in the terminal
Personal information.
Further, based on fourth embodiment, referring to Fig. 8, Fig. 8 is to walk monitoring modular in fourth embodiment of the invention
701 elaborator module diagram, the monitoring modular 701 include:
Acquisition module 801, the target interface accessed for obtaining the access operation requests;
Searching modul 802, for searching access interface set corresponding to the sensitive operation pre-set, if the access connects
The target interface be present in mouth set, it is determined that the access operation belongs to sensitive operation.
In the present embodiment, the access operation that sensitive operation is belonged in mobile terminal is first set, such as sets in mobile terminal
" recording ", " access camera ", " acquisition geographical position ", " accessing address list ", the access such as " reading memory " operation belong to
Sensitive operation, the title of access interface corresponding to each sensitive operation is then obtained again, such as recording access, camera are accessed and connect
Mouth, geographical position obtain interface, address list access interface, memory read/write interface etc., and each access interface that will be got
Title be stored in the memory or database specified.It is understood that third-party application is being accessed in mobile terminal
When some application or function, it is necessary to conducted interviews by corresponding access interface.
Specifically, first monitoring the access operation of each application in mobile terminal, then acquisition module 801 obtains what is monitored
The target interface that operation requests access is accessed, then searching modul 802 is searched in the access interface set of above-mentioned sensitive operation
Target interface, if the target interface in above-mentioned access interface set be present, then it is assumed that the access operation monitored belongs to sensitive
Operation;If the target interface is not present in above-mentioned access interface set, then it is assumed that the access operation monitored is not belonging to sensitive behaviour
Make.
Wherein, user can self-defined addition or deletion sensitive operation, movement in the system setup menu of mobile terminal
Addition or deletion action of the terminal according to user, the access interface set of the sensitive operation of real-time update mobile terminal memory storage.
In the present embodiment, the target interface that the access operation requests monitored by obtaining access, then judge sensitive
It whether there is the target interface in access interface set corresponding to operation, if in the presence of, it is determined that the access operation monitored belongs to
Sensitive operation, so as to detect the sensitive operation that whether there is in mobile terminal in real time, it is effectively protected and is stored in movement
Personal information in terminal.
Further, referring to Fig. 9, Fig. 9 is the program module that operation supervising device is accessed in fifth embodiment of the invention
Schematic diagram, the device include:
Monitoring modular 701, the access for monitoring each application in mobile terminal operate, and judge the access operation monitored
Whether sensitive operation is belonged to;
Information generating module 702, if belonging to sensitive operation for the access operation monitored, operated according to described access
The Apply Names of affiliated application and described access operate generation access information;
Reminding module 703, for according to access information generation and display reminding message, whether allowing to perform with prompting
It is described to access operation;
First control module 901, for after generating and showing the prompting message, if detecting awarding for user's triggering
Operational order is weighed, then allows to perform the access operation in the access information, and the access information is preserved to access and recorded
It is interior;
In the present embodiment, include by above-mentioned prompting message after display interface, if detecting, user's clicking trigger should
Prompting message, then in the prompting frame of display interface ejection " whether allow the access operate ", the prompting frame comprising " permissions " and
" refusal " two kinds of trigger events, for prompting the user whether to allow to perform current access operation, and grasped according to the triggering of user
Make to control above-mentioned access to operate.
Wherein, if detecting the Authorized operation instruction of user's triggering, that is, detect that user triggers " permission " trigger event,
Then allow to perform the access operation in above-mentioned access information, and above-mentioned access information is preserved to access record.
Second control module 902, for after generating and showing the prompting message, if detecting refusing for user's triggering
Exhausted operational order, the then access that refusal is performed in the access information operate.
In the present embodiment, if detecting the refusal operational order of user's triggering, that is, detect that user triggers " refusal " and touched
Hair event, the then access that refusal is performed in above-mentioned access information operate.
In the present embodiment, after according to the generation of above-mentioned access information and display reminding message, if detecting, user triggers
Authorized operation instruction, then allow to perform in above-mentioned access information access operation;If detect the refusal operation of user's triggering
Instruction, the then access that refusal is performed in above-mentioned access information operate, i.e., the present embodiment can be according to the trigger action of user, to moving
Existing sensitive operation is managed in dynamic terminal, on the premise of mobile terminal normal operation is not influenceed, is effectively protected and is deposited
The personal information of storage in the terminal.
Further, referring to Fig. 10, Figure 10 is the program mould that operation supervising device is accessed in sixth embodiment of the invention
Block schematic diagram, the device include:
Monitoring modular 701, the access for monitoring each application in mobile terminal operate, and judge the access operation monitored
Whether sensitive operation is belonged to;
Information generating module 702, if belonging to sensitive operation for the access operation monitored, operated according to described access
The Apply Names of affiliated application and described access operate generation access information;
Judge module 1001, for judging that described access in record whether there is the access information;
In the present embodiment, after according to the generation of above-mentioned access information and display reminding message, if detecting, user triggers
Authorized operation instruction, then allow the access in access information described above to operate, and above-mentioned access information is preserved to access
In record, when generating new access information next time, searched in the access records identical with the newly-generated access information
Access information, then controlled the access in newly-generated access information to operate according to lookup result.
3rd control module 1002, if the access information be present for described access in record, allow described in execution
Access operation in access information;
4th control module 1003, if the access information is not present for described access in record, continues executing with and carry
Show module 703.
Specifically, if presence and newly-generated access information identical access information in above-mentioned access record, allow to hold
Access operation in the newly-generated access information of row, if being not present and newly-generated access information identical in above-mentioned access record
Access information, then regenerated according to newly-generated access information and show new prompting message.User i.e. for monitoring
The access information of authorized mistake, it is not necessary to regenerate and show above-mentioned prompting message, can directly allow to perform newly-generated
Access operation in access information, to avoid same access frequent operation mandate of the user to same application.
Further, above-mentioned 3rd control module 1002 also includes:
Counting module, if the access information be present for described access in record, it is determined that allowed described access to believe
The number that access operation in breath performs;
5th control module, for when the number is equal to the frequency threshold value set, then deleting described access in record
The access information preserved, and continue executing with reminding module 703.
Wherein, for user's authorized access information, the access information is being preserved to after accessing and record, can be with
The access is recorded a frequency threshold value (such as 10 times) is set, then recording, which has allowed the access in the access information to operate, performs
Number, when the number is equal to above-mentioned frequency threshold value, then delete the above-mentioned access information preserved in above-mentioned access record, and root
Generated according to newly-generated access information and show new prompting message.For example, it is assumed that above-mentioned access information is " microblogging-communication
Record ", then microblogging is allowed to access 9 address lists, within this 9 times, it is not necessary to generate simultaneously display reminding message;But work as and monitor
During the 10th accessing address list of microblogging, then generate and show the prompting message of " microblogging is just in accessing address list ".
Relative, can also be after according to the generation of above-mentioned access information and display reminding message, if inspection in the present embodiment
The refusal operational order of user's triggering is measured, then refuses the access operation in access information described above, and above-mentioned access is believed
Breath is preserved to accessing in record, when generating new access information next time, is searched in the access records newly-generated with this
Access information identical access information, if presence and newly-generated access information identical access information in above-mentioned access record,
Then refusal performs the access operation in newly-generated access information, believes if being not present in above-mentioned access record with newly-generated access
Identical access information is ceased, then is regenerated according to newly-generated access information and shows new prompting message.I.e. for monitoring
To the access information refused of user, it is not necessary to regenerate and show above-mentioned prompting message, can directly refuse to perform
Access operation in newly-generated access information, to avoid user from refusing the same access frequent operation of same application
Operation.
In the present embodiment, after the access in allowing access information described above operates, and by above-mentioned access information
Preserve to access record, when generating new access information next time, judge to access in record with the presence or absence of newly-generated with this
Access information identical access information, if in the presence of, allow to perform in newly-generated access information access operation;If no
Deposit, then regenerated according to newly-generated access information and show new prompting message.Awarded for the user monitored
The access information weighed, it is not necessary to regenerate simultaneously display reminding message, can directly allow to perform in newly-generated access information
Access operation, to avoid same access frequent operation mandate of the user to same application.
In several embodiments provided herein, it should be understood that disclosed apparatus and method, it can be passed through
Its mode is realized.For example, device embodiment described above is only schematical, for example, the division of the module, only
Only a kind of division of logic function, there can be other dividing mode when actually realizing, such as multiple module or components can be tied
Another system is closed or is desirably integrated into, or some features can be ignored, or do not perform.It is another, it is shown or discussed
Mutual coupling or direct-coupling or communication connection can be the INDIRECT COUPLINGs or logical by some interfaces, device or module
Letter connection, can be electrical, mechanical or other forms.
The module illustrated as separating component can be or may not be physically separate, show as module
The part shown can be or may not be physical module, you can with positioned at a place, or can also be distributed to multiple
On mixed-media network modules mixed-media.Some or all of module therein can be selected to realize the mesh of this embodiment scheme according to the actual needs
's.
In addition, each functional module in each embodiment of the present invention can be integrated in a processing module, can also
That modules are individually physically present, can also two or more modules be integrated in a module.Above-mentioned integrated mould
Block can both be realized in the form of hardware, can also be realized in the form of software function module.
If the integrated module is realized in the form of software function module and is used as independent production marketing or use
When, it can be stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially
The part to be contributed in other words to prior art or all or part of the technical scheme can be in the form of software products
Embody, the computer software product is stored in a storage medium, including some instructions are causing a computer
Equipment (can be personal computer, server, or network equipment etc.) performs the complete of each embodiment methods described of the present invention
Portion or part steps.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only
Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey
The medium of sequence code.
It should be noted that for foregoing each method embodiment, in order to which simplicity describes, therefore it is all expressed as a series of
Combination of actions, but those skilled in the art should know, the present invention is not limited by described sequence of movement because
According to the present invention, some steps can use other orders or carry out simultaneously.Secondly, those skilled in the art should also know
Know, embodiment described in this description belongs to preferred embodiment, and involved action and module might not all be this hairs
Necessary to bright.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and does not have the portion being described in detail in some embodiment
Point, it may refer to the associated description of other embodiments.
It is that monitoring method, device, mobile terminal and readable storage medium are operated to a kind of access provided by the present invention above
The description of matter, for those skilled in the art, according to the thought of the embodiment of the present invention, in embodiment and application
Upper there will be changes, to sum up, this specification content should not be construed as limiting the invention.
Claims (12)
1. one kind accesses operation monitoring method, it is characterised in that methods described includes:
The access operation of each application in mobile terminal is monitored, whether the access operation for judging to monitor belongs to sensitive operation;
If the access operation monitored belongs to sensitive operation, according to the Apply Names for accessing the application belonging to operating and institute
State access operation generation access information;
According to access information generation and display reminding message, whether allow to perform the access operation with prompting.
2. according to the method for claim 1, it is characterised in that whether the access operation for judging to monitor belongs to sensitive
The step of operation, includes:
Obtain the target interface that the access operation requests access;
Access interface set corresponding to the sensitive operation pre-set is searched, if the target be present in the access interface set
Interface, it is determined that the access operation belongs to sensitive operation.
3. according to the method for claim 1, it is characterised in that described to be disappeared according to access information generation and display reminding
Also include after the step of breath:
If detecting the Authorized operation instruction of user's triggering, allow to perform the access operation in the access information, and by institute
Access information is stated to preserve to access record;
If detecting the refusal operational order of user's triggering, refusal performs the access operation in the access information.
4. according to the method for claim 3, it is characterised in that described according to the application for accessing the application belonging to operating
Title and described the step of accessing operation generation access information, also include afterwards:
Judge that described access in record whether there is the access information;
If described access in record has the access information, allow to perform the access operation in the access information;
If the access information is not present in described access in record, continues executing with and described generate and show according to the access information
The step of showing prompting message.
5. according to the method for claim 4, it is characterised in that if described access has the access letter in record
Breath, then allowing to perform the step of access in the access information operates includes:
If there is the access information in described access in record, it is determined that has allowed the access in the access information to operate and has performed
Number;
When the number is equal to the frequency threshold value of setting, then the access information for accessing and being preserved in record is deleted, and
Continue executing with described according to the step of access information generation and display reminding message.
6. one kind accesses operation supervising device, it is characterised in that described device includes:
Monitoring modular, the access for monitoring each application in mobile terminal operate, and whether the access operation for judging to monitor belongs to
In sensitive operation;
Information generating module, if belonging to sensitive operation for the access operation monitored, according to belonging to the access operation
The Apply Names of application and described access operate generation access information;
Reminding module, for according to access information generation and display reminding message, whether allowing to perform the visit with prompting
Ask operation.
7. device according to claim 6, it is characterised in that the monitoring modular includes:
Acquisition module, the target interface accessed for obtaining the access operation requests;
Searching modul, for searching access interface set corresponding to the sensitive operation pre-set, if the access interface set
In the target interface be present, it is determined that it is described access operation belong to sensitive operation.
8. device according to claim 6, it is characterised in that described device also includes:
First control module, for after generating and showing the prompting message, if detecting the Authorized operation of user's triggering
Instruction, then allow to perform the access operation in the access information, and the access information is preserved to access record;
Second control module, for after generating and showing the prompting message, the refusal of user's triggering to operate if detecting
Instruction, the then access that refusal is performed in the access information operate.
9. device according to claim 8, it is characterised in that described device also includes:
Judge module, for judging that described access in record whether there is the access information;
3rd control module, if the access information be present for described access in record, allow to perform the access information
In access operation;
4th control module, if the access information is not present for described access in record, continue executing with the prompting mould
Block.
10. device according to claim 9, it is characterised in that the 3rd control module includes:
Counting module, if the access information be present for described access in record, it is determined that allowed in the access information
Access operation perform number;
5th control module, for when the number is equal to the frequency threshold value set, then deleting described access and being preserved in record
The access information, and continue executing with the reminding module.
11. a kind of mobile terminal, including memory, processor and storage are on a memory and the calculating that can run on a processor
Machine program, it is characterised in that described in the computing device during computer program, realize described in claim 1 to 5 any one
Access operation monitoring method in each step.
12. a kind of readable storage medium storing program for executing, the readable storage medium storing program for executing is computer-readable recording medium, is stored thereon with computer
Program, it is characterised in that when the computer program is executed by processor, realize the visit described in claim 1 to 5 any one
Ask each step in operation monitoring method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710761500.0A CN107563187A (en) | 2017-08-30 | 2017-08-30 | Access operation monitoring method, device, mobile terminal and readable storage medium storing program for executing |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710761500.0A CN107563187A (en) | 2017-08-30 | 2017-08-30 | Access operation monitoring method, device, mobile terminal and readable storage medium storing program for executing |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107563187A true CN107563187A (en) | 2018-01-09 |
Family
ID=60977830
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710761500.0A Pending CN107563187A (en) | 2017-08-30 | 2017-08-30 | Access operation monitoring method, device, mobile terminal and readable storage medium storing program for executing |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107563187A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108932435A (en) * | 2018-07-05 | 2018-12-04 | 宇龙计算机通信科技(深圳)有限公司 | A kind of information security management method, terminal device and computer readable storage medium |
CN108944377A (en) * | 2018-09-14 | 2018-12-07 | 南京理工技术转移中心有限公司 | A kind of environment inside car regulating system and its working method |
CN109145528A (en) * | 2018-08-01 | 2019-01-04 | 上海碳蓝网络科技有限公司 | A kind of calling hold-up interception method of mobile terminal and photographic device |
CN109164223A (en) * | 2018-09-14 | 2019-01-08 | 南京理工技术转移中心有限公司 | A kind of water environment monitoring processing system and its working method |
CN109451162A (en) * | 2018-11-16 | 2019-03-08 | 努比亚技术有限公司 | Recording control method, mobile terminal and computer readable storage medium |
CN110336910A (en) * | 2018-12-29 | 2019-10-15 | 华为技术有限公司 | A kind of private data guard method and terminal |
CN110737916A (en) * | 2019-09-30 | 2020-01-31 | 青岛海信移动通信技术股份有限公司 | Communication terminal and processing method |
CN111625811A (en) * | 2020-05-29 | 2020-09-04 | 数网金融有限公司 | Data authorization method and device |
CN112347505A (en) * | 2020-10-19 | 2021-02-09 | 重庆传音通讯技术有限公司 | Data protection method and device and computer storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103368904A (en) * | 2012-03-27 | 2013-10-23 | 百度在线网络技术(北京)有限公司 | Mobile terminal, and system and method for suspicious behavior detection and judgment |
CN103369520A (en) * | 2012-03-27 | 2013-10-23 | 百度在线网络技术(北京)有限公司 | Intention prejudging system and method for application program suspicious behavior of mobile terminal |
CN104462970A (en) * | 2014-12-17 | 2015-03-25 | 中国科学院软件研究所 | Android application program permission abuse detecting method based on process communication |
CN104978543A (en) * | 2015-07-09 | 2015-10-14 | 黄凯锋 | Mobile terminal information safety protection system and method |
CN106778334A (en) * | 2016-11-30 | 2017-05-31 | 上海创功通讯技术有限公司 | The guard method of account information and mobile terminal |
CN107045605A (en) * | 2016-02-05 | 2017-08-15 | 中兴通讯股份有限公司 | A kind of real-time metrics method and device |
-
2017
- 2017-08-30 CN CN201710761500.0A patent/CN107563187A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103368904A (en) * | 2012-03-27 | 2013-10-23 | 百度在线网络技术(北京)有限公司 | Mobile terminal, and system and method for suspicious behavior detection and judgment |
CN103369520A (en) * | 2012-03-27 | 2013-10-23 | 百度在线网络技术(北京)有限公司 | Intention prejudging system and method for application program suspicious behavior of mobile terminal |
CN104462970A (en) * | 2014-12-17 | 2015-03-25 | 中国科学院软件研究所 | Android application program permission abuse detecting method based on process communication |
CN104978543A (en) * | 2015-07-09 | 2015-10-14 | 黄凯锋 | Mobile terminal information safety protection system and method |
CN107045605A (en) * | 2016-02-05 | 2017-08-15 | 中兴通讯股份有限公司 | A kind of real-time metrics method and device |
CN106778334A (en) * | 2016-11-30 | 2017-05-31 | 上海创功通讯技术有限公司 | The guard method of account information and mobile terminal |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108932435A (en) * | 2018-07-05 | 2018-12-04 | 宇龙计算机通信科技(深圳)有限公司 | A kind of information security management method, terminal device and computer readable storage medium |
CN109145528A (en) * | 2018-08-01 | 2019-01-04 | 上海碳蓝网络科技有限公司 | A kind of calling hold-up interception method of mobile terminal and photographic device |
CN108944377A (en) * | 2018-09-14 | 2018-12-07 | 南京理工技术转移中心有限公司 | A kind of environment inside car regulating system and its working method |
CN109164223A (en) * | 2018-09-14 | 2019-01-08 | 南京理工技术转移中心有限公司 | A kind of water environment monitoring processing system and its working method |
CN109451162A (en) * | 2018-11-16 | 2019-03-08 | 努比亚技术有限公司 | Recording control method, mobile terminal and computer readable storage medium |
CN109451162B (en) * | 2018-11-16 | 2021-06-18 | 努比亚技术有限公司 | Recording control method, mobile terminal and computer readable storage medium |
CN110336910A (en) * | 2018-12-29 | 2019-10-15 | 华为技术有限公司 | A kind of private data guard method and terminal |
CN110737916A (en) * | 2019-09-30 | 2020-01-31 | 青岛海信移动通信技术股份有限公司 | Communication terminal and processing method |
CN111625811A (en) * | 2020-05-29 | 2020-09-04 | 数网金融有限公司 | Data authorization method and device |
CN112347505A (en) * | 2020-10-19 | 2021-02-09 | 重庆传音通讯技术有限公司 | Data protection method and device and computer storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107563187A (en) | Access operation monitoring method, device, mobile terminal and readable storage medium storing program for executing | |
CN107346397B (en) | Information processing method and related product | |
CN107918850A (en) | A kind of express delivery information processing method, terminal and computer-readable recording medium | |
CN109656980A (en) | Data processing method, electronic equipment, device and readable storage medium storing program for executing | |
CN107222914B (en) | Application control method and related product | |
CN109190369A (en) | A kind of camera control method, terminal and computer storage medium | |
CN104967683A (en) | Message pushing method, terminal and server | |
CN104346560A (en) | Security authentication method and security authentication device | |
CN106598676A (en) | Application management method and apparatus, and terminal device | |
CN107872555A (en) | Call recording method, device, terminal device and computer-readable recording medium | |
CN107360332A (en) | Talking state display methods, device, mobile terminal and storage medium | |
CN105892822A (en) | Mobile terminal and rapid setting method and device thereof | |
CN107371221A (en) | Select method, apparatus, mobile terminal and the readable storage medium storing program for executing of network | |
CN106022071A (en) | Fingerprint unlocking method and terminal | |
CN107871015A (en) | Daily record data processing method and processing device, terminal and readable storage medium storing program for executing | |
CN107809437A (en) | A kind of converged communication login method, device and computer-readable recording medium | |
CN106255102A (en) | The authentication method of a kind of terminal unit and relevant device | |
CN105262878A (en) | Processing method of automatic call recording and mobile terminal | |
CN106790926A (en) | A kind of contact management method and terminal | |
CN107222629A (en) | Call processing method and related product | |
CN106105168A (en) | A kind of method, terminal and portable electric appts calling transfer | |
CN106599663A (en) | Information security protecting method and mobile terminal | |
CN106817489A (en) | The reminding method and mobile terminal of message | |
CN104575548A (en) | File playing positioning method and device as well as terminal | |
CN107798821A (en) | Safety prompt function method, apparatus, mobile terminal and readable storage medium storing program for executing |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180109 |
|
RJ01 | Rejection of invention patent application after publication |