CN109670293A - Information processing method and electronic equipment - Google Patents
Information processing method and electronic equipment Download PDFInfo
- Publication number
- CN109670293A CN109670293A CN201811574283.5A CN201811574283A CN109670293A CN 109670293 A CN109670293 A CN 109670293A CN 201811574283 A CN201811574283 A CN 201811574283A CN 109670293 A CN109670293 A CN 109670293A
- Authority
- CN
- China
- Prior art keywords
- information
- privilege feature
- called
- application
- access
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Telephone Function (AREA)
Abstract
The embodiment of the present invention discloses a kind of information processing method and electronic equipment, wherein the described method includes: detection first event, the first event is characterized as that at least one privilege feature is called or access, and the privilege feature is for the acquisition to restricted information;Record first event;It generates prompt information and exports the prompt information, the prompt information is at least used to remind at least one described privilege feature called or access.
Description
Technical field
This application involves the information processing technologies, and in particular to a kind of information processing method and electronic equipment.
Background technique
Electronic equipment makes itself function more powerful due to being equipped with the application of different function, and many applications, which have, to be obtained
Take, collect the ability of information.Currently, the phenomenon that using stealthily calling without permission or accessing certain privilege features of electronic equipment
It is generally existing.Even if electronic equipment is allowed to that rights management can be carried out to application, but is also in application installation, inquiry is used
Whether family allows to authorize the privilege features such as application recording, video recording, positioning, is receiving what selection was used or was forbidden to use
After operation, the operation of electronic equipment response user allows or forbids this using these privilege features.Wherein, for being awarded
Allow using situation, user is not intended to the application and authorization invocation or accesses these power at any time, under any scene
Limit function.It is usually present electronic equipment and/or user in practice and is unaware of when these privilege features are used, especially exists
It is nonessential calling or access authority function scene in stealthily call and caused by user lose situation so that privacy of user pacify
It is on the hazard entirely.
Although in the related art, application need call or access some/a little privilege features when, can pass through inquiry use
Whether family allows the mode called or accessed that user is enabled to know when permission is used, but this mode repeatedly inquired
It can not equally determine whether there is and have permission the case where function is stealthily called or accessed.
Summary of the invention
To solve existing technical problem, the embodiment of the present invention provides a kind of information processing method and electronic equipment,
The personal secrets that at least can be avoided user are on the hazard, and ensure the safety of user privacy information, and that improves user uses body
It tests.
The technical solution of the embodiment of the present invention is achieved in that
The embodiment of the present invention provides a kind of information processing method, comprising:
First event is detected, the first event is characterized as at least one privilege feature and is called or accesses, the permission
Function is for the acquisition to restricted information;
Record first event;
It generates prompt information and exports the prompt information, the prompt information is at least used to remind at least one described power
Function is limited to be called or access.
In above scheme, the method also includes:
The application of the privilege feature is called or is accessed in detection, wherein the application is the non-application for authorizing operation.
In above scheme, the privilege feature is to be awarded to allow permission that is called or accessing.
In above scheme, the method also includes:
The privilege feature can call specific functional component, and the functional component is information collection component;
Alternatively,
The privilege feature is able to access that preset memory space or file.
In above scheme, the method also includes:
The prompt information is at least also used to prompt to call or access the application message of the privilege feature;And/or it is described
Prompt information is at least also used to prompt the privilege feature called or the temporal information of access.
The embodiment of the present invention also provides a kind of electronic equipment, comprising:
Processing component, for detecting first event, the first event be characterized as at least one privilege feature it is called or
Access, the privilege feature is for the acquisition to restricted information;First event is recorded into storage assembly;Generate prompt information;
Output precision, for exporting the prompt information, the prompt information is at least used to remind at least one described power
Function is limited to be called or access.
In above scheme, the processing component is also used to:
The application of the privilege feature is called or is accessed in detection, wherein the application is the non-application for authorizing operation.
In above scheme, the privilege feature is to be awarded to allow permission that is called or accessing.
In above scheme,
The privilege feature can call specific functional component, and the functional component is information collection component;
Alternatively,
The privilege feature is able to access that preset memory space or file.
In above scheme,
The output precision, the prompt information for output are at least also used to prompt to call or access the privilege feature
Application message;And/or the prompt information is at least also used to prompt the privilege feature called or the temporal information of access.
Electronic equipment in this programme is able to detect called privilege feature or access and is carried out based on the event detected
The output of prompt information, be at least able to detect that the privilege feature stealthily called and export certain prompt information to
Family is reminded, and the personal secrets due to that can not know user caused by which privilege feature is stealthily called are solved at least
The problem of being on the hazard ensures the safety of user privacy information, improves the usage experience of user.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
The embodiment of invention for those of ordinary skill in the art without creative efforts, can also basis
The attached drawing of offer obtains other attached drawings.
Fig. 1 is the implementation process schematic diagram of the first embodiment of information processing method provided by the invention;
Fig. 2 is the implementation process schematic diagram of the second embodiment of information processing method provided by the invention;
Fig. 3 (a) (b) is the flexible schematic diagram of an information collection component of the electronic equipment of the embodiment of the present invention;
Fig. 4 is one schematic diagram of application scenarios of the embodiment of the present invention;
Fig. 5 is two schematic diagram of application scenarios of the embodiment of the present invention;
Fig. 6 is the composed structure schematic diagram one of the electronic equipment of the embodiment of the present invention;
Fig. 7 is the composed structure schematic diagram two of the electronic equipment of the embodiment of the present invention.
Specific embodiment
For the purposes, technical schemes and advantages of the application are more clearly understood, below in conjunction in the embodiment of the present invention
Attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is only
It is a part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, ordinary skill people
Member's every other embodiment obtained without making creative work, shall fall within the protection scope of the present invention.?
In the case where not conflicting, the features in the embodiments and the embodiments of the present application can mutual any combination.In the process of attached drawing
The step of illustrating can execute in a computer system such as a set of computer executable instructions.Although also, in process
Logical order is shown in figure, but in some cases, it can be to be different from shown or described by sequence execution herein
Step.
Those skilled in the art should and know, the electronic equipment being related in the following embodiment of the application can be any
Electronic equipment, such as: industrial control computer, personal computer various types computer, integral computer, laptop,
Tablet computer, mobile phone, electronic reader etc. can also be the wearable devices such as smart glasses, smart watches, intelligent shoe.This Shen
It please preferred electronic equipment be mobile phone in embodiment.
In view of in practical applications, image or photo as obtained by taking pictures, the audio as obtained by recording are obtained by video recording
Video, such as logical as localization function module user's geographical location information as obtained by global positioning system (GPS), Affiliates List
News record list, userspersonal information and user's payment information have certain private nature, not square under certain application scenarios
Just it reveals to non-user, the information as above with private nature is considered as restricted information in this programme.Wherein, individual subscriber
Information may include logging in or opening with user to apply the information such as used user name, account, password, fingerprint, facial image.
User's payment information includes that the payment account, payment cipher, pay mark used when realizing payment function such as pays two dimensional code
Information.Electronic equipment in this programme has at least one privilege feature, privilege feature is called or access can be considered as to
The reading and/or use of upper various restricted informations;Such as it is recorded using recording device to the call of user, with reading user
Manage location information, read address list list etc..Restricted information and privilege feature in this programme further include that other any can think
The appropriate message arrived, is not limited to the above.
The implementation process schematic diagram of the first embodiment of information processing method provided by the invention;As shown in Figure 1, the side
Method includes:
Step 101: detection first event, the first event are characterized as at least one privilege feature and are called or access,
The privilege feature is for the acquisition to restricted information;
Step 102: record first event;
Step 103: generate prompt information and simultaneously export the prompt information, the prompt information be at least used to reminding it is described extremely
A few privilege feature is called or accesses.
The main body for executing step 101~103 is electronic equipment.Electronic equipment in this programme is able to detect that privilege feature
Called or access event simultaneously records this event, generate prompt information based on the event detected and exports prompt information,
The case where to remind consumer electronic devices that there are access and/or restriction informations.It can be seen that the electronics in this programme is set
The standby output for being able to detect called privilege feature or access and prompt information is carried out based on the event detected, can at least examine
Measure the privilege feature stealthily called and export certain prompt information reminding user, solve at least due to
It can not know the problem of personal secrets of user caused by which privilege feature is stealthily called are on the hazard, ensure that user is hidden
The safety of personal letter breath, improves the usage experience of user.
The implementation process schematic diagram of the second embodiment of information processing method provided by the invention;As shown in Fig. 2, the side
Method includes:
Step 201: detection first event, the first event are characterized as at least one privilege feature and are called or access,
The privilege feature is for the acquisition to restricted information;
Step 202: the application of the privilege feature is called or is accessed in detection, wherein the application authorizes answering for operation to be non-
With;
Step 203: the application message of record first event and calling or the access privilege feature;
Here, application message is the information of any application that can show that calling or the access privilege feature, is such as applied
Title, using the mark of corresponding icon.
Step 204: generate prompt information and simultaneously export the prompt information, the prompt information be at least used to reminding it is described extremely
A few privilege feature is called or accesses and the application message for prompting calling or accessing the privilege feature.
The main body for executing step 201~204 is electronic equipment.Wherein, step 201 and 202 is without strict sequence, step
Rapid 201 and 202 can also carry out simultaneously.
Electronic equipment in this programme is able to detect that privilege feature is called or accesses this event and detects tune
With or access authority function application, and the application message of this event and calling or access authority function is recorded, based on detection
To event generate prompt information and export for remind consumer electronic devices there are access and/or restriction information feelings
Condition and the restricted information being accessed or called by which/prompt information that is accessed or called of a little applications.It can be seen that our
It is at least able to detect that the privilege feature stealthily called and calling in case or accesses the application of the privilege feature and exports certain
Prompt information to remind user, solve at least due to that can not know which privilege feature is stealthily called and is led
The problem of personal secrets of the user of cause are on the hazard ensures the safety of user privacy information, improves the usage experience of user.
In an alternative embodiment, the privilege feature in this programme can call specific functional component, the function
Energy component is information collection component.Privilege feature in this programme is by calling specific information collection component to execute to limitation
The acquisition of information.For example, by calling photographic device (information collection component) such as camera to be acquired the image of user
To the photo or video of user;By calling recording device (information collection component) such as microphone to be acquired the audio of user
And obtain the audio file of relevant user;By calling localization function module (information collection component) such as GPS to be positioned to obtain
The location information of user.Namely the privilege feature in this programme is by calling specific functional component to realize to restricted information
Obtain, in the related technology only by way of being read out to restricted information and obtaining restricted information compared with so that electronics is set
Standby component resource (information collection component) is fully utilized.
In above scheme, for privilege feature by calling specific functional component to realize the acquisition to restricted information
Situation.It can be the component that can generate movement with setting information acquisition component in this programme, as electronic equipment is based on detecting
Privilege feature and the prompt information that exports can be and be risen by information collection component along the movement of scheduled motion profile
To reminding effect, the electronic equipment to remind user current is stealthily calling or access authority function.Namely the application is real
It applies in example, output prompt information is only indicated with the movement of information collection component.For example, camera shooting is set in this programme
Device such as camera is the camera with scalability, and as shown in Fig. 3 (a), camera is located at electronic equipment under normal circumstances
The back side, electronic equipment stealthily call camera carry out Image Acquisition when, specific length is stretched out from the back side and is made
Camera is no longer on the back side as shown in Fig. 3 (b).The electronic equipment that this extending action of camera can remind user current
The acquisition of image is stealthily being carried out using camera.This movement by information collection component issues the user with prompt letter
The mode of breath, so that prompt information is more novel, the experience of user is more preferably.It should be noted that electricity shown in Fig. 3 (a), (b)
The composition form of sub- equipment is only a kind of specifically distance, is not limited to all groups of formings of the electronic equipment of the application
State.
In an alternative embodiment, the privilege feature in this programme is able to access that preset memory space or file.
Electronic equipment in this programme is that the storage of user's private information opens certain memory space or establishes certain file.
The file of the memory space or foundation opened up can be used for storing the private information of user, apply institute as user logs in or opens
The userspersonal informations such as the user name, account, password, fingerprint, the facial image that use;It is used when realizing payment function for storing
Payment account, payment cipher, pay mark such as pay two dimensional code user's payment information.This privilege feature will read storage
When information in private information memory space or file, needs first with pre-set encryption information such as Crypted password, refers to
The memory space or file that the access such as line and/or image recognition are specially arranged are deposited in successful access (encryption information input is correct)
The information of storage is read in the case where storage space or file again.If electronic equipment has carried out reading stealthily to these private informations
It takes, then the side of the privilege feature that the detection of the embodiment of the present application is stealthily called or accessed and in time generation and output prompt information
Case can substantially reduce the risk that user's private information is compromised, and further solve the problems, such as that the personal secrets of user are on the hazard,
The safety for ensureing user privacy information, improves the usage experience of user.
To be different from the relevant technologies, the application of the calling detected or access authority function in this programme authorizes fortune to be non-
Capable application.It is believed that non-in this programme authorize operation application can be not based on user unlatching wish and by
User's application that actively triggering is opened, it is believed that be the application that electronic equipment is stealthily opened and run, actually electronic equipment
User be not intended to the application to be run also not know that the application has been turned on and runs.Non- in this programme authorizes operation
Using can also be that user wishes that it closes but be not successfully closed application still in operation, for example, user forget to close and
Application that the backstage of electronic equipment is stealthily run, user executed shutoff operation but for some reason such as software upgrading and
The application not being closed successfully.In this case, it is believed that not only can detecte the power stealthily called in this programme
Function is limited, can also detect the application for stealthily being opened simultaneously (still/continuation) operation by electronic equipment, i.e., this detection method can
With detect stealthily opened by electronic equipment and run and stealthily call or access authority function application be which kind of application and
Which kind of privilege feature the privilege feature that the application is stealthily called or accessed is, to remind user which by electronic equipment open simultaneously
Which kind of privilege feature the application of (still/continuation) operation stealthily has invoked.
In an optional scheme, the privilege feature, which can be to be awarded, allows permission that is called or accessing.
Called or access the privilege feature detected in this programme can be the permission having allowed for using calling or accessing,
I.e. privilege feature is not the privilege feature for stealthily calling or accessing, but the privilege feature for rationally being called or being accessed.For example,
In installation in application, user allows this using a privilege feature such as sound-recording function, then the application is opened and is run
The application rationally can call or access the privilege feature in the process, and the electronic equipment in this programme not only can be to stealthily calling
Privilege feature detected, additionally it is possible to detect the privilege feature for rationally being called or being accessed and export prompt information, to
The privilege feature that all permissions function-that prompt user's current electronic device is called or accessed stealthily is called and rationally called.
It will be understood by those skilled in the art that not only can detecte the privilege feature for stealthily calling or accessing in this programme, additionally it is possible to
Detect by user allow call or access permission, based on detect by user allowed call or access
This event of permission and the scheme for exporting prompt information at least enable to user to know the permission for being allowed to call or access
Under which kind of application scenarios, when called or access, and be allowed to the permission called or accessed at this time called or
Whether access reasonable.
For the prompt information of electronic equipment output, user can according to circumstances carry out alignment processing, for example, for stealthily
The recording privilege feature of calling, user can execute delete operation to the recording file that gets off stealthily is recorded, thus avoid due to
The problem of personal secrets of user are on the hazard caused by privilege feature is stealthily called.For the permission function rationally called
Can, the output of prompt information may make that user clearly knows when privilege feature is being used, made under which kind of application
With, and call or access it is whether reasonable, substantially increase the usage experience of user.
In an optional scheme, step 204 can be with are as follows: the prompt information is at least used to remind described at least one
A privilege feature is called or access, prompt are called or accessed the application message of the privilege feature and/or prompt the permission
Function is called or the temporal information of access.
It is appreciated that the name of the identification information such as privilege feature of the exportable privilege feature for being called or accessing of electronic equipment
Claim;The temporal information that electronic equipment is exported is used to remind user right function called or the time of access;What is exported answers
The privilege feature for information being used to that user to be reminded currently to be called or access by which/a little application is called or accesses.It is optional
, electronic equipment can carry out the output of information above according to the form of table 1, and with the 2nd behavior example in table 1, electronic equipment institute is defeated
Prompt information out is to remind user within 8:00~08:15 this period in the morning on December 19th, 2018, using-webpage A
Recording device is stealthily had invoked, is recorded to the message registration of user in this period.It is appreciated that shape shown in table 1
Formula is only a kind of concrete example, is not limited to all modes that this programme is covered.
Table 1
It should be appreciated by those skilled in the art that the output information in this programme exports in real time, that is, detecting the presence of
It is exported at once when having the privilege feature stealthily called, the risk being compromised with reduction user's private information of maximum possible.
It, can also be with it is appreciated that the prompt information in this programme is in form as above other than it can be exported
The mode of any reasonable visual feedback, audio feedback or audiovisual feedback composition is exported.For example, believing on electronic equipment
Signal lamp is lighted, the flashing of signal lamp, issues vebrato, issues and remind at least one of prompting modes such as sound.In this programme
Prompt information at least user can be accomplished to remind in a manner of vision and/or the sense of hearing.Prompting mode in this programme can be with
It is any reasonable manner, does not do and enumerate one by one.It is, of course, also possible to will be combined and be used for upper type and information collection component
User is prompted, for example, sending vebrato and triggering camera are as schemed monitoring there are when the privilege feature stealthily called
3 (b) stretching.
It, can be with it will be understood by those skilled in the art that prompt information is by electronic equipment other than it can be exported
It is exported by the other equipment such as smartwatch, bracelet etc. being communicatively coupled with electronic equipment, user can be made from more
A output pathway carries out knowing for prompt information, and user experience is obviously improved.Smartwatch, bracelet etc. are to the defeated of prompt information
Mode is as previously mentioned, no longer describe out.
The possible more than one of quantity in view of detecting the privilege feature for stealthily calling or accessing, in response to this,
Different prompting modes is preset for different privilege features, so that each privilege feature is with the progress of respective prompting mode
The output of prompt information, this scheme that different prompting modes are arranged for different rights function can help user's differentiation stealthily to call
Or which kind of privilege feature each privilege feature of access is all.
It is believed that above scheme be to the process that is monitored of application, monitor which/which kind of power an application stealthily call
Function is limited, it should be appreciated by those skilled in the art that for convenience of the monitoring to all applications, it can be in application programming interface
(API) monitoring function is executed at, and monitored results (first event) are recorded in service (Service), until there is inquiry to need
Monitored results are called when asking into service.
A application (the mesh for inquiry prompt information is specially developed in this programme for convenience of the access to prompt information
Mark applies APP), which, can also be from the APP by calling the content in the service of being recorded that can carry out the access of prompt information
It is middle to delete the prompt information being recorded in service.In view of the safety that prompt information is consulted, the API of the APP is set not
It is open, so that the function of the APP is not easy to be tampered.
It is specifically described below with reference to technical solution of several application scenarios to the embodiment of the present application.
In an application scenarios, as shown in figure 4, the user with electronic equipment is conversed using phone application and other side
For, the further phone application using electronic equipment carries out for voice communication.Those skilled in the art should and know, this
Electronic equipment in scheme has the function of monitoring whether to exist the permission by application calling or access, can real-time perfoming monitoring
It (booting and non-locking screen state) can be monitored, can also be touched based on the active of user during electronic equipment is by use
Hair enables the operation of monitoring function and enables the monitoring function, flexibly sets depending on concrete application situation.By taking real time monitoring as an example,
Electronic equipment monitoring, with the presence or absence of called or access privilege feature, is set in the communication process of user once monitoring electronics
The standby privilege feature that there is calling or access just records the event (first event), generates prompt information and simultaneously exports prompt
Information, to remind user's current electronic device calling or accessing some privilege feature.For example, the electronic equipment in communication process
Monitoring phone application is calling recording device to record the dialog context, records this event and calls recording device
The mark of phone application generates prompt information based on this event and exports prompt information, which makes electronic equipment
User know that sound-recording function (privilege feature) is stealthily had invoked by phone application, the dialog context has been stolen the system of using a hidden recorder and has got off.
User deletes recording substance and closes recording device, to prevent dialog context to be compromised, greatly reduces user privacy information quilt
The risk of leakage.
In another application scene, as shown in figure 5, being ridden the scene that shared bicycle travels with the user of electronic equipment
For,
User, which enables, applies 1, and enters shared to scan using 1 " sweep and sweep " function interface enabling " sweep and sweep " function
Two dimensional code on bicycle is so that the lock of shared bicycle is opened, and electronic equipment is in real time to the presence or absence of called or access
Privilege feature is monitored, it is assumed that obtains the riding track (first of user by calling GPS using 1 during scanning
Event), then electronic equipment records the event and calls the mark of the application 1 of GPS, generate prompt letter when monitoring the event
The output of prompt information is ceased and carries out with output form shown in table 1, to remind the riding track (itinerary) of user itself
It is positioned in real time.User closes freely to enjoy a people and rides using 1 and GPS to prevent other people from knowing the itinerary of oneself
Vehicle is travelled happy, to greatly promote the use feeling of user.
By above scheme it is found that in the embodiment of the present application, it is at least able to detect that the privilege feature stealthily called and defeated
Certain prompt information is solved at least to remind user due to that can not know which privilege feature is stealthily adjusted out
The problem of personal secrets of user are on the hazard caused by ensures the safety of user privacy information, improves making for user
With experience.
The present invention provides the embodiment of a kind of electronic equipment, as shown in fig. 6, the electronic equipment includes: processing component
601, storage assembly 602 and output precision 603;Wherein,
Processing component 601, for detecting first event, it is called that the first event is characterized as at least one privilege feature
Or access, the privilege feature is for the acquisition to restricted information;First event is recorded into storage assembly 602;Generate prompt
Information;
Output precision 603, for exporting the prompt information, the prompt information be at least used to reminding it is described at least one
Privilege feature is called or accesses.
In an alternative embodiment, the processing component 601, is also used to:
The application of the privilege feature is called or is accessed in detection, wherein the application is the non-application for authorizing operation.
In an alternative embodiment, the privilege feature is to be awarded to allow permission that is called or accessing.
In an alternative embodiment, the privilege feature can call specific functional component, the functional component
For information collection component;Alternatively, the privilege feature is able to access that preset memory space or file.
In an alternative embodiment, the output precision 603, the prompt information for output are at least also used to prompt
Call or access the application message of the privilege feature;And/or the prompt information is at least also used to prompt the privilege feature
Called or access temporal information.
Processing component 601 above-mentioned can processor as shown in Figure 7 realize;Storage assembly 602 above-mentioned can be by
Storage medium 702 shown in Fig. 7 is realized;Output precision 603 above-mentioned can audio output unit as shown in Figure 7 and display
Screen is to realize.
The electronic equipment of the embodiment of the present invention can be as shown in fig. 7, electronic equipment 700 includes: at least one processor
701, storage medium 702, at least one network interface 704, user interface 703, audio output unit 706 such as loudspeaker and display screen
707.Various components in electronic equipment 700 are coupled by bus system 705.It is understood that bus system 705 is for real
Connection communication between these existing components.Bus system 705 further includes power bus, controls always in addition to including data/address bus
Line and status signal bus in addition.But for the sake of clear explanation, various buses are all designated as bus system 705 in Fig. 7.
Wherein, user interface 703 may include display, keyboard, mouse, trace ball, click wheel, key, button, sense of touch
Plate or touch screen etc..
It is appreciated that storage medium 702 can be volatile memory or nonvolatile memory, volatibility may also comprise
Both with nonvolatile memory.Wherein, nonvolatile memory can be read-only memory (ROM, Read Only
Memory), programmable read only memory (PROM, Programmable Read-Only Memory), erasable programmable are read-only
Memory (EPROM, Erasable Programmable Read-Only Memory), electrically erasable programmable read-only memory
The storage of (EEPROM, Electrically Erasable Programmable Read-Only Memory), magnetic random access
Device (FRAM, ferromagnetic random access memory), flash memory (Flash Memory), magnetic surface are deposited
Reservoir, CD or CD-ROM (CD-ROM, Compact Disc Read-Only Memory);Magnetic surface storage can be
Magnetic disk storage or magnetic tape storage.Volatile memory can be random access memory (RAM, Random Access
Memory), it is used as External Cache.By exemplary but be not restricted explanation, the RAM of many forms is available, such as
Static random access memory (SRAM, Static Random Access Memory), synchronous static random access memory
(SSRAM, Synchronous Static Random Access Memory), dynamic random access memory (DRAM,
Dynamic Random Access Memory), Synchronous Dynamic Random Access Memory (SDRAM, Synchronous
Dynamic Random Access Memory), double data speed synchronous dynamic RAM (DDRSDRAM,
Double Data Rate Synchronous Dynamic Random Access Memory), enhanced synchronous dynamic random
Access memory (ESDRAM, Enhanced Synchronous Dynamic Random Access Memory), synchronized links
Dynamic random access memory (SLDRAM, SyncLink Dynamic Random Access Memory), direct rambus
Random access memory (DRRAM, Direct Rambus Random Access Memory).Description of the embodiment of the present invention is deposited
Storage media 702 is intended to include but is not limited to the memory of these and any other suitable type.
Storage medium 702 in the embodiment of the present invention is for storing various types of data to support electronic equipment 700
Operation.The example of these data includes: any computer program for operating on electronic equipment 700, such as operating system
7021 and application program 7022.Wherein, operating system 7021 includes various system programs, such as ccf layer, core library layer, driving
Layer etc., for realizing various basic businesses and the hardware based task of processing.Application program 7022 may include various applications
Program, such as media player (Media Player), browser (Browser) etc., for realizing various applied business.It realizes
The program of present invention method may be embodied in application program 7022.
The method that the embodiments of the present invention disclose can be applied in processor 701, or be realized by processor 701.
Processor 701 may be a kind of IC chip, the processing capacity with signal.During realization, the above method it is each
Step can be completed by the integrated logic circuit of the hardware in processor 701 or the instruction of software form.Above-mentioned processing
Device 701 can be general processor, digital signal processor (DSP, Digital Signal Processor) or other can
Programmed logic device, discrete gate or transistor logic, discrete hardware components etc..Processor 701 may be implemented or hold
Disclosed each method, step and logic diagram in the row embodiment of the present invention.General processor can be microprocessor or appoint
What conventional processor etc..The step of method in conjunction with disclosed in the embodiment of the present invention, can be embodied directly at hardware decoding
Reason device executes completion, or in decoding processor hardware and software module combine and execute completion.Software module can be located at
In storage medium, which is located at storage medium 702, and processor 701 reads the information in storage medium 702, in conjunction with it
Hardware completes the step of preceding method.
The embodiment of the present application also provides a kind of storage medium, and the storage medium can be the storage medium 702 in Fig. 7,
For storing computer program, which, which is performed, executes information processing method above-mentioned, it is further execute with
Lower operation:
First event is detected, the first event is characterized as at least one privilege feature and is called or accesses, the permission
Function is for the acquisition to restricted information;
Record first event;
It generates prompt information and exports the prompt information, the prompt information is at least used to remind at least one described power
Function is limited to be called or access.
It should be noted that the electronic equipment of the embodiment of the present invention, the principle solved the problems, such as due to the electronic equipment is with before
The information processing method stated is similar, and therefore, the implementation process and implementation principle of electronic equipment may refer to aforementioned information processing
The implementation process and implementation principle of method describe, and overlaps will not be repeated.
In several embodiments provided herein, it should be understood that disclosed device and method can pass through it
Its mode is realized.Apparatus embodiments described above are merely indicative, for example, the division of the unit, only
A kind of logical function partition, there may be another division manner in actual implementation, such as: multiple units or components can combine, or
It is desirably integrated into another system, or some features can be ignored or not executed.In addition, shown or discussed each composition portion
Mutual coupling or direct-coupling or communication connection is divided to can be through some interfaces, the INDIRECT COUPLING of equipment or unit
Or communication connection, it can be electrical, mechanical or other forms.
Above-mentioned unit as illustrated by the separation member, which can be or may not be, to be physically separated, aobvious as unit
The component shown can be or may not be physical unit, it can and it is in one place, it may be distributed over multiple network lists
In member;Some or all of units can be selected to achieve the purpose of the solution of this embodiment according to the actual needs.
In addition, each functional unit in various embodiments of the present invention can be fully integrated in one processing unit, it can also
To be each unit individually as a unit, can also be integrated in one unit with two or more units;It is above-mentioned
Integrated unit both can take the form of hardware realization, can also realize in the form of hardware adds SFU software functional unit.
Those of ordinary skill in the art will appreciate that: realize that all or part of the steps of above method embodiment can pass through
The relevant hardware of program instruction is completed, and program above-mentioned can be stored in a computer readable storage medium, the program
When being executed, step including the steps of the foregoing method embodiments is executed;And storage medium above-mentioned include: movable storage device, it is read-only
Memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disk or
The various media that can store program code such as person's CD.
If alternatively, the above-mentioned integrated unit of the present invention is realized in the form of software function module and as independent product
When selling or using, it also can store in a computer readable storage medium.Based on this understanding, the present invention is implemented
Substantially the part that contributes to existing technology can be embodied in the form of software products the technical solution of example in other words,
The computer software product is stored in a storage medium, including some instructions are used so that computer equipment (can be with
It is personal computer, server or network equipment etc.) execute all or part of each embodiment the method for the present invention.
And storage medium above-mentioned includes: that movable storage device, ROM, RAM, magnetic or disk etc. are various can store program code
Medium.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any
Those familiar with the art in the technical scope disclosed by the present invention, can easily think of the change or the replacement, and should all contain
Lid is within protection scope of the present invention.Therefore, protection scope of the present invention should be based on the protection scope of the described claims.
Claims (10)
1. a kind of information processing method, comprising:
First event is detected, the first event is characterized as at least one privilege feature and is called or accesses, the privilege feature
For the acquisition to restricted information;
Record first event;
It generates prompt information and exports the prompt information, the prompt information is at least used to remind at least one described permission function
It can be called or access.
2. the method according to claim 1, wherein the method also includes:
The application of the privilege feature is called or is accessed in detection, wherein the application is the non-application for authorizing operation.
3. the method according to claim 1, wherein the privilege feature is to be awarded to allow called or visit
The permission asked.
4. method according to any one of claims 1 to 3, which is characterized in that the method also includes:
The privilege feature can call specific functional component, and the functional component is information collection component;
Alternatively,
The privilege feature is able to access that preset memory space or file.
5. according to the method described in claim 4, it is characterized in that, the method also includes:
The prompt information is at least also used to prompt to call or access the application message of the privilege feature;And/or the prompt
Information is at least also used to prompt the privilege feature called or the temporal information of access.
6. a kind of electronic equipment, comprising:
Processing component, for detecting first event, the first event is characterized as at least one privilege feature and is called or accesses,
The privilege feature is for the acquisition to restricted information;First event is recorded into storage assembly;Generate prompt information;
Output precision, for exporting the prompt information, the prompt information is at least used to remind at least one described permission function
It can be called or access.
7. electronic equipment according to claim 6, which is characterized in that the processing component is also used to:
The application of the privilege feature is called or is accessed in detection, wherein the application is the non-application for authorizing operation.
8. electronic equipment according to claim 6, which is characterized in that the privilege feature is to be awarded to allow to be called
Or the permission of access.
9. according to the described in any item electronic equipments of claim 6 to 8, which is characterized in that
The privilege feature can call specific functional component, and the functional component is information collection component;
Alternatively,
The privilege feature is able to access that preset memory space or file.
10. electronic equipment according to claim 9, which is characterized in that
The output precision, the prompt information for output are at least also used to prompt to call or access the application of the privilege feature
Information;And/or the prompt information is at least also used to prompt the privilege feature called or the temporal information of access.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811574283.5A CN109670293A (en) | 2018-12-21 | 2018-12-21 | Information processing method and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811574283.5A CN109670293A (en) | 2018-12-21 | 2018-12-21 | Information processing method and electronic equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109670293A true CN109670293A (en) | 2019-04-23 |
Family
ID=66147053
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811574283.5A Pending CN109670293A (en) | 2018-12-21 | 2018-12-21 | Information processing method and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109670293A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111309208A (en) * | 2020-02-07 | 2020-06-19 | 维沃移动通信有限公司 | File protection method and electronic equipment |
CN112929484A (en) * | 2021-02-02 | 2021-06-08 | 维沃移动通信(杭州)有限公司 | Notification message reminding method, notification message reminding device and electronic equipment |
CN113542603A (en) * | 2021-07-13 | 2021-10-22 | 上海福赛梦扬科技有限公司 | Camera operation prompt processing method and device |
CN113676440A (en) * | 2020-05-15 | 2021-11-19 | 华为技术有限公司 | Authority negotiation method and device in communication process and electronic equipment |
EP4138357A4 (en) * | 2020-05-15 | 2023-10-18 | Huawei Technologies Co., Ltd. | Method and device for negotiating permission during communication process, and electronic apparatus |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8381283B2 (en) * | 2007-11-28 | 2013-02-19 | Renesas Electronics Corporation | Information processing apparatus and method of controlling program execution of same |
CN103927474A (en) * | 2014-04-01 | 2014-07-16 | 可牛网络技术(北京)有限公司 | Method and device for monitoring application programs |
CN104021062A (en) * | 2013-03-01 | 2014-09-03 | 联想(北京)有限公司 | Information processing method and electronic device |
-
2018
- 2018-12-21 CN CN201811574283.5A patent/CN109670293A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8381283B2 (en) * | 2007-11-28 | 2013-02-19 | Renesas Electronics Corporation | Information processing apparatus and method of controlling program execution of same |
CN104021062A (en) * | 2013-03-01 | 2014-09-03 | 联想(北京)有限公司 | Information processing method and electronic device |
CN103927474A (en) * | 2014-04-01 | 2014-07-16 | 可牛网络技术(北京)有限公司 | Method and device for monitoring application programs |
Non-Patent Citations (2)
Title |
---|
ESRI中国(北京)有限公司: "《2011第九届ESRI中国用户大全论文集》", 30 September 2011, 测绘出版社 * |
LAWRENCE HARTE等著,粟欣,肖立民译: "《蜂窝及个人通信系统中的CDMA IS-95—技术、运营和业务》", 30 September 2001, 人民邮电出版社 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111309208A (en) * | 2020-02-07 | 2020-06-19 | 维沃移动通信有限公司 | File protection method and electronic equipment |
CN113676440A (en) * | 2020-05-15 | 2021-11-19 | 华为技术有限公司 | Authority negotiation method and device in communication process and electronic equipment |
EP4138357A4 (en) * | 2020-05-15 | 2023-10-18 | Huawei Technologies Co., Ltd. | Method and device for negotiating permission during communication process, and electronic apparatus |
CN112929484A (en) * | 2021-02-02 | 2021-06-08 | 维沃移动通信(杭州)有限公司 | Notification message reminding method, notification message reminding device and electronic equipment |
CN113542603A (en) * | 2021-07-13 | 2021-10-22 | 上海福赛梦扬科技有限公司 | Camera operation prompt processing method and device |
CN113542603B (en) * | 2021-07-13 | 2024-01-23 | 上海福赛梦扬科技有限公司 | Camera operation prompt processing method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109670293A (en) | Information processing method and electronic equipment | |
CN104765552B (en) | Right management method and device | |
US9294568B2 (en) | Providing electronic content to residents of controlled-environment facilities | |
US20070155418A1 (en) | Expandable functions for cellular phones | |
CN104933351B (en) | The treating method and apparatus of information security | |
CN109416645A (en) | Shared user's context and preference | |
CN105574378A (en) | Terminal control method and terminal control device | |
CN109145560A (en) | The method and device of accessing monitoring equipment | |
KR20050045883A (en) | Content sharing system, content processing apparatus, information processing apparatus, program, recording medium, and content sharing method | |
CN103023649A (en) | Method, device and equipment for protecting privacy information | |
CN106203167A (en) | Application rights management method and device | |
WO2022078108A1 (en) | Method and apparatus for monitoring permission use, device, and storage medium | |
CN107767133B (en) | Virtual card opening method, device and system and storage medium | |
CN106203125A (en) | Operating system and safety detection method, safety detection device and terminal | |
CN106339870A (en) | Resource transfer method and device | |
CN106204011A (en) | NFC payment and device | |
CN100593786C (en) | Sytem and method for providing access to OMA DRM protected files from JAVA applications | |
CN106557679A (en) | Terminal control method and device | |
CN105975876A (en) | File sharing method and device | |
CN110111460A (en) | Visitor's method, apparatus and readable storage medium storing program for executing | |
CN106600768A (en) | Intelligent door lock authentication method, device and terminal | |
CN112784262A (en) | Data access method, device, terminal and storage medium | |
CN109697632A (en) | Advertisement access method, device, equipment and storage medium | |
CN109801065A (en) | Virtual card opens chucking method, apparatus and system, storage medium | |
CN114244598B (en) | Intranet data access control method, device, equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190423 |