CN109918898A - Method for secret protection and equipment - Google Patents

Method for secret protection and equipment Download PDF

Info

Publication number
CN109918898A
CN109918898A CN201910195245.7A CN201910195245A CN109918898A CN 109918898 A CN109918898 A CN 109918898A CN 201910195245 A CN201910195245 A CN 201910195245A CN 109918898 A CN109918898 A CN 109918898A
Authority
CN
China
Prior art keywords
camera
microphone
mobile device
device end
equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910195245.7A
Other languages
Chinese (zh)
Inventor
温慧龙
杜军红
汤肖迅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Longcheer Technology Co Ltd
Original Assignee
Shanghai Longcheer Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Longcheer Technology Co Ltd filed Critical Shanghai Longcheer Technology Co Ltd
Priority to CN201910195245.7A priority Critical patent/CN109918898A/en
Publication of CN109918898A publication Critical patent/CN109918898A/en
Pending legal-status Critical Current

Links

Landscapes

  • Alarm Systems (AREA)

Abstract

The object of the present invention is to provide a kind of method for secret protection and equipment, and the movement of mic and camera can be monitored and be recorded to privacy protection function through the invention, for evidence to be warned and retained to user.The present invention passes through real-time monitoring and records mic and camera allocating time and calling process, and can store the content of its capture, determines whether privacy violation for user.

Description

Method for secret protection and equipment
Technical field
The present invention relates to computer field more particularly to a kind of method for secret protection and equipment.
Background technique
Universal with electronic equipments such as mobile phones, more and more businessmans or individual obtain number of users by electronic product According to, or even there is criminal to call microphone (mic) and camera by the way that backstage is secret in the unwitting situation of user (camera), infringement privacy of user safety.
Existing electronic equipment generally has rights management setting, calls mic to certain application for choosing whether to user It is authorized with camera.But this authorization not can know that mic and camera allocating time generally and call purpose.
Summary of the invention
It is an object of the present invention to provide a kind of method for secret protection and equipment.
According to an aspect of the invention, there is provided a kind of method for secret protection, this method comprises:
Step S1, the process of monitoring whether start to call the microphone and/or camera of mobile device end,
If so, step S2, what the allocating time of the microphone and/or camera that record mobile device end was called with correspondence Process title.
Further, in the above method, step S2 records the microphone of mobile device end and/or the allocating time of camera After being referred to as with the corresponding process name being called, further includes:
Step S3 passes through the wheat during saving the microphone and/or camera that the process calls mobile device end Gram wind and/or the data of camera capture.
Further, in the above method, step S1, the process of monitoring whether starts to call the microphone of mobile device end And/or camera, comprising:
Judge whether user opens monitor function, if so,
The process of monitoring whether starts to call the microphone and/or camera of mobile device end;
Step S3 passes through the wheat during saving the microphone and/or camera that the process calls mobile device end After gram wind and/or the data of camera capture, further includes:
Step S4, judges whether user stops the monitor function,
If so, terminating to exit;
If it is not, then being executed since being repeated step S1.
Further, in the above method, step S3 saves microphone and/or phase that the process calls mobile device end During machine, after the data captured by the microphone and/or camera, comprising:
The data time limit saved is set.
According to another aspect of the present invention, a kind of secret protection equipment is also provided, wherein the equipment includes:
First device, for monitoring whether that process starts the microphone and/or camera of calling mobile device end, if so, Record the microphone of mobile device end and/or the allocating time of camera and the corresponding process title being called.
Further, in above equipment, the first device is also used to save the wheat that the process calls mobile device end During gram wind and/or camera, pass through the data of the microphone and/or camera capture.
Further, in above equipment, the first device, for judging whether user opens monitor function, if so, prison Whether survey has process to start to call the microphone and/or camera of mobile device end;
The equipment further includes second device, for judging whether user stops the monitor function, if so, terminating to move back Out;If it is not, then from repeating the first device.
Further, in above equipment, the first device is also used to be arranged the time limit of the data of preservation.
According to another aspect of the present invention, a kind of equipment based on calculating is also provided, wherein include:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the place when executed Manage device:
Step S1, the process of monitoring whether start to call the microphone and/or camera of mobile device end,
If so, step S2, what the allocating time of the microphone and/or camera that record mobile device end was called with correspondence Process title.
According to another aspect of the present invention, a kind of computer readable storage medium is also provided, being stored thereon with computer can It executes instruction, wherein the computer executable instructions make the processor when being executed by processor:
Step S1, the process of monitoring whether start to call the microphone and/or camera of mobile device end,
If so, step S2, what the allocating time of the microphone and/or camera that record mobile device end was called with correspondence Process title.
Compared with prior art, the dynamic of mic and camera can be monitored and be recorded to privacy protection function through the invention Make, for evidence to be warned and retained to user.The present invention passes through real-time monitoring and records mic and camera allocating time and tune It with process, and can store the content of its capture, determine whether privacy violation for user.
Detailed description of the invention
By reading a detailed description of non-restrictive embodiments in the light of the attached drawings below, of the invention other Feature, objects and advantages will become more apparent upon:
Fig. 1 shows the flow chart of the method for secret protection of one embodiment of the invention.
The same or similar appended drawing reference represents the same or similar component in attached drawing.
Specific embodiment
Present invention is further described in detail with reference to the accompanying drawing.
In a typical configuration of this application, terminal, the equipment of service network and trusted party include one or more Processor (CPU), input/output interface, network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/or The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM), Digital versatile disc (DVD) or other optical storage, magnetic cassettes, magnetic tape disk storage or other magnetic storage devices or Any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, computer Readable medium does not include non-temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
As shown in Figure 1, the present invention provides a kind of method for secret protection, which comprises
Step S1, the process of monitoring whether start to call the microphone and/or camera of mobile device end,
If so, step S2, what the allocating time of the microphone and/or camera that record mobile device end was called with correspondence Process title.
Here, the microphone of mobile terminal and the state of camera can be monitored in real time, when recording the calling of mic and camera Between and calling process, to warn to user.The present invention by privacy protection function, can monitor and record mic and The movement of camera, for warning to user.
In one embodiment of method for secret protection of the invention, step S2 records the microphone and/or camera of mobile device end Allocating time and after the corresponding process name being called is referred to as, further includes:
Step S3 passes through the wheat during saving the microphone and/or camera that the process calls mobile device end Gram wind and/or the data of camera capture.
Here, privacy protection function through the invention, can monitor and record the movement of mic and camera, for pair User warns and retains evidence.The present invention passes through real-time monitoring and records mic and camera allocating time and calling process, and The content that can store its capture, determines whether privacy violation for user.
In one embodiment of method for secret protection of the invention, step S1, the process of having monitored whether starts to call mobile device The microphone and/or camera at end, comprising:
Judge whether user opens monitor function, if so,
The process of monitoring whether starts to call the microphone and/or camera of mobile device end;
Step S3 passes through the wheat during saving the microphone and/or camera that the process calls mobile device end After gram wind and/or the data of camera capture, further includes:
Step S4, judges whether user ceases listening for function,
If so, terminating to exit;
If it is not, then being executed since being repeated step S1.
Here, the present invention can open/close this to user at user's space (userspace) by an interface apk Monitor function.When monitor function is opened, the movement of mic and camera is monitored on backstage, once having using calling, triggering is interrupted, The either on or off time of mic or camera is recorded, and stores the data of equipment capture.Mic and camera stops after calling, prison Auditory function continues to be called monitoring to mic and camera, until user deactivates monitor function.
In one embodiment of method for secret protection of the invention, step S3 saves the wheat that the process calls mobile device end During gram wind and/or camera, after the data captured by the microphone and/or camera, comprising:
The time limit of the data saved is set.
Here, the data volume of capture record may be very huge, it can not unrestricted eternal preservation.It can only be by mentioning For interface to the time limit of the customized preservation of user, and permanent preservation is separately provided for important data.
According to another aspect of the present invention, a kind of secret protection equipment is also provided, wherein the equipment includes:
First device, for monitoring whether that process starts the microphone and/or camera of calling mobile device end, if so, Record the microphone of mobile device end and/or the allocating time of camera and the corresponding process title being called.
Here, the microphone of mobile terminal and the state of camera can be monitored in real time, when recording the calling of mic and camera Between and calling process, to warn to user.The present invention by privacy protection function, can monitor and record mic and The movement of camera, for warning to user.
Further, in above equipment, the first device is also used to save the wheat that the process calls mobile device end During gram wind and/or camera, pass through the data of the microphone and/or camera capture.
Here, privacy protection function through the invention, can monitor and record the movement of mic and camera, for pair User warns and retains evidence.The present invention passes through real-time monitoring and records mic and camera allocating time and calling process, and The content that can store its capture, determines whether privacy violation for user.
Further, in above equipment, the first device, for judging whether user opens monitor function, if so, prison Whether survey has process to start to call the microphone and/or camera of mobile device end;
The equipment further includes second device, for judging whether user stops the monitor function, if so, terminating to move back Out;If it is not, then from repeating the first device.
Here, the present invention can open/close this to user at user's space (userspace) by an interface apk Monitor function.When monitor function is opened, the movement of mic and camera is monitored on backstage, once having using calling, triggering is interrupted, The either on or off time of mic or camera is recorded, and stores the data of equipment capture.Mic and camera stops after calling, prison Auditory function continues to be called monitoring to mic and camera, until user deactivates monitor function.
Further, in above equipment, the first device is also used to be arranged the time limit of the data of preservation.
Here, the data volume of capture record may be very huge, it can not unrestricted eternal preservation.It can only be by mentioning For interface to the time limit of the customized preservation of user, and permanent preservation is separately provided for important data.
According to another aspect of the present invention, a kind of equipment based on calculating is also provided, wherein include:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the place when executed Manage device:
Step S1, the process of monitoring whether start to call the microphone and/or camera of mobile device end,
If so, step S2, what the allocating time of the microphone and/or camera that record mobile device end was called with correspondence Process title.
According to another aspect of the present invention, a kind of computer readable storage medium is also provided, being stored thereon with computer can It executes instruction, wherein the computer executable instructions make the processor when being executed by processor:
Step S1, the process of monitoring whether start to call the microphone and/or camera of mobile device end,
If so, step S2, what the allocating time of the microphone and/or camera that record mobile device end was called with correspondence Process title.
Compared with prior art, the dynamic of mic and camera can be monitored and be recorded to privacy protection function through the invention Make, for evidence to be warned and retained to user.The present invention passes through real-time monitoring and records mic and camera allocating time and tune It with process, and can store the content of its capture, determine whether privacy violation for user.
The detailed content of each equipment and storage medium embodiment of the invention, for details, reference can be made to the correspondences of each method embodiment Part, here, repeating no more.
Obviously, those skilled in the art can carry out various modification and variations without departing from the essence of the application to the application Mind and range.In this way, if these modifications and variations of the application belong to the range of the claim of this application and its equivalent technologies Within, then the application is also intended to include these modifications and variations.
It should be noted that the present invention can be carried out in the assembly of software and/or software and hardware, for example, can adopt With specific integrated circuit (ASIC), general purpose computer or any other realized similar to hardware device.In one embodiment In, software program of the invention can be executed to implement the above steps or functions by processor.Similarly, of the invention Software program (including relevant data structure) can be stored in computer readable recording medium, for example, RAM memory, Magnetic or optical driver or floppy disc and similar devices.In addition, some of the steps or functions of the present invention may be implemented in hardware, example Such as, as the circuit cooperated with processor thereby executing each step or function.
In addition, a part of the invention can be applied to computer program product, such as computer program instructions, when its quilt When computer executes, by the operation of the computer, it can call or provide according to the method for the present invention and/or technical solution. And the program instruction of method of the invention is called, it is possibly stored in fixed or moveable recording medium, and/or pass through Broadcast or the data flow in other signal-bearing mediums and transmitted, and/or be stored according to described program instruction operation In the working storage of computer equipment.Here, according to one embodiment of present invention including a device, which includes using Memory in storage computer program instructions and processor for executing program instructions, wherein when the computer program refers to When enabling by processor execution, method and/or skill of the device operation based on aforementioned multiple embodiments according to the present invention are triggered Art scheme.
It is obvious to a person skilled in the art that invention is not limited to the details of the above exemplary embodiments, Er Qie In the case where without departing substantially from spirit or essential attributes of the invention, the present invention can be realized in other specific forms.Therefore, no matter From the point of view of which point, the present embodiments are to be considered as illustrative and not restrictive, and the scope of the present invention is by appended power Benefit requires rather than above description limits, it is intended that all by what is fallen within the meaning and scope of the equivalent elements of the claims Variation is included in the present invention.Any reference signs in the claims should not be construed as limiting the involved claims.This Outside, it is clear that one word of " comprising " does not exclude other units or steps, and odd number is not excluded for plural number.That states in device claim is multiple Unit or device can also be implemented through software or hardware by a unit or device.The first, the second equal words are used to table Show title, and does not indicate any particular order.

Claims (10)

1. a kind of method for secret protection, wherein this method comprises:
Step S1, the process of monitoring whether start to call the microphone and/or camera of mobile device end,
If so, step S2, records the microphone of mobile device end and/or the allocating time of camera and the corresponding process being called Title.
2. according to the method described in claim 1, wherein, step S2 records the microphone of mobile device end and/or the tune of camera After being referred to as with time and the corresponding process name being called, further includes:
Step S3 passes through the microphone during saving the microphone and/or camera that the process calls mobile device end And/or the data of camera capture.
3. according to the method described in claim 1, wherein, step S1, the process of monitoring whether starts to call mobile device end Microphone and/or camera, comprising:
Judge whether user opens monitor function, if so,
The process of monitoring whether starts to call the microphone and/or camera of mobile device end;
Step S3 passes through the microphone during saving the microphone and/or camera that the process calls mobile device end And/or after the data of camera capture, further includes:
Step S4, judges whether user stops the monitor function,
If so, terminating to exit;
If it is not, then being executed since being repeated step S1.
4. according to the method described in claim 1, wherein, step S3 saves the microphone that the process calls mobile device end And/or during camera, after the data captured by the microphone and/or camera, comprising:
The data time limit saved is set.
5. a kind of secret protection equipment, wherein the equipment includes:
First device, for monitoring whether that process starts the microphone and/or camera of calling mobile device end, if so, record The microphone of mobile device end and/or the allocating time of camera and the corresponding process title being called.
6. equipment according to claim 5, wherein the first device is also used to save the process and movement is called to set During the microphone and/or camera at standby end, pass through the microphone and/or the data of camera capture.
7. equipment according to claim 5, wherein the first device, for judging whether user opens monitor function, If so, monitoring whether that process starts to call the microphone and/or camera of mobile device end;
The equipment further includes second device, for judging whether user stops the monitor function, if so, terminating to exit; If it is not, then from repeating the first device.
8. equipment according to claim 5, wherein the first device is also used to be arranged the time limit of the data of preservation.
9. a kind of equipment based on calculating, wherein include:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the processing when executed Device:
Step S1, the process of monitoring whether start to call the microphone and/or camera of mobile device end,
If so, step S2, records the microphone of mobile device end and/or the allocating time of camera and the corresponding process being called Title.
10. a kind of computer readable storage medium, is stored thereon with computer executable instructions, wherein the computer is executable Instruction makes the processor when being executed by processor:
Step S1, the process of monitoring whether start to call the microphone and/or camera of mobile device end,
If so, step S2, records the microphone of mobile device end and/or the allocating time of camera and the corresponding process being called Title.
CN201910195245.7A 2019-03-14 2019-03-14 Method for secret protection and equipment Pending CN109918898A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910195245.7A CN109918898A (en) 2019-03-14 2019-03-14 Method for secret protection and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910195245.7A CN109918898A (en) 2019-03-14 2019-03-14 Method for secret protection and equipment

Publications (1)

Publication Number Publication Date
CN109918898A true CN109918898A (en) 2019-06-21

Family

ID=66964913

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910195245.7A Pending CN109918898A (en) 2019-03-14 2019-03-14 Method for secret protection and equipment

Country Status (1)

Country Link
CN (1) CN109918898A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111444497A (en) * 2020-04-13 2020-07-24 Oppo广东移动通信有限公司 Application program detection method and device and electronic equipment
CN111611631A (en) * 2020-04-14 2020-09-01 上海卓易科技股份有限公司 Terminal peeping prevention method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103701978A (en) * 2012-09-27 2014-04-02 中国电信股份有限公司 Terminal and automatic multimedia file encryption method
CN105868090A (en) * 2015-01-21 2016-08-17 中兴通讯股份有限公司 Terminal operation record management method and apparatus
US9456131B2 (en) * 2010-02-26 2016-09-27 Bao Tran Video processing systems and methods
CN108984234A (en) * 2018-08-01 2018-12-11 上海碳蓝网络科技有限公司 A kind of calling reminding method of mobile terminal and photographic device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9456131B2 (en) * 2010-02-26 2016-09-27 Bao Tran Video processing systems and methods
CN103701978A (en) * 2012-09-27 2014-04-02 中国电信股份有限公司 Terminal and automatic multimedia file encryption method
CN105868090A (en) * 2015-01-21 2016-08-17 中兴通讯股份有限公司 Terminal operation record management method and apparatus
CN108984234A (en) * 2018-08-01 2018-12-11 上海碳蓝网络科技有限公司 A kind of calling reminding method of mobile terminal and photographic device

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111444497A (en) * 2020-04-13 2020-07-24 Oppo广东移动通信有限公司 Application program detection method and device and electronic equipment
CN111444497B (en) * 2020-04-13 2024-03-08 Oppo广东移动通信有限公司 Application program detection method and device and electronic equipment
CN111611631A (en) * 2020-04-14 2020-09-01 上海卓易科技股份有限公司 Terminal peeping prevention method and device

Similar Documents

Publication Publication Date Title
EP2843979B1 (en) Method and apparatus for preventing sound recording during the call
CN105389507B (en) The method and device of monitoring system partitioned file
US8295448B2 (en) Communication system and method
US20150193280A1 (en) Method and device for monitoring api function scheduling in mobile terminal
CN106130970B (en) Application access control method and device
US20120155661A1 (en) Electronic device and method for testing an audio module
WO2015070633A1 (en) Privacy authority management method and apparatus
CN104915599A (en) Application program monitoring method and terminal
CN109918898A (en) Method for secret protection and equipment
WO2020172990A1 (en) User smart device and operation abnormality-based user privacy protection method therefor
CN108984234B (en) Calling prompt method for mobile terminal and camera device
CN108200053B (en) Method and device for recording APT attack operation
CN110956722A (en) Method, equipment and storage medium for alarming abnormity of intelligent lock
CN110727941A (en) Private data protection method and device, terminal equipment and storage medium
CN111147313B (en) Message abnormity monitoring method and device, storage medium and electronic equipment
CN104021062A (en) Information processing method and electronic device
CN109218649A (en) Talking recording and acquisition methods and equipment
US10826944B1 (en) Systems and methods for network security
CN104346410A (en) Method and equipment for monitoring terminal equipment
US10846383B2 (en) Applet-based account security protection method and system
CN104580155A (en) Safety protection method
CN111343132B (en) File transmission detection method and device and storage medium
CN113660658A (en) Audio data protection method and device and voice equipment
CN204795352U (en) Video -audio recorder
CN111258860B (en) Data alarm method, device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190621