CN105530261B - The guard method of privacy information and device - Google Patents
The guard method of privacy information and device Download PDFInfo
- Publication number
- CN105530261B CN105530261B CN201510982843.0A CN201510982843A CN105530261B CN 105530261 B CN105530261 B CN 105530261B CN 201510982843 A CN201510982843 A CN 201510982843A CN 105530261 B CN105530261 B CN 105530261B
- Authority
- CN
- China
- Prior art keywords
- privacy information
- camera program
- security camera
- photograph album
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
Abstract
The invention discloses a kind of guard method of privacy information and devices; it is related to field of information security technology; main purpose is to ensure that smart phone is stored in the safety of privacy information in photograph album, and technical solution of the present invention includes: that client intercepts calling solicited message;Call request information is the call request information that system camera program of the third party application into terminal device is sent;It include the first preset address in call request information, the first preset address is the corresponding address of system camera program;The first preset address in call request information is obtained, and the first preset address is revised as the second preset address;Second preset address is the corresponding address of security camera program in client;In response to the store instruction that third party application is sent, the privacy information that third party application is shot based on security camera program is stored in the corresponding safe photograph album of security camera program.During the present invention is applied to protection intelligent terminal privacy information safety.
Description
Technical field
The present invention relates to field of information security technology, guard method and device more particularly to a kind of privacy information.
Background technique
With the fast development of the communication technology and computer technology, smart phone is also more more and more universal, increasing therewith
Further include the third party application that can be installed on smart phone, third party application can make the function of smart phone more
Reinforce big, meet the different demands of smart phone user, the work and life to smart phone user provide it is many just
Benefit.
For example, the camera that smart phone user is carried by system, by taking pictures or the operation such as recorded video, with photo
The either life or work of the form record user of video;In the photograph album of photo and video storage smart phone;For some
For the user for installing certain social application program, the photo that can be shot based on internet by certain social application program or
Video, with his family or friend shares.
But after smart phone is checked by the non-holder of the smart phone, the photo that may will be saved in photograph album
Or the leakage of private information such as video;Alternatively, when smart phone user passes through the photo in certain social application program sharing photograph album
Perhaps when video due to user hand accidentally or other reasons have given privacy photo or video sharing to stranger etc., thus
As it can be seen that smart phone user is stored in photo in photograph album or video, there are huge security risks.In particular, when in photograph album
Photo or video when being related to Company Confidential information, the leakage of privacy information may bring irremediable huge to company
Economic loss.Therefore, the safety for how protecting privacy information in smart phone becomes current urgent problem to be solved.
Summary of the invention
In view of this, a kind of guard method of privacy information provided by the invention and device, main purpose are to ensure that intelligence
Energy mobile phone is stored in the safety of privacy information in photograph album.
According to the present invention on one side, the present invention provides a kind of guard methods of privacy information, this method comprises:
Client intercepts calling solicited message;Wherein, the call request information be third party application to
The call request information that system camera program in terminal device is sent;In the call request information presetly comprising first
Location, first preset address are the corresponding address of the system camera program;
The first preset address in the call request information is obtained, and first preset address is revised as second in advance
Set address;Wherein, second preset address is the corresponding address of security camera program in the client;
In response to the store instruction that the third party application is sent, the third party application is based on the peace
The privacy information of full camera programm shooting, is stored in the corresponding safe photograph album of the security camera program, so that the terminal is set
Standby user accesses the safe photograph album by the client.
According to the present invention on the other hand, the present invention provides a kind of protective device of privacy information, which includes:
Interception unit, for being intercepted to calling solicited message;Wherein, the call request information is third-party application
The call request information that system camera program of the program into terminal device is sent;It is pre- comprising first in the call request information
Address is set, first preset address is the corresponding address of the system camera program;
First acquisition unit, for obtaining the first preset address in the call request information;
Unit is modified, first preset address for obtaining the first acquisition unit is revised as second presetly
Location;Wherein, second preset address is the corresponding address of security camera program in the client;
Storage unit, the store instruction for being sent in response to the third party application, by the third-party application
The privacy information that program is shot based on the security camera program is stored in the corresponding safe photograph album of the security camera program,
So that the terminal user accesses the safe photograph album by the client.
By above-mentioned technical proposal, the guard method of privacy information provided by the invention and device are installed in terminal device
Client to call solicited message intercept, the call request information be third party application be into terminal device
The call request information that camera programm of uniting is sent, wherein include the first preset address in the call request information, described first is pre-
Setting address is the corresponding address of system camera program;Secondly, client obtains the first preset address in call request information, and
First preset address is revised as the second preset address, which is security camera program in client to drinking
Address, in response to third party application send store instruction, by third party application be based on security camera program bat
The privacy information taken the photograph is stored in the corresponding safe photograph album of security camera program, so that terminal user passes through the client
It accesses, check privacy information in safe photograph album;Being stored in photo in photograph album or video with the prior art, there are huge
Security risk is compared, and third party application of the present invention shoots privacy information by the security camera in client, executes third
The store instruction that square application program is sent, privacy information is stored in the safe photograph album in client, rather than is stored in terminal
In the system photograph album of equipment, it is ensured that the safety of privacy information in terminal device.
The above description is only an overview of the technical scheme of the present invention, in order to better understand the technical means of the present invention,
And it can be implemented in accordance with the contents of the specification, and in order to allow above and other objects of the present invention, feature and advantage can
It is clearer and more comprehensible, the followings are specific embodiments of the present invention.
Detailed description of the invention
By reading the following detailed description of the preferred embodiment, various other advantages and benefits are common for this field
Technical staff will become clear.The drawings are only for the purpose of illustrating a preferred embodiment, and is not considered as to the present invention
Limitation.And throughout the drawings, the same reference numbers will be used to refer to the same parts.In the accompanying drawings:
Fig. 1 shows a kind of flow chart of the guard method of privacy information provided in an embodiment of the present invention;
Fig. 2 shows a kind of schematic diagrames of security camera program provided in an embodiment of the present invention;
Fig. 3 shows the schematic diagram of another security camera program provided in an embodiment of the present invention;
Fig. 4 shows a kind of schematic diagram of safe photograph album provided in an embodiment of the present invention;
Fig. 5 shows the flow chart of the guard method of another privacy information provided in an embodiment of the present invention;
Fig. 6 shows the composition block diagram that the embodiment of the present invention provides a kind of protective device of privacy information;
Fig. 7 shows the composition block diagram that the embodiment of the present invention provides the protective device of another privacy information.
Specific embodiment
Exemplary embodiments of the present disclosure are described in more detail below with reference to accompanying drawings.Although showing the disclosure in attached drawing
Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here
It is limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure
It is fully disclosed to those skilled in the art.
The embodiment of the present invention provides a kind of guard method of privacy information, as described in Figure 1, which comprises
101, client intercepts calling solicited message.
In the embodiment of the present invention, client is installed in terminal device, and the terminal device must support system camera journey
Sequence.When being protected to privacy information, client third party application calling system camera programm in order to prevent, to third
The call request information that square application program is sent to system camera program is intercepted;It include first in the call request information
Preset address, first preset address are the corresponding address of the system camera program.Ensure that third party application calls
Camera not instead of system camera program, the security camera in client;In turn, it is ensured that third party application is based on phase
The photo or video of machine shooting are not present in system photograph album.
It should be noted that including corresponding first preset address of system camera program in call request information, this
Difference of one preset address because of system camera program, it is understood that there may be difference;May also be because of the different type of terminal device, it may
It has differences;The embodiment of the present invention is to the concrete form of the first preset address without limiting.
In the embodiment of the present invention, the terminal device may include but be not limited to the following contents, such as: smart phone,
PC (personal computer, PC), tablet computer etc., concrete type of the embodiment of the present invention to terminal device
Without limiting, as long as supporting system camera program in the terminal device, and the embodiment of the present invention is to system camera program
Hardware configuration: camera, pixel, picture resolution, Digital Zoom, interior screen parameter, dynamic memory, picture editing function etc.
Without limiting.
102, client obtains the first preset address in the call request information, and first preset address is repaired
It is changed to the second preset address.
Third party application is in calling system camera programm, it is not known that its camera programm called is system camera journey
Other camera programms in sequence or terminal device;After client intercepts call request information, to the call request
Information is parsed, and obtains the first preset address in call request information, and the first preset address that will acquire is revised as the
Two preset address, wherein second preset address is the corresponding preset address of security camera program in the client.
In the embodiment of the present invention, the second preset address in client is unique, no matter which kind of class is client be installed on
The terminal device of type, the second preset address are all determining, unique.
When being taken pictures using camera or recorded video, third party application is based in client third party application
Security camera take pictures, recorded video, privacy information share etc. operation, the embodiment of the present invention to third party application be based on peace
The purposes of full camera is without limiting.
103, the store instruction that client end response is sent in the third party application, by the third party application
Based on the privacy information of security camera program shooting, it is stored in the corresponding safe photograph album of the security camera program.
After terminal user, which is based on security camera program, has shot privacy information, click in security camera program
Saving button triggers store instruction.After client receives store instruction, store instruction is responded, by security camera
The privacy information of shooting is stored in the corresponding safe photograph album of security camera;So that the terminal user passes through the client
End accesses the safe photograph album.Wherein, privacy information described in the embodiment of the present invention includes photo and video.
As another implementation of the embodiment of the present invention, when terminal user determine save its shooting photo or
When person's video, the storage button in security camera program is triggered, when terminal device is intended to take pictures again or when recorded video again,
Key is retaken in triggering security camera program, is taken pictures again or recorded video again.
Illustratively, as shown in Fig. 2, Fig. 2 shows a kind of signals of security camera program provided in an embodiment of the present invention
Figure triggers storage button, which is stored in safe photograph album when terminal user determines the photo storage shot
It is interior;When terminal user determines the photo re-shoot, key is retaken in triggering, and nose heave based on the camera shooting in terminal device
New shooting.The exemplary only citing of Fig. 2, the embodiment of the present invention in the appearance and security camera program of security camera program to wrapping
The content contained is without limiting.
The guard method of privacy information provided in an embodiment of the present invention, the client installed in terminal device is to call request
Information is intercepted, which is the tune that system camera program of the third party application into terminal device is sent
With solicited message, wherein include the first preset address in the call request information, first preset address is system camera journey
The corresponding address of sequence;Secondly, client obtains the first preset address in call request information, and the first preset address is modified
For the second preset address, which is the security camera program in client to the address drunk, in response to third
The store instruction that square application program is sent, the privacy information that third party application is shot based on security camera program, storage
In in the corresponding safe photograph album of security camera program, is accessed so that terminal user passes through the client, checks safe photograph album
Interior privacy information;With the photo or video that the prior art is stored in photograph album there are compared with huge security risk, this hair
Bright embodiment third party application shoots privacy information by the security camera in client, executes third party application hair
Privacy information is stored in the safe photograph album in client by the store instruction sent, rather than is stored in the system phase of terminal device
In volume, it is ensured that the safety of privacy information in terminal device.
Further, client provides a variety of be served by, comprising: the application program updating of terminal device, killing terminal
The virus of equipment, the available machine time for recording terminal device, browse rubbish, the unloading of application program etc. removed in terminal device take
Business application etc., the equipment safety and the speed of service of terminal device provide a favorable security.In order to meet terminal user more
More demands also provide security camera program, safe album-service application in client, wherein security camera program and system phase
Machine program is similar, there is a corresponding preset address, client offer security camera program, safe album-service in application,
Client adds security camera program, includes take pictures service and Video service in the security camera program;Add security camera journey
After sequence, the corresponding safe photograph album of creation security camera program;And security camera is configured according to the configuration information that console issues
Program and safe photograph album, wherein the configuration information includes hiding security camera program and safe photograph album, display security camera journey
Sequence and safe photograph album.
It should be noted that third-party application journey can be forbidden after configuring hiding security camera program and safe photograph album
Sequence calls security camera program, i.e. security camera program can not enable.When using the privacy information in safe photograph album, client
It will pop up the prompt information for whether starting security camera program and safe photograph album, client is according to the selection of terminal user
Instruction determines whether to start security camera program and safe photograph album.When terminal user determine starting security camera program with
And after safe photograph album, third party application can call security camera program.
Further, third party application, can be according to the reality of terminal user after calling security camera program
Border demand, selects take pictures service or Video service in security camera program, and client records terminal user's setting
Take pictures service or the Video service of security camera, to write from memory when third party application calls security camera program again
Recognize take pictures service or the Video service recorded using client.Illustratively, as shown in figure 3, Fig. 3 shows implementation of the present invention
The schematic diagram for another security camera program that example provides, terminal user selects the security camera program of setting in diagram
Photo service.The exemplary only citing of Fig. 3, the embodiment of the present invention is to service or the Video service of taking pictures in security camera program
The specific location of place security camera program is without limiting.
Further, when third party application need by take pictures or recorded video share privacy information when, default
Call request information is sent for the system camera program into terminal device, in order to ensure the safety of privacy information, client is logical
It crosses preset elements to be monitored system camera program, and determines whether there is the call request that oriented system camera programm is sent
Information;When client control is to the call request information sent there are oriented system camera program, client is by call request
Information is intercepted, and ensures that the safety of terminal user's privacy information.
Further, in order to further ensure that the privacy information safety of terminal user, by the third-party application
The privacy information that program is shot based on the security camera program, be stored in the corresponding safe photograph album of the security camera program it
Before, the privacy information that client shoots the security camera program encrypts, and encrypted privacy information is stored in peace
In full photograph album, by two layers of protective barrier, the safety of terminal user's privacy information is determined.It is encrypted to safe photograph album
When, it may be employed without limitation of mode below to realize, symmetry encryption algorithm and unsymmetrical tridiagonal matrix algorithm;Such as: DES
(Data Encryption Standard)、3DES(Triple DES)、DSA(Digital Signature Algorithm)、
MD5, PKCS (The Public-Key Cryptography Standards) etc., the embodiment of the present invention adds safe photograph album
The specific implementation of close algorithm is without limiting.
Further, it when terminal user shares hiding information to other terminal devices, is obtained out of safe photograph album
Encrypted privacy information, and privacy information is sent to other terminal user, privacy information is sent to other terminals and sets
After standby user, client authenticates the access authority of other terminal user, will be encrypted if authenticating successfully
The corresponding key of privacy information is sent to other terminal user;If authentification failure, not by encrypted privacy information pair
The key answered is sent to other terminal user.As a kind of implementation of the embodiment of the present invention, client is remembered by it
The equipment identification information of the terminal device of record confirms whether other terminal user have the encrypted privacy information of access
Permission;As another implementation of the embodiment of the present invention, if terminal user shared by third party application it is hidden
Personal letter breath then shares whether other terminal user of privacy information are friend relations with terminal user by confirmation,
Whether the corresponding key of encrypted privacy information is sent to other terminal user to authenticate with this.The embodiment of the present invention
To authentication mode without limiting.
Further, the privacy information in safe photograph album can be managed, is being incited somebody to action for the ease of terminal user
The privacy information that the third party application is shot based on the security camera program is stored in the security camera program pair
After the safe photograph album answered, client classifies to privacy information.
A kind of implementation as the embodiment of the present invention is shot when classifying to privacy information with privacy information
Time sequencing classify, as shown in figure 4, Fig. 4 shows a kind of schematic diagram of safe photograph album provided in an embodiment of the present invention,
In Fig. 4, it can be resequenced to the privacy information in safe photograph album according to the sequencing of time according to sequence key.
As another implementation of the embodiment of the present invention, in safe photograph album, create sub- photograph album, with the difference of sub- photograph album name into
Row classification.For the implementation that privacy information is classified in the safe photograph album of the embodiment of the present invention without limiting, Fig. 4 is exemplary only
Citing, the embodiment of the present invention do not limit the quantity of existing key and privacy information in safe photograph album just.
Further, client end response operates the privacy information in safe photograph album in operational order, to safety phase
Privacy information in volume is operated, wherein operational order includes following arbitrary content: the privacy information that zooms in or out is deleted
Except privacy information, transmission privacy information, rotation privacy information, renaming privacy information, cutting privacy information etc..
Further, as the description that summarizes to above-described embodiment, the embodiment of the present invention also provides a kind of privacy information
Guard method, as shown in figure 5, this method comprises:
501, client adds the security camera program, includes service and the video clothes of taking pictures in the security camera program
Business.
502, client creates the corresponding safe photograph album of the security camera program.
503, client configures the security camera program and the safe photograph album according to the configuration information that console issues.
504, client is monitored the system camera program by preset elements, and determines whether there is oriented institute
State the call request information of system camera program transmission.
If 505, monitoring, there are the call request information that the oriented system camera program is sent, clients pair
Call request information is intercepted.
506, client obtains the first preset address in the call request information, and first preset address is repaired
It is changed to the second preset address.
507, the privacy information that client shoots the security camera program encrypts.
508, the store instruction that client end response is sent in the third party application, by the third party application
Based on the privacy information of security camera program shooting, it is stored in the corresponding safe photograph album of the security camera program.
509, when terminal user shares the privacy information to other terminal user, client is from the peace
The encrypted privacy information is obtained in full photograph album, and the privacy information is sent to other terminal user.
510, client authenticates the access authority of other terminal user.
If authenticating successfully, 511 are thened follow the steps;If authentification failure thens follow the steps 512.
511, the corresponding key of the encrypted privacy information is sent to other described terminal devices by client
User.
512, the corresponding key of the encrypted privacy information is not sent to other described terminals and set by client
Standby user.
It should be noted that the associated description in relation to step 501- step 512, please refers to retouching in detail for above-described embodiment
It states, the embodiment of the present invention is no longer repeated one by one herein.
Further, as the realization to method shown in above-mentioned Fig. 1, another embodiment of the present invention additionally provides a kind of privacy
The protective device of information.The Installation practice is corresponding with preceding method embodiment, and to be easy to read, present apparatus embodiment is no longer right
Detail content in preceding method embodiment is repeated one by one, it should be understood that the device in the present embodiment can correspond to reality
Full content in existing preceding method embodiment.
Further, the embodiment of the present invention provides a kind of protective device of privacy information, as shown in fig. 6, the device includes:
Interception unit 61, for being intercepted to calling solicited message;Wherein, the call request information is answered for third party
The call request information sent with system camera program of the program into terminal device;It include first in the call request information
Preset address, first preset address are the corresponding address of the system camera program;
First acquisition unit 62, for obtaining the first preset address in the call request information;
Unit 63 is modified, it is pre- that first preset address for obtaining the first acquisition unit 62 is revised as second
Set address;Wherein, second preset address is the corresponding address of security camera program in the client;
Storage unit 64, the store instruction for sending in response to the third party application, the third party is answered
The privacy information shot with program based on the security camera program is stored in the corresponding safe phase of the security camera program
Volume, so that the terminal user accesses the safe photograph album by the client.
Further, as shown in fig. 7, described device further include:
Adding unit 65, for the modification unit 63 by first preset address be revised as the second preset address it
Before, the security camera program is added, includes take pictures service and Video service in the security camera program;
Creating unit 66, the corresponding safety of the security camera program added for creating the adding unit 65
Photograph album;
Configuration unit 67, the configuration information for being issued according to console configure the peace that the adding unit 65 is added
The safe photograph album that full camera programm and dormitory creating unit 66 create;Wherein, the configuration information includes hiding/display peace
Full camera programm and safe photograph album.
Further, as shown in fig. 7, described device further include:
Recording unit 68, the service of taking pictures/Video service of the security camera for recording terminal user's setting,
When calling the security camera program next time, the service of the taking pictures/Video service of usage record is defaulted.
Further, as shown in fig. 7, described device further include:
Monitoring unit 69, for passing through preset group before 61 pairs of calling solicited messages of the interception unit intercept
Part is monitored the system camera program, and determines whether there is the calling that the oriented system camera program is sent
Solicited message;
The interception unit 61, is also used to that there are the oriented system camera programs to send out when the monitoring unit 69 is monitored
When the call request information sent, the call request information is intercepted.
Further, as shown in fig. 7, described device further include:
Encryption unit 610, for the third party application to be based on the security camera in the storage unit 64
The privacy information of program shooting, is stored in front of the corresponding safe photograph album of the security camera program, to the security camera journey
The privacy information of sequence shooting is encrypted.
Further, as shown in fig. 7, described device further include:
Second acquisition unit 611, for sharing the privacy information to other terminal user as terminal user
When, the encrypted privacy information of the encryption unit 610 is obtained from the safe photograph album;
Transmission unit 612, the privacy information for obtaining the second acquisition unit 611 are sent to other terminals
Equipment user;
Authentication unit 613, for the privacy information described in the transmission unit 612 be sent to other terminal user it
Afterwards, the access authority of other terminal user is authenticated;
The transmission unit 612 is also used to when the authentication unit 613 authenticates successfully, will be described encrypted described
The corresponding key of privacy information is sent to other described terminal user.
Further, as shown in fig. 7, described device further include:
Taxon 614, for the third party application to be based on the security camera in the storage unit 64
The privacy information of program shooting, is stored in after the corresponding safe photograph album of the security camera program, in the safe photograph album
The privacy information of storage is classified.
Further, as shown in fig. 7, described device further include:
Operating unit 615, for being operated to the privacy information in safe photograph album in response to operational order;Wherein, institute
Stating operational order includes following arbitrary content: the privacy information that zooms in or out deletes privacy information, sends privacy information, rotation
Turn privacy information, renaming privacy information, cut privacy information.
The protective device of privacy information provided in an embodiment of the present invention, the client installed in terminal device is to call request
Information is intercepted, which is the tune that system camera program of the third party application into terminal device is sent
With solicited message, wherein include the first preset address in the call request information, first preset address is system camera journey
The corresponding address of sequence;Secondly, client obtains the first preset address in call request information, and the first preset address is modified
For the second preset address, which is the security camera program in client to the address drunk, in response to third
The store instruction that square application program is sent, the privacy information that third party application is shot based on security camera program, storage
In in the corresponding safe photograph album of security camera program, is accessed so that terminal user passes through the client, checks safe photograph album
Interior privacy information;With the photo or video that the prior art is stored in photograph album there are compared with huge security risk, this hair
Bright embodiment third party application shoots privacy information by the security camera in client, executes third party application hair
Privacy information is stored in the safe photograph album in client by the store instruction sent, rather than is stored in the system phase of terminal device
In volume, it is ensured that the safety of privacy information in terminal device.
The embodiment of the invention discloses:
A1, a kind of guard method of privacy information, comprising:
Client intercepts calling solicited message;Wherein, the call request information be third party application to
The call request information that system camera program in terminal device is sent;In the call request information presetly comprising first
Location, first preset address are the corresponding address of the system camera program;
The first preset address in the call request information is obtained, and first preset address is revised as second in advance
Set address;Wherein, second preset address is the corresponding address of security camera program in the client;
In response to the store instruction that the third party application is sent, the third party application is based on the peace
The privacy information of full camera programm shooting, is stored in the corresponding safe photograph album of the security camera program, so that the terminal is set
Standby user accesses the safe photograph album by the client.
A2, method according to a1, before first preset address is revised as the second preset address, the side
Method further include:
The security camera program is added, includes take pictures service and Video service in the security camera program;
Create the corresponding safe photograph album of the security camera program;
The security camera program and the safe photograph album are configured according to the configuration information that console issues;Wherein, described
Configuration information includes hiding/display security camera program and safe photograph album.
A3, the method according to A2, the method also includes:
The service of taking pictures/Video service of the security camera of terminal user's setting is recorded, ought to adjust next time
When with the security camera program, the service of the taking pictures/Video service of usage record is defaulted.
A4, method according to a1, in client to before calling solicited message to intercept, the method is also wrapped
It includes:
The system camera program is monitored by preset elements, and determines whether there is the oriented system camera
The call request information that program is sent;
Client intercept to calling solicited message
If monitoring there are the call request information that the oriented system camera program is sent, the calling is asked
Information is asked to be intercepted.
The third party application is being based on the security camera by A5, the method according to any one of A1-A4
The privacy information of program shooting, is stored in front of the corresponding safe photograph album of the security camera program, the method also includes:
The privacy information of security camera program shooting is encrypted.
A6, method according to a5, the method also includes:
When terminal user shares the privacy information to other terminal user, obtained from the safe photograph album
The encrypted privacy information is taken, and the privacy information is sent to other terminal user;
The access authority of other terminal user is authenticated;
If authenticating successfully, the corresponding key of the encrypted privacy information is sent to other described terminals and is set
Standby user.
A7, method according to a5, shoot the third party application based on the security camera program
Privacy information is stored in after the corresponding safe photograph album of the security camera program, the method also includes:
Classify to the privacy information of the storage in the safe photograph album.
A8, the method according to A7, the method also includes:
In response to operational order, the privacy information in safe photograph album is operated;Wherein, under the operational order includes
Column arbitrary content: the privacy information that zooms in or out deletes privacy information, sends privacy information, rotation privacy information, renaming
Privacy information cuts privacy information.
B9, a kind of protective device of privacy information, comprising:
Interception unit, for being intercepted to calling solicited message;Wherein, the call request information is third-party application
The call request information that system camera program of the program into terminal device is sent;It is pre- comprising first in the call request information
Address is set, first preset address is the corresponding address of the system camera program;
First acquisition unit, for obtaining the first preset address in the call request information;
Unit is modified, first preset address for obtaining the first acquisition unit is revised as second presetly
Location;Wherein, second preset address is the corresponding address of security camera program in the client;
Storage unit, the store instruction for being sent in response to the third party application, by the third-party application
The privacy information that program is shot based on the security camera program is stored in the corresponding safe photograph album of the security camera program,
So that the terminal user accesses the safe photograph album by the client.
B10, the device according to B9, described device further include:
Adding unit, for before first preset address is revised as the second preset address by the modification unit,
The security camera program is added, includes take pictures service and Video service in the security camera program;
Creating unit, for creating the corresponding safe phase of the security camera program of the adding unit addition
Volume;
Configuration unit, the configuration information for being issued according to console configure the safe phase of the adding unit addition
The safe photograph album of machine program and the creation of dormitory creating unit;Wherein, the configuration information includes hiding/display security camera
Program and safe photograph album.
B11, device according to b10, described device further include:
Recording unit, the service of taking pictures/Video service of the security camera for recording terminal user's setting, with
Box lunch calls the security camera program next time when, the service of the taking pictures/Video service of usage record is defaulted.
B12, the device according to B9, described device further include:
Monitoring unit, for, to before calling solicited message to intercept, passing through preset elements pair in the interception unit
The system camera program is monitored, and determines whether there is the call request that the oriented system camera program is sent
Information;
The interception unit is also used to send when the monitoring unit is monitored there are the oriented system camera program
When the call request information, the call request information is intercepted.
B13, the device according to any one of B9-B12, described device further include:
Encryption unit, for clapping the third party application based on the security camera program in the storage unit
The privacy information taken the photograph is stored in front of the corresponding safe photograph album of the security camera program, is shot to the security camera program
Privacy information encrypted.
B14, device according to b13, described device further include:
Second acquisition unit is used for when terminal user shares the privacy information to other terminal user,
The encrypted privacy information of the encryption unit is obtained from the safe photograph album;
Transmission unit, the privacy information for obtaining the second acquisition unit are sent to other terminal devices use
Family;
Authentication unit is right after being sent to other terminal user for the privacy information described in the transmission unit
The access authority of other terminal user authenticates;
The transmission unit is also used to when the authentication unit authenticates successfully, and the encrypted privacy is believed
It ceases corresponding key and is sent to other described terminal user.
B15, device according to b13, described device further include:
Taxon, for clapping the third party application based on the security camera program in the storage unit
The privacy information taken the photograph is stored in after the corresponding safe photograph album of the security camera program, the storage in the safe photograph album
The privacy information is classified.
B16, the device according to B15, described device further include:
Operating unit, for being operated to the privacy information in safe photograph album in response to operational order;Wherein, described
Operational order includes following arbitrary content: the privacy information that zooms in or out deletes privacy information, sends privacy information, rotation
Privacy information, cuts privacy information at renaming privacy information.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment
Point, reference can be made to the related descriptions of other embodiments.
It is understood that the correlated characteristic in the above method and device can be referred to mutually.In addition, in above-described embodiment
" first ", " second " etc. be and not represent the superiority and inferiority of each embodiment for distinguishing each embodiment.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description,
The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
Algorithm and display are not inherently related to any particular computer, virtual system, or other device provided herein.
Various general-purpose systems can also be used together with teachings based herein.As described above, it constructs required by this kind of system
Structure be obvious.In addition, the present invention is also not directed to any particular programming language.It should be understood that can use various
Programming language realizes summary of the invention described herein, and the description done above to language-specific is to disclose this hair
Bright preferred forms.
In the instructions provided here, numerous specific details are set forth.It is to be appreciated, however, that implementation of the invention
Example can be practiced without these specific details.In some instances, well known method, structure is not been shown in detail
And technology, so as not to obscure the understanding of this specification.
Similarly, it should be understood that in order to simplify the disclosure and help to understand one or more of the various inventive aspects,
Above in the description of exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes
In example, figure or descriptions thereof.However, the disclosed method should not be interpreted as reflecting the following intention: i.e. required to protect
Shield the present invention claims features more more than feature expressly recited in each claim.More precisely, as following
Claims reflect as, inventive aspect is all features less than single embodiment disclosed above.Therefore,
Thus the claims for following specific embodiment are expressly incorporated in the specific embodiment, wherein each claim itself
All as a separate embodiment of the present invention.
Those skilled in the art will understand that can be carried out adaptively to the module in the equipment in embodiment
Change and they are arranged in one or more devices different from this embodiment.It can be the module or list in embodiment
Member or component are combined into a module or unit or component, and furthermore they can be divided into multiple submodule or subelement or
Sub-component.Other than such feature and/or at least some of process or unit exclude each other, it can use any
Combination is to all features disclosed in this specification (including adjoint claim, abstract and attached drawing) and so disclosed
All process or units of what method or apparatus are combined.Unless expressly stated otherwise, this specification is (including adjoint power
Benefit require, abstract and attached drawing) disclosed in each feature can carry out generation with an alternative feature that provides the same, equivalent, or similar purpose
It replaces.
In addition, it will be appreciated by those of skill in the art that although some embodiments described herein include other embodiments
In included certain features rather than other feature, but the combination of the feature of different embodiments mean it is of the invention
Within the scope of and form different embodiments.For example, in the following claims, embodiment claimed is appointed
Meaning one of can in any combination mode come using.
Various component embodiments of the invention can be implemented in hardware, or to run on one or more processors
Software module realize, or be implemented in a combination thereof.It will be understood by those of skill in the art that can be used in practice
Microprocessor or digital signal processor (DSP) realize the denomination of invention according to an embodiment of the present invention (as determined in website
The device of Hyperlink rank) in some or all components some or all functions.The present invention is also implemented as being used for
Some or all device or device programs of method as described herein are executed (for example, computer program and calculating
Machine program product).It is such to realize that program of the invention can store on a computer-readable medium, or can have one
Or the form of multiple signals.Such signal can be downloaded from an internet website to obtain, or be provided on the carrier signal,
Or it is provided in any other form.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and ability
Field technique personnel can be designed alternative embodiment without departing from the scope of the appended claims.In the claims,
Any reference symbol between parentheses should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not
Element or step listed in the claims.Word "a" or "an" located in front of the element does not exclude the presence of multiple such
Element.The present invention can be by means of including the hardware of several different elements and being come by means of properly programmed computer real
It is existing.In the unit claims listing several devices, several in these devices can be through the same hardware branch
To embody.The use of word first, second, and third does not indicate any sequence.These words can be explained and be run after fame
Claim.
Claims (16)
1. a kind of guard method of privacy information characterized by comprising
Client intercepts calling solicited message;Wherein, the call request information is third party application to terminal
The call request information that system camera program in equipment is sent;It include the first preset address, institute in the call request information
Stating the first preset address is the corresponding address of the system camera program;
The first preset address in the call request information is obtained, and first preset address is revised as second presetly
Location;Wherein, second preset address is the corresponding address of security camera program in the client;
In response to the store instruction that the third party application is sent, the third party application is based on the safe phase
The privacy information of machine program shooting, is stored in the corresponding safe photograph album of the security camera program, so as to terminal device use
Family accesses the safe photograph album by the client.
2. the method according to claim 1, wherein first preset address is revised as second presetly
Before location, the method also includes:
The security camera program is added, includes take pictures service and Video service in the security camera program;
Create the corresponding safe photograph album of the security camera program;
The security camera program and the safe photograph album are configured according to the configuration information that console issues;Wherein, the configuration
Information includes hiding/display security camera program and safe photograph album.
3. according to the method described in claim 2, it is characterized in that, the method also includes:
The service of taking pictures/Video service of the security camera of terminal user's setting is recorded, so that institute ought be called next time
When stating security camera program, the service of the taking pictures/Video service of usage record is defaulted.
4. the method according to claim 1, wherein in client to calling before solicited message intercepts,
The method also includes:
The system camera program is monitored by preset elements, and determines whether there is the oriented system camera program
The call request information sent;
Client intercept to calling solicited message
If monitoring there are the call request information that the oriented system camera program is sent, the call request is believed
Breath is intercepted.
5. method according to any of claims 1-4, which is characterized in that be based on by the third party application
The privacy information of the security camera program shooting, is stored in front of the corresponding safe photograph album of the security camera program, described
Method further include:
The privacy information of security camera program shooting is encrypted.
6. according to the method described in claim 5, it is characterized in that, the method also includes:
When terminal user shares the privacy information to other terminal user, obtains and add from the safe photograph album
The privacy information after close, and the privacy information is sent to other terminal user;
The access authority of other terminal user is authenticated;
If authenticating successfully, the corresponding key of the encrypted privacy information is sent to other described terminal devices and is used
Family.
7. according to the method described in claim 5, it is characterized in that, the third party application is based on the safe phase
The privacy information of machine program shooting, is stored in after the corresponding safe photograph album of the security camera program, the method also includes:
Classify to the privacy information of the storage in the safe photograph album.
8. the method according to the description of claim 7 is characterized in that the method also includes:
In response to operational order, the privacy information in safe photograph album is operated;Wherein, the operational order includes following
Meaning content: the privacy information that zooms in or out deletes privacy information, sends privacy information, rotation privacy information, renaming privacy
Information cuts privacy information.
9. a kind of protective device of privacy information characterized by comprising
Interception unit, for being intercepted to calling solicited message;Wherein, the call request information is third party application
The call request information that system camera program into terminal device is sent;In the call request information presetly comprising first
Location, first preset address are the corresponding address of the system camera program;
First acquisition unit, for obtaining the first preset address in the call request information;
Unit is modified, first preset address for obtaining the first acquisition unit is revised as the second preset address;
Wherein, second preset address is the corresponding address of security camera program in client;
Storage unit, the store instruction for being sent in response to the third party application, by the third party application
Based on the privacy information of security camera program shooting, it is stored in the corresponding safe photograph album of the security camera program, so as to
The terminal user accesses the safe photograph album by the client.
10. device according to claim 9, which is characterized in that described device further include:
Adding unit, for adding before first preset address is revised as the second preset address by the modification unit
The security camera program includes take pictures service and Video service in the security camera program;
Creating unit, for creating the corresponding safe photograph album of the security camera program of the adding unit addition;
Configuration unit, the configuration information for being issued according to console configure the security camera journey of the adding unit addition
The safe photograph album of sequence and creating unit creation;Wherein, the configuration information includes hiding/display security camera program
With safe photograph album.
11. device according to claim 10, which is characterized in that described device further include:
Recording unit, the service of taking pictures/Video service of the security camera for recording terminal user's setting, to work as
When calling the security camera program next time, the service of the taking pictures/Video service of usage record is defaulted.
12. device according to claim 9, which is characterized in that described device further include:
Monitoring unit, in the interception unit to calling before solicited message intercepts, by preset elements to described
System camera program is monitored, and determines whether there is the call request letter that the oriented system camera program is sent
Breath;
The interception unit, be also used to when the monitoring unit monitor there are the oriented system camera program send it is described
When call request information, the call request information is intercepted.
13. the device according to any one of claim 9-12, which is characterized in that described device further include:
Encryption unit, for shoot the third party application based on the security camera program in the storage unit
Privacy information is stored in front of the corresponding safe photograph album of the security camera program, to the hidden of security camera program shooting
Personal letter breath is encrypted.
14. device according to claim 13, which is characterized in that described device further include:
Second acquisition unit is used for when terminal user shares the privacy information to other terminal user, from institute
It states and obtains the encrypted privacy information of the encryption unit in safe photograph album;
Transmission unit, the privacy information for obtaining the second acquisition unit are sent to other terminal user;
Authentication unit, after being sent to other terminal user for the privacy information described in the transmission unit, to described
The access authority of other terminal user authenticates;
The transmission unit is also used to when the authentication unit authenticates successfully, by the encrypted privacy information pair
The key answered is sent to other described terminal user.
15. device according to claim 13, which is characterized in that described device further include:
Taxon, for shoot the third party application based on the security camera program in the storage unit
Privacy information is stored in after the corresponding safe photograph album of the security camera program, the storage in the safe photograph album it is described
Privacy information is classified.
16. device according to claim 15, which is characterized in that described device further include:
Operating unit, for being operated to the privacy information in safe photograph album in response to operational order;Wherein, the operation
Instruction includes following arbitrary content: the privacy information that zooms in or out deletes privacy information, sends privacy information, rotation privacy
Information, cuts privacy information at renaming privacy information.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811621678.6A CN109688145B (en) | 2015-12-23 | 2015-12-23 | Method and device for protecting privacy information |
CN201510982843.0A CN105530261B (en) | 2015-12-23 | 2015-12-23 | The guard method of privacy information and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510982843.0A CN105530261B (en) | 2015-12-23 | 2015-12-23 | The guard method of privacy information and device |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811621678.6A Division CN109688145B (en) | 2015-12-23 | 2015-12-23 | Method and device for protecting privacy information |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105530261A CN105530261A (en) | 2016-04-27 |
CN105530261B true CN105530261B (en) | 2019-02-12 |
Family
ID=55772243
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811621678.6A Active CN109688145B (en) | 2015-12-23 | 2015-12-23 | Method and device for protecting privacy information |
CN201510982843.0A Active CN105530261B (en) | 2015-12-23 | 2015-12-23 | The guard method of privacy information and device |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811621678.6A Active CN109688145B (en) | 2015-12-23 | 2015-12-23 | Method and device for protecting privacy information |
Country Status (1)
Country | Link |
---|---|
CN (2) | CN109688145B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109688145A (en) * | 2015-12-23 | 2019-04-26 | 北京奇虎科技有限公司 | The guard method of privacy information and device |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106326762A (en) * | 2016-10-17 | 2017-01-11 | 广东七洲科技股份有限公司 | Data protection method realizing encryption while shooting for mobile terminal |
WO2019023955A1 (en) * | 2017-08-02 | 2019-02-07 | 深圳传音通讯有限公司 | Image storage and viewing method and system of intelligent terminal |
CN111143586B (en) * | 2019-08-09 | 2023-09-08 | 华为技术有限公司 | Picture processing method and related device |
CN113285912A (en) * | 2020-12-28 | 2021-08-20 | 常熟昊虞电子信息科技有限公司 | Security management method and device for monitoring content and cloud server |
CN113836567A (en) * | 2021-11-26 | 2021-12-24 | 北京指掌易科技有限公司 | Data security protection method, device, medium and electronic equipment |
CN117633265A (en) * | 2022-08-10 | 2024-03-01 | 华为技术有限公司 | Picture storage method and device and terminal equipment |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101415099A (en) * | 2007-10-18 | 2009-04-22 | 鸿富锦精密工业(深圳)有限公司 | System and method for ciphering image viewfinding device |
CN103034537A (en) * | 2012-12-17 | 2013-04-10 | 北京奇虎科技有限公司 | Method and device for executing quick operations in internet work operating system (IOS) |
CN103838986A (en) * | 2012-11-21 | 2014-06-04 | 腾讯科技(深圳)有限公司 | Multimedia file encryption method and device |
CN103942225A (en) * | 2013-01-23 | 2014-07-23 | 阿里巴巴集团控股有限公司 | Method and system for invoking resources of Hybrid App client and client |
CN104133544A (en) * | 2013-08-26 | 2014-11-05 | 腾讯科技(深圳)有限公司 | File processing method, device and terminal |
CN104135605A (en) * | 2013-06-21 | 2014-11-05 | 腾讯科技(深圳)有限公司 | Method and device for taking a picture |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040085445A1 (en) * | 2002-10-30 | 2004-05-06 | Park Ho-Sang | Apparatus for secured video signal transmission for video surveillance system |
KR20150017844A (en) * | 2013-08-08 | 2015-02-23 | 삼성전자주식회사 | Controlling Method For Input Status and Electronic Device supporting the same |
CN104102358A (en) * | 2014-07-18 | 2014-10-15 | 北京奇虎科技有限公司 | Privacy information protecting method and privacy information protecting device |
CN104618584A (en) * | 2015-01-09 | 2015-05-13 | 深圳市前海富达科技有限公司 | Method and system for switching intelligent terminal safe work mode |
CN104732140A (en) * | 2015-04-13 | 2015-06-24 | 成都睿峰科技有限公司 | Program data processing method |
CN109688145B (en) * | 2015-12-23 | 2021-07-16 | 北京奇虎科技有限公司 | Method and device for protecting privacy information |
-
2015
- 2015-12-23 CN CN201811621678.6A patent/CN109688145B/en active Active
- 2015-12-23 CN CN201510982843.0A patent/CN105530261B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101415099A (en) * | 2007-10-18 | 2009-04-22 | 鸿富锦精密工业(深圳)有限公司 | System and method for ciphering image viewfinding device |
CN103838986A (en) * | 2012-11-21 | 2014-06-04 | 腾讯科技(深圳)有限公司 | Multimedia file encryption method and device |
CN103034537A (en) * | 2012-12-17 | 2013-04-10 | 北京奇虎科技有限公司 | Method and device for executing quick operations in internet work operating system (IOS) |
CN103942225A (en) * | 2013-01-23 | 2014-07-23 | 阿里巴巴集团控股有限公司 | Method and system for invoking resources of Hybrid App client and client |
CN104135605A (en) * | 2013-06-21 | 2014-11-05 | 腾讯科技(深圳)有限公司 | Method and device for taking a picture |
CN104133544A (en) * | 2013-08-26 | 2014-11-05 | 腾讯科技(深圳)有限公司 | File processing method, device and terminal |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109688145A (en) * | 2015-12-23 | 2019-04-26 | 北京奇虎科技有限公司 | The guard method of privacy information and device |
CN109688145B (en) * | 2015-12-23 | 2021-07-16 | 北京奇虎科技有限公司 | Method and device for protecting privacy information |
Also Published As
Publication number | Publication date |
---|---|
CN109688145A (en) | 2019-04-26 |
CN105530261A (en) | 2016-04-27 |
CN109688145B (en) | 2021-07-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105530261B (en) | The guard method of privacy information and device | |
US11973860B1 (en) | Systems and methods for encryption and provision of information security using platform services | |
US10375116B2 (en) | System and method to provide server control for access to mobile client data | |
CN105453105B (en) | System and method for cloud data safety | |
CN104662870B (en) | Data safety management system | |
CN108600251B (en) | Mobile device management and security | |
CN108696520B (en) | Multi-rights data security and access | |
US20190205317A1 (en) | Systems and methods for secure storage and retrieval of data objects | |
US9338175B1 (en) | Methods and systems for providing comprehensive cyber-security protection using an open application programming interface based platform solution | |
US20120284516A1 (en) | Cross-domain collaborative systems and methods | |
KR20080095866A (en) | Computer session management device and system | |
CN103647784A (en) | Public and private isolation method and device | |
EP3066639B1 (en) | Method and device for image processing, and storage medium | |
Loshin | Practical anonymity: Hiding in plain sight online | |
US20210350024A1 (en) | Providing transparency in private-user-data access | |
CN107426151A (en) | A kind of file decryption method and device | |
CN110417638B (en) | Communication data processing method and device, storage medium and electronic device | |
Hassan et al. | Essential Privacy Tips | |
CN114329514A (en) | Mobile office system for data security |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20220725 Address after: Room 801, 8th floor, No. 104, floors 1-19, building 2, yard 6, Jiuxianqiao Road, Chaoyang District, Beijing 100015 Patentee after: BEIJING QIHOO TECHNOLOGY Co.,Ltd. Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park) Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd. Patentee before: Qizhi software (Beijing) Co.,Ltd. |