CN109670293A - Information processing method and electronic equipment - Google Patents

Information processing method and electronic equipment Download PDF

Info

Publication number
CN109670293A
CN109670293A CN201811574283.5A CN201811574283A CN109670293A CN 109670293 A CN109670293 A CN 109670293A CN 201811574283 A CN201811574283 A CN 201811574283A CN 109670293 A CN109670293 A CN 109670293A
Authority
CN
China
Prior art keywords
information
privilege feature
called
application
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811574283.5A
Other languages
Chinese (zh)
Inventor
刘晓军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN201811574283.5A priority Critical patent/CN109670293A/en
Publication of CN109670293A publication Critical patent/CN109670293A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the present invention discloses a kind of information processing method and electronic equipment, wherein the described method includes: detection first event, the first event is characterized as that at least one privilege feature is called or access, and the privilege feature is for the acquisition to restricted information;Record first event;It generates prompt information and exports the prompt information, the prompt information is at least used to remind at least one described privilege feature called or access.

Description

Information processing method and electronic equipment
Technical field
This application involves the information processing technologies, and in particular to a kind of information processing method and electronic equipment.
Background technique
Electronic equipment makes itself function more powerful due to being equipped with the application of different function, and many applications, which have, to be obtained Take, collect the ability of information.Currently, the phenomenon that using stealthily calling without permission or accessing certain privilege features of electronic equipment It is generally existing.Even if electronic equipment is allowed to that rights management can be carried out to application, but is also in application installation, inquiry is used Whether family allows to authorize the privilege features such as application recording, video recording, positioning, is receiving what selection was used or was forbidden to use After operation, the operation of electronic equipment response user allows or forbids this using these privilege features.Wherein, for being awarded Allow using situation, user is not intended to the application and authorization invocation or accesses these power at any time, under any scene Limit function.It is usually present electronic equipment and/or user in practice and is unaware of when these privilege features are used, especially exists It is nonessential calling or access authority function scene in stealthily call and caused by user lose situation so that privacy of user pacify It is on the hazard entirely.
Although in the related art, application need call or access some/a little privilege features when, can pass through inquiry use Whether family allows the mode called or accessed that user is enabled to know when permission is used, but this mode repeatedly inquired It can not equally determine whether there is and have permission the case where function is stealthily called or accessed.
Summary of the invention
To solve existing technical problem, the embodiment of the present invention provides a kind of information processing method and electronic equipment, The personal secrets that at least can be avoided user are on the hazard, and ensure the safety of user privacy information, and that improves user uses body It tests.
The technical solution of the embodiment of the present invention is achieved in that
The embodiment of the present invention provides a kind of information processing method, comprising:
First event is detected, the first event is characterized as at least one privilege feature and is called or accesses, the permission Function is for the acquisition to restricted information;
Record first event;
It generates prompt information and exports the prompt information, the prompt information is at least used to remind at least one described power Function is limited to be called or access.
In above scheme, the method also includes:
The application of the privilege feature is called or is accessed in detection, wherein the application is the non-application for authorizing operation.
In above scheme, the privilege feature is to be awarded to allow permission that is called or accessing.
In above scheme, the method also includes:
The privilege feature can call specific functional component, and the functional component is information collection component;
Alternatively,
The privilege feature is able to access that preset memory space or file.
In above scheme, the method also includes:
The prompt information is at least also used to prompt to call or access the application message of the privilege feature;And/or it is described Prompt information is at least also used to prompt the privilege feature called or the temporal information of access.
The embodiment of the present invention also provides a kind of electronic equipment, comprising:
Processing component, for detecting first event, the first event be characterized as at least one privilege feature it is called or Access, the privilege feature is for the acquisition to restricted information;First event is recorded into storage assembly;Generate prompt information;
Output precision, for exporting the prompt information, the prompt information is at least used to remind at least one described power Function is limited to be called or access.
In above scheme, the processing component is also used to:
The application of the privilege feature is called or is accessed in detection, wherein the application is the non-application for authorizing operation.
In above scheme, the privilege feature is to be awarded to allow permission that is called or accessing.
In above scheme,
The privilege feature can call specific functional component, and the functional component is information collection component;
Alternatively,
The privilege feature is able to access that preset memory space or file.
In above scheme,
The output precision, the prompt information for output are at least also used to prompt to call or access the privilege feature Application message;And/or the prompt information is at least also used to prompt the privilege feature called or the temporal information of access.
Electronic equipment in this programme is able to detect called privilege feature or access and is carried out based on the event detected The output of prompt information, be at least able to detect that the privilege feature stealthily called and export certain prompt information to Family is reminded, and the personal secrets due to that can not know user caused by which privilege feature is stealthily called are solved at least The problem of being on the hazard ensures the safety of user privacy information, improves the usage experience of user.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The embodiment of invention for those of ordinary skill in the art without creative efforts, can also basis The attached drawing of offer obtains other attached drawings.
Fig. 1 is the implementation process schematic diagram of the first embodiment of information processing method provided by the invention;
Fig. 2 is the implementation process schematic diagram of the second embodiment of information processing method provided by the invention;
Fig. 3 (a) (b) is the flexible schematic diagram of an information collection component of the electronic equipment of the embodiment of the present invention;
Fig. 4 is one schematic diagram of application scenarios of the embodiment of the present invention;
Fig. 5 is two schematic diagram of application scenarios of the embodiment of the present invention;
Fig. 6 is the composed structure schematic diagram one of the electronic equipment of the embodiment of the present invention;
Fig. 7 is the composed structure schematic diagram two of the electronic equipment of the embodiment of the present invention.
Specific embodiment
For the purposes, technical schemes and advantages of the application are more clearly understood, below in conjunction in the embodiment of the present invention Attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is only It is a part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, ordinary skill people Member's every other embodiment obtained without making creative work, shall fall within the protection scope of the present invention.? In the case where not conflicting, the features in the embodiments and the embodiments of the present application can mutual any combination.In the process of attached drawing The step of illustrating can execute in a computer system such as a set of computer executable instructions.Although also, in process Logical order is shown in figure, but in some cases, it can be to be different from shown or described by sequence execution herein Step.
Those skilled in the art should and know, the electronic equipment being related in the following embodiment of the application can be any Electronic equipment, such as: industrial control computer, personal computer various types computer, integral computer, laptop, Tablet computer, mobile phone, electronic reader etc. can also be the wearable devices such as smart glasses, smart watches, intelligent shoe.This Shen It please preferred electronic equipment be mobile phone in embodiment.
In view of in practical applications, image or photo as obtained by taking pictures, the audio as obtained by recording are obtained by video recording Video, such as logical as localization function module user's geographical location information as obtained by global positioning system (GPS), Affiliates List News record list, userspersonal information and user's payment information have certain private nature, not square under certain application scenarios Just it reveals to non-user, the information as above with private nature is considered as restricted information in this programme.Wherein, individual subscriber Information may include logging in or opening with user to apply the information such as used user name, account, password, fingerprint, facial image. User's payment information includes that the payment account, payment cipher, pay mark used when realizing payment function such as pays two dimensional code Information.Electronic equipment in this programme has at least one privilege feature, privilege feature is called or access can be considered as to The reading and/or use of upper various restricted informations;Such as it is recorded using recording device to the call of user, with reading user Manage location information, read address list list etc..Restricted information and privilege feature in this programme further include that other any can think The appropriate message arrived, is not limited to the above.
The implementation process schematic diagram of the first embodiment of information processing method provided by the invention;As shown in Figure 1, the side Method includes:
Step 101: detection first event, the first event are characterized as at least one privilege feature and are called or access, The privilege feature is for the acquisition to restricted information;
Step 102: record first event;
Step 103: generate prompt information and simultaneously export the prompt information, the prompt information be at least used to reminding it is described extremely A few privilege feature is called or accesses.
The main body for executing step 101~103 is electronic equipment.Electronic equipment in this programme is able to detect that privilege feature Called or access event simultaneously records this event, generate prompt information based on the event detected and exports prompt information, The case where to remind consumer electronic devices that there are access and/or restriction informations.It can be seen that the electronics in this programme is set The standby output for being able to detect called privilege feature or access and prompt information is carried out based on the event detected, can at least examine Measure the privilege feature stealthily called and export certain prompt information reminding user, solve at least due to It can not know the problem of personal secrets of user caused by which privilege feature is stealthily called are on the hazard, ensure that user is hidden The safety of personal letter breath, improves the usage experience of user.
The implementation process schematic diagram of the second embodiment of information processing method provided by the invention;As shown in Fig. 2, the side Method includes:
Step 201: detection first event, the first event are characterized as at least one privilege feature and are called or access, The privilege feature is for the acquisition to restricted information;
Step 202: the application of the privilege feature is called or is accessed in detection, wherein the application authorizes answering for operation to be non- With;
Step 203: the application message of record first event and calling or the access privilege feature;
Here, application message is the information of any application that can show that calling or the access privilege feature, is such as applied Title, using the mark of corresponding icon.
Step 204: generate prompt information and simultaneously export the prompt information, the prompt information be at least used to reminding it is described extremely A few privilege feature is called or accesses and the application message for prompting calling or accessing the privilege feature.
The main body for executing step 201~204 is electronic equipment.Wherein, step 201 and 202 is without strict sequence, step Rapid 201 and 202 can also carry out simultaneously.
Electronic equipment in this programme is able to detect that privilege feature is called or accesses this event and detects tune With or access authority function application, and the application message of this event and calling or access authority function is recorded, based on detection To event generate prompt information and export for remind consumer electronic devices there are access and/or restriction information feelings Condition and the restricted information being accessed or called by which/prompt information that is accessed or called of a little applications.It can be seen that our It is at least able to detect that the privilege feature stealthily called and calling in case or accesses the application of the privilege feature and exports certain Prompt information to remind user, solve at least due to that can not know which privilege feature is stealthily called and is led The problem of personal secrets of the user of cause are on the hazard ensures the safety of user privacy information, improves the usage experience of user.
In an alternative embodiment, the privilege feature in this programme can call specific functional component, the function Energy component is information collection component.Privilege feature in this programme is by calling specific information collection component to execute to limitation The acquisition of information.For example, by calling photographic device (information collection component) such as camera to be acquired the image of user To the photo or video of user;By calling recording device (information collection component) such as microphone to be acquired the audio of user And obtain the audio file of relevant user;By calling localization function module (information collection component) such as GPS to be positioned to obtain The location information of user.Namely the privilege feature in this programme is by calling specific functional component to realize to restricted information Obtain, in the related technology only by way of being read out to restricted information and obtaining restricted information compared with so that electronics is set Standby component resource (information collection component) is fully utilized.
In above scheme, for privilege feature by calling specific functional component to realize the acquisition to restricted information Situation.It can be the component that can generate movement with setting information acquisition component in this programme, as electronic equipment is based on detecting Privilege feature and the prompt information that exports can be and be risen by information collection component along the movement of scheduled motion profile To reminding effect, the electronic equipment to remind user current is stealthily calling or access authority function.Namely the application is real It applies in example, output prompt information is only indicated with the movement of information collection component.For example, camera shooting is set in this programme Device such as camera is the camera with scalability, and as shown in Fig. 3 (a), camera is located at electronic equipment under normal circumstances The back side, electronic equipment stealthily call camera carry out Image Acquisition when, specific length is stretched out from the back side and is made Camera is no longer on the back side as shown in Fig. 3 (b).The electronic equipment that this extending action of camera can remind user current The acquisition of image is stealthily being carried out using camera.This movement by information collection component issues the user with prompt letter The mode of breath, so that prompt information is more novel, the experience of user is more preferably.It should be noted that electricity shown in Fig. 3 (a), (b) The composition form of sub- equipment is only a kind of specifically distance, is not limited to all groups of formings of the electronic equipment of the application State.
In an alternative embodiment, the privilege feature in this programme is able to access that preset memory space or file. Electronic equipment in this programme is that the storage of user's private information opens certain memory space or establishes certain file. The file of the memory space or foundation opened up can be used for storing the private information of user, apply institute as user logs in or opens The userspersonal informations such as the user name, account, password, fingerprint, the facial image that use;It is used when realizing payment function for storing Payment account, payment cipher, pay mark such as pay two dimensional code user's payment information.This privilege feature will read storage When information in private information memory space or file, needs first with pre-set encryption information such as Crypted password, refers to The memory space or file that the access such as line and/or image recognition are specially arranged are deposited in successful access (encryption information input is correct) The information of storage is read in the case where storage space or file again.If electronic equipment has carried out reading stealthily to these private informations It takes, then the side of the privilege feature that the detection of the embodiment of the present application is stealthily called or accessed and in time generation and output prompt information Case can substantially reduce the risk that user's private information is compromised, and further solve the problems, such as that the personal secrets of user are on the hazard, The safety for ensureing user privacy information, improves the usage experience of user.
To be different from the relevant technologies, the application of the calling detected or access authority function in this programme authorizes fortune to be non- Capable application.It is believed that non-in this programme authorize operation application can be not based on user unlatching wish and by User's application that actively triggering is opened, it is believed that be the application that electronic equipment is stealthily opened and run, actually electronic equipment User be not intended to the application to be run also not know that the application has been turned on and runs.Non- in this programme authorizes operation Using can also be that user wishes that it closes but be not successfully closed application still in operation, for example, user forget to close and Application that the backstage of electronic equipment is stealthily run, user executed shutoff operation but for some reason such as software upgrading and The application not being closed successfully.In this case, it is believed that not only can detecte the power stealthily called in this programme Function is limited, can also detect the application for stealthily being opened simultaneously (still/continuation) operation by electronic equipment, i.e., this detection method can With detect stealthily opened by electronic equipment and run and stealthily call or access authority function application be which kind of application and Which kind of privilege feature the privilege feature that the application is stealthily called or accessed is, to remind user which by electronic equipment open simultaneously Which kind of privilege feature the application of (still/continuation) operation stealthily has invoked.
In an optional scheme, the privilege feature, which can be to be awarded, allows permission that is called or accessing. Called or access the privilege feature detected in this programme can be the permission having allowed for using calling or accessing, I.e. privilege feature is not the privilege feature for stealthily calling or accessing, but the privilege feature for rationally being called or being accessed.For example, In installation in application, user allows this using a privilege feature such as sound-recording function, then the application is opened and is run The application rationally can call or access the privilege feature in the process, and the electronic equipment in this programme not only can be to stealthily calling Privilege feature detected, additionally it is possible to detect the privilege feature for rationally being called or being accessed and export prompt information, to The privilege feature that all permissions function-that prompt user's current electronic device is called or accessed stealthily is called and rationally called. It will be understood by those skilled in the art that not only can detecte the privilege feature for stealthily calling or accessing in this programme, additionally it is possible to Detect by user allow call or access permission, based on detect by user allowed call or access This event of permission and the scheme for exporting prompt information at least enable to user to know the permission for being allowed to call or access Under which kind of application scenarios, when called or access, and be allowed to the permission called or accessed at this time called or Whether access reasonable.
For the prompt information of electronic equipment output, user can according to circumstances carry out alignment processing, for example, for stealthily The recording privilege feature of calling, user can execute delete operation to the recording file that gets off stealthily is recorded, thus avoid due to The problem of personal secrets of user are on the hazard caused by privilege feature is stealthily called.For the permission function rationally called Can, the output of prompt information may make that user clearly knows when privilege feature is being used, made under which kind of application With, and call or access it is whether reasonable, substantially increase the usage experience of user.
In an optional scheme, step 204 can be with are as follows: the prompt information is at least used to remind described at least one A privilege feature is called or access, prompt are called or accessed the application message of the privilege feature and/or prompt the permission Function is called or the temporal information of access.
It is appreciated that the name of the identification information such as privilege feature of the exportable privilege feature for being called or accessing of electronic equipment Claim;The temporal information that electronic equipment is exported is used to remind user right function called or the time of access;What is exported answers The privilege feature for information being used to that user to be reminded currently to be called or access by which/a little application is called or accesses.It is optional , electronic equipment can carry out the output of information above according to the form of table 1, and with the 2nd behavior example in table 1, electronic equipment institute is defeated Prompt information out is to remind user within 8:00~08:15 this period in the morning on December 19th, 2018, using-webpage A Recording device is stealthily had invoked, is recorded to the message registration of user in this period.It is appreciated that shape shown in table 1 Formula is only a kind of concrete example, is not limited to all modes that this programme is covered.
Table 1
It should be appreciated by those skilled in the art that the output information in this programme exports in real time, that is, detecting the presence of It is exported at once when having the privilege feature stealthily called, the risk being compromised with reduction user's private information of maximum possible.
It, can also be with it is appreciated that the prompt information in this programme is in form as above other than it can be exported The mode of any reasonable visual feedback, audio feedback or audiovisual feedback composition is exported.For example, believing on electronic equipment Signal lamp is lighted, the flashing of signal lamp, issues vebrato, issues and remind at least one of prompting modes such as sound.In this programme Prompt information at least user can be accomplished to remind in a manner of vision and/or the sense of hearing.Prompting mode in this programme can be with It is any reasonable manner, does not do and enumerate one by one.It is, of course, also possible to will be combined and be used for upper type and information collection component User is prompted, for example, sending vebrato and triggering camera are as schemed monitoring there are when the privilege feature stealthily called 3 (b) stretching.
It, can be with it will be understood by those skilled in the art that prompt information is by electronic equipment other than it can be exported It is exported by the other equipment such as smartwatch, bracelet etc. being communicatively coupled with electronic equipment, user can be made from more A output pathway carries out knowing for prompt information, and user experience is obviously improved.Smartwatch, bracelet etc. are to the defeated of prompt information Mode is as previously mentioned, no longer describe out.
The possible more than one of quantity in view of detecting the privilege feature for stealthily calling or accessing, in response to this, Different prompting modes is preset for different privilege features, so that each privilege feature is with the progress of respective prompting mode The output of prompt information, this scheme that different prompting modes are arranged for different rights function can help user's differentiation stealthily to call Or which kind of privilege feature each privilege feature of access is all.
It is believed that above scheme be to the process that is monitored of application, monitor which/which kind of power an application stealthily call Function is limited, it should be appreciated by those skilled in the art that for convenience of the monitoring to all applications, it can be in application programming interface (API) monitoring function is executed at, and monitored results (first event) are recorded in service (Service), until there is inquiry to need Monitored results are called when asking into service.
A application (the mesh for inquiry prompt information is specially developed in this programme for convenience of the access to prompt information Mark applies APP), which, can also be from the APP by calling the content in the service of being recorded that can carry out the access of prompt information It is middle to delete the prompt information being recorded in service.In view of the safety that prompt information is consulted, the API of the APP is set not It is open, so that the function of the APP is not easy to be tampered.
It is specifically described below with reference to technical solution of several application scenarios to the embodiment of the present application.
In an application scenarios, as shown in figure 4, the user with electronic equipment is conversed using phone application and other side For, the further phone application using electronic equipment carries out for voice communication.Those skilled in the art should and know, this Electronic equipment in scheme has the function of monitoring whether to exist the permission by application calling or access, can real-time perfoming monitoring It (booting and non-locking screen state) can be monitored, can also be touched based on the active of user during electronic equipment is by use Hair enables the operation of monitoring function and enables the monitoring function, flexibly sets depending on concrete application situation.By taking real time monitoring as an example, Electronic equipment monitoring, with the presence or absence of called or access privilege feature, is set in the communication process of user once monitoring electronics The standby privilege feature that there is calling or access just records the event (first event), generates prompt information and simultaneously exports prompt Information, to remind user's current electronic device calling or accessing some privilege feature.For example, the electronic equipment in communication process Monitoring phone application is calling recording device to record the dialog context, records this event and calls recording device The mark of phone application generates prompt information based on this event and exports prompt information, which makes electronic equipment User know that sound-recording function (privilege feature) is stealthily had invoked by phone application, the dialog context has been stolen the system of using a hidden recorder and has got off. User deletes recording substance and closes recording device, to prevent dialog context to be compromised, greatly reduces user privacy information quilt The risk of leakage.
In another application scene, as shown in figure 5, being ridden the scene that shared bicycle travels with the user of electronic equipment For,
User, which enables, applies 1, and enters shared to scan using 1 " sweep and sweep " function interface enabling " sweep and sweep " function Two dimensional code on bicycle is so that the lock of shared bicycle is opened, and electronic equipment is in real time to the presence or absence of called or access Privilege feature is monitored, it is assumed that obtains the riding track (first of user by calling GPS using 1 during scanning Event), then electronic equipment records the event and calls the mark of the application 1 of GPS, generate prompt letter when monitoring the event The output of prompt information is ceased and carries out with output form shown in table 1, to remind the riding track (itinerary) of user itself It is positioned in real time.User closes freely to enjoy a people and rides using 1 and GPS to prevent other people from knowing the itinerary of oneself Vehicle is travelled happy, to greatly promote the use feeling of user.
By above scheme it is found that in the embodiment of the present application, it is at least able to detect that the privilege feature stealthily called and defeated Certain prompt information is solved at least to remind user due to that can not know which privilege feature is stealthily adjusted out The problem of personal secrets of user are on the hazard caused by ensures the safety of user privacy information, improves making for user With experience.
The present invention provides the embodiment of a kind of electronic equipment, as shown in fig. 6, the electronic equipment includes: processing component 601, storage assembly 602 and output precision 603;Wherein,
Processing component 601, for detecting first event, it is called that the first event is characterized as at least one privilege feature Or access, the privilege feature is for the acquisition to restricted information;First event is recorded into storage assembly 602;Generate prompt Information;
Output precision 603, for exporting the prompt information, the prompt information be at least used to reminding it is described at least one Privilege feature is called or accesses.
In an alternative embodiment, the processing component 601, is also used to:
The application of the privilege feature is called or is accessed in detection, wherein the application is the non-application for authorizing operation.
In an alternative embodiment, the privilege feature is to be awarded to allow permission that is called or accessing.
In an alternative embodiment, the privilege feature can call specific functional component, the functional component For information collection component;Alternatively, the privilege feature is able to access that preset memory space or file.
In an alternative embodiment, the output precision 603, the prompt information for output are at least also used to prompt Call or access the application message of the privilege feature;And/or the prompt information is at least also used to prompt the privilege feature Called or access temporal information.
Processing component 601 above-mentioned can processor as shown in Figure 7 realize;Storage assembly 602 above-mentioned can be by Storage medium 702 shown in Fig. 7 is realized;Output precision 603 above-mentioned can audio output unit as shown in Figure 7 and display Screen is to realize.
The electronic equipment of the embodiment of the present invention can be as shown in fig. 7, electronic equipment 700 includes: at least one processor 701, storage medium 702, at least one network interface 704, user interface 703, audio output unit 706 such as loudspeaker and display screen 707.Various components in electronic equipment 700 are coupled by bus system 705.It is understood that bus system 705 is for real Connection communication between these existing components.Bus system 705 further includes power bus, controls always in addition to including data/address bus Line and status signal bus in addition.But for the sake of clear explanation, various buses are all designated as bus system 705 in Fig. 7.
Wherein, user interface 703 may include display, keyboard, mouse, trace ball, click wheel, key, button, sense of touch Plate or touch screen etc..
It is appreciated that storage medium 702 can be volatile memory or nonvolatile memory, volatibility may also comprise Both with nonvolatile memory.Wherein, nonvolatile memory can be read-only memory (ROM, Read Only Memory), programmable read only memory (PROM, Programmable Read-Only Memory), erasable programmable are read-only Memory (EPROM, Erasable Programmable Read-Only Memory), electrically erasable programmable read-only memory The storage of (EEPROM, Electrically Erasable Programmable Read-Only Memory), magnetic random access Device (FRAM, ferromagnetic random access memory), flash memory (Flash Memory), magnetic surface are deposited Reservoir, CD or CD-ROM (CD-ROM, Compact Disc Read-Only Memory);Magnetic surface storage can be Magnetic disk storage or magnetic tape storage.Volatile memory can be random access memory (RAM, Random Access Memory), it is used as External Cache.By exemplary but be not restricted explanation, the RAM of many forms is available, such as Static random access memory (SRAM, Static Random Access Memory), synchronous static random access memory (SSRAM, Synchronous Static Random Access Memory), dynamic random access memory (DRAM, Dynamic Random Access Memory), Synchronous Dynamic Random Access Memory (SDRAM, Synchronous Dynamic Random Access Memory), double data speed synchronous dynamic RAM (DDRSDRAM, Double Data Rate Synchronous Dynamic Random Access Memory), enhanced synchronous dynamic random Access memory (ESDRAM, Enhanced Synchronous Dynamic Random Access Memory), synchronized links Dynamic random access memory (SLDRAM, SyncLink Dynamic Random Access Memory), direct rambus Random access memory (DRRAM, Direct Rambus Random Access Memory).Description of the embodiment of the present invention is deposited Storage media 702 is intended to include but is not limited to the memory of these and any other suitable type.
Storage medium 702 in the embodiment of the present invention is for storing various types of data to support electronic equipment 700 Operation.The example of these data includes: any computer program for operating on electronic equipment 700, such as operating system 7021 and application program 7022.Wherein, operating system 7021 includes various system programs, such as ccf layer, core library layer, driving Layer etc., for realizing various basic businesses and the hardware based task of processing.Application program 7022 may include various applications Program, such as media player (Media Player), browser (Browser) etc., for realizing various applied business.It realizes The program of present invention method may be embodied in application program 7022.
The method that the embodiments of the present invention disclose can be applied in processor 701, or be realized by processor 701. Processor 701 may be a kind of IC chip, the processing capacity with signal.During realization, the above method it is each Step can be completed by the integrated logic circuit of the hardware in processor 701 or the instruction of software form.Above-mentioned processing Device 701 can be general processor, digital signal processor (DSP, Digital Signal Processor) or other can Programmed logic device, discrete gate or transistor logic, discrete hardware components etc..Processor 701 may be implemented or hold Disclosed each method, step and logic diagram in the row embodiment of the present invention.General processor can be microprocessor or appoint What conventional processor etc..The step of method in conjunction with disclosed in the embodiment of the present invention, can be embodied directly at hardware decoding Reason device executes completion, or in decoding processor hardware and software module combine and execute completion.Software module can be located at In storage medium, which is located at storage medium 702, and processor 701 reads the information in storage medium 702, in conjunction with it Hardware completes the step of preceding method.
The embodiment of the present application also provides a kind of storage medium, and the storage medium can be the storage medium 702 in Fig. 7, For storing computer program, which, which is performed, executes information processing method above-mentioned, it is further execute with Lower operation:
First event is detected, the first event is characterized as at least one privilege feature and is called or accesses, the permission Function is for the acquisition to restricted information;
Record first event;
It generates prompt information and exports the prompt information, the prompt information is at least used to remind at least one described power Function is limited to be called or access.
It should be noted that the electronic equipment of the embodiment of the present invention, the principle solved the problems, such as due to the electronic equipment is with before The information processing method stated is similar, and therefore, the implementation process and implementation principle of electronic equipment may refer to aforementioned information processing The implementation process and implementation principle of method describe, and overlaps will not be repeated.
In several embodiments provided herein, it should be understood that disclosed device and method can pass through it Its mode is realized.Apparatus embodiments described above are merely indicative, for example, the division of the unit, only A kind of logical function partition, there may be another division manner in actual implementation, such as: multiple units or components can combine, or It is desirably integrated into another system, or some features can be ignored or not executed.In addition, shown or discussed each composition portion Mutual coupling or direct-coupling or communication connection is divided to can be through some interfaces, the INDIRECT COUPLING of equipment or unit Or communication connection, it can be electrical, mechanical or other forms.
Above-mentioned unit as illustrated by the separation member, which can be or may not be, to be physically separated, aobvious as unit The component shown can be or may not be physical unit, it can and it is in one place, it may be distributed over multiple network lists In member;Some or all of units can be selected to achieve the purpose of the solution of this embodiment according to the actual needs.
In addition, each functional unit in various embodiments of the present invention can be fully integrated in one processing unit, it can also To be each unit individually as a unit, can also be integrated in one unit with two or more units;It is above-mentioned Integrated unit both can take the form of hardware realization, can also realize in the form of hardware adds SFU software functional unit.
Those of ordinary skill in the art will appreciate that: realize that all or part of the steps of above method embodiment can pass through The relevant hardware of program instruction is completed, and program above-mentioned can be stored in a computer readable storage medium, the program When being executed, step including the steps of the foregoing method embodiments is executed;And storage medium above-mentioned include: movable storage device, it is read-only Memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disk or The various media that can store program code such as person's CD.
If alternatively, the above-mentioned integrated unit of the present invention is realized in the form of software function module and as independent product When selling or using, it also can store in a computer readable storage medium.Based on this understanding, the present invention is implemented Substantially the part that contributes to existing technology can be embodied in the form of software products the technical solution of example in other words, The computer software product is stored in a storage medium, including some instructions are used so that computer equipment (can be with It is personal computer, server or network equipment etc.) execute all or part of each embodiment the method for the present invention. And storage medium above-mentioned includes: that movable storage device, ROM, RAM, magnetic or disk etc. are various can store program code Medium.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any Those familiar with the art in the technical scope disclosed by the present invention, can easily think of the change or the replacement, and should all contain Lid is within protection scope of the present invention.Therefore, protection scope of the present invention should be based on the protection scope of the described claims.

Claims (10)

1. a kind of information processing method, comprising:
First event is detected, the first event is characterized as at least one privilege feature and is called or accesses, the privilege feature For the acquisition to restricted information;
Record first event;
It generates prompt information and exports the prompt information, the prompt information is at least used to remind at least one described permission function It can be called or access.
2. the method according to claim 1, wherein the method also includes:
The application of the privilege feature is called or is accessed in detection, wherein the application is the non-application for authorizing operation.
3. the method according to claim 1, wherein the privilege feature is to be awarded to allow called or visit The permission asked.
4. method according to any one of claims 1 to 3, which is characterized in that the method also includes:
The privilege feature can call specific functional component, and the functional component is information collection component;
Alternatively,
The privilege feature is able to access that preset memory space or file.
5. according to the method described in claim 4, it is characterized in that, the method also includes:
The prompt information is at least also used to prompt to call or access the application message of the privilege feature;And/or the prompt Information is at least also used to prompt the privilege feature called or the temporal information of access.
6. a kind of electronic equipment, comprising:
Processing component, for detecting first event, the first event is characterized as at least one privilege feature and is called or accesses, The privilege feature is for the acquisition to restricted information;First event is recorded into storage assembly;Generate prompt information;
Output precision, for exporting the prompt information, the prompt information is at least used to remind at least one described permission function It can be called or access.
7. electronic equipment according to claim 6, which is characterized in that the processing component is also used to:
The application of the privilege feature is called or is accessed in detection, wherein the application is the non-application for authorizing operation.
8. electronic equipment according to claim 6, which is characterized in that the privilege feature is to be awarded to allow to be called Or the permission of access.
9. according to the described in any item electronic equipments of claim 6 to 8, which is characterized in that
The privilege feature can call specific functional component, and the functional component is information collection component;
Alternatively,
The privilege feature is able to access that preset memory space or file.
10. electronic equipment according to claim 9, which is characterized in that
The output precision, the prompt information for output are at least also used to prompt to call or access the application of the privilege feature Information;And/or the prompt information is at least also used to prompt the privilege feature called or the temporal information of access.
CN201811574283.5A 2018-12-21 2018-12-21 Information processing method and electronic equipment Pending CN109670293A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811574283.5A CN109670293A (en) 2018-12-21 2018-12-21 Information processing method and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811574283.5A CN109670293A (en) 2018-12-21 2018-12-21 Information processing method and electronic equipment

Publications (1)

Publication Number Publication Date
CN109670293A true CN109670293A (en) 2019-04-23

Family

ID=66147053

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811574283.5A Pending CN109670293A (en) 2018-12-21 2018-12-21 Information processing method and electronic equipment

Country Status (1)

Country Link
CN (1) CN109670293A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111309208A (en) * 2020-02-07 2020-06-19 维沃移动通信有限公司 File protection method and electronic equipment
CN112929484A (en) * 2021-02-02 2021-06-08 维沃移动通信(杭州)有限公司 Notification message reminding method, notification message reminding device and electronic equipment
CN113542603A (en) * 2021-07-13 2021-10-22 上海福赛梦扬科技有限公司 Camera operation prompt processing method and device
CN113676440A (en) * 2020-05-15 2021-11-19 华为技术有限公司 Authority negotiation method and device in communication process and electronic equipment
EP4138357A4 (en) * 2020-05-15 2023-10-18 Huawei Technologies Co., Ltd. Method and device for negotiating permission during communication process, and electronic apparatus

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8381283B2 (en) * 2007-11-28 2013-02-19 Renesas Electronics Corporation Information processing apparatus and method of controlling program execution of same
CN103927474A (en) * 2014-04-01 2014-07-16 可牛网络技术(北京)有限公司 Method and device for monitoring application programs
CN104021062A (en) * 2013-03-01 2014-09-03 联想(北京)有限公司 Information processing method and electronic device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8381283B2 (en) * 2007-11-28 2013-02-19 Renesas Electronics Corporation Information processing apparatus and method of controlling program execution of same
CN104021062A (en) * 2013-03-01 2014-09-03 联想(北京)有限公司 Information processing method and electronic device
CN103927474A (en) * 2014-04-01 2014-07-16 可牛网络技术(北京)有限公司 Method and device for monitoring application programs

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
ESRI中国(北京)有限公司: "《2011第九届ESRI中国用户大全论文集》", 30 September 2011, 测绘出版社 *
LAWRENCE HARTE等著,粟欣,肖立民译: "《蜂窝及个人通信系统中的CDMA IS-95—技术、运营和业务》", 30 September 2001, 人民邮电出版社 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111309208A (en) * 2020-02-07 2020-06-19 维沃移动通信有限公司 File protection method and electronic equipment
CN113676440A (en) * 2020-05-15 2021-11-19 华为技术有限公司 Authority negotiation method and device in communication process and electronic equipment
EP4138357A4 (en) * 2020-05-15 2023-10-18 Huawei Technologies Co., Ltd. Method and device for negotiating permission during communication process, and electronic apparatus
CN112929484A (en) * 2021-02-02 2021-06-08 维沃移动通信(杭州)有限公司 Notification message reminding method, notification message reminding device and electronic equipment
CN113542603A (en) * 2021-07-13 2021-10-22 上海福赛梦扬科技有限公司 Camera operation prompt processing method and device
CN113542603B (en) * 2021-07-13 2024-01-23 上海福赛梦扬科技有限公司 Camera operation prompt processing method and device

Similar Documents

Publication Publication Date Title
CN109670293A (en) Information processing method and electronic equipment
CN104765552B (en) Right management method and device
US9294568B2 (en) Providing electronic content to residents of controlled-environment facilities
US20070155418A1 (en) Expandable functions for cellular phones
CN104933351B (en) The treating method and apparatus of information security
CN109416645A (en) Shared user's context and preference
CN105574378A (en) Terminal control method and terminal control device
CN109145560A (en) The method and device of accessing monitoring equipment
KR20050045883A (en) Content sharing system, content processing apparatus, information processing apparatus, program, recording medium, and content sharing method
CN103023649A (en) Method, device and equipment for protecting privacy information
CN106203167A (en) Application rights management method and device
WO2022078108A1 (en) Method and apparatus for monitoring permission use, device, and storage medium
CN107767133B (en) Virtual card opening method, device and system and storage medium
CN106203125A (en) Operating system and safety detection method, safety detection device and terminal
CN106339870A (en) Resource transfer method and device
CN106204011A (en) NFC payment and device
CN100593786C (en) Sytem and method for providing access to OMA DRM protected files from JAVA applications
CN106557679A (en) Terminal control method and device
CN105975876A (en) File sharing method and device
CN110111460A (en) Visitor's method, apparatus and readable storage medium storing program for executing
CN106600768A (en) Intelligent door lock authentication method, device and terminal
CN112784262A (en) Data access method, device, terminal and storage medium
CN109697632A (en) Advertisement access method, device, equipment and storage medium
CN109801065A (en) Virtual card opens chucking method, apparatus and system, storage medium
CN114244598B (en) Intranet data access control method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190423