CN109918898A - Method for secret protection and equipment - Google Patents
Method for secret protection and equipment Download PDFInfo
- Publication number
- CN109918898A CN109918898A CN201910195245.7A CN201910195245A CN109918898A CN 109918898 A CN109918898 A CN 109918898A CN 201910195245 A CN201910195245 A CN 201910195245A CN 109918898 A CN109918898 A CN 109918898A
- Authority
- CN
- China
- Prior art keywords
- camera
- microphone
- mobile device
- device end
- equipment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Alarm Systems (AREA)
Abstract
The object of the present invention is to provide a kind of method for secret protection and equipment, and the movement of mic and camera can be monitored and be recorded to privacy protection function through the invention, for evidence to be warned and retained to user.The present invention passes through real-time monitoring and records mic and camera allocating time and calling process, and can store the content of its capture, determines whether privacy violation for user.
Description
Technical field
The present invention relates to computer field more particularly to a kind of method for secret protection and equipment.
Background technique
Universal with electronic equipments such as mobile phones, more and more businessmans or individual obtain number of users by electronic product
According to, or even there is criminal to call microphone (mic) and camera by the way that backstage is secret in the unwitting situation of user
(camera), infringement privacy of user safety.
Existing electronic equipment generally has rights management setting, calls mic to certain application for choosing whether to user
It is authorized with camera.But this authorization not can know that mic and camera allocating time generally and call purpose.
Summary of the invention
It is an object of the present invention to provide a kind of method for secret protection and equipment.
According to an aspect of the invention, there is provided a kind of method for secret protection, this method comprises:
Step S1, the process of monitoring whether start to call the microphone and/or camera of mobile device end,
If so, step S2, what the allocating time of the microphone and/or camera that record mobile device end was called with correspondence
Process title.
Further, in the above method, step S2 records the microphone of mobile device end and/or the allocating time of camera
After being referred to as with the corresponding process name being called, further includes:
Step S3 passes through the wheat during saving the microphone and/or camera that the process calls mobile device end
Gram wind and/or the data of camera capture.
Further, in the above method, step S1, the process of monitoring whether starts to call the microphone of mobile device end
And/or camera, comprising:
Judge whether user opens monitor function, if so,
The process of monitoring whether starts to call the microphone and/or camera of mobile device end;
Step S3 passes through the wheat during saving the microphone and/or camera that the process calls mobile device end
After gram wind and/or the data of camera capture, further includes:
Step S4, judges whether user stops the monitor function,
If so, terminating to exit;
If it is not, then being executed since being repeated step S1.
Further, in the above method, step S3 saves microphone and/or phase that the process calls mobile device end
During machine, after the data captured by the microphone and/or camera, comprising:
The data time limit saved is set.
According to another aspect of the present invention, a kind of secret protection equipment is also provided, wherein the equipment includes:
First device, for monitoring whether that process starts the microphone and/or camera of calling mobile device end, if so,
Record the microphone of mobile device end and/or the allocating time of camera and the corresponding process title being called.
Further, in above equipment, the first device is also used to save the wheat that the process calls mobile device end
During gram wind and/or camera, pass through the data of the microphone and/or camera capture.
Further, in above equipment, the first device, for judging whether user opens monitor function, if so, prison
Whether survey has process to start to call the microphone and/or camera of mobile device end;
The equipment further includes second device, for judging whether user stops the monitor function, if so, terminating to move back
Out;If it is not, then from repeating the first device.
Further, in above equipment, the first device is also used to be arranged the time limit of the data of preservation.
According to another aspect of the present invention, a kind of equipment based on calculating is also provided, wherein include:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the place when executed
Manage device:
Step S1, the process of monitoring whether start to call the microphone and/or camera of mobile device end,
If so, step S2, what the allocating time of the microphone and/or camera that record mobile device end was called with correspondence
Process title.
According to another aspect of the present invention, a kind of computer readable storage medium is also provided, being stored thereon with computer can
It executes instruction, wherein the computer executable instructions make the processor when being executed by processor:
Step S1, the process of monitoring whether start to call the microphone and/or camera of mobile device end,
If so, step S2, what the allocating time of the microphone and/or camera that record mobile device end was called with correspondence
Process title.
Compared with prior art, the dynamic of mic and camera can be monitored and be recorded to privacy protection function through the invention
Make, for evidence to be warned and retained to user.The present invention passes through real-time monitoring and records mic and camera allocating time and tune
It with process, and can store the content of its capture, determine whether privacy violation for user.
Detailed description of the invention
By reading a detailed description of non-restrictive embodiments in the light of the attached drawings below, of the invention other
Feature, objects and advantages will become more apparent upon:
Fig. 1 shows the flow chart of the method for secret protection of one embodiment of the invention.
The same or similar appended drawing reference represents the same or similar component in attached drawing.
Specific embodiment
Present invention is further described in detail with reference to the accompanying drawing.
In a typical configuration of this application, terminal, the equipment of service network and trusted party include one or more
Processor (CPU), input/output interface, network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/or
The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium
Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves
State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable
Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM),
Digital versatile disc (DVD) or other optical storage, magnetic cassettes, magnetic tape disk storage or other magnetic storage devices or
Any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, computer
Readable medium does not include non-temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
As shown in Figure 1, the present invention provides a kind of method for secret protection, which comprises
Step S1, the process of monitoring whether start to call the microphone and/or camera of mobile device end,
If so, step S2, what the allocating time of the microphone and/or camera that record mobile device end was called with correspondence
Process title.
Here, the microphone of mobile terminal and the state of camera can be monitored in real time, when recording the calling of mic and camera
Between and calling process, to warn to user.The present invention by privacy protection function, can monitor and record mic and
The movement of camera, for warning to user.
In one embodiment of method for secret protection of the invention, step S2 records the microphone and/or camera of mobile device end
Allocating time and after the corresponding process name being called is referred to as, further includes:
Step S3 passes through the wheat during saving the microphone and/or camera that the process calls mobile device end
Gram wind and/or the data of camera capture.
Here, privacy protection function through the invention, can monitor and record the movement of mic and camera, for pair
User warns and retains evidence.The present invention passes through real-time monitoring and records mic and camera allocating time and calling process, and
The content that can store its capture, determines whether privacy violation for user.
In one embodiment of method for secret protection of the invention, step S1, the process of having monitored whether starts to call mobile device
The microphone and/or camera at end, comprising:
Judge whether user opens monitor function, if so,
The process of monitoring whether starts to call the microphone and/or camera of mobile device end;
Step S3 passes through the wheat during saving the microphone and/or camera that the process calls mobile device end
After gram wind and/or the data of camera capture, further includes:
Step S4, judges whether user ceases listening for function,
If so, terminating to exit;
If it is not, then being executed since being repeated step S1.
Here, the present invention can open/close this to user at user's space (userspace) by an interface apk
Monitor function.When monitor function is opened, the movement of mic and camera is monitored on backstage, once having using calling, triggering is interrupted,
The either on or off time of mic or camera is recorded, and stores the data of equipment capture.Mic and camera stops after calling, prison
Auditory function continues to be called monitoring to mic and camera, until user deactivates monitor function.
In one embodiment of method for secret protection of the invention, step S3 saves the wheat that the process calls mobile device end
During gram wind and/or camera, after the data captured by the microphone and/or camera, comprising:
The time limit of the data saved is set.
Here, the data volume of capture record may be very huge, it can not unrestricted eternal preservation.It can only be by mentioning
For interface to the time limit of the customized preservation of user, and permanent preservation is separately provided for important data.
According to another aspect of the present invention, a kind of secret protection equipment is also provided, wherein the equipment includes:
First device, for monitoring whether that process starts the microphone and/or camera of calling mobile device end, if so,
Record the microphone of mobile device end and/or the allocating time of camera and the corresponding process title being called.
Here, the microphone of mobile terminal and the state of camera can be monitored in real time, when recording the calling of mic and camera
Between and calling process, to warn to user.The present invention by privacy protection function, can monitor and record mic and
The movement of camera, for warning to user.
Further, in above equipment, the first device is also used to save the wheat that the process calls mobile device end
During gram wind and/or camera, pass through the data of the microphone and/or camera capture.
Here, privacy protection function through the invention, can monitor and record the movement of mic and camera, for pair
User warns and retains evidence.The present invention passes through real-time monitoring and records mic and camera allocating time and calling process, and
The content that can store its capture, determines whether privacy violation for user.
Further, in above equipment, the first device, for judging whether user opens monitor function, if so, prison
Whether survey has process to start to call the microphone and/or camera of mobile device end;
The equipment further includes second device, for judging whether user stops the monitor function, if so, terminating to move back
Out;If it is not, then from repeating the first device.
Here, the present invention can open/close this to user at user's space (userspace) by an interface apk
Monitor function.When monitor function is opened, the movement of mic and camera is monitored on backstage, once having using calling, triggering is interrupted,
The either on or off time of mic or camera is recorded, and stores the data of equipment capture.Mic and camera stops after calling, prison
Auditory function continues to be called monitoring to mic and camera, until user deactivates monitor function.
Further, in above equipment, the first device is also used to be arranged the time limit of the data of preservation.
Here, the data volume of capture record may be very huge, it can not unrestricted eternal preservation.It can only be by mentioning
For interface to the time limit of the customized preservation of user, and permanent preservation is separately provided for important data.
According to another aspect of the present invention, a kind of equipment based on calculating is also provided, wherein include:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the place when executed
Manage device:
Step S1, the process of monitoring whether start to call the microphone and/or camera of mobile device end,
If so, step S2, what the allocating time of the microphone and/or camera that record mobile device end was called with correspondence
Process title.
According to another aspect of the present invention, a kind of computer readable storage medium is also provided, being stored thereon with computer can
It executes instruction, wherein the computer executable instructions make the processor when being executed by processor:
Step S1, the process of monitoring whether start to call the microphone and/or camera of mobile device end,
If so, step S2, what the allocating time of the microphone and/or camera that record mobile device end was called with correspondence
Process title.
Compared with prior art, the dynamic of mic and camera can be monitored and be recorded to privacy protection function through the invention
Make, for evidence to be warned and retained to user.The present invention passes through real-time monitoring and records mic and camera allocating time and tune
It with process, and can store the content of its capture, determine whether privacy violation for user.
The detailed content of each equipment and storage medium embodiment of the invention, for details, reference can be made to the correspondences of each method embodiment
Part, here, repeating no more.
Obviously, those skilled in the art can carry out various modification and variations without departing from the essence of the application to the application
Mind and range.In this way, if these modifications and variations of the application belong to the range of the claim of this application and its equivalent technologies
Within, then the application is also intended to include these modifications and variations.
It should be noted that the present invention can be carried out in the assembly of software and/or software and hardware, for example, can adopt
With specific integrated circuit (ASIC), general purpose computer or any other realized similar to hardware device.In one embodiment
In, software program of the invention can be executed to implement the above steps or functions by processor.Similarly, of the invention
Software program (including relevant data structure) can be stored in computer readable recording medium, for example, RAM memory,
Magnetic or optical driver or floppy disc and similar devices.In addition, some of the steps or functions of the present invention may be implemented in hardware, example
Such as, as the circuit cooperated with processor thereby executing each step or function.
In addition, a part of the invention can be applied to computer program product, such as computer program instructions, when its quilt
When computer executes, by the operation of the computer, it can call or provide according to the method for the present invention and/or technical solution.
And the program instruction of method of the invention is called, it is possibly stored in fixed or moveable recording medium, and/or pass through
Broadcast or the data flow in other signal-bearing mediums and transmitted, and/or be stored according to described program instruction operation
In the working storage of computer equipment.Here, according to one embodiment of present invention including a device, which includes using
Memory in storage computer program instructions and processor for executing program instructions, wherein when the computer program refers to
When enabling by processor execution, method and/or skill of the device operation based on aforementioned multiple embodiments according to the present invention are triggered
Art scheme.
It is obvious to a person skilled in the art that invention is not limited to the details of the above exemplary embodiments, Er Qie
In the case where without departing substantially from spirit or essential attributes of the invention, the present invention can be realized in other specific forms.Therefore, no matter
From the point of view of which point, the present embodiments are to be considered as illustrative and not restrictive, and the scope of the present invention is by appended power
Benefit requires rather than above description limits, it is intended that all by what is fallen within the meaning and scope of the equivalent elements of the claims
Variation is included in the present invention.Any reference signs in the claims should not be construed as limiting the involved claims.This
Outside, it is clear that one word of " comprising " does not exclude other units or steps, and odd number is not excluded for plural number.That states in device claim is multiple
Unit or device can also be implemented through software or hardware by a unit or device.The first, the second equal words are used to table
Show title, and does not indicate any particular order.
Claims (10)
1. a kind of method for secret protection, wherein this method comprises:
Step S1, the process of monitoring whether start to call the microphone and/or camera of mobile device end,
If so, step S2, records the microphone of mobile device end and/or the allocating time of camera and the corresponding process being called
Title.
2. according to the method described in claim 1, wherein, step S2 records the microphone of mobile device end and/or the tune of camera
After being referred to as with time and the corresponding process name being called, further includes:
Step S3 passes through the microphone during saving the microphone and/or camera that the process calls mobile device end
And/or the data of camera capture.
3. according to the method described in claim 1, wherein, step S1, the process of monitoring whether starts to call mobile device end
Microphone and/or camera, comprising:
Judge whether user opens monitor function, if so,
The process of monitoring whether starts to call the microphone and/or camera of mobile device end;
Step S3 passes through the microphone during saving the microphone and/or camera that the process calls mobile device end
And/or after the data of camera capture, further includes:
Step S4, judges whether user stops the monitor function,
If so, terminating to exit;
If it is not, then being executed since being repeated step S1.
4. according to the method described in claim 1, wherein, step S3 saves the microphone that the process calls mobile device end
And/or during camera, after the data captured by the microphone and/or camera, comprising:
The data time limit saved is set.
5. a kind of secret protection equipment, wherein the equipment includes:
First device, for monitoring whether that process starts the microphone and/or camera of calling mobile device end, if so, record
The microphone of mobile device end and/or the allocating time of camera and the corresponding process title being called.
6. equipment according to claim 5, wherein the first device is also used to save the process and movement is called to set
During the microphone and/or camera at standby end, pass through the microphone and/or the data of camera capture.
7. equipment according to claim 5, wherein the first device, for judging whether user opens monitor function,
If so, monitoring whether that process starts to call the microphone and/or camera of mobile device end;
The equipment further includes second device, for judging whether user stops the monitor function, if so, terminating to exit;
If it is not, then from repeating the first device.
8. equipment according to claim 5, wherein the first device is also used to be arranged the time limit of the data of preservation.
9. a kind of equipment based on calculating, wherein include:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the processing when executed
Device:
Step S1, the process of monitoring whether start to call the microphone and/or camera of mobile device end,
If so, step S2, records the microphone of mobile device end and/or the allocating time of camera and the corresponding process being called
Title.
10. a kind of computer readable storage medium, is stored thereon with computer executable instructions, wherein the computer is executable
Instruction makes the processor when being executed by processor:
Step S1, the process of monitoring whether start to call the microphone and/or camera of mobile device end,
If so, step S2, records the microphone of mobile device end and/or the allocating time of camera and the corresponding process being called
Title.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910195245.7A CN109918898A (en) | 2019-03-14 | 2019-03-14 | Method for secret protection and equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910195245.7A CN109918898A (en) | 2019-03-14 | 2019-03-14 | Method for secret protection and equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109918898A true CN109918898A (en) | 2019-06-21 |
Family
ID=66964913
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910195245.7A Pending CN109918898A (en) | 2019-03-14 | 2019-03-14 | Method for secret protection and equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109918898A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111444497A (en) * | 2020-04-13 | 2020-07-24 | Oppo广东移动通信有限公司 | Application program detection method and device and electronic equipment |
CN111611631A (en) * | 2020-04-14 | 2020-09-01 | 上海卓易科技股份有限公司 | Terminal peeping prevention method and device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103701978A (en) * | 2012-09-27 | 2014-04-02 | 中国电信股份有限公司 | Terminal and automatic multimedia file encryption method |
CN105868090A (en) * | 2015-01-21 | 2016-08-17 | 中兴通讯股份有限公司 | Terminal operation record management method and apparatus |
US9456131B2 (en) * | 2010-02-26 | 2016-09-27 | Bao Tran | Video processing systems and methods |
CN108984234A (en) * | 2018-08-01 | 2018-12-11 | 上海碳蓝网络科技有限公司 | A kind of calling reminding method of mobile terminal and photographic device |
-
2019
- 2019-03-14 CN CN201910195245.7A patent/CN109918898A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9456131B2 (en) * | 2010-02-26 | 2016-09-27 | Bao Tran | Video processing systems and methods |
CN103701978A (en) * | 2012-09-27 | 2014-04-02 | 中国电信股份有限公司 | Terminal and automatic multimedia file encryption method |
CN105868090A (en) * | 2015-01-21 | 2016-08-17 | 中兴通讯股份有限公司 | Terminal operation record management method and apparatus |
CN108984234A (en) * | 2018-08-01 | 2018-12-11 | 上海碳蓝网络科技有限公司 | A kind of calling reminding method of mobile terminal and photographic device |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111444497A (en) * | 2020-04-13 | 2020-07-24 | Oppo广东移动通信有限公司 | Application program detection method and device and electronic equipment |
CN111444497B (en) * | 2020-04-13 | 2024-03-08 | Oppo广东移动通信有限公司 | Application program detection method and device and electronic equipment |
CN111611631A (en) * | 2020-04-14 | 2020-09-01 | 上海卓易科技股份有限公司 | Terminal peeping prevention method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2843979B1 (en) | Method and apparatus for preventing sound recording during the call | |
CN105389507B (en) | The method and device of monitoring system partitioned file | |
US8295448B2 (en) | Communication system and method | |
US20150193280A1 (en) | Method and device for monitoring api function scheduling in mobile terminal | |
CN106130970B (en) | Application access control method and device | |
US20120155661A1 (en) | Electronic device and method for testing an audio module | |
WO2015070633A1 (en) | Privacy authority management method and apparatus | |
CN104915599A (en) | Application program monitoring method and terminal | |
CN109918898A (en) | Method for secret protection and equipment | |
WO2020172990A1 (en) | User smart device and operation abnormality-based user privacy protection method therefor | |
CN108984234B (en) | Calling prompt method for mobile terminal and camera device | |
CN108200053B (en) | Method and device for recording APT attack operation | |
CN110956722A (en) | Method, equipment and storage medium for alarming abnormity of intelligent lock | |
CN110727941A (en) | Private data protection method and device, terminal equipment and storage medium | |
CN111147313B (en) | Message abnormity monitoring method and device, storage medium and electronic equipment | |
CN104021062A (en) | Information processing method and electronic device | |
CN109218649A (en) | Talking recording and acquisition methods and equipment | |
US10826944B1 (en) | Systems and methods for network security | |
CN104346410A (en) | Method and equipment for monitoring terminal equipment | |
US10846383B2 (en) | Applet-based account security protection method and system | |
CN104580155A (en) | Safety protection method | |
CN111343132B (en) | File transmission detection method and device and storage medium | |
CN113660658A (en) | Audio data protection method and device and voice equipment | |
CN204795352U (en) | Video -audio recorder | |
CN111258860B (en) | Data alarm method, device, computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190621 |