CN105530261B - The guard method of privacy information and device - Google Patents

The guard method of privacy information and device Download PDF

Info

Publication number
CN105530261B
CN105530261B CN201510982843.0A CN201510982843A CN105530261B CN 105530261 B CN105530261 B CN 105530261B CN 201510982843 A CN201510982843 A CN 201510982843A CN 105530261 B CN105530261 B CN 105530261B
Authority
CN
China
Prior art keywords
privacy information
camera program
security camera
photograph album
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510982843.0A
Other languages
Chinese (zh)
Other versions
CN105530261A (en
Inventor
熊立立
岳丽莹
王力
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201811621678.6A priority Critical patent/CN109688145B/en
Priority to CN201510982843.0A priority patent/CN105530261B/en
Publication of CN105530261A publication Critical patent/CN105530261A/en
Application granted granted Critical
Publication of CN105530261B publication Critical patent/CN105530261B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Abstract

The invention discloses a kind of guard method of privacy information and devices; it is related to field of information security technology; main purpose is to ensure that smart phone is stored in the safety of privacy information in photograph album, and technical solution of the present invention includes: that client intercepts calling solicited message;Call request information is the call request information that system camera program of the third party application into terminal device is sent;It include the first preset address in call request information, the first preset address is the corresponding address of system camera program;The first preset address in call request information is obtained, and the first preset address is revised as the second preset address;Second preset address is the corresponding address of security camera program in client;In response to the store instruction that third party application is sent, the privacy information that third party application is shot based on security camera program is stored in the corresponding safe photograph album of security camera program.During the present invention is applied to protection intelligent terminal privacy information safety.

Description

The guard method of privacy information and device
Technical field
The present invention relates to field of information security technology, guard method and device more particularly to a kind of privacy information.
Background technique
With the fast development of the communication technology and computer technology, smart phone is also more more and more universal, increasing therewith Further include the third party application that can be installed on smart phone, third party application can make the function of smart phone more Reinforce big, meet the different demands of smart phone user, the work and life to smart phone user provide it is many just Benefit.
For example, the camera that smart phone user is carried by system, by taking pictures or the operation such as recorded video, with photo The either life or work of the form record user of video;In the photograph album of photo and video storage smart phone;For some For the user for installing certain social application program, the photo that can be shot based on internet by certain social application program or Video, with his family or friend shares.
But after smart phone is checked by the non-holder of the smart phone, the photo that may will be saved in photograph album Or the leakage of private information such as video;Alternatively, when smart phone user passes through the photo in certain social application program sharing photograph album Perhaps when video due to user hand accidentally or other reasons have given privacy photo or video sharing to stranger etc., thus As it can be seen that smart phone user is stored in photo in photograph album or video, there are huge security risks.In particular, when in photograph album Photo or video when being related to Company Confidential information, the leakage of privacy information may bring irremediable huge to company Economic loss.Therefore, the safety for how protecting privacy information in smart phone becomes current urgent problem to be solved.
Summary of the invention
In view of this, a kind of guard method of privacy information provided by the invention and device, main purpose are to ensure that intelligence Energy mobile phone is stored in the safety of privacy information in photograph album.
According to the present invention on one side, the present invention provides a kind of guard methods of privacy information, this method comprises:
Client intercepts calling solicited message;Wherein, the call request information be third party application to The call request information that system camera program in terminal device is sent;In the call request information presetly comprising first Location, first preset address are the corresponding address of the system camera program;
The first preset address in the call request information is obtained, and first preset address is revised as second in advance Set address;Wherein, second preset address is the corresponding address of security camera program in the client;
In response to the store instruction that the third party application is sent, the third party application is based on the peace The privacy information of full camera programm shooting, is stored in the corresponding safe photograph album of the security camera program, so that the terminal is set Standby user accesses the safe photograph album by the client.
According to the present invention on the other hand, the present invention provides a kind of protective device of privacy information, which includes:
Interception unit, for being intercepted to calling solicited message;Wherein, the call request information is third-party application The call request information that system camera program of the program into terminal device is sent;It is pre- comprising first in the call request information Address is set, first preset address is the corresponding address of the system camera program;
First acquisition unit, for obtaining the first preset address in the call request information;
Unit is modified, first preset address for obtaining the first acquisition unit is revised as second presetly Location;Wherein, second preset address is the corresponding address of security camera program in the client;
Storage unit, the store instruction for being sent in response to the third party application, by the third-party application The privacy information that program is shot based on the security camera program is stored in the corresponding safe photograph album of the security camera program, So that the terminal user accesses the safe photograph album by the client.
By above-mentioned technical proposal, the guard method of privacy information provided by the invention and device are installed in terminal device Client to call solicited message intercept, the call request information be third party application be into terminal device The call request information that camera programm of uniting is sent, wherein include the first preset address in the call request information, described first is pre- Setting address is the corresponding address of system camera program;Secondly, client obtains the first preset address in call request information, and First preset address is revised as the second preset address, which is security camera program in client to drinking Address, in response to third party application send store instruction, by third party application be based on security camera program bat The privacy information taken the photograph is stored in the corresponding safe photograph album of security camera program, so that terminal user passes through the client It accesses, check privacy information in safe photograph album;Being stored in photo in photograph album or video with the prior art, there are huge Security risk is compared, and third party application of the present invention shoots privacy information by the security camera in client, executes third The store instruction that square application program is sent, privacy information is stored in the safe photograph album in client, rather than is stored in terminal In the system photograph album of equipment, it is ensured that the safety of privacy information in terminal device.
The above description is only an overview of the technical scheme of the present invention, in order to better understand the technical means of the present invention, And it can be implemented in accordance with the contents of the specification, and in order to allow above and other objects of the present invention, feature and advantage can It is clearer and more comprehensible, the followings are specific embodiments of the present invention.
Detailed description of the invention
By reading the following detailed description of the preferred embodiment, various other advantages and benefits are common for this field Technical staff will become clear.The drawings are only for the purpose of illustrating a preferred embodiment, and is not considered as to the present invention Limitation.And throughout the drawings, the same reference numbers will be used to refer to the same parts.In the accompanying drawings:
Fig. 1 shows a kind of flow chart of the guard method of privacy information provided in an embodiment of the present invention;
Fig. 2 shows a kind of schematic diagrames of security camera program provided in an embodiment of the present invention;
Fig. 3 shows the schematic diagram of another security camera program provided in an embodiment of the present invention;
Fig. 4 shows a kind of schematic diagram of safe photograph album provided in an embodiment of the present invention;
Fig. 5 shows the flow chart of the guard method of another privacy information provided in an embodiment of the present invention;
Fig. 6 shows the composition block diagram that the embodiment of the present invention provides a kind of protective device of privacy information;
Fig. 7 shows the composition block diagram that the embodiment of the present invention provides the protective device of another privacy information.
Specific embodiment
Exemplary embodiments of the present disclosure are described in more detail below with reference to accompanying drawings.Although showing the disclosure in attached drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here It is limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure It is fully disclosed to those skilled in the art.
The embodiment of the present invention provides a kind of guard method of privacy information, as described in Figure 1, which comprises
101, client intercepts calling solicited message.
In the embodiment of the present invention, client is installed in terminal device, and the terminal device must support system camera journey Sequence.When being protected to privacy information, client third party application calling system camera programm in order to prevent, to third The call request information that square application program is sent to system camera program is intercepted;It include first in the call request information Preset address, first preset address are the corresponding address of the system camera program.Ensure that third party application calls Camera not instead of system camera program, the security camera in client;In turn, it is ensured that third party application is based on phase The photo or video of machine shooting are not present in system photograph album.
It should be noted that including corresponding first preset address of system camera program in call request information, this Difference of one preset address because of system camera program, it is understood that there may be difference;May also be because of the different type of terminal device, it may It has differences;The embodiment of the present invention is to the concrete form of the first preset address without limiting.
In the embodiment of the present invention, the terminal device may include but be not limited to the following contents, such as: smart phone, PC (personal computer, PC), tablet computer etc., concrete type of the embodiment of the present invention to terminal device Without limiting, as long as supporting system camera program in the terminal device, and the embodiment of the present invention is to system camera program Hardware configuration: camera, pixel, picture resolution, Digital Zoom, interior screen parameter, dynamic memory, picture editing function etc. Without limiting.
102, client obtains the first preset address in the call request information, and first preset address is repaired It is changed to the second preset address.
Third party application is in calling system camera programm, it is not known that its camera programm called is system camera journey Other camera programms in sequence or terminal device;After client intercepts call request information, to the call request Information is parsed, and obtains the first preset address in call request information, and the first preset address that will acquire is revised as the Two preset address, wherein second preset address is the corresponding preset address of security camera program in the client.
In the embodiment of the present invention, the second preset address in client is unique, no matter which kind of class is client be installed on The terminal device of type, the second preset address are all determining, unique.
When being taken pictures using camera or recorded video, third party application is based in client third party application Security camera take pictures, recorded video, privacy information share etc. operation, the embodiment of the present invention to third party application be based on peace The purposes of full camera is without limiting.
103, the store instruction that client end response is sent in the third party application, by the third party application Based on the privacy information of security camera program shooting, it is stored in the corresponding safe photograph album of the security camera program.
After terminal user, which is based on security camera program, has shot privacy information, click in security camera program Saving button triggers store instruction.After client receives store instruction, store instruction is responded, by security camera The privacy information of shooting is stored in the corresponding safe photograph album of security camera;So that the terminal user passes through the client End accesses the safe photograph album.Wherein, privacy information described in the embodiment of the present invention includes photo and video.
As another implementation of the embodiment of the present invention, when terminal user determine save its shooting photo or When person's video, the storage button in security camera program is triggered, when terminal device is intended to take pictures again or when recorded video again, Key is retaken in triggering security camera program, is taken pictures again or recorded video again.
Illustratively, as shown in Fig. 2, Fig. 2 shows a kind of signals of security camera program provided in an embodiment of the present invention Figure triggers storage button, which is stored in safe photograph album when terminal user determines the photo storage shot It is interior;When terminal user determines the photo re-shoot, key is retaken in triggering, and nose heave based on the camera shooting in terminal device New shooting.The exemplary only citing of Fig. 2, the embodiment of the present invention in the appearance and security camera program of security camera program to wrapping The content contained is without limiting.
The guard method of privacy information provided in an embodiment of the present invention, the client installed in terminal device is to call request Information is intercepted, which is the tune that system camera program of the third party application into terminal device is sent With solicited message, wherein include the first preset address in the call request information, first preset address is system camera journey The corresponding address of sequence;Secondly, client obtains the first preset address in call request information, and the first preset address is modified For the second preset address, which is the security camera program in client to the address drunk, in response to third The store instruction that square application program is sent, the privacy information that third party application is shot based on security camera program, storage In in the corresponding safe photograph album of security camera program, is accessed so that terminal user passes through the client, checks safe photograph album Interior privacy information;With the photo or video that the prior art is stored in photograph album there are compared with huge security risk, this hair Bright embodiment third party application shoots privacy information by the security camera in client, executes third party application hair Privacy information is stored in the safe photograph album in client by the store instruction sent, rather than is stored in the system phase of terminal device In volume, it is ensured that the safety of privacy information in terminal device.
Further, client provides a variety of be served by, comprising: the application program updating of terminal device, killing terminal The virus of equipment, the available machine time for recording terminal device, browse rubbish, the unloading of application program etc. removed in terminal device take Business application etc., the equipment safety and the speed of service of terminal device provide a favorable security.In order to meet terminal user more More demands also provide security camera program, safe album-service application in client, wherein security camera program and system phase Machine program is similar, there is a corresponding preset address, client offer security camera program, safe album-service in application, Client adds security camera program, includes take pictures service and Video service in the security camera program;Add security camera journey After sequence, the corresponding safe photograph album of creation security camera program;And security camera is configured according to the configuration information that console issues Program and safe photograph album, wherein the configuration information includes hiding security camera program and safe photograph album, display security camera journey Sequence and safe photograph album.
It should be noted that third-party application journey can be forbidden after configuring hiding security camera program and safe photograph album Sequence calls security camera program, i.e. security camera program can not enable.When using the privacy information in safe photograph album, client It will pop up the prompt information for whether starting security camera program and safe photograph album, client is according to the selection of terminal user Instruction determines whether to start security camera program and safe photograph album.When terminal user determine starting security camera program with And after safe photograph album, third party application can call security camera program.
Further, third party application, can be according to the reality of terminal user after calling security camera program Border demand, selects take pictures service or Video service in security camera program, and client records terminal user's setting Take pictures service or the Video service of security camera, to write from memory when third party application calls security camera program again Recognize take pictures service or the Video service recorded using client.Illustratively, as shown in figure 3, Fig. 3 shows implementation of the present invention The schematic diagram for another security camera program that example provides, terminal user selects the security camera program of setting in diagram Photo service.The exemplary only citing of Fig. 3, the embodiment of the present invention is to service or the Video service of taking pictures in security camera program The specific location of place security camera program is without limiting.
Further, when third party application need by take pictures or recorded video share privacy information when, default Call request information is sent for the system camera program into terminal device, in order to ensure the safety of privacy information, client is logical It crosses preset elements to be monitored system camera program, and determines whether there is the call request that oriented system camera programm is sent Information;When client control is to the call request information sent there are oriented system camera program, client is by call request Information is intercepted, and ensures that the safety of terminal user's privacy information.
Further, in order to further ensure that the privacy information safety of terminal user, by the third-party application The privacy information that program is shot based on the security camera program, be stored in the corresponding safe photograph album of the security camera program it Before, the privacy information that client shoots the security camera program encrypts, and encrypted privacy information is stored in peace In full photograph album, by two layers of protective barrier, the safety of terminal user's privacy information is determined.It is encrypted to safe photograph album When, it may be employed without limitation of mode below to realize, symmetry encryption algorithm and unsymmetrical tridiagonal matrix algorithm;Such as: DES (Data Encryption Standard)、3DES(Triple DES)、DSA(Digital Signature Algorithm)、 MD5, PKCS (The Public-Key Cryptography Standards) etc., the embodiment of the present invention adds safe photograph album The specific implementation of close algorithm is without limiting.
Further, it when terminal user shares hiding information to other terminal devices, is obtained out of safe photograph album Encrypted privacy information, and privacy information is sent to other terminal user, privacy information is sent to other terminals and sets After standby user, client authenticates the access authority of other terminal user, will be encrypted if authenticating successfully The corresponding key of privacy information is sent to other terminal user;If authentification failure, not by encrypted privacy information pair The key answered is sent to other terminal user.As a kind of implementation of the embodiment of the present invention, client is remembered by it The equipment identification information of the terminal device of record confirms whether other terminal user have the encrypted privacy information of access Permission;As another implementation of the embodiment of the present invention, if terminal user shared by third party application it is hidden Personal letter breath then shares whether other terminal user of privacy information are friend relations with terminal user by confirmation, Whether the corresponding key of encrypted privacy information is sent to other terminal user to authenticate with this.The embodiment of the present invention To authentication mode without limiting.
Further, the privacy information in safe photograph album can be managed, is being incited somebody to action for the ease of terminal user The privacy information that the third party application is shot based on the security camera program is stored in the security camera program pair After the safe photograph album answered, client classifies to privacy information.
A kind of implementation as the embodiment of the present invention is shot when classifying to privacy information with privacy information Time sequencing classify, as shown in figure 4, Fig. 4 shows a kind of schematic diagram of safe photograph album provided in an embodiment of the present invention, In Fig. 4, it can be resequenced to the privacy information in safe photograph album according to the sequencing of time according to sequence key. As another implementation of the embodiment of the present invention, in safe photograph album, create sub- photograph album, with the difference of sub- photograph album name into Row classification.For the implementation that privacy information is classified in the safe photograph album of the embodiment of the present invention without limiting, Fig. 4 is exemplary only Citing, the embodiment of the present invention do not limit the quantity of existing key and privacy information in safe photograph album just.
Further, client end response operates the privacy information in safe photograph album in operational order, to safety phase Privacy information in volume is operated, wherein operational order includes following arbitrary content: the privacy information that zooms in or out is deleted Except privacy information, transmission privacy information, rotation privacy information, renaming privacy information, cutting privacy information etc..
Further, as the description that summarizes to above-described embodiment, the embodiment of the present invention also provides a kind of privacy information Guard method, as shown in figure 5, this method comprises:
501, client adds the security camera program, includes service and the video clothes of taking pictures in the security camera program Business.
502, client creates the corresponding safe photograph album of the security camera program.
503, client configures the security camera program and the safe photograph album according to the configuration information that console issues.
504, client is monitored the system camera program by preset elements, and determines whether there is oriented institute State the call request information of system camera program transmission.
If 505, monitoring, there are the call request information that the oriented system camera program is sent, clients pair Call request information is intercepted.
506, client obtains the first preset address in the call request information, and first preset address is repaired It is changed to the second preset address.
507, the privacy information that client shoots the security camera program encrypts.
508, the store instruction that client end response is sent in the third party application, by the third party application Based on the privacy information of security camera program shooting, it is stored in the corresponding safe photograph album of the security camera program.
509, when terminal user shares the privacy information to other terminal user, client is from the peace The encrypted privacy information is obtained in full photograph album, and the privacy information is sent to other terminal user.
510, client authenticates the access authority of other terminal user.
If authenticating successfully, 511 are thened follow the steps;If authentification failure thens follow the steps 512.
511, the corresponding key of the encrypted privacy information is sent to other described terminal devices by client User.
512, the corresponding key of the encrypted privacy information is not sent to other described terminals and set by client Standby user.
It should be noted that the associated description in relation to step 501- step 512, please refers to retouching in detail for above-described embodiment It states, the embodiment of the present invention is no longer repeated one by one herein.
Further, as the realization to method shown in above-mentioned Fig. 1, another embodiment of the present invention additionally provides a kind of privacy The protective device of information.The Installation practice is corresponding with preceding method embodiment, and to be easy to read, present apparatus embodiment is no longer right Detail content in preceding method embodiment is repeated one by one, it should be understood that the device in the present embodiment can correspond to reality Full content in existing preceding method embodiment.
Further, the embodiment of the present invention provides a kind of protective device of privacy information, as shown in fig. 6, the device includes:
Interception unit 61, for being intercepted to calling solicited message;Wherein, the call request information is answered for third party The call request information sent with system camera program of the program into terminal device;It include first in the call request information Preset address, first preset address are the corresponding address of the system camera program;
First acquisition unit 62, for obtaining the first preset address in the call request information;
Unit 63 is modified, it is pre- that first preset address for obtaining the first acquisition unit 62 is revised as second Set address;Wherein, second preset address is the corresponding address of security camera program in the client;
Storage unit 64, the store instruction for sending in response to the third party application, the third party is answered The privacy information shot with program based on the security camera program is stored in the corresponding safe phase of the security camera program Volume, so that the terminal user accesses the safe photograph album by the client.
Further, as shown in fig. 7, described device further include:
Adding unit 65, for the modification unit 63 by first preset address be revised as the second preset address it Before, the security camera program is added, includes take pictures service and Video service in the security camera program;
Creating unit 66, the corresponding safety of the security camera program added for creating the adding unit 65 Photograph album;
Configuration unit 67, the configuration information for being issued according to console configure the peace that the adding unit 65 is added The safe photograph album that full camera programm and dormitory creating unit 66 create;Wherein, the configuration information includes hiding/display peace Full camera programm and safe photograph album.
Further, as shown in fig. 7, described device further include:
Recording unit 68, the service of taking pictures/Video service of the security camera for recording terminal user's setting, When calling the security camera program next time, the service of the taking pictures/Video service of usage record is defaulted.
Further, as shown in fig. 7, described device further include:
Monitoring unit 69, for passing through preset group before 61 pairs of calling solicited messages of the interception unit intercept Part is monitored the system camera program, and determines whether there is the calling that the oriented system camera program is sent Solicited message;
The interception unit 61, is also used to that there are the oriented system camera programs to send out when the monitoring unit 69 is monitored When the call request information sent, the call request information is intercepted.
Further, as shown in fig. 7, described device further include:
Encryption unit 610, for the third party application to be based on the security camera in the storage unit 64 The privacy information of program shooting, is stored in front of the corresponding safe photograph album of the security camera program, to the security camera journey The privacy information of sequence shooting is encrypted.
Further, as shown in fig. 7, described device further include:
Second acquisition unit 611, for sharing the privacy information to other terminal user as terminal user When, the encrypted privacy information of the encryption unit 610 is obtained from the safe photograph album;
Transmission unit 612, the privacy information for obtaining the second acquisition unit 611 are sent to other terminals Equipment user;
Authentication unit 613, for the privacy information described in the transmission unit 612 be sent to other terminal user it Afterwards, the access authority of other terminal user is authenticated;
The transmission unit 612 is also used to when the authentication unit 613 authenticates successfully, will be described encrypted described The corresponding key of privacy information is sent to other described terminal user.
Further, as shown in fig. 7, described device further include:
Taxon 614, for the third party application to be based on the security camera in the storage unit 64 The privacy information of program shooting, is stored in after the corresponding safe photograph album of the security camera program, in the safe photograph album The privacy information of storage is classified.
Further, as shown in fig. 7, described device further include:
Operating unit 615, for being operated to the privacy information in safe photograph album in response to operational order;Wherein, institute Stating operational order includes following arbitrary content: the privacy information that zooms in or out deletes privacy information, sends privacy information, rotation Turn privacy information, renaming privacy information, cut privacy information.
The protective device of privacy information provided in an embodiment of the present invention, the client installed in terminal device is to call request Information is intercepted, which is the tune that system camera program of the third party application into terminal device is sent With solicited message, wherein include the first preset address in the call request information, first preset address is system camera journey The corresponding address of sequence;Secondly, client obtains the first preset address in call request information, and the first preset address is modified For the second preset address, which is the security camera program in client to the address drunk, in response to third The store instruction that square application program is sent, the privacy information that third party application is shot based on security camera program, storage In in the corresponding safe photograph album of security camera program, is accessed so that terminal user passes through the client, checks safe photograph album Interior privacy information;With the photo or video that the prior art is stored in photograph album there are compared with huge security risk, this hair Bright embodiment third party application shoots privacy information by the security camera in client, executes third party application hair Privacy information is stored in the safe photograph album in client by the store instruction sent, rather than is stored in the system phase of terminal device In volume, it is ensured that the safety of privacy information in terminal device.
The embodiment of the invention discloses:
A1, a kind of guard method of privacy information, comprising:
Client intercepts calling solicited message;Wherein, the call request information be third party application to The call request information that system camera program in terminal device is sent;In the call request information presetly comprising first Location, first preset address are the corresponding address of the system camera program;
The first preset address in the call request information is obtained, and first preset address is revised as second in advance Set address;Wherein, second preset address is the corresponding address of security camera program in the client;
In response to the store instruction that the third party application is sent, the third party application is based on the peace The privacy information of full camera programm shooting, is stored in the corresponding safe photograph album of the security camera program, so that the terminal is set Standby user accesses the safe photograph album by the client.
A2, method according to a1, before first preset address is revised as the second preset address, the side Method further include:
The security camera program is added, includes take pictures service and Video service in the security camera program;
Create the corresponding safe photograph album of the security camera program;
The security camera program and the safe photograph album are configured according to the configuration information that console issues;Wherein, described Configuration information includes hiding/display security camera program and safe photograph album.
A3, the method according to A2, the method also includes:
The service of taking pictures/Video service of the security camera of terminal user's setting is recorded, ought to adjust next time When with the security camera program, the service of the taking pictures/Video service of usage record is defaulted.
A4, method according to a1, in client to before calling solicited message to intercept, the method is also wrapped It includes:
The system camera program is monitored by preset elements, and determines whether there is the oriented system camera The call request information that program is sent;
Client intercept to calling solicited message
If monitoring there are the call request information that the oriented system camera program is sent, the calling is asked Information is asked to be intercepted.
The third party application is being based on the security camera by A5, the method according to any one of A1-A4 The privacy information of program shooting, is stored in front of the corresponding safe photograph album of the security camera program, the method also includes:
The privacy information of security camera program shooting is encrypted.
A6, method according to a5, the method also includes:
When terminal user shares the privacy information to other terminal user, obtained from the safe photograph album The encrypted privacy information is taken, and the privacy information is sent to other terminal user;
The access authority of other terminal user is authenticated;
If authenticating successfully, the corresponding key of the encrypted privacy information is sent to other described terminals and is set Standby user.
A7, method according to a5, shoot the third party application based on the security camera program Privacy information is stored in after the corresponding safe photograph album of the security camera program, the method also includes:
Classify to the privacy information of the storage in the safe photograph album.
A8, the method according to A7, the method also includes:
In response to operational order, the privacy information in safe photograph album is operated;Wherein, under the operational order includes Column arbitrary content: the privacy information that zooms in or out deletes privacy information, sends privacy information, rotation privacy information, renaming Privacy information cuts privacy information.
B9, a kind of protective device of privacy information, comprising:
Interception unit, for being intercepted to calling solicited message;Wherein, the call request information is third-party application The call request information that system camera program of the program into terminal device is sent;It is pre- comprising first in the call request information Address is set, first preset address is the corresponding address of the system camera program;
First acquisition unit, for obtaining the first preset address in the call request information;
Unit is modified, first preset address for obtaining the first acquisition unit is revised as second presetly Location;Wherein, second preset address is the corresponding address of security camera program in the client;
Storage unit, the store instruction for being sent in response to the third party application, by the third-party application The privacy information that program is shot based on the security camera program is stored in the corresponding safe photograph album of the security camera program, So that the terminal user accesses the safe photograph album by the client.
B10, the device according to B9, described device further include:
Adding unit, for before first preset address is revised as the second preset address by the modification unit, The security camera program is added, includes take pictures service and Video service in the security camera program;
Creating unit, for creating the corresponding safe phase of the security camera program of the adding unit addition Volume;
Configuration unit, the configuration information for being issued according to console configure the safe phase of the adding unit addition The safe photograph album of machine program and the creation of dormitory creating unit;Wherein, the configuration information includes hiding/display security camera Program and safe photograph album.
B11, device according to b10, described device further include:
Recording unit, the service of taking pictures/Video service of the security camera for recording terminal user's setting, with Box lunch calls the security camera program next time when, the service of the taking pictures/Video service of usage record is defaulted.
B12, the device according to B9, described device further include:
Monitoring unit, for, to before calling solicited message to intercept, passing through preset elements pair in the interception unit The system camera program is monitored, and determines whether there is the call request that the oriented system camera program is sent Information;
The interception unit is also used to send when the monitoring unit is monitored there are the oriented system camera program When the call request information, the call request information is intercepted.
B13, the device according to any one of B9-B12, described device further include:
Encryption unit, for clapping the third party application based on the security camera program in the storage unit The privacy information taken the photograph is stored in front of the corresponding safe photograph album of the security camera program, is shot to the security camera program Privacy information encrypted.
B14, device according to b13, described device further include:
Second acquisition unit is used for when terminal user shares the privacy information to other terminal user, The encrypted privacy information of the encryption unit is obtained from the safe photograph album;
Transmission unit, the privacy information for obtaining the second acquisition unit are sent to other terminal devices use Family;
Authentication unit is right after being sent to other terminal user for the privacy information described in the transmission unit The access authority of other terminal user authenticates;
The transmission unit is also used to when the authentication unit authenticates successfully, and the encrypted privacy is believed It ceases corresponding key and is sent to other described terminal user.
B15, device according to b13, described device further include:
Taxon, for clapping the third party application based on the security camera program in the storage unit The privacy information taken the photograph is stored in after the corresponding safe photograph album of the security camera program, the storage in the safe photograph album The privacy information is classified.
B16, the device according to B15, described device further include:
Operating unit, for being operated to the privacy information in safe photograph album in response to operational order;Wherein, described Operational order includes following arbitrary content: the privacy information that zooms in or out deletes privacy information, sends privacy information, rotation Privacy information, cuts privacy information at renaming privacy information.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment Point, reference can be made to the related descriptions of other embodiments.
It is understood that the correlated characteristic in the above method and device can be referred to mutually.In addition, in above-described embodiment " first ", " second " etc. be and not represent the superiority and inferiority of each embodiment for distinguishing each embodiment.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
Algorithm and display are not inherently related to any particular computer, virtual system, or other device provided herein. Various general-purpose systems can also be used together with teachings based herein.As described above, it constructs required by this kind of system Structure be obvious.In addition, the present invention is also not directed to any particular programming language.It should be understood that can use various Programming language realizes summary of the invention described herein, and the description done above to language-specific is to disclose this hair Bright preferred forms.
In the instructions provided here, numerous specific details are set forth.It is to be appreciated, however, that implementation of the invention Example can be practiced without these specific details.In some instances, well known method, structure is not been shown in detail And technology, so as not to obscure the understanding of this specification.
Similarly, it should be understood that in order to simplify the disclosure and help to understand one or more of the various inventive aspects, Above in the description of exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes In example, figure or descriptions thereof.However, the disclosed method should not be interpreted as reflecting the following intention: i.e. required to protect Shield the present invention claims features more more than feature expressly recited in each claim.More precisely, as following Claims reflect as, inventive aspect is all features less than single embodiment disclosed above.Therefore, Thus the claims for following specific embodiment are expressly incorporated in the specific embodiment, wherein each claim itself All as a separate embodiment of the present invention.
Those skilled in the art will understand that can be carried out adaptively to the module in the equipment in embodiment Change and they are arranged in one or more devices different from this embodiment.It can be the module or list in embodiment Member or component are combined into a module or unit or component, and furthermore they can be divided into multiple submodule or subelement or Sub-component.Other than such feature and/or at least some of process or unit exclude each other, it can use any Combination is to all features disclosed in this specification (including adjoint claim, abstract and attached drawing) and so disclosed All process or units of what method or apparatus are combined.Unless expressly stated otherwise, this specification is (including adjoint power Benefit require, abstract and attached drawing) disclosed in each feature can carry out generation with an alternative feature that provides the same, equivalent, or similar purpose It replaces.
In addition, it will be appreciated by those of skill in the art that although some embodiments described herein include other embodiments In included certain features rather than other feature, but the combination of the feature of different embodiments mean it is of the invention Within the scope of and form different embodiments.For example, in the following claims, embodiment claimed is appointed Meaning one of can in any combination mode come using.
Various component embodiments of the invention can be implemented in hardware, or to run on one or more processors Software module realize, or be implemented in a combination thereof.It will be understood by those of skill in the art that can be used in practice Microprocessor or digital signal processor (DSP) realize the denomination of invention according to an embodiment of the present invention (as determined in website The device of Hyperlink rank) in some or all components some or all functions.The present invention is also implemented as being used for Some or all device or device programs of method as described herein are executed (for example, computer program and calculating Machine program product).It is such to realize that program of the invention can store on a computer-readable medium, or can have one Or the form of multiple signals.Such signal can be downloaded from an internet website to obtain, or be provided on the carrier signal, Or it is provided in any other form.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and ability Field technique personnel can be designed alternative embodiment without departing from the scope of the appended claims.In the claims, Any reference symbol between parentheses should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not Element or step listed in the claims.Word "a" or "an" located in front of the element does not exclude the presence of multiple such Element.The present invention can be by means of including the hardware of several different elements and being come by means of properly programmed computer real It is existing.In the unit claims listing several devices, several in these devices can be through the same hardware branch To embody.The use of word first, second, and third does not indicate any sequence.These words can be explained and be run after fame Claim.

Claims (16)

1. a kind of guard method of privacy information characterized by comprising
Client intercepts calling solicited message;Wherein, the call request information is third party application to terminal The call request information that system camera program in equipment is sent;It include the first preset address, institute in the call request information Stating the first preset address is the corresponding address of the system camera program;
The first preset address in the call request information is obtained, and first preset address is revised as second presetly Location;Wherein, second preset address is the corresponding address of security camera program in the client;
In response to the store instruction that the third party application is sent, the third party application is based on the safe phase The privacy information of machine program shooting, is stored in the corresponding safe photograph album of the security camera program, so as to terminal device use Family accesses the safe photograph album by the client.
2. the method according to claim 1, wherein first preset address is revised as second presetly Before location, the method also includes:
The security camera program is added, includes take pictures service and Video service in the security camera program;
Create the corresponding safe photograph album of the security camera program;
The security camera program and the safe photograph album are configured according to the configuration information that console issues;Wherein, the configuration Information includes hiding/display security camera program and safe photograph album.
3. according to the method described in claim 2, it is characterized in that, the method also includes:
The service of taking pictures/Video service of the security camera of terminal user's setting is recorded, so that institute ought be called next time When stating security camera program, the service of the taking pictures/Video service of usage record is defaulted.
4. the method according to claim 1, wherein in client to calling before solicited message intercepts, The method also includes:
The system camera program is monitored by preset elements, and determines whether there is the oriented system camera program The call request information sent;
Client intercept to calling solicited message
If monitoring there are the call request information that the oriented system camera program is sent, the call request is believed Breath is intercepted.
5. method according to any of claims 1-4, which is characterized in that be based on by the third party application The privacy information of the security camera program shooting, is stored in front of the corresponding safe photograph album of the security camera program, described Method further include:
The privacy information of security camera program shooting is encrypted.
6. according to the method described in claim 5, it is characterized in that, the method also includes:
When terminal user shares the privacy information to other terminal user, obtains and add from the safe photograph album The privacy information after close, and the privacy information is sent to other terminal user;
The access authority of other terminal user is authenticated;
If authenticating successfully, the corresponding key of the encrypted privacy information is sent to other described terminal devices and is used Family.
7. according to the method described in claim 5, it is characterized in that, the third party application is based on the safe phase The privacy information of machine program shooting, is stored in after the corresponding safe photograph album of the security camera program, the method also includes:
Classify to the privacy information of the storage in the safe photograph album.
8. the method according to the description of claim 7 is characterized in that the method also includes:
In response to operational order, the privacy information in safe photograph album is operated;Wherein, the operational order includes following Meaning content: the privacy information that zooms in or out deletes privacy information, sends privacy information, rotation privacy information, renaming privacy Information cuts privacy information.
9. a kind of protective device of privacy information characterized by comprising
Interception unit, for being intercepted to calling solicited message;Wherein, the call request information is third party application The call request information that system camera program into terminal device is sent;In the call request information presetly comprising first Location, first preset address are the corresponding address of the system camera program;
First acquisition unit, for obtaining the first preset address in the call request information;
Unit is modified, first preset address for obtaining the first acquisition unit is revised as the second preset address; Wherein, second preset address is the corresponding address of security camera program in client;
Storage unit, the store instruction for being sent in response to the third party application, by the third party application Based on the privacy information of security camera program shooting, it is stored in the corresponding safe photograph album of the security camera program, so as to The terminal user accesses the safe photograph album by the client.
10. device according to claim 9, which is characterized in that described device further include:
Adding unit, for adding before first preset address is revised as the second preset address by the modification unit The security camera program includes take pictures service and Video service in the security camera program;
Creating unit, for creating the corresponding safe photograph album of the security camera program of the adding unit addition;
Configuration unit, the configuration information for being issued according to console configure the security camera journey of the adding unit addition The safe photograph album of sequence and creating unit creation;Wherein, the configuration information includes hiding/display security camera program With safe photograph album.
11. device according to claim 10, which is characterized in that described device further include:
Recording unit, the service of taking pictures/Video service of the security camera for recording terminal user's setting, to work as When calling the security camera program next time, the service of the taking pictures/Video service of usage record is defaulted.
12. device according to claim 9, which is characterized in that described device further include:
Monitoring unit, in the interception unit to calling before solicited message intercepts, by preset elements to described System camera program is monitored, and determines whether there is the call request letter that the oriented system camera program is sent Breath;
The interception unit, be also used to when the monitoring unit monitor there are the oriented system camera program send it is described When call request information, the call request information is intercepted.
13. the device according to any one of claim 9-12, which is characterized in that described device further include:
Encryption unit, for shoot the third party application based on the security camera program in the storage unit Privacy information is stored in front of the corresponding safe photograph album of the security camera program, to the hidden of security camera program shooting Personal letter breath is encrypted.
14. device according to claim 13, which is characterized in that described device further include:
Second acquisition unit is used for when terminal user shares the privacy information to other terminal user, from institute It states and obtains the encrypted privacy information of the encryption unit in safe photograph album;
Transmission unit, the privacy information for obtaining the second acquisition unit are sent to other terminal user;
Authentication unit, after being sent to other terminal user for the privacy information described in the transmission unit, to described The access authority of other terminal user authenticates;
The transmission unit is also used to when the authentication unit authenticates successfully, by the encrypted privacy information pair The key answered is sent to other described terminal user.
15. device according to claim 13, which is characterized in that described device further include:
Taxon, for shoot the third party application based on the security camera program in the storage unit Privacy information is stored in after the corresponding safe photograph album of the security camera program, the storage in the safe photograph album it is described Privacy information is classified.
16. device according to claim 15, which is characterized in that described device further include:
Operating unit, for being operated to the privacy information in safe photograph album in response to operational order;Wherein, the operation Instruction includes following arbitrary content: the privacy information that zooms in or out deletes privacy information, sends privacy information, rotation privacy Information, cuts privacy information at renaming privacy information.
CN201510982843.0A 2015-12-23 2015-12-23 The guard method of privacy information and device Active CN105530261B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201811621678.6A CN109688145B (en) 2015-12-23 2015-12-23 Method and device for protecting privacy information
CN201510982843.0A CN105530261B (en) 2015-12-23 2015-12-23 The guard method of privacy information and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510982843.0A CN105530261B (en) 2015-12-23 2015-12-23 The guard method of privacy information and device

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN201811621678.6A Division CN109688145B (en) 2015-12-23 2015-12-23 Method and device for protecting privacy information

Publications (2)

Publication Number Publication Date
CN105530261A CN105530261A (en) 2016-04-27
CN105530261B true CN105530261B (en) 2019-02-12

Family

ID=55772243

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201811621678.6A Active CN109688145B (en) 2015-12-23 2015-12-23 Method and device for protecting privacy information
CN201510982843.0A Active CN105530261B (en) 2015-12-23 2015-12-23 The guard method of privacy information and device

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN201811621678.6A Active CN109688145B (en) 2015-12-23 2015-12-23 Method and device for protecting privacy information

Country Status (1)

Country Link
CN (2) CN109688145B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109688145A (en) * 2015-12-23 2019-04-26 北京奇虎科技有限公司 The guard method of privacy information and device

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106326762A (en) * 2016-10-17 2017-01-11 广东七洲科技股份有限公司 Data protection method realizing encryption while shooting for mobile terminal
WO2019023955A1 (en) * 2017-08-02 2019-02-07 深圳传音通讯有限公司 Image storage and viewing method and system of intelligent terminal
CN111143586B (en) * 2019-08-09 2023-09-08 华为技术有限公司 Picture processing method and related device
CN113285912A (en) * 2020-12-28 2021-08-20 常熟昊虞电子信息科技有限公司 Security management method and device for monitoring content and cloud server
CN113836567A (en) * 2021-11-26 2021-12-24 北京指掌易科技有限公司 Data security protection method, device, medium and electronic equipment
CN117633265A (en) * 2022-08-10 2024-03-01 华为技术有限公司 Picture storage method and device and terminal equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101415099A (en) * 2007-10-18 2009-04-22 鸿富锦精密工业(深圳)有限公司 System and method for ciphering image viewfinding device
CN103034537A (en) * 2012-12-17 2013-04-10 北京奇虎科技有限公司 Method and device for executing quick operations in internet work operating system (IOS)
CN103838986A (en) * 2012-11-21 2014-06-04 腾讯科技(深圳)有限公司 Multimedia file encryption method and device
CN103942225A (en) * 2013-01-23 2014-07-23 阿里巴巴集团控股有限公司 Method and system for invoking resources of Hybrid App client and client
CN104133544A (en) * 2013-08-26 2014-11-05 腾讯科技(深圳)有限公司 File processing method, device and terminal
CN104135605A (en) * 2013-06-21 2014-11-05 腾讯科技(深圳)有限公司 Method and device for taking a picture

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040085445A1 (en) * 2002-10-30 2004-05-06 Park Ho-Sang Apparatus for secured video signal transmission for video surveillance system
KR20150017844A (en) * 2013-08-08 2015-02-23 삼성전자주식회사 Controlling Method For Input Status and Electronic Device supporting the same
CN104102358A (en) * 2014-07-18 2014-10-15 北京奇虎科技有限公司 Privacy information protecting method and privacy information protecting device
CN104618584A (en) * 2015-01-09 2015-05-13 深圳市前海富达科技有限公司 Method and system for switching intelligent terminal safe work mode
CN104732140A (en) * 2015-04-13 2015-06-24 成都睿峰科技有限公司 Program data processing method
CN109688145B (en) * 2015-12-23 2021-07-16 北京奇虎科技有限公司 Method and device for protecting privacy information

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101415099A (en) * 2007-10-18 2009-04-22 鸿富锦精密工业(深圳)有限公司 System and method for ciphering image viewfinding device
CN103838986A (en) * 2012-11-21 2014-06-04 腾讯科技(深圳)有限公司 Multimedia file encryption method and device
CN103034537A (en) * 2012-12-17 2013-04-10 北京奇虎科技有限公司 Method and device for executing quick operations in internet work operating system (IOS)
CN103942225A (en) * 2013-01-23 2014-07-23 阿里巴巴集团控股有限公司 Method and system for invoking resources of Hybrid App client and client
CN104135605A (en) * 2013-06-21 2014-11-05 腾讯科技(深圳)有限公司 Method and device for taking a picture
CN104133544A (en) * 2013-08-26 2014-11-05 腾讯科技(深圳)有限公司 File processing method, device and terminal

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109688145A (en) * 2015-12-23 2019-04-26 北京奇虎科技有限公司 The guard method of privacy information and device
CN109688145B (en) * 2015-12-23 2021-07-16 北京奇虎科技有限公司 Method and device for protecting privacy information

Also Published As

Publication number Publication date
CN109688145A (en) 2019-04-26
CN105530261A (en) 2016-04-27
CN109688145B (en) 2021-07-16

Similar Documents

Publication Publication Date Title
CN105530261B (en) The guard method of privacy information and device
US11973860B1 (en) Systems and methods for encryption and provision of information security using platform services
US10375116B2 (en) System and method to provide server control for access to mobile client data
CN105453105B (en) System and method for cloud data safety
CN104662870B (en) Data safety management system
CN108600251B (en) Mobile device management and security
CN108696520B (en) Multi-rights data security and access
US20190205317A1 (en) Systems and methods for secure storage and retrieval of data objects
US9338175B1 (en) Methods and systems for providing comprehensive cyber-security protection using an open application programming interface based platform solution
US20120284516A1 (en) Cross-domain collaborative systems and methods
KR20080095866A (en) Computer session management device and system
CN103647784A (en) Public and private isolation method and device
EP3066639B1 (en) Method and device for image processing, and storage medium
Loshin Practical anonymity: Hiding in plain sight online
US20210350024A1 (en) Providing transparency in private-user-data access
CN107426151A (en) A kind of file decryption method and device
CN110417638B (en) Communication data processing method and device, storage medium and electronic device
Hassan et al. Essential Privacy Tips
CN114329514A (en) Mobile office system for data security

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220725

Address after: Room 801, 8th floor, No. 104, floors 1-19, building 2, yard 6, Jiuxianqiao Road, Chaoyang District, Beijing 100015

Patentee after: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Patentee before: Qizhi software (Beijing) Co.,Ltd.