FIELD: information technology.
SUBSTANCE: method is implemented by blocking the unwanted element of the active application's interface by overlapping it. When overlapping, new graphic element is drawn on top of the unwanted element of the active application's interface of mobile device.
EFFECT: restricting access to the interface of unwanted application.
2 cl, 3 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD TO LOCK ACCESS TO DATA ON MOBILE DEVICE WITH API FOR USERS WITH DISABILITIES | 2015 |
|
RU2618946C1 |
METHOD OF CONTRADICTION TO UNFAIR APPLICATIONS RATES | 2016 |
|
RU2634182C1 |
METHOD OF THE DATA CATEGORY DETECTING USING THE API, APPLIED FOR CREATING AN APPLICATIONS FOR USERS WITH DISABILITIES | 2017 |
|
RU2649796C1 |
SYSTEM AND METHOD OF DETERMINING THE CATEGORY OF PROXY APPLICATION | 2014 |
|
RU2580032C2 |
SYSTEM AND METHOD OF DETERMINING UNKNOWN STATUS APPLICATION | 2014 |
|
RU2580053C2 |
METHOD OF CONFIDENTIAL DATA INPUT | 2015 |
|
RU2606556C2 |
SYSTEM AND METHOD FOR DETECTING MALWARE BY CREATING ISOLATED ENVIRONMENT | 2012 |
|
RU2535175C2 |
SYSTEM AND METHOD OF TRUSTED APPLICATIONS OPERATION IN THE PRESENCE OF SUSPICIOUS APPLICATIONS | 2014 |
|
RU2595511C2 |
SYSTEM AND METHOD OF COUNTERACTING ATTACK ON COMPUTING DEVICES OF USERS | 2018 |
|
RU2697926C1 |
SYSTEM AND METHOD FOR ANTIVIRUS SCANNING OF OBJECTS ON A MOBILE DEVICE | 2023 |
|
RU2818877C1 |
Authors
Dates
2018-02-19—Published
2013-12-05—Filed