CN110336910A - A kind of private data guard method and terminal - Google Patents

A kind of private data guard method and terminal Download PDF

Info

Publication number
CN110336910A
CN110336910A CN201811644527.2A CN201811644527A CN110336910A CN 110336910 A CN110336910 A CN 110336910A CN 201811644527 A CN201811644527 A CN 201811644527A CN 110336910 A CN110336910 A CN 110336910A
Authority
CN
China
Prior art keywords
terminal
user
prompt information
privacy
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201811644527.2A
Other languages
Chinese (zh)
Inventor
周平科
童碧峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN201811644527.2A priority Critical patent/CN110336910A/en
Publication of CN110336910A publication Critical patent/CN110336910A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72406User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by software upgrading or downloading
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions

Landscapes

  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)

Abstract

A kind of private data guard method and terminal, are related to field of communication technology, can more efficiently carry out private data guard.This method comprises: terminal detects that specific application accesses privacy of user data, the first prompt information is exported, which allows the specific application to access the privacy of user data for being confirmed whether.Terminal receives the confirmation message of user, executes and accesses the privacy of user data, wherein the confirmation message, which is used to indicate, allows the specific application to access the private data.After privacy of user data described in the terminal access, if detecting that the specific application accesses privacy of user data again, the second prompt information can be exported, second prompt information is for prompting privacy of user data accessed.

Description

A kind of private data guard method and terminal
Technical field
The invention relates to field of communication technology more particularly to a kind of private data guard method and terminals.
Background technique
With the rapid development of electronic technology, the function of terminal device (such as mobile phone) is more and more, and user can be based on The devices such as camera (including front camera and rear camera), microphone on mobile phone carry out voice communication or other work It is dynamic, and the devices such as camera, microphone are to be related to the device of privacy of user, if these privacy device quilts when user is ignorant Tripartite applies (such as certain social application software) steal, will reveal privacy of user.
Currently, user can be prompted to be by private data guard when user uses a certain application software on mobile phone The no privacy device for authorizing the application software to use mobile phone.Specifically, using privacy device as camera, application software is answered for camera For 1, as shown in Figure 1, when user first switches on the camera applications 1 on mobile phone 10, it on a display of the handset can bullet Out prompting frame 11 with prompt the user whether allow camera applications 1 using mobile phone 10 camera, realize private data guard, when with When family selects " permission " option in prompting frame 11, which will use the camera of mobile phone 10 with permission;Work as user When selecting " forbidding " option in prompting frame 11, which then uses the camera of mobile phone 10 without permission.
However, above-mentioned private data guard method be user for the first time use application software when, remind user whether into Row authorization, if user authorizes the application software using the privacy device of mobile phone, in the subsequent mistake using the application software of user Cheng Zhong, no longer progress secret protection prompt are led in this way, user can not perceive when the privacy device of application software steal mobile phone It applies family privacy leakage.
Summary of the invention
The embodiment of the present application provides a kind of private data guard method and terminal, can more efficiently carry out private data Protection.
In order to achieve the above objectives, the embodiment of the present application adopts the following technical scheme that
In a first aspect, the embodiment of the present application provides a kind of private data guard method, this method be may comprise steps of: Terminal detects that specific application accesses privacy of user data, exports the first prompt information, which is for confirming It is no that the specific application is allowed to access the privacy of user data.The terminal receives the confirmation message of user, and it is hidden that execution accesses the user Private data, wherein the confirmation message, which is used to indicate, allows the specific application to access the private data.The terminal access user is hidden After private data, which detects that the specific application accesses the privacy of user data again;Terminal output the second prompt letter Breath, second prompt information is for prompting user's private data accessed.
It, specifically can be by detecting whether private data access interface is called to determine user in the application in embodiment Private data whether be accessed, specifically, accessing object (third party or use when the private data of user is accessed in terminal Family itself) triggering access after, in the bottom layer realization of terminal, need by call terminal on corresponding data access interface come Private data is read, therefore, terminal detects that corresponding data-interface is called, then terminal can determine the private data of user It is accessed, and terminal exports the first prompt information to prompt privacy of user data accessed, so can more efficiently into Row private data guard.
In a kind of possible implementation, above-mentioned private data includes at least following one or more: including at least following It is one or more: audio or video data, position data, account data, address list, image data, privacy application or privacy function Energy.
Specifically, private data can be also possible to for by the private data for calling certain devices of terminal to obtain Stored private data in terminal.For example, video data can be by calling (user carry out active unlatching calling or Third party call) camera obtain video data, be also possible to data stored in terminal;Audio data can be logical The audio data for calling microphone to obtain is crossed, voice data stored in terminal is also possible to;Position data is to hold this The location of user of terminal etc.;Account data can be all kinds of account datas stored in terminal, address list, such as user Address list or the phone number of user of the address list, user APP currently in use that are stored on mobile phone etc..
In a kind of possible implementation, above-mentioned private data is audio data, then private data access interface is Mike Wind access interface.When third party opens the microphone of terminal, microphone access in terminal system is called to connect by software program Mouthful microphone is opened, specifically, calling microphone access interface that can realize by calling and running such as to give an order: and roid.media.AudioRecord.startRecording()。
In a kind of possible implementation, terminal exports the second prompt information, and second prompt information is used for prompting Whether family allows the specific application to access the privacy of user data.The terminal is in the second confirmation message for receiving user Afterwards, the privacy of user data are accessed, wherein second confirmation message allows the spy for confirming the second prompt information Determine privacy of user data described in application access.As long as privacy of user data are accessed will to give user reminding, effective protection user Data.Alternatively, the terminal exports the second prompt information, second prompt information is for having prompted specific application described in user Through accessing the privacy of user data.Only inform that privacy of user data are accessed, do not prevent the execution of access.
In a kind of possible implementation, the method that above-mentioned terminal exports the first prompt information may include: terminal pre- If exporting the first prompt information in the period;Or, terminal exports the first prompt information according to preset times.The embodiment of the present application In, terminal can export the first prompt information in different ways, specifically, terminal is in preset time period (such as 10 seconds, 20 Second etc.) in export the first prompt information, for example, first prompt information a length of 5 seconds voices, the preset time period when being one section It is 20 seconds, then terminal recycles in this 20 seconds exports first prompt information;Or terminal is according to preset times (such as 5 times, 10 It is inferior) first prompt information is exported, for example, first prompt information is the prompt tone of " ticking ", which is 5 times, then Terminal can export the prompt tone of 5 times " ticking ", and first prompt information is a kind of prompt letter of experience for not influencing user Breath, i.e., to a certain extent, which does not influence the operation of user currently at the terminal.
In a kind of possible implementation, the method that above-mentioned terminal exports the first prompt information may include: that terminal determines Private data guard function in terminal is opened, then terminal exports first or second prompt information.In the embodiment of the present application, at end Private data guard setup module can be added in " setting " application at end, in the case where private data guard function is opened, When private data is accessed, terminal exports first or second prompt information;The private data guard functional relationship the case where Under, even if private data is accessed, terminal will not export first or second prompt information.In addition, user can be according to reality Use demand selection, which is opened, switchs the private data guard of a certain private data.
In the embodiment of the present application, terminal can export first or second prompt information by different modes, in this way, user It can know that the private data of user in terminal is accessed by the first or second prompt information, therefore, end can be made The safety is improved at end, can more efficiently carry out private data guard, and increase terminal and directly interact with user, Terminal and the interactive performance of user are improved, user experience is promoted.
In a kind of possible implementation, private data guard method provided by the embodiments of the present application can also include: In above-mentioned preset time period, terminal receives first operation of the user to terminal, and terminal stops output first or second prompt information; Or, the number of terminal output first or second prompt information is less than or equal to preset times, terminal receives user to terminal First operation, terminal stop output first or second prompt information.In the embodiment of the present application, mentioned in the terminal output first or second (in i.e. above-mentioned preset time period or the number of the first prompt information of output is less than or equal to default time during showing information Number), user has learned that its private data is accessed, and user, which can stop being further continued for triggering terminal exporting the first or second, to be mentioned Show information, above-mentioned first operation such as is carried out to terminal.
In a kind of possible implementation, if private data guard method provided by the embodiments of the present application can also include: Terminal does not receive, do not receive in the given time or does not receive the first operation of preset times, then the prompt of terminal output third Information, which includes one of following information or a variety of: the accessed initial time of private data, privacy number According to accessed duration, the title for the application for accessing private data.In the embodiment of the present application, above-mentioned first is exported in terminal Or second during prompt information, when user does not carry out the first operation to terminal, for example, user is currently busy with other things not When being in time for carrying out the first or second prompt information response or terminal output first or second prompt information, the terminal Not user at one's side, in this way, the private data that user may have no knowledge about the user is accessed, and the privacy number of user at present According to accessed state may be still within, it is also possible to which the private data has been moved to end access, if user does not know from beginning to end The accessed situation of road private data, then may bring serious loss to user.Therefore, when terminal does not receive, predetermined Above-mentioned first operation of preset times is not received or not received in time, terminal exports third prompt information, on the one hand, mentions again The private data of the awake user user was once accessed, and on the other hand, user can be according to the content that third prompt information includes (i.e. The name of the application of duration, access private data that the accessed initial time of above-mentioned private data, private data are accessed Claim etc.) know the accessed details of its private data.
So far, it should be noted that above-mentioned first or second prompt information is different from third prompt information, and difference is, First or second prompt information is a real-time prompt information, i.e., terminal once detects that private data accesses, and terminal is immediately The first or second prompt information is exported, which is the thing for prompting privacy of user data accessed Part has occurred, and no longer includes other content, only reminding effect in first prompt information, then no longer exists after playing;And Third prompt information is to contain specific content (the third prompt information can be the text of a similar notice or short message This information a, or voice messaging), it has stored in terminal, when user reuses mobile phone, this can be read Third prompt information knows the accessed details of its private data.
In the embodiment of the present application, when terminal detects that the private data of user in terminal is accessed, the first or second is exported After prompt information, terminal does not receive the first operation of user, and terminal exports third prompt information again, in this way, user To know the accessed details of the private data of user in terminal by the third prompt information, it is direct with user to increase terminal Interaction, improve terminal and the interactive performance of user, promote user experience.
In a kind of possible implementation, private data guard method provided by the embodiments of the present application also specifically be can wrap Include: terminal shows the first prompting frame, and first prompting frame is for prompting user to forbid accessing private data or continue to allow to visit Ask private data;And terminal receives third operation of the user on the first prompting frame, and operates in response to third, forbids visiting Ask private data.In the embodiment of the present application, when the private data of user is accessed in terminal, terminal can not only export above-mentioned the One or second prompt information prompt user, terminal can also show for user carry out selection operation prompting frame, thus user Corresponding operation can be made, is further continued for access private data to stop third party.
In a kind of possible implementation, above-mentioned first or second prompt information may include one in following prompt information It is a or multiple: prompt tone, vibration prompting, interface prompt, indicator light prompt.In the embodiment of the present application, which can be one Section voice signal (such as " camera that XX begins to use you "), be also possible to single syllable prompt tone (such as " stining ", " ticking " or " whiz " etc.), which can be single vibration, repeatedly vibration or sustained vibration etc., which can be terminal Touch one icon of screen display (icon is the small icon in the region for being shown in specified region or not influencing user experience, Such as it is shown in a region in the upper right corner of touch screen), which prompts to can be the indicator (i.e. indicator light) of terminal Light (such as the indicator light starts regularly to flash, including n times flashing or lasting flashing lamp).It should be noted that when, this One or a kind of a kind of a kind of a kind of second prompt information when being that prompt tone, vibration prompting, interface prompt or indicator light prompt, this is mentioned Show that sound, vibration prompting, interface prompt or indicator light prompt are only used for indicating that the private data of user is accessed, and is no longer serve as it He prompts.
Second aspect, the embodiment of the present application provide a kind of terminal, the terminal include: one or more processors, memory, Communication interface;The memory, display screen are coupled with processor;Memory is for storing computer program code;Computer program Code includes computer instruction, and when processor executes above-mentioned computer instruction, it is as follows to control the mobile terminal execution for processor Method: detect that specific application accesses privacy of user data;The first prompt information is exported, which is for confirming It is no that the specific application is allowed to access the privacy of user data;The confirmation message of user is received, executes and accesses the privacy of user data, Wherein, which, which is used to indicate, allows the specific application to access the private data;Access the privacy of user data and then It is secondary to detect that the specific application accesses the privacy of user data;The second prompt information is exported, second prompt information is for prompting User's private data is accessed.
In a kind of possible implementation, above-mentioned private data includes at least following one or more: audio or video number According to, position data, account data, address list, image data, privacy application or privacy function.
In a kind of possible implementation, which is also used to control the terminal and executes following steps: control display screen The second prompt information is exported, second prompt information is for prompting the user whether that the specific application is allowed to access the privacy of user number According to.
After the mobile terminal receives the second confirmation message of user, the privacy of user data are accessed, wherein second confirmation Information allows the specific application to access the privacy of user data for confirming the second prompt information.
In a kind of possible implementation, states processor and be also used to control the terminal and execute following steps: terminal output Second prompt information, second prompt information is for prompting user's specific application to access the privacy of user data.It is a kind of In possible implementation, above-mentioned processor exports the first prompt information specifically for controlling terminal within a preset period of time; Or, the processor, is specifically used for exporting the first prompt information according to preset times.
In a kind of possible implementation, above-mentioned processor is also used within a preset period of time, and controlling terminal receives user The first operation to terminal, stops the first prompt information of output;Or, the processor, is also used to exporting the first prompt information In the case that number is less than or equal to preset times, controlling terminal receives user to the first of terminal the operation, stops output the One prompt information.
In a kind of possible implementation, above-mentioned processor is also used in the case where not receiving the first operation, output Second prompt information, second prompt information include one of following information or a variety of: when the starting that private data is accessed Between, private data accessed duration, access private data application title.
In a kind of possible implementation, terminal provided by the embodiments of the present application can also include touch screen;Above-mentioned processing Device is also used to control touch screen and shows the first prompting frame, first prompting frame for prompt user forbid access private data or Person continues to allow to access private data;The processor is also used to receive first operation of the user on the first prompting frame, and responds It is operated in third, forbids accessing private data.
In a kind of possible implementation, above-mentioned first or second prompt information include one in following prompt information or It is multiple: prompt tone, vibration prompt, interface prompt, indicator light prompt.
The third aspect, the embodiment of the present application provide a kind of computer storage medium, which includes calculating Machine instruction, when the computer instruction is run at the terminal, so that terminal executes above-mentioned first aspect and its possible realization side One of any private data guard method being somebody's turn to do in formula.
Fourth aspect, the embodiment of the present application provide a kind of computer program product, when the computer program product is calculating When being run on machine, so that computer, which executes, states one of any private data guarantor being somebody's turn to do in first aspect and its possible implementation Maintaining method.
It is to be appreciated that the computer storage medium that terminal, fourth aspect that the second aspect of above-mentioned offer is somebody's turn to do are somebody's turn to do, and The computer program product that 5th aspect is somebody's turn to do is used to execute corresponding method presented above, and therefore, institute is attainable Beneficial effect can refer to the beneficial effect in corresponding method presented above, and details are not described herein again.
Detailed description of the invention
Fig. 1 is a kind of display interface example schematic one provided by the embodiments of the present application;
Fig. 2 is a kind of application scenarios schematic diagram of private data guard method provided by the embodiments of the present application;
Fig. 3 is private data guard method schematic diagram one provided by the embodiments of the present application;
Fig. 4 is the schematic diagram one of prompt information in private data guard provided by the embodiments of the present application;
Fig. 5 is the schematic diagram two of prompt information in private data guard provided by the embodiments of the present application;
Fig. 6 is the schematic diagram three of prompt information in private data guard provided by the embodiments of the present application;
Fig. 7 is the schematic diagram four of prompt information in private data guard provided by the embodiments of the present application;
Fig. 8 is private data guard method schematic diagram two provided by the embodiments of the present application;
Fig. 9 is a kind of display interface example schematic two provided by the embodiments of the present application;
Figure 10 is a kind of display interface example schematic three provided by the embodiments of the present application;
Figure 11 is private data guard method schematic diagram three provided by the embodiments of the present application;
Figure 12 is a kind of structural schematic diagram of terminal provided by the embodiments of the present application.
Specific embodiment
The terms "and/or", only a kind of incidence relation for describing affiliated partner, indicates that there may be three kinds of passes System, for example, A and/or B, can indicate: individualism A exists simultaneously A and B, these three situations of individualism B.
Term " first " and " second " in the specification and claims of the embodiment of the present application etc. are for distinguishing not Same object, rather than it is used for the particular order of description object.For example, the first prompt information and the second prompt information etc. are to be used for Different prompt informations is distinguished, rather than is used to describe the particular order of prompt information.
In the embodiment of the present application, " illustrative " or " such as " etc. words for indicate make example, illustration or explanation.This Application embodiment in be described as " illustrative " or " such as " any embodiment or design scheme be not necessarily to be construed as comparing Other embodiments or design scheme more preferably or more advantage.Specifically, use " illustrative " or " such as " etc. words purport Related notion is being presented in specific ways.
In the description of the embodiment of the present application, unless otherwise indicated, the meaning of " plurality " is refer to two or more.Example Such as, multiple processing units refer to two or more processing units;Multiple systems refer to two or more systems.
With the intelligence of terminal (such as mobile phone), the function of mobile phone is more and more, and the operation different based on mobile phone The application program (application, APP) of system, exploitation is more and more diversified, and nowadays people are in daily work such as life, work It is also increasingly stronger to the dependence of mobile phone in dynamic, and user can generate many user data during using mobile phone, In include the private data of many users, for example, the image data (including picture or the video counts that are obtained by the camera of mobile phone According to etc.), the audio data obtained by microphone, various account informations (such as the cell-phone number, communication of the user stored on mobile phone Record etc.) and the location information of terminal etc..In general, a certain APP in user experience terminal (can be understood as third-party application Program) when, if the private data of user is accessed by the other users of the malicious operation APP in terminal, and user is always not It is accessed to discover its private data, in this way since privacy of user data are stolen, the person or property etc. may be brought to user It threatens and loses.
The embodiment of the present application provides a kind of private data guard method and terminal, during user's using terminal, eventually As long as end when having softward interview or invoking privacy data, will detect that private data (such as is obtained by access camera Image data or the voice data etc. obtained by microphone) it is accessed, terminal exports prompt information, and to prompt user, its is hidden Private data are accessed.By this programme, so that the safety is improved for terminal, private data guard can be more efficiently carried out.
Private data guard method provided by the embodiments of the present application be mainly used in the private data in terminal user not The scene being accessed in the case where knowing.For example, (such as opening social software when user opens a certain APP and carries out normal operating Chat with friend) during, there is no actively open camera (but it should be recognized that user uses in first time by user Authorized when the APP APP access terminal camera) in the case where, the APP call the terminal camera (including call The front camera or rear camera of terminal) private data that obtains the user, including its around figure information or user His information, and user have no it is known.In another example shopping APP a certain in terminal is set as being associated with by user with a certain payment APP APP, it is therefore intended that user can easily complete to pay when doing shopping on shopping APP, in practical applications, when user beats During opening a certain shopping APP browsing commodity, shopping APP may allow without user, read the privacy number of user According to, such as with shopping APP it is associated payment APP on user information (such as account information or even bank's card number etc.).Example again Such as, when user accesses a certain website, which may steal the private data of user in terminal by malicious plugins, such as user Location information etc..In above-mentioned scene, when the private data of user is accessed, pass through technical solution provided by the present application, energy Enough remind its private data of user accessed.
Be illustrated with a kind of example, for example, user it is small it is beautiful hold mobile phone 300, a certain social activity is installed on the mobile phone 300 APP 1, and small beautiful first time uses the part that whether the APP 1 can be called or be accessed mobile phone 300 when APP 1 Function is authorized, for example, the camera and microphone of authorization 1 calling mobile phone 300 of APP, authorization APP 1 accesses mobile phone 300 Position, authorization APP 1 sends a notification message to mobile phone 300 etc., in this way, for the camera and microphone of mobile phone 300, When using the camera or microphone of mobile phone 300 subsequently through APP 1, the default of mobile phone 300 allows using camera or Mike Wind is authorized without reresenting user.As shown in Fig. 2, the small beautiful a certain social activity APP 1 being used on mobile phone 300 with it is small It is bright to chat, and small beautiful and Xiao Ming is not carry out Video chat or voice-enabled chat, i.e. mobile phone by inputting text chat 300 camera and microphone is not opened, and during the small beautiful chat with Xiao Ming, there is rogue program tune on the backstage of APP 1 With the camera access interface on mobile phone 300, so that the camera (such as front camera) of mobile phone 300 is opened, then at this time Small beautiful personal image is just stolen in real time, i.e., small beautiful individual privacy is invaded, and due to the camera of mobile phone 300 Licensed through user, therefore when small beautiful individual privacy is accessed, it is small it is beautiful know nothing, use is provided by the embodiments of the present application After private data guard method, when small beautiful use APP 1 passes through text chat with other people, if camera is called, terminal It can issue prompt immediately, inform that the camera of small beautiful mobile phone 300 is currently being used, and then small beautiful can carry out relevant operation end The only risk that individual privacy is stolen.
Certainly, private data guard method provided by the embodiments of the present application also can be applied to user and actively access in terminal The scene of the private data of the user, for example, user actively open a terminal on take pictures using take pictures or user use When certain social activity APP, video calling is actively initiated or receives, in such a scenario, technical solution provided by the present application can also mention Its private data of user of waking up is accessed.
The application provides a kind of private data guard method, as shown in figure 3, this method includes S101-S102:
S101, terminal detect that private data access interface is called.
In the embodiment of the present application, the private data of user will be interviewed when private data access interface is called in terminal It asks, wherein the private data of user includes at least following one or more: image data, voice data, position data, account Data, wherein image data includes audio, video data or image data.
Above-mentioned private data can be also possible to terminal for by the private data for calling certain devices of terminal to obtain On stored private data.For example, image data can be through the calling (calling or third of user's progress active unlatching Side call) camera obtain image data, be also possible to image data stored in terminal;Voice data can be logical The voice data for calling microphone to obtain is crossed, voice data stored in terminal is also possible to;Position data is to hold this The location of user of terminal etc.;Account data can be all kinds of account datas stored in terminal, such as bank card account Address list or the phone number of user of the APP that data, address list, user use etc..
It should be noted that the private data of user can also be other kinds of data, specifically, user can basis Specified data is set private data by actual conditions, and the embodiment of the present application is not especially limited.
In the embodiment of the present application, terminal can be by detecting whether private data access interface is called to determine user's Whether private data is accessed, specifically, accessing object (third party or user when the private data of user is accessed in terminal Itself) after triggering access, in the bottom layer realization of terminal, need by calling corresponding data access interface in terminal to read Private data is taken, therefore, terminal detects that corresponding data-interface is called, then terminal can determine the private data quilt of user Access, and when the private data of user is accessed each time in terminal, it is accessed that terminal can detecte the private data Behavior.
By taking the camera of terminal and microphone as an example, and by taking the steerable system of terminal is android system as an example, when the When tripartite opens the camera of terminal, camera access interface (calling certain instruction) in terminal system is called by software program To open camera;When third party opens the microphone of terminal, microphone in terminal system is called to access by software program Interface opens microphone.
Specifically, calling camera access interface that can realize by calling and running such as to give an order:
android.hardware.camera2.openCamera(String cameraId)
Call microphone access interface that can realize by calling and running such as to give an order:
android.media.AudioRecord.startRecording()
S102, terminal export the first prompt information, and first prompt information is for prompting the user whether to allow the user's Private data is accessed.
Wherein, above-mentioned first prompt information may include one or more of following prompt information: prompt tone, vibration mention Show, interface prompt, indicator light prompt.
In the embodiment of the present application, when the private data of user in terminal is accessed, although user can not perceive privacy Whether data are accessed, but terminal may detect that private data access interface is called every time, you can learn that private data It is accessed, so that the behavior that terminal can be accessed the private data is responded to inform that privacy of user data are accessed, I.e. terminal exports the first prompt information, and to prompt the private data of the user user accessed, and then user can take into one The measure of step allows or third party is prevented to continue to access the private data of the user.
S103, the terminal receive the confirmation message of user, execute and access the privacy of user data, wherein the confirmation message Being used to indicate allows to access the private data;
S104, the terminal access privacy of user data and then secondary detect that the privacy of user data access again.The end The second prompt information of end output, second prompt information is for prompting user's private data accessed.
Wherein, second prompt information is for prompting the user whether to allow to access the privacy of user data;The terminal is connecing After the second confirmation message for receiving user, the privacy of user data are accessed, wherein second confirmation message is for confirming the second prompt Information allows to access the privacy of user data.Optionally, second prompt information is for prompting user to access the user Private data, only as the prompting to user.
It should be understood that above-mentioned first or second prompt information is that one kind does not influence user in the embodiment of the present application The prompt information of experience, i.e., to a certain extent, the first or second prompt information do not influence the behaviour of user currently at the terminal Make.
Camera by the private data of user for terminal is called for the private data of acquisition, illustrates respectively several The example that terminal exports the first prompt information.The prompting mode of second prompt information can refer to the performance shape of the first prompt information Formula, can be identical as the first prompt information, can also be different.
In the embodiment of the present application, above-mentioned first prompt information is prompt tone, when terminal detects that the camera of terminal is adjusted Used time, then terminal exports one section of prompt tone by the loudspeaker of the terminal, which is used to prompt the camera of user terminal It is called.As shown in figure 4, the chat of the social APP 1 on mobile phone 300 is used in user, mobile phone 300 issues prompt tone 1 at this time, The prompt tone can be the voice that content is " camera that APP 1 begins to use you ", in this way, user can know the mobile phone 300 camera is called, and private data is accessed.
Optionally, above-mentioned prompt tone can be single syllable prompt tone, such as " stining ", " ticking " or " whiz ".Alternatively, prompt tone It can be N seconds length ringing tones, as N is equal to 3,4 or 5.Alternatively, prompt tone is voice signal, such as " XX begins to use your camera shooting Head " can specifically determine that the embodiment of the present application is not construed as limiting according to actual use demand.
It should be noted that, when the first prompt information is prompt tone, which is only used for referring in the embodiment of the present application Show that the private data of user is accessed, which is no longer serve as other prompts.
In the embodiment of the present application, when above-mentioned first prompt information is vibration prompt, when terminal detects the camera of terminal When called, then terminal issues vibration prompt by the motor in the terminal, to prompt the camera of user terminal called.Such as Shown in Fig. 5, the chat of the social APP 1 on mobile phone 300 is used in user, and mobile phone 300 issues vibration prompt at this time, it is possible to understand that , mobile phone 300 issue the vibration prompt can for certain ad hoc fashion vibration prompt (such as single vibration, repeatedly vibration Dynamic or sustained vibration etc.), in this way, user can know that the camera of the mobile phone 300 is called, private data is accessed.
Similarly, in the embodiment of the present application, when the first prompt information is a kind of vibration prompt, which is only used for referring to Show that the private data of user is accessed, which is no longer serve as other prompts.
In the embodiment of the present application, when above-mentioned first prompt information is interface prompt, when terminal detects the camera of terminal When called, then in one icon of touch screen display of the terminal, (icon is to be shown in specified region or not shadow to terminal The small icon in the region of user experience is rung, such as is shown in a region in the upper right corner of touch screen), to prompt user terminal Camera is called.It chats as shown in fig. 6, the social APP 1 on mobile phone 300 is used in user, at this time the upper right of mobile phone 300 Angle shows the icon of a camera, in this way, user can know that the camera of the mobile phone 300 is called by the camera icon, Its private data is accessed.
Similarly, in the embodiment of the present application, when the first prompt information is a kind of interface prompt, which is only used for referring to Show that the private data of user is accessed, which is no longer serve as other prompts.
In the embodiment of the present application, when above-mentioned first prompt information is that indicator light prompts, when terminal detects the camera shooting of terminal When head is called, then the indicator (i.e. indicator light) of terminal lights that (such as the indicator light starts regularly to flash, including n times are dodged Bright or lasting flashing lamp), to prompt the camera of user terminal called.As shown in fig. 7, mobile phone 300 is used in user On social APP 1 chat, the indicator light of the upper end of mobile phone 300 starts to flash at this time, in this way, user can know the mobile phone 300 camera is called, and private data is accessed.
Similarly, in the embodiment of the present application, when the first prompt information is that indicator light prompts, indicator light prompt is only used for referring to Show that the private data of user is accessed, which is no longer serve as other prompts.
It optionally, in practical applications, can be different using the instruction of different types of instruction information in the embodiment of the present application Private data it is accessed, for example, the camera using prompt tone prompt terminal is called, using vibration prompt prompt terminal Microphone is called, accessed using the position data of interface prompt prompt terminal, using the account of signal lamp prompt prompt terminal User data is accessed.
To sum up should, in the embodiment of the present application, terminal export the first prompt information, in this way, user can by this first Prompt information knows that the private data of user in terminal is accessed, increases terminal and directly interacts with user, improves terminal With the interactive performance of user, user experience is promoted.
Private data guard method provided by the embodiments of the present application, during user's using terminal, since terminal is examined Measure private data interface it is called when, terminal can export the first prompt information, to prompt its private data of user accessed, Therefore, can making terminal, the safety is improved, can more efficiently carry out private data guard.
It optionally, can be for described by the above-mentioned S101-S102 of certain application implementations in terminal in the embodiment of the present application Private data guard method, such as: the important APP of several moneys specified in terminal is set private data guard by user Object, i.e., when user uses these APP, the private data of user is by these APP access (such as APP, hand of certain bank Machine pays APP etc.) when, terminal exports prompt information and informs user, and when terminal uses other APP, then terminal does not export prompt book Information.
It optionally, can also be for certain function elements (such as the camera, Mike in terminal in the embodiment of the present application Wind, traffic management device etc.) implement private data guard method described in above-mentioned S101-S102, for example, user is by terminal Camera is set as private data guard object, i.e., during user is using the terminal, if terminal detects the terminal When camera is called, terminal exports prompt information and informs user;When terminal is using device in addition to camera, then terminal is not Export prompt information.
In a kind of implementation, in conjunction with Fig. 3, as shown in figure 8, above-mentioned S102 can specifically include S1021a-S1021b:
S1021a, terminal determine that the private data guard function in the terminal is opened.
In the embodiment of the present application, private data guard setup module can be added in " setting " application of terminal, hidden In the case that private data protection function is opened, when private data is accessed, terminal exports the first prompt information;In the privacy number In the case where according to defencive function relationship, even if private data is accessed, terminal will not export the first prompt information.
Illustratively, it is assumed that the object of private data guard is the camera of terminal, using the first prompt information as prompt tone For, as shown in figure 9, mobile phone 300 can receive user to the clicking operation of " setting " application icon on the desktop of mobile phone 300 (such as single-click operation), in response to user to the clicking operation of " setting " application icon, mobile phone 300 can show that boundary is arranged in mobile phone Face.It may include " offline mode " option, " WLAN " option, " bluetooth " option, " mobile network " choosing in the mobile phone set interface , " display " and " sound " option etc..Wherein, " offline mode " option, " WLAN " option, " bluetooth " option and " mobile network The concrete function of network " option etc. can be with reference to the specific descriptions in routine techniques, and it will not go into details here for the embodiment of the present application.Mobile phone 300 in response to user to the clicking operation of " sound " option, can show sound set interface 401 shown in (a) in Fig. 9. It include " volume " option, " the tinkle of bells " option and " system " option etc. in the sound set interface 401, wherein in " volume " option Under, the volume of the adjustable the tinkle of bells of user, under " the tinkle of bells " option, different the tinkle of bells is can be set in user, in " system " It include the switch of private data guard function in option, such as front camera is used using the switch or rear camera reminded The switch of prompting, user can choose that " front camera is opened using prompting now by " system " tabs in sound set interface Close " it is set on, to open front camera using prompting function, it can refer to interface shown in (b) in Fig. 9.
It optionally, can also include that private data is realized to other private datas in above sound set interface in conjunction with Fig. 9 The switch of defencive function, user can open the private data guard to a certain private data according to actual use demand selection Switch, specifically refers to Figure 10.And in figure 9 and in figure 10, corresponding prompt can also be arranged for private data guard in user Sound can also be set specifically, different prompt tones can be arranged for the different corresponding private data guard functions of private data Identical prompt tone is set, the embodiment of the present application is not construed as limiting.
S1021b, terminal export the first prompt information.
In the embodiment of the present application, in conjunction with the associated description of S1021a, terminal detects that private data access interface is called, And corresponding privacy protection function switch is open state in the terminal, and terminal can be according to the pre-set prompt side of user Formula exports first prompt information.
In conjunction with Fig. 3, above-mentioned S102 can specifically include S1022 or S1023:
S1022, terminal export the first prompt information within a preset period of time.
S1023, terminal export the first prompt information according to preset times.
In the embodiment of the present application, terminal can also export the first prompt information in different ways, specifically, terminal exists The first prompt information is exported in preset time period (such as 10 seconds, 20 seconds etc.), for example, first prompt information is one section of Shi Changwei 5 seconds voices, the preset time period are 20 seconds, then terminal recycles in this 20 seconds exports first prompt information;Or terminal First prompt information is exported according to preset times (such as 5 times, 10 inferior), for example, first prompt information is mentioning for " ticking " Show sound, which is 5 times, then terminal can export the prompt tone of 5 times " ticking ".
Optionally, in conjunction with above-mentioned S1022, private data guard method provided by the present application can also include: when default Between in section, terminal receives first operation of the user to terminal, which stops the first prompt information of output.
Optionally, in conjunction with above-mentioned S1023, private data guard method provided by the present application can also include: terminal output When the number of first prompt information is less than or equal to preset times, terminal receives first operation of the user to the terminal, and Terminal stops the first prompt information of output.
It is (in i.e. above-mentioned preset time period or defeated during terminal exports the first prompt information in the embodiment of the present application The number of the first prompt information is less than or equal to preset times out), user has learned that its private data is accessed, Yong Huke It is further continued for exporting first prompt information with triggering terminal stopping, specifically, the user can carry out the first operation to terminal, it should First operation is used to indicate terminal and stops the first prompt information of output, which can be contact action or button operation Deng the embodiment of the present invention is not especially limited.Illustratively, which is that user grasps the pressing of the touch screen of terminal Work, long press operation, slide, clicking operation, suspension procedure (operation of the user near touch screen) etc..Button operation is corresponding In user to the single-click operation, double click operation, long press operation, combination button of the keys such as the power key, volume key, Home key of terminal The operation such as operation.
Based on foregoing description, if method for secret protection provided by the embodiments of the present application can also include: terminal do not receive, It does not receive in the given time or does not receive above-mentioned first operations of preset times, then terminal exports third prompt information, this Three prompt informations include one of following information or a variety of: the accessed initial time of private data, private data are accessed Duration, access private data application title.
In the embodiment of the present application, during terminal exports above-mentioned first prompt information, user does not carry out the to terminal When one operation, have not enough time to respond first prompt information or the terminal for example, user is currently busy with other things When exporting the first prompt information, the terminal not user at one's side, in this way, user may have no knowledge about the private data of the user It is accessed, and the private data of user may be still within accessed state at present, it is also possible to the private data is tied Beam access may bring serious loss if user does not know the accessed situation of private data from beginning to end to user.Cause This, when exporting third prompt information in terminal, when terminal does not receive above-mentioned first operation, terminal exports third prompt information, On the one hand, the private data of the user user is reminded once to be accessed again, on the other hand, user can be according to third prompt information Content (the accessed initial time of i.e. above-mentioned private data, the private data accessed duration, access privacy number for including According to application title etc.) know the accessed details of its private data.
It should be noted that above-mentioned first prompt information is different from third prompt information in the embodiment of the present application, difference exists In the first prompt information is a real-time prompt information, i.e., terminal once detects that private data accesses, and terminal exports immediately First prompt information, first prompt information are that the event for prompting privacy of user data accessed has occurred, this first No longer include other content, only reminding effect in prompt information, then no longer exists after playing;And third prompt information is packet Contained specific content (second prompt information can be the text information of a similar notice or short message, or One voice messaging), it has stored in terminal, when user reuses mobile phone, the third prompt information can be read, obtained Know the accessed details of its private data.
In the embodiment of the present application, when terminal detects that the private data of user in terminal is accessed, the first prompt of output is believed After breath, terminal does not receive the first operation of user, and terminal exports third prompt information again, in this way, user can pass through The third prompt information knows the accessed details of the private data of user in terminal, and it is directly mutual with user to increase terminal It is dynamic, terminal and the interactive performance of user are improved, user experience is promoted.
It should be noted that the content that above-mentioned third prompt information is included may be other in the embodiment of the present application Information can specifically determine that the content that the third prompt information includes, the embodiment of the present application are not limited according to actual use demand It is fixed.
Optionally, in conjunction with Fig. 3, as shown in figure 11, after above-mentioned S102, private data guard method provided by the present application Can also include S105-S106:
S105, terminal show the first prompting frame, first prompting frame for prompt user forbid access private data or Continue to allow to access private data.
S106, terminal receive third operation of the user on the first prompting frame, and operate in response to third, forbid accessing Private data.
In the embodiment of the present application, when the private data of user is accessed in terminal, terminal can not only export above-mentioned first Prompt information prompts user, and terminal can also show the prompting frame that selection operation is carried out for user, so that user can make Corresponding operation is further continued for access private data to stop third party.
For example, user is chatted using the social APP 1 on mobile phone 300, mobile phone 300 issues prompt tone 1, the prompt tone at this time 1 camera for being used for prompt terminal is called, at this point, the touch screen of terminal displays the prompt box 301, shows in the prompting frame 301 The option of " APP 1 whether is allowed to continue the camera of calling mobile phone 300 " and " allow using " and " being forbidden to use ", if user The option for being somebody's turn to do " being forbidden to use " is clicked on the touchscreen, then mobile phone 300 is in response to the clicking operation, the camera shooting of closing hand phone 300 Head.
It should be noted that above-mentioned S105-S106 can be executed during executing S102 in the embodiment of the present application, I.e. terminal first exports the first prompt information, the first prompt information output during (terminal in above-mentioned preset time period not It is disconnected to export first prompt information), terminal shows the first prompting frame, forbids accessing user's so that user carries out corresponding operation Private data;Or S105-S106 can be executed after executing S102, the embodiment of the present application is not especially limited.
Terminal in above-described embodiment can be portable computer (such as mobile phone), laptop, personal computer (personal computer, PC), wearable terminal (such as smartwatch), tablet computer, augmented reality (augmented Reality, AR) virtual reality (virtual reality, VR) equipment, vehicle-mounted computer etc., the embodiment of the present application is to the terminal Concrete form do not do it is specifically limited.
It is understood that above-mentioned terminal is in order to realize the above functions, it comprises execute each corresponding hardware of function Structure and/or software module.Those skilled in the art should be readily appreciated that, describe in conjunction with the embodiments described herein Each exemplary unit and algorithm steps, the embodiment of the present application can with the combining form of hardware or hardware and computer software come It realizes.Some function is executed in a manner of hardware or computer software driving hardware actually, spy depending on technical solution Fixed application and design constraint.Professional technician can retouch each specific application using distinct methods to realize The function of stating, but this realization is it is not considered that exceed the range of the embodiment of the present application.
Figure 12 is please referred to, the embodiment of the present application is shown, a kind of structural schematic diagram of terminal 200 is provided.Wherein, terminal 200 It may include processor 210, external memory interface 220, internal storage 221, universal serial bus (universal Serial bus, USB) interface 230, charge management module 240, power management module 241, battery 242, antenna 1, antenna 2, shifting Dynamic communication module 250, wireless communication module 260, audio-frequency module 270, loudspeaker 270A, receiver 270B, microphone 270C, ear Machine interface 270D, sensor module 280, key 290, motor 291, indicator 292, camera 293, display screen 294, Yi Jiyong Family mark module (subscriber identification module, SIM) card interface 295 etc..Wherein sensor module 280 It may include pressure sensor 280A, gyro sensor 280B, baroceptor 280C, Magnetic Sensor 280D, acceleration biography Sensor 280E, range sensor 280F are touched and are passed close to optical sensor 280G, fingerprint sensor 280H, temperature sensor 280J Sensor 280K, ambient light sensor 280L, bone conduction sensor 280M etc..
It is understood that the specific restriction of the structure not structure paired terminal 200 of the embodiment of the present application signal.In this Shen Please in other embodiments, terminal 200 may include than illustrating more or fewer components, perhaps combine certain components or Split certain components or different component layouts.The component of diagram can be with hardware, and the combination of software or software and hardware is real It is existing.
Processor 210 may include one or more processing units, for example, processor 210 may include application processor (application processor, AP), modem processor, graphics processor (graphics processing Unit, GPU), image-signal processor (image signal processor, ISP), controller, memory, coding and decoding video Device, digital signal processor (digital signal processor, DSP), baseband processor and/or Processing with Neural Network Device (neural-network processing unit, NPU) etc..Wherein, different processing units can be independent device, Also it can integrate in one or more processors.
Above controller can be nerve center and the command centre of terminal 200.Controller can be according to instruction operation code And clock signal, operating control signal is generated, the control completing instruction fetch and executing instruction.
Memory can also be set in processor 210, for storing instruction and data.In some embodiments, processor Memory in 210 is cache memory.The memory can save the instruction that processor 210 is just used or is recycled Or data.If processor 210 needs to reuse the instruction or data, can be called directly from the memory.Avoid weight Access multiple, reduces the waiting time of processor 210, thus improves the efficiency of system.
In some embodiments, processor 210 may include one or more interfaces.Interface may include integrated circuit (inter-integrated circuit, I2C) interface, integrated circuit built-in audio (inter-integrated circuit Sound, I2S) interface, pulse code modulation (pulse code modulation, PCM) interface, universal asynchronous receiving-transmitting transmitter (universal asynchronous receiver/transmitter, UART) interface, mobile industry processor interface (mobile industry processor interface, MIPI), universal input export (general-purpose Input/output, GPIO) interface, Subscriber Identity Module (subscriber identity module, SIM) interface, and/or Universal serial bus (universal serial bus, USB) interface etc..
I2C interface is a kind of bi-directional synchronization universal serial bus, including serial data line (serial data line, SDA) He Yigen serial time clock line (derail clock line, SCL).In some embodiments, processor 210 may include Multiple groups I2C bus.Processor 210 can by different I2C bus interface distinguish coupled with touch sensors 280K, charger, Flash lamp, camera 293 etc..Such as: processor 210 can make processor by I2C interface coupled with touch sensors 280K 210 are communicated with touch sensor 280K by I2C bus interface, realize the touch function of terminal 200.
I2S interface can be used for voice communication.In some embodiments, processor 210 may include multiple groups I2S bus. Processor 210 can be coupled by I2S bus with audio-frequency module 270, be realized logical between processor 210 and audio-frequency module 270 Letter.In some embodiments, audio-frequency module 270 can transmit audio signal to wireless communication module 260 by I2S interface, real The function of now being received calls by bluetooth headset.
Pcm interface can be used for voice communication, by analog signal sampling, quantization and coding.In some embodiments, sound Frequency module 270 can be coupled with wireless communication module 260 by pcm bus interface.In some embodiments, audio-frequency module 270 Audio signal can also be transmitted to wireless communication module 260 by pcm interface, realize the function to receive calls by bluetooth headset Energy.The I2S interface and the pcm interface may be used to voice communication.
UART interface is a kind of Universal Serial Bus, is used for asynchronous communication.The bus can be bidirectional communications bus. The data that it will be transmitted are converted between serial communication and parallel communications.In some embodiments, UART interface usually by with In connection processor 210 and wireless communication module 260.Such as: processor 210 passes through UART interface and wireless communication module 260 In bluetooth module communication, realize Bluetooth function.In some embodiments, audio-frequency module 270 can be by UART interface to nothing Line communication module 260 transmits audio signal, realizes the function that music is played by bluetooth headset.
MIPI interface can be used to connect the peripheral components such as processor 210 and display screen 294, camera 293.MIPI connects Mouth includes camera serial line interface (camera serial interface, CSI), display screen serial line interface (display Serial interface, DSI) etc..In some embodiments, processor 210 and camera 293 are communicated by CSI interface, real The shooting function of existing terminal 200.Processor 210 and display screen 294 realize the display function of terminal 200 by DSI interface communication Energy.
GPIO interface can pass through software configuration.GPIO interface can be configured as control signal, may be alternatively configured as counting It is believed that number.In some embodiments, GPIO interface can be used for connecting processor 210 and camera 293, display screen 294, wirelessly Communication module 260, audio-frequency module 270, sensor module 280 etc..GPIO interface can be additionally configured to I2C interface, and I2S connects Mouthful, UART interface, MIPI interface etc..
USB interface 230 is the interface for meeting USB standard specification, specifically can be Mini USB interface, and Micro USB connects Mouthful, USB Type C interface etc..USB interface 230 can be used for connecting charger for the charging of terminal 200, can be used for terminal Data are transmitted between 200 and peripheral equipment.It can be used for connection earphone, audio played by earphone.The interface can also be used In connection other terminals, such as AR equipment etc..
It is understood that the interface connection relationship of each intermodule of the embodiment of the present application signal, only schematically illustrates, The not structure qualification of structure paired terminal 200.In other embodiments of the application, terminal 200 can also use above-mentioned implementation The combination of different interface connection type or multiple interfaces connection type in example.
Above-mentioned processor 210 can support terminal 200 execute above-described embodiment in S101, S102, S103, S104, Other movements in S1021a, S1021b, S1022, S1023, S105, S106 and above-described embodiment, and will not be described here in detail.
Charge management module 240 is used to receive charging input from charger.Wherein, charger can be wireless charger, It is also possible to wired charger.In the embodiment of some wired chargings, charge management module 240 can pass through USB interface 230 Receive the charging input of wired charger.In the embodiment of some wireless chargings, charge management module 240 can pass through terminal 200 Wireless charging coil receives wireless charging input.While charge management module 240 is that battery 242 charges, it can also lead to Power management module 241 is crossed as terminal power supply.
Power management module 241 is for connecting battery 242, charge management module 240 and processor 210.Power management mould Block 241 receives the input of battery 242 and/or charge management module 240, is processor 210, internal storage 221, external storage Device, display screen 294, the power supply such as camera 293 and wireless communication module 260.Power management module 241 can be also used for monitoring Battery capacity, circulating battery number, the parameters such as cell health state (electric leakage, impedance).In some other embodiment, power supply pipe Reason module 241 also can be set in processor 210.In further embodiments, power management module 241 and Charge Management mould Block 240 also can be set in the same device.
The wireless communication function of terminal 200 can pass through antenna 1, antenna 2, mobile communication module 250, wireless communication module 260, modem processor and baseband processor etc. are realized.
Antenna 1 and antenna 2 electromagnetic wave signal for transmitting and receiving.Each antenna in terminal 200 can be used for covering list A or multiple communication bands.Different antennas can also be multiplexed, to improve the utilization rate of antenna.Such as: antenna 1 can be multiplexed For the diversity antenna of WLAN.In other embodiments, antenna can be used in combination with tuning switch.
Mobile communication module 250 can provide the solution of wireless communications such as including 2G/3G/4G/5G applied in terminal 200 Certainly scheme.Mobile communication module 250 may include at least one filter, switch, power amplifier, low-noise amplifier (low Noise amplifier, LNA) etc..Mobile communication module 250 can receive electromagnetic wave by antenna 1, and to received electromagnetic wave It is filtered, the processing such as amplification is sent to modem processor and is demodulated.Mobile communication module 250 can also be to through adjusting The modulated signal amplification of demodulation processor processed, switchs to electromagenetic wave radiation through antenna 1 and goes out.In some embodiments, mobile logical At least partly functional module of letter module 250 can be arranged in processor 210.In some embodiments, mobile communication mould At least partly functional module of block 250 can be arranged in the same device at least partly module of processor 210.
Modem processor may include modulator and demodulator.Wherein, modulator is used for low frequency base to be sent Band signal is modulated into high frequency signal.Demodulator is used to received electromagnetic wave signal being demodulated into low frequency baseband signal.Then solution Adjust device that the low frequency baseband signal that demodulation obtains is sent to baseband processor.Low frequency baseband signal is through baseband processor Afterwards, it is delivered to application processor.Application processor is defeated by audio frequency apparatus (being not limited to loudspeaker 270A, receiver 270B etc.) Voice signal out, or image or video are shown by display screen 294.In some embodiments, modem processor can be Independent device.In further embodiments, modem processor can be independently of processor 210, with mobile communication module 250 or other function module be arranged in the same device.
It includes WLAN (wireless local that wireless communication module 260, which can be provided and be applied in terminal 200, Area networks, WLAN) (such as Wireless Fidelity (wireless fidelity, Wi-Fi) network), bluetooth (bluetooth, BT), Global Navigation Satellite System (global navigation satellite system, GNSS), frequency modulation (frequency Modulation, FM), the short distance wireless communication technology (near field communication, NFC), infrared technique The solution of wireless communications such as (infrared, IR).Wireless communication module 260 can be integrated into a few communication process mould One or more devices of block.Wireless communication module 260 receives electromagnetic wave via antenna 2, by electromagnetic wave signal frequency modulation and filter Wave processing, by treated, signal is sent to processor 210.Wireless communication module 260 can also receive pending from processor 210 The signal sent carries out frequency modulation to it, and amplification switchs to electromagenetic wave radiation through antenna 2 and goes out.
In some embodiments, antenna 1 and mobile communication module 250 coupling of terminal 200, antenna 2 and radio communication mold Block 260 couples, and allowing terminal 200, technology is communicated with network and other equipment by wireless communication.The wireless communication skill Art may include global system for mobile communications (global system for mobile communications, GSM), general It is grouped wireless service (general packet radio service, GPRS), CDMA accesses (code division Multiple access, CDMA), wideband code division multiple access (wideband code division multiple access, WCDMA), time division CDMA (time-division code division multiple access, TD-SCDMA), it is long Phase evolution (long term evolution, LTE), BT, GNSS, WLAN, NFC, FM and/or IR technology etc..The GNSS can be with Including GPS (global positioning system, GPS), Global Navigation Satellite System (global Navigation satellite system, GLONASS), Beidou satellite navigation system (beidou navigation Satellite system, BDS), quasi- zenith satellite system (quasi-zenith satellite system, QZSS) and/or Satellite-based augmentation system (satellite based augmentation systems, SBAS).
Terminal 200 realizes display function by GPU, display screen 294 and application processor etc..GPU is image procossing Microprocessor connects display screen 294 and application processor.GPU is calculated for executing mathematics and geometry, is rendered for figure.Place Managing device 210 may include one or more GPU, execute program instructions to generate or change display information.
Display screen 294 is for showing image, video etc..Display screen 294 includes display panel.Display panel can use liquid Crystal display screen (liquid crystal display, LCD), Organic Light Emitting Diode (organic light-emitting Diode, OLED), active matrix organic light-emitting diode or active-matrix organic light emitting diode (active-matrix Organic light emitting diode's, AMOLED), Flexible light-emitting diodes (flex light-emitting Diode, FLED), Miniled, MicroLed, Micro-oLed, light emitting diode with quantum dots (quantum dot light Emitting diodes, QLED) etc..In some embodiments, terminal 200 may include 1 or N number of display screen 294, and N is big In 1 positive integer.For example, in above-described embodiment, the touch screen display icon of terminal 200 prompts taking the photograph for user terminal 200 It is invoked as first 293.
Terminal 200 can pass through ISP, camera 293, Video Codec, GPU, display screen 294 and application processor Deng realization shooting function.
ISP is used to handle the data of the feedback of camera 293.For example, opening shutter when taking pictures, light is passed by camera lens It is delivered on camera photosensitive element, optical signal is converted to electric signal, and camera photosensitive element passes to the electric signal at ISP Reason, is converted into macroscopic image.ISP can also be to the noise of image, brightness, colour of skin progress algorithm optimization.ISP can be with Exposure to photographed scene, the parameter optimizations such as colour temperature.In some embodiments, ISP can be set in camera 293.
Camera 293 is for capturing still image or video.Object generates optical imagery by camera lens and projects photosensitive member Part.Photosensitive element can be charge-coupled device (charge coupled device, CCD) or complementary metal oxide is partly led Body (complementary metal-oxide-semiconductor, CMOS) phototransistor.Photosensitive element turns optical signal It changes electric signal into, electric signal is passed into ISP later and is converted into data image signal.Data image signal is output to DSP by ISP Working process.Data image signal is converted into the RGB of standard, the picture signal of the formats such as YUV by DSP.In some embodiments, Terminal 200 may include 1 or N number of camera 293, and N is the positive integer greater than 1.
Digital signal processor, in addition to can handle data image signal, can also handle it for handling digital signal His digital signal.For example, digital signal processor is used to carry out Fourier to frequency point energy when terminal 200 is when frequency point selects Transformation etc..
Video Codec is used for compression of digital video or decompression.Terminal 200 can support one or more videos Codec.In this way, terminal 200 can play or record the video of a variety of coded formats, and such as: dynamic image expert group (moving picture experts group, MPEG) 1, MPEG2, mpeg 3, MPEG4 etc..
NPU is neural network (neural-network, NN) computation processor, by using for reference biological neural network structure, Such as transfer mode between human brain neuron is used for reference, it, can also continuous self study to input information fast processing.Pass through NPU The application such as intelligent cognition of terminal 200 may be implemented, such as: image recognition, recognition of face, speech recognition, text understanding etc..
External memory interface 220 can be used for connecting external memory card, such as Micro SD card, realize extension terminal 200 storage capacity.External memory card is communicated by external memory interface 220 with processor 210, realizes that data store function Energy.Such as by music, the files such as video are stored in external memory card.
Internal storage 221 can be used for storing computer executable program code, which includes referring to It enables.Processor 210 is stored in the instruction of internal storage 221 by operation, thereby executing terminal 200 various function application with And data processing.Internal storage 221 may include storing program area and storage data area.Wherein, storing program area can store Operating system, application program (such as sound-playing function, image player function etc.) needed at least one function etc..Store number The data (such as audio data, phone directory etc.) etc. created in 200 use process of terminal can be stored according to area.In addition, inside is deposited Reservoir 221 may include high-speed random access memory, can also include nonvolatile memory, and a for example, at least disk is deposited Memory device, flush memory device, generic flash memory (universal flash storage, UFS) etc..
Terminal 200 can pass through audio-frequency module 270, loudspeaker 270A, receiver 270B, microphone 270C, earphone interface 270D and application processor etc. realize audio-frequency function.Such as music, recording etc..
Audio-frequency module 270 is used to for digitized audio message to be converted into analog audio signal output, is also used for analogue audio frequency Input is converted to digital audio and video signals.Audio-frequency module 270 can be also used for audio-frequency signal coding and decoding.In some embodiments In, audio-frequency module 270 can be set in processor 210, or the partial function module of audio-frequency module 270 is set to processor In 210.
Loudspeaker 270A, also referred to as " loudspeaker ", for audio electrical signal to be converted to voice signal.Terminal 200 can pass through Loudspeaker 270A listens to music, or listens to hand-free call, for example, terminal 200 is defeated by loudspeaker 270A in above-described embodiment One section of prompt tone out prompts the camera 293 of user's terminal 200 to be invoked.
Receiver 270B, also referred to as " earpiece ", for audio electrical signal to be converted into voice signal.When terminal 200 answers electricity It, can be by the way that receiver 270B be answered voice close to human ear when words or voice messaging.
Microphone 270C, also referred to as " microphone ", " microphone ", for voice signal to be converted to electric signal.When making a phone call Or when sending voice messaging, voice signal can be input to microphone by mouth close to microphone 270C sounding by user 270C.At least one microphone 270C can be set in terminal 200.In further embodiments, two wheats can be set in terminal 200 Gram wind 270C can also realize decrease of noise functions in addition to collected sound signal.In further embodiments, terminal 200 can also be set Three, four or more microphone 270C are set, realizes that collected sound signal, noise reduction can also identify sound source, realizes orientation Sound-recording function etc..
Earphone interface 270D is for connecting wired earphone.Earphone interface 270D can be USB interface 230, be also possible to Opening mobile-terminal platform (open mobile terminal platform, OMTP) standard interface of 3.5mm, American cellular Telecommunications industry association (cellular telecommunications industry association of the USA, CTIA) standard interface.
Pressure signal can be converted into electric signal for experiencing pressure signal by pressure sensor 280A.In some implementations In example, pressure sensor 280A be can be set in display screen 294.There are many type of pressure sensor 280A, such as resistive pressure Sensor, inductance pressure transducer, capacitance pressure transducer, etc..Capacitance pressure transducer, can be including at least two Parallel-plate with conductive material.When effectively acting on pressure sensor 280A, the capacitor between electrode changes.200, terminal The intensity of pressure is determined according to the variation of capacitor.When there is touch operation to act on display screen 294, terminal 200 is according to pressure sensor 280A detects the touch operation intensity.Terminal 200 can also calculate the position touched according to the detection signal of pressure sensor 280A It sets.In some embodiments, identical touch location, but the touch operation of different touch operation intensity are acted on, can be corresponded to not Same operational order.Such as: when the touch operation for having touch operation intensity to be less than first pressure threshold value acts on short message application When icon, the instruction for checking short message is executed.When the touch operation for thering is touch operation intensity to be greater than or equal to first pressure threshold value When acting on short message application icon, the instruction of newly-built short message is executed, such as the first operation in above-described embodiment.
Gyro sensor 280B is determined for the athletic posture of terminal 200.In some embodiments, can pass through Gyro sensor 280B determines that terminal 200 surrounds the angular speed of three axis (i.e. x, y and z-axis).Gyro sensor 280B can For shooting stabilization.Illustratively, when pressing shutter, gyro sensor 280B detects the angle that terminal 200 is shaken, according to Angle calculation goes out the distance that lens module needs to compensate, and camera lens is allowed to offset the shake of terminal 200 by counter motion, realizes anti- It trembles.Gyro sensor 280B can be also used for navigating, somatic sensation television game scene.
Baroceptor 280C is for measuring air pressure.In some embodiments, terminal 200 is surveyed by baroceptor 280C The atmospheric pressure value obtained calculates height above sea level, auxiliary positioning and navigation.
Magnetic Sensor 280D includes Hall sensor.Terminal 200 can use Magnetic Sensor 280D flip cover leather sheath Folding.In some embodiments, when terminal 200 is liding machine, terminal 200 can be according to Magnetic Sensor 280D flip cover Folding.And then according to the folding condition of the leather sheath detected or the folding condition of flip lid, the characteristics such as setting flip lid automatic unlocking.
Acceleration transducer 280E can detect the size of (the generally three axis) acceleration in all directions of terminal 200.When Terminal 200 can detect that size and the direction of gravity when static.It can be also used for identification terminal posture, cut applied to horizontal/vertical screen It changes, the application such as pedometer.
Range sensor 280F, for measuring distance.Terminal 200 can pass through infrared or laser distance measuring.Some In embodiment, photographed scene, terminal 200 can use range sensor 280F ranging to realize rapid focus.
It may include such as light emitting diode (LED) and photodetector, such as photodiode close to optical sensor 280G. Light emitting diode can be infrared light-emitting diode.Terminal 200 launches outward infrared light by light emitting diode.Terminal 200 makes The infrared external reflection light from neighbouring object is detected with photodiode.When detecting sufficient reflected light, terminal can be determined 200 nearby have object.When detecting insufficient reflected light, terminal 200 can determine terminal 200 nearby without object.Eventually End 200 can use close to optical sensor 280G and detect user's handheld terminal 200 close to ear call, so as to automatic distinguishing screen Achieve the purpose that power saving.It can also be used for leather sheath mode, pocket pattern automatic unlocking and screen locking close to optical sensor 280G.
Ambient light sensor 280L is for perceiving environmental light brightness.Terminal 200 can according to the environmental light brightness of perception from It adapts to adjust 294 brightness of display screen.Automatic white balance adjustment when ambient light sensor 280L can also be used for taking pictures.Ambient light sensing Device 280L can also cooperate with close to optical sensor 280G, terminal 200 be detected whether in pocket, with false-touch prevention.
Fingerprint sensor 280H is for acquiring fingerprint.The fingerprint characteristic that terminal 200 can use acquisition realizes unlocked by fingerprint, Application lock is accessed, fingerprint is taken pictures, fingerprint incoming call answering etc..
Temperature sensor 280J is for detecting temperature.In some embodiments, terminal 200 is examined using temperature sensor 280J The temperature of survey executes Temperature Treatment strategy.For example, terminal 200 executes when the temperature sensor 280J temperature reported is more than threshold value The performance for the processor being located near temperature sensor 280J is reduced, implements Thermal protection to reduce power consumption.In other implementations In example, when temperature is lower than another threshold value, terminal 200 heats battery 242, causes terminal 200 to be shut down extremely to avoid low temperature. In some other embodiment, when temperature is lower than another threshold value, terminal 200 executes boosting to the output voltage of battery 242, with It avoids shutting down extremely caused by low temperature.
Touch sensor 280K, also referred to as " touch panel ".Touch sensor 280K can be set in display screen 294, by touching It touches sensor 280K and display screen 294 forms touch screen, also referred to as " touch screen ".Touch sensor 280K acts on it for detecting On or near touch operation.The touch operation that touch sensor can will test passes to application processor, to determine touching Touch event type.Visual output relevant to touch operation can be provided by display screen 294.In further embodiments, it touches Touching sensor 280K also can be set in the surface of terminal 200, different from the location of display screen 294.For example, above-mentioned implementation The first operation in example.
The available vibration signal of bone conduction sensor 280M.In some embodiments, bone conduction sensor 280M can be with Obtain the vibration signal of human body part vibration bone block.Bone conduction sensor 280M can also contact human pulse, receive blood pressure and jump Dynamic signal.In some embodiments, bone conduction sensor 280M also can be set in earphone, be combined into bone conduction earphone.Sound Frequency module 270 can parse voice letter based on the vibration signal for the part vibration bone block that bone conduction sensor 280M is obtained Number, realize phonetic function.The blood pressure jitter that application processor can be obtained based on bone conduction sensor 280M parses the heart Rate information realizes heart rate detecting function.
Key 290 includes power button, volume key etc..Key 290 can be mechanical key.It is also possible to touch-key. Terminal 200 can receive key-press input, generate key signals input related with the user setting of terminal 200 and function control. For example, first in above-described embodiment operates.
Motor 291 can produce vibration prompt.Motor 291 can be used for calling vibration prompt, can be used for touching vibration Dynamic feedback.For example, acting on the touch operation of different application (such as taking pictures, audio broadcasting etc.), different vibrations can be corresponded to Feedback effects.The touch operation of 294 different zones of display screen is acted on, motor 291 can also correspond to different vibrational feedback effects. Different application scenarios (such as: time alarm receives information, alarm clock, game etc.) different vibrational feedback effects can also be corresponded to Fruit.Touch vibrational feedback effect can also be supported customized.For example, terminal 200 can pass through motor 291 in above-described embodiment Vibration prompt is issued, to prompt the camera 293 for terminal 200 to be invoked.
Indicator 292 can be indicator light, can serve to indicate that charged state, electric quantity change can be used for instruction and disappear Breath, missed call, notice etc..For example, user terminal can be prompted when the indicator 292 of terminal 200 is lighted in above-described embodiment 200 camera 293 is invoked
SIM card interface 295 is for connecting SIM card.SIM card can be by being inserted into SIM card interface 295, or from SIM card interface 295 extract, and realization is contacting and separating with terminal 200.Terminal 200 can support that 1 or N number of SIM card interface, N are greater than 1 Positive integer.SIM card interface 295 can support Nano SIM card, Micro SIM card, SIM card etc..The same SIM card interface 195 It can be inserted into multiple cards simultaneously.The type of multiple cards may be the same or different.SIM card interface 295 can also be compatible with not The SIM card of same type.SIM card interface 295 can also be with compatible external storage card.Terminal 200 is real by SIM card and network interaction The now functions such as call and data communication.In some embodiments, terminal 200 uses eSIM, it may be assumed that embedded SIM card.ESIM card It can cannot be separated with terminal 200 in terminal 200.
The embodiment of the present application also provides a kind of mobile terminal, which includes first detection module, for detecting spy Determine application access privacy of user data;First cue module, for exporting the first prompt information, first prompt information is used for It is confirmed whether that the specific application is allowed to access the privacy of user data;Access control module, for receiving the confirmation of user Information executes and accesses the privacy of user data, wherein the confirmation message, which is used to indicate, allows the specific application to access institute State private data;Second detection module, for accessing the privacy of user data and then secondary detecting that the specific application is visited Ask the privacy of user data;Second cue module, for exporting the second prompt information, second prompt information is for prompting Private data described in user is accessed.Wherein, the step of above-mentioned each module executes above method embodiment and protection scope.Here It no longer applies and states.
The embodiment of the present application also provides a kind of computer storage medium, and computer journey is stored in the computer storage medium Sequence code, when above-mentioned processor executes the computer program code, which is executed in Fig. 3, Fig. 8 or Figure 11 either figure Correlation technique step realizes the method in above-described embodiment.
The embodiment of the present application also provides a kind of computer program products, when the computer program product is transported on computers When row, so that computer executes the correlation technique step in Fig. 3, Fig. 8 or Figure 11 either figure and realizes side in above-described embodiment Method.
Wherein, terminal 1000, computer storage medium or computer program product provided by the embodiments of the present application are used In executing corresponding method presented above, therefore, attainable beneficial effect can refer to correspondence presented above Method in beneficial effect, details are not described herein again.
Through the above description of the embodiments, it is apparent to those skilled in the art that, for description It is convenienct and succinct, only the example of the division of the above functional modules, in practical application, can according to need and will be upper It states function distribution to be completed by different functional modules, i.e., the internal structure of device is divided into different functional modules, to complete All or part of function described above.
In several embodiments provided herein, it should be understood that disclosed device and method can pass through it Its mode is realized.For example, the apparatus embodiments described above are merely exemplary, for example, stroke of the module or unit Point, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units or components can To combine or be desirably integrated into another device, or some features can be ignored or not executed.Another point, it is shown or beg for The mutual coupling, direct-coupling or communication connection of opinion can be through some interfaces, the INDIRECT COUPLING of device or unit Or communication connection, it can be electrical property, mechanical or other forms.
Unit may or may not be physically separated as illustrated by the separation member for this, show as unit Component can be a physical unit or multiple physical units, it can it is in one place, or may be distributed over more A different places.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, each functional unit in each embodiment of the application can integrate in one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Formal implementation of hardware both can be used in member, and the form that SFU software functional unit also can be used is realized.
If the integrated unit is realized in the form of SFU software functional unit and when sold or used as an independent product, It can store in a read/write memory medium.Based on this understanding, the technical solution of the embodiment of the present application substantially or Person says that all or part of the part that contributes to existing technology or the technical solution can body in the form of software products Reveal and, which is stored in a storage medium, including some instructions are used so that an equipment (can be monolithic Machine, chip etc.) or processor (processor) execute each embodiment this method of the application all or part of the steps.And it is preceding The storage medium stated includes: various Jie that can store program code such as USB flash disk, mobile hard disk, ROM, RAM, magnetic or disk Matter.
It is somebody's turn to do above, only the specific embodiment of the application, but the protection scope of the application is not limited thereto, Ren He The change or replacement in technical scope that the application discloses, should all cover within the scope of protection of this application.Therefore, the application Protection scope should be subject to the scope of protection of the claims.

Claims (26)

1. a kind of private data guard method characterized by comprising
Terminal detects that specific application accesses privacy of user data;
The terminal exports the first prompt information, and first prompt information allows the specific application to access for being confirmed whether The privacy of user data;
The terminal receives the confirmation message of user, executes and accesses the privacy of user data, wherein the confirmation message is used for Instruction allows the specific application to access the private data;
After privacy of user data described in the terminal access, the terminal detects that the specific application accesses the use again Family private data;
The terminal exports the second prompt information, and second prompt information is for prompting private data described in user accessed.
2. the method according to claim 1, wherein
The private data includes at least following one or more: audio or video data, position data, account data, communication Record, image data, privacy application or privacy function.
3. method according to claim 1 or 2, which is characterized in that the method also includes: the terminal output second mentions Show that information, second prompt information allow the specific application to access the privacy of user data for prompting the user whether;
The terminal accesses the privacy of user data after the second confirmation message for receiving user, wherein second confirmation Information allows the specific application to access the privacy of user data for confirming the second prompt information.
4. method according to claim 1 or 2, which is characterized in that the method also includes: the terminal output second mentions Show information, second prompt information is for prompting specific application described in user to access the privacy of user data.
5. according to claim 1 to described in any item methods, which is characterized in that the terminal exports the first prompt information, packet It includes:
The terminal exports first prompt information within a preset period of time;Or,
The terminal exports first prompt information according to preset times.
6. the method according to claim 1, wherein the method also includes:
In the preset time period, the terminal receives first operation of the user to the terminal, and the terminal stops output The first or second prompt information;Or,
The number that the terminal exports the first or second prompt information is less than or equal to the preset times, the terminal First operation of the user to the terminal is received, the terminal stops exporting first prompt information.
7. according to the method described in claim 6, it is characterized in that, the method also includes:
If the terminal does not receive, do not receive in the given time or does not receive first operation of preset times, institute Terminal output third prompt information is stated, the third prompt information includes one of following information or a variety of: the privacy number According to accessed initial time, the private data accessed duration, the title of the application of the access private data.
8. the method according to claim 1, wherein
The first or second prompt information includes one or more of following prompt information: prompt tone, vibration prompt, interface Prompt, indicator light prompt.
9. a kind of mobile terminal for protecting private data characterized by comprising one or more processors, memory, display Screen;The memory, the display screen are coupled by data/address bus with the processor;The memory is for storing computer Program code;The computer program code includes computer instruction, when the processor executes above-mentioned computer instruction, control Make the following method of the mobile terminal execution:
Detect that specific application accesses privacy of user data;
The first prompt information is exported, first prompt information allows the specific application to access the user for being confirmed whether Private data;
The confirmation message of user is received, executes and accesses the privacy of user data, wherein the confirmation message is used to indicate permission The specific application accesses the private data;
It accesses the privacy of user data and then secondary detects that the specific application accesses the privacy of user data;
The second prompt information is exported, second prompt information is for prompting private data described in user accessed.
10. terminal according to claim 9, which is characterized in that
The private data includes at least following one or more: audio or video data, position data, account data, communication Record, image data, privacy application or privacy function.
11. terminal according to claim 9 or 10, which is characterized in that the processor is also used to control the terminal and holds Row following steps: control display screen exports the second prompt information, and second prompt information allows institute for prompting the user whether It states specific application and accesses the privacy of user data;
After the mobile terminal receives the second confirmation message of user, the privacy of user data are accessed, wherein described second really Recognize information for confirm the second prompt information, allow the specific application access privacy of user data.
12. terminal according to claim 9 or 10, which is characterized in that the processor is also used to control the terminal and holds Row following steps: the terminal exports the second prompt information, and second prompt information is for prompting specific application described in user The privacy of user data are accessed.
13. terminal according to claim 9, which is characterized in that
The first prompt information of the output, comprising:
The terminal exports first prompt information within a preset period of time;Or,
The terminal exports first prompt information according to preset times.
14. terminal according to claim 9, which is characterized in that the processor is also used to control the terminal and executes:
In the preset time period, first operation of the user to the terminal is received, stops exporting first prompt information; Or,
In the case where the number for exporting first prompt information is less than or equal to the preset times, user is received to institute The first operation for stating terminal, stops exporting first prompt information.
15. terminal according to claim 13, which is characterized in that the processor is also used to control the terminal and executes:
If the terminal does not receive, do not receive in the given time or does not receive first operation of preset times, institute Terminal output third prompt information is stated, the third prompt information includes one of following information or a variety of: the privacy number According to accessed initial time, the private data accessed duration, the title of the application of the access private data.
16. terminal according to claim 9, which is characterized in that
The first or second prompt information includes one or more of following prompt information: prompt tone, vibration prompt, interface Prompt, indicator light prompt.
17. a kind of mobile terminal for protecting private data, which is characterized in that the mobile terminal includes:
First detection module, for detecting specific application access privacy of user data;
First cue module, for exporting the first prompt information, first prompt information is for being confirmed whether to allow the spy Determine privacy of user data described in application access;
Access control module executes for receiving the confirmation message of user and accesses the privacy of user data, wherein described true Recognize information and is used to indicate the permission specific application access private data;
Second detection module, for accessing the privacy of user data and then secondary detecting described in specific application access Privacy of user data;
Second cue module, for exporting the second prompt information, second prompt information is for prompting privacy number described in user According to accessed.
18. terminal according to claim 17, which is characterized in that
The private data includes at least following one or more: audio or video data, position data, account data, communication Record, image data, privacy application or privacy function.
19. terminal described in 7 or 18 according to claim 1, which is characterized in that second cue module is also used to export Two prompt informations, second prompt information allow the specific application to access the privacy of user number for prompting the user whether According to;
The access control module after the second confirmation message for receiving user, accesses the privacy of user data, wherein Second confirmation message allows the specific application to access the privacy of user data for confirming the second prompt information.
20. terminal described in 7 or 18 according to claim 1, which is characterized in that second cue module is also used to export Two prompt informations, second prompt information is for prompting specific application described in user to access the privacy of user data.
21. terminal according to claim 17, which is characterized in that
First cue module, specifically for exporting first prompt information within a preset period of time;Or, according to default time Number exports first prompt information.
22. terminal according to claim 17, which is characterized in that first cue module is also used to described default In period, first operation of the user to the terminal is received, stops exporting first prompt information;Or,
In the case where the number for exporting first prompt information is less than or equal to the preset times, user is received to institute The first operation for stating terminal, stops exporting first prompt information.
23. terminal according to claim 22, which is characterized in that the terminal further includes third cue module, if for First operation for not receiving, not receiving in the given time or not receiving preset times, then export third prompt information, The third prompt information includes one of following information or a variety of: the accessed initial time of the private data, described The title of the application of duration, the access private data that private data is accessed.
24. terminal according to claim 17, which is characterized in that the first or second prompt information includes following prompt One or more of information: prompt tone, vibration prompt, interface prompt, indicator light prompt.
25. a kind of computer storage medium, which is characterized in that the computer storage medium includes computer instruction, when described When computer instruction is run at the terminal, so that the terminal executes privacy number as claimed in any of claims 1 to 8 in one of claims According to guard method.
26. a kind of computer program product, which is characterized in that when the computer program product is run on computers, make It obtains the computer and executes private data guard method as claimed in any of claims 1 to 8 in one of claims.
CN201811644527.2A 2018-12-29 2018-12-29 A kind of private data guard method and terminal Withdrawn CN110336910A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811644527.2A CN110336910A (en) 2018-12-29 2018-12-29 A kind of private data guard method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811644527.2A CN110336910A (en) 2018-12-29 2018-12-29 A kind of private data guard method and terminal

Publications (1)

Publication Number Publication Date
CN110336910A true CN110336910A (en) 2019-10-15

Family

ID=68138823

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811644527.2A Withdrawn CN110336910A (en) 2018-12-29 2018-12-29 A kind of private data guard method and terminal

Country Status (1)

Country Link
CN (1) CN110336910A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111131189A (en) * 2019-12-09 2020-05-08 维沃移动通信有限公司 Data protection method and electronic equipment
CN111667033A (en) * 2020-04-29 2020-09-15 东北大学 Information reading auxiliary system and method for safe medication of visually impaired people
WO2021022433A1 (en) * 2019-08-05 2021-02-11 宇龙计算机通信科技(深圳)有限公司 Application monitoring method and apparatus, and storage medium and electronic device
CN113068154A (en) * 2021-03-17 2021-07-02 恒大新能源汽车投资控股集团有限公司 Vehicle information safety processing method, device and system
WO2021136138A1 (en) * 2019-12-31 2021-07-08 维沃移动通信有限公司 Information prompting method and electronic device
CN113890745A (en) * 2020-07-02 2022-01-04 华为技术有限公司 Service connection decision method and device and electronic equipment
CN114489419A (en) * 2022-01-13 2022-05-13 荣耀终端有限公司 Authority control method and electronic equipment
CN115630388A (en) * 2021-08-12 2023-01-20 荣耀终端有限公司 Permission optimization method and related equipment

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102045712A (en) * 2011-01-04 2011-05-04 奇智软件(北京)有限公司 Anti-monitoring method and system for mobile terminal
CN103368904A (en) * 2012-03-27 2013-10-23 百度在线网络技术(北京)有限公司 Mobile terminal, and system and method for suspicious behavior detection and judgment
CN103488939A (en) * 2013-08-30 2014-01-01 小米科技有限责任公司 Method, device and terminal for prompting user
CN105574380A (en) * 2016-01-11 2016-05-11 广东欧珀移动通信有限公司 Application authority management method and device for terminal
US20170193218A1 (en) * 2015-12-30 2017-07-06 The Regents Of The University Of Michigan Reducing Unregulated Aggregation Of App Usage Behaviors
CN107563187A (en) * 2017-08-30 2018-01-09 广东欧珀移动通信有限公司 Access operation monitoring method, device, mobile terminal and readable storage medium storing program for executing
CN107622203A (en) * 2017-09-30 2018-01-23 广东欧珀移动通信有限公司 Guard method, device, storage medium and the electronic equipment of sensitive information

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102045712A (en) * 2011-01-04 2011-05-04 奇智软件(北京)有限公司 Anti-monitoring method and system for mobile terminal
CN103368904A (en) * 2012-03-27 2013-10-23 百度在线网络技术(北京)有限公司 Mobile terminal, and system and method for suspicious behavior detection and judgment
CN103488939A (en) * 2013-08-30 2014-01-01 小米科技有限责任公司 Method, device and terminal for prompting user
US20170193218A1 (en) * 2015-12-30 2017-07-06 The Regents Of The University Of Michigan Reducing Unregulated Aggregation Of App Usage Behaviors
CN105574380A (en) * 2016-01-11 2016-05-11 广东欧珀移动通信有限公司 Application authority management method and device for terminal
CN107563187A (en) * 2017-08-30 2018-01-09 广东欧珀移动通信有限公司 Access operation monitoring method, device, mobile terminal and readable storage medium storing program for executing
CN107622203A (en) * 2017-09-30 2018-01-23 广东欧珀移动通信有限公司 Guard method, device, storage medium and the electronic equipment of sensitive information

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021022433A1 (en) * 2019-08-05 2021-02-11 宇龙计算机通信科技(深圳)有限公司 Application monitoring method and apparatus, and storage medium and electronic device
CN111131189A (en) * 2019-12-09 2020-05-08 维沃移动通信有限公司 Data protection method and electronic equipment
WO2021136138A1 (en) * 2019-12-31 2021-07-08 维沃移动通信有限公司 Information prompting method and electronic device
CN111667033A (en) * 2020-04-29 2020-09-15 东北大学 Information reading auxiliary system and method for safe medication of visually impaired people
CN113890745A (en) * 2020-07-02 2022-01-04 华为技术有限公司 Service connection decision method and device and electronic equipment
CN113890745B (en) * 2020-07-02 2023-02-03 华为技术有限公司 Service connection decision method, device, electronic equipment and readable storage medium
CN113068154A (en) * 2021-03-17 2021-07-02 恒大新能源汽车投资控股集团有限公司 Vehicle information safety processing method, device and system
CN115630388A (en) * 2021-08-12 2023-01-20 荣耀终端有限公司 Permission optimization method and related equipment
CN115630388B (en) * 2021-08-12 2023-08-29 荣耀终端有限公司 Authority optimization method and related equipment
CN114489419A (en) * 2022-01-13 2022-05-13 荣耀终端有限公司 Authority control method and electronic equipment

Similar Documents

Publication Publication Date Title
CN110336910A (en) A kind of private data guard method and terminal
CN110506416A (en) A kind of method and terminal of terminal switching camera
CN110119295A (en) A kind of display control method and relevant apparatus
CN109766043A (en) The operating method and electronic equipment of electronic equipment
CN109782944A (en) A kind of response method and electronic equipment of touch screen
CN109584879A (en) A kind of sound control method and electronic equipment
CN110381282A (en) A kind of display methods and relevant apparatus of the video calling applied to electronic equipment
CN110058777A (en) The method and electronic equipment of shortcut function starting
CN110191442A (en) A kind of Bluetooth connecting method, equipment and system
CN110012154A (en) A kind of control method and electronic equipment of the electronic equipment with Folding screen
CN110489215A (en) The treating method and apparatus of scene is waited in a kind of application program
CN110417991A (en) A kind of record screen method and electronic equipment
CN109274828B (en) Method for generating screenshot, control method and electronic equipment
CN110244893A (en) A kind of operating method and electronic equipment of split screen display available
CN110321790A (en) The detection method and electronic equipment of a kind of pair of resisting sample
CN110536004A (en) Multisensor is applied to the method and electronic equipment of the electronic equipment with flexible screen
CN109976626A (en) A kind of switching method and electronic equipment of application icon
CN110032307A (en) A kind of moving method and electronic equipment of application icon
CN110347269A (en) A kind of sky mouse mode implementation method and relevant device
CN110531864A (en) A kind of gesture interaction method, device and terminal device
CN110401767B (en) Information processing method and apparatus
CN110262877A (en) A kind of card processing method and equipment
CN113496426A (en) Service recommendation method, electronic device and system
CN110012130A (en) A kind of control method and electronic equipment of the electronic equipment with Folding screen
CN114095599B (en) Message display method and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20191015