WO2020062192A1 - Operation control method and electronic device - Google Patents

Operation control method and electronic device Download PDF

Info

Publication number
WO2020062192A1
WO2020062192A1 PCT/CN2018/108898 CN2018108898W WO2020062192A1 WO 2020062192 A1 WO2020062192 A1 WO 2020062192A1 CN 2018108898 W CN2018108898 W CN 2018108898W WO 2020062192 A1 WO2020062192 A1 WO 2020062192A1
Authority
WO
WIPO (PCT)
Prior art keywords
electronic device
data unit
partition
user
application
Prior art date
Application number
PCT/CN2018/108898
Other languages
French (fr)
Chinese (zh)
Inventor
祁德春
臧磊真
张亮
章迅
鲁志军
薛军
朱海涛
孟小珍
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to PCT/CN2018/108898 priority Critical patent/WO2020062192A1/en
Priority to CN201880085310.4A priority patent/CN111566632B/en
Publication of WO2020062192A1 publication Critical patent/WO2020062192A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

Definitions

  • the embodiments of the present application relate to the field of electronic technology, and in particular, to an operation control method and an electronic device.
  • the prior art provides a data protection solution, that is, the user achieves the purpose of protecting user data by setting a correspondence relationship between different application programs and deletion rights of the user data to be protected.
  • the user sets the correspondence between the application 1 and the deletion of the contact information, and sets the correspondence between the application 2 and the deletion of the contact information to improve the security of the contact information.
  • the user needs to set the corresponding relationship between each application and the operation authority of the user data to be protected, and the processing efficiency is low.
  • the embodiments of the present application provide an operation control method and an electronic device, which can improve the security of user data to be protected and the processing efficiency in the operation control process.
  • the technical solution of the present application provides an operation control method.
  • a correspondence relationship between a first data unit and first parameter information is stored on an electronic device.
  • the data unit is a file or a folder, and the first parameter information is used to indicate that modification of the first data unit is prohibited.
  • the electronic device also stores a correspondence between the second data unit and the second parameter information.
  • the second parameter information is used to indicate that deletion of the second data unit is prohibited.
  • the electronic device determines the first request information according to the second parameter information corresponding to the second data unit.
  • the second operation is prohibited, so the second operation can be refused.
  • the parameter information is used to indicate that the data unit is prohibited from being deleted, modified, or read by any application program, which can improve the security of the data unit and the processing efficiency of the operation control process.
  • the method further includes: if the first application is a specific application, indicating that the first application may be a secure application, and thus the electronic The device may prompt the user whether to authorize the first operation, and the electronic device performs the first operation after the electronic device detects the instructed operation of the user to authorize the first operation.
  • the method further includes: if the first operation is an operation initiated by the user, it indicates that the user may indeed want to perform the first operation, so The electronic device may prompt the user whether to authorize the first operation, and after the electronic device detects the instructed operation of the user to authorize the first operation, the electronic device performs the first operation.
  • the method further includes: if the second application is a specific application, indicating that the second application may be a secure application, and thus The electronic device may prompt the user whether to authorize the second operation. After the electronic device detects the user's instruction to authorize the second operation, the electronic device performs the second operation.
  • the method further includes: if the electronic device detects a third operation request that the third application uses to request the first operation, the electronic device according to the first parameter corresponding to the first data unit The information determines that the first operation is prohibited, and thus the electronic device refuses to perform the first operation.
  • the correspondence between the third data unit and the third parameter information is stored on the electronic device, and the third parameter information is used to indicate that reading of the third data unit is prohibited. If the electronic device detects the fourth request information used by the fourth application program to request the third operation, and the third operation is an operation of reading the third data unit, the electronic device according to the third parameter information corresponding to the third data unit, It is determined that the third operation is prohibited, and thus the electronic device refuses to perform the third operation.
  • the electronic device when the electronic device detects an operation that the user adds the first data unit to the first partition, the electronic device saves the correspondence between the first data unit and the first parameter information and the second parameter information to indicate that The first data unit belongs to the first partition.
  • the electronic device when the electronic device detects an operation that the user adds the second data unit to the second partition, the electronic device saves the correspondence between the second data unit and the second parameter information to indicate that the second data unit belongs to The second partition.
  • the electronic device saves the third data unit and the first parameter information, the second parameter information, and the third parameter information when detecting that the user adds the third data unit to the third partition. Correspondence relationship to indicate that the third data unit belongs to the third partition.
  • the method further includes: after the data unit in the first partition, the second partition, or the third partition is deleted, the electronic device saves a delete log, and the delete log is used to record the data in these partitions.
  • the deletion subject is an application that requests a deletion operation. In this way, the electronic device can track and record the deletion of the data unit in the second partition, so that relevant personnel and users can understand how the files and folders are deleted.
  • the electronic device saves the partition change log.
  • the partition change log includes the time when the fourth data unit changes the partition, the path of the fourth data unit, and the time before the partition is changed. Location and location after changing partitions. In this way, relevant personnel and users can know the current security level of files and folders in real time.
  • changing the fourth data unit includes changing the fourth data unit from one of the first, second, and third partitions to another of the first, second, and third partitions. Either the third data unit is changed from outside the partition to the first, the second, or the third partition, or the fourth data unit is changed from the first, the second, or the third partition to the outside of the partition.
  • the display status of files and folders in the partition may be different from the display status of files and folders outside the partition, so that the user can know whether the file or folder is in the partition. Whether it is an important document.
  • the display states of the data units in different partitions are different, so that users can distinguish files of different security levels.
  • the display state includes one or any combination of a color of the data unit icon, a mark on the data unit icon, a shape of the data unit icon, or a transparency of the data unit icon.
  • the technical solution of the present application provides an operation control method.
  • a correspondence relationship between a first data unit and first parameter information is stored on an electronic device.
  • the first data unit is a file or a folder, and the first parameter information is used to indicate that modification of the first data unit is prohibited.
  • the electronic device detects the first request information used by the first application to request the first operation, and the first operation is an operation to modify the first data unit, the electronic device according to the first parameter information corresponding to the first data unit It is determined that the first operation is prohibited, and thus the execution of the first operation may be refused.
  • the parameter information is used to indicate that the data unit is prohibited from being modified by any application program, which can improve the security of the data unit and the processing efficiency of the operation control process.
  • the technical solution of the present application provides an operation control method.
  • the electronic device stores a correspondence between the first data unit and the first parameter information.
  • the first data unit is a file or a folder, and the first parameter information is used to indicate that deletion of the first data unit is prohibited.
  • the electronic device detects the first request information used by the first application to request the first operation, and the first operation is an operation to delete the first data unit, the electronic device according to the first parameter information corresponding to the first data unit It is determined that the first operation is prohibited, and thus the execution of the first operation may be refused.
  • the parameter information is used to indicate that the data unit is prohibited from being deleted by any application program, which can improve the security of the data unit and the processing efficiency of the operation control process.
  • the technical solution of the present application provides an operation control method.
  • the correspondence relationship between the first data unit and the first parameter information is stored on the electronic device.
  • the first data unit is a file or a folder, and the first parameter information is used to indicate that reading of the first data unit is prohibited.
  • the electronic device detects the first request information used by the first application to request the first operation, and the first operation is an operation of reading the first data unit, the electronic device according to the first parameter corresponding to the first data unit The information determines that the first operation is prohibited, and thus the execution of the first operation may be refused.
  • the parameter unit is used to indicate that the data unit is forbidden to be read by any application program, which can improve the security of the data unit and the processing efficiency of the operation control process.
  • the technical solution of the present application provides an operation control method, including: the electronic device detects that the user adds the first data unit to the first partition, and the electronic device detects that the user modifies the first data unit through the first application program For the first operation, the electronic device prompts the user that the first operation has been rejected, and the electronic device prompts the user whether to authorize the first operation.
  • the electronic device if the electronic device detects an authorized operation of the first operation by the user, the electronic device prompts the user that the first operation has been successfully performed.
  • the method further includes: the electronic device detects that the user modifies the second operation of the first data unit through the second application program, and the electronic device prompts the user that the second operation has been rejected.
  • the method further includes: the electronic device detects that the user adds the second data unit to the second partition; the electronic device detects that the user deletes the third of the second data unit through the third application program Operation; the electronic device prompts the user that the third operation has been rejected; the electronic device prompts the user whether to authorize the third operation; if the electronic device detects the user's authorized operation on the third operation, the electronic device prompts the user that the third operation has been successfully performed .
  • the method further includes: the electronic device detects that the user adds the third data unit to the third partition; the electronic device detects that the user reads the third data unit through the fourth application program. Four operations; the electronic device prompts the user that the fourth operation has been rejected; the electronic device prompts the user whether to authorize the fourth operation; if the electronic device detects the user's authorized operation on the fourth operation, the electronic device prompts the user that the fourth operation has succeeded carried out.
  • the technical solution of the present application provides an operation control method, including: the electronic device detects that the user adds the first data unit to the first partition; the electronic device detects that the user modifies or deletes the first data unit through the first application program; The first operation of the data unit; the electronic device prompts the user that the first operation has been rejected; the electronic device prompts the user whether to authorize the first operation.
  • the technical solution of the present application provides an operation control method, including: the electronic device detects that the user adds the first data unit to the second partition; the electronic device detects that the user deletes the first data unit through the first application program The electronic device prompts the user that the first operation has been rejected; the electronic device prompts the user whether to authorize the first operation.
  • the technical solution of the present application provides an operation control method, including: the electronic device detects that the user adds the first data unit to the third partition; the electronic device detects that the user modifies, deletes, or reads through the first application program Take the first operation of the first data unit; the electronic device prompts the user that the first operation has been rejected; the electronic device prompts the user whether to authorize the first operation.
  • the technical solution of the present application provides an operation control device, which is included in an electronic device, and the device has a function of implementing the behavior of the electronic device in the first to eighth aspects and possible implementation manners.
  • This function can be realized by hardware, and can also be implemented by hardware executing corresponding software.
  • the hardware or software includes one or more modules or units corresponding to the above functions. For example, a save module or unit, a detection module or unit, a processing module or unit, a prompt module or unit, and so on.
  • the technical solution of the present application provides an electronic device including one or more processors and one or more memories.
  • the one or more memories are coupled to one or more processors.
  • the one or more memories are used to store computer program code.
  • the computer program code includes computer instructions.
  • the electronic device executes the instructions.
  • the operation control method in any possible implementation of the foregoing first to eighth aspects.
  • the technical solution of the present application provides a computer storage medium including computer instructions, and when the computer instructions are run on the electronic device, the electronic device is caused to execute any one of the foregoing first to eighth possible implementations. Operation control method.
  • the technical solution of the present application provides a computer program product.
  • the computer program product runs on a computer, the computer is caused to execute the operation control method in any one of the possible implementations of the first aspect to the eighth aspect.
  • FIG. 1 is a schematic diagram of a group of interfaces according to an embodiment of the present application.
  • FIG. 2 is a schematic diagram of a hardware structure of an electronic device according to an embodiment of the present application.
  • FIG. 3 is a schematic diagram of a software structure of an electronic device according to an embodiment of the present application.
  • FIG. 4 is a schematic interface diagram according to an embodiment of the present application.
  • FIG. 6 is a schematic diagram of another group of interfaces according to an embodiment of the present application.
  • FIG. 7 is a schematic diagram of another interface according to an embodiment of the present application.
  • FIG. 8 is a schematic diagram of another group of interfaces according to an embodiment of the present application.
  • FIG. 9 is a schematic diagram of another group of interfaces according to an embodiment of the present application.
  • FIG. 10 is a flowchart of another method according to an embodiment of the present application.
  • FIG. 11 is a flowchart of another method according to an embodiment of the present application.
  • FIG. 12 is a schematic diagram of another group of interfaces according to an embodiment of the present application.
  • FIG. 13 is a schematic diagram of another interface according to an embodiment of the present application.
  • FIG. 17 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
  • user data refers to data generated by the user in the process of using the electronic device, such as contact information stored by the user on the electronic device, photos taken by the user with the electronic device, and documents received by the user from other devices through the electronic device , Audio files recorded by users using electronic devices, chat records when users use WeChat, and so on.
  • the electronic device may include at least one partition, and the partition may be a virtual storage partition or a real disk partition (for example, disk D, SD card 1, etc.), which is not limited in the embodiment of the present application.
  • Different partitions can include different data units.
  • the data unit can be a file or a folder.
  • the folder may include only files or subfolders, which are not specifically limited in the embodiment of the present application.
  • the operating systems adopted by the electronic devices are different, and the types of data units in different partitions may also be different.
  • the data unit in partition 1 may be a file or a folder, and the data unit in partition 2 may be a folder.
  • the data unit in partition 1 may be a file or folder, and the data unit in partition 2 may also be a file or folder.
  • the electronic device When the electronic device detects a user operation to open a partition, files and folders in the partition can be displayed on the electronic device.
  • a digital camera storage (DCIM) folder for storing photos on an electronic device has been added to the partition 1, see FIG. 1 (a)
  • the electronic device can display files and folders included in the partition 1, that is, a DCIM folder.
  • the user clicks on the control 02 of the partition 2 the electronic device can display files and folders included in the partition 2.
  • the partition on the electronic device is a virtual storage partition
  • the file or folder logically belongs to a partition, but the storage path of the file or folder has not changed. . For example, after the DCIM folder is added to the first partition, the DCIM file is still the original storage path.
  • Each partition on the electronic device can correspond to a set of parameter information.
  • the electronic device can save the correspondence between the data unit and the corresponding parameter information of the partition to indicate that the data unit belongs to the partition. . That is, if a correspondence between a data unit and a set of parameter information is stored on the electronic device, it can be shown that the data unit belongs to a partition corresponding to the parameter information.
  • the parameter information is used to indicate that the application is prohibited from deleting one or any combination of data units, modifying data units, or reading data units.
  • the parameter information corresponding to the data unit stored on the electronic device may be attribute information of the data unit.
  • the attribute information may include attribute information forbidden to delete, attribute information forbidden to modify, or attribute information forbidden to read. One or any combination.
  • the electronic device can save the correspondence between the file and the attribute information.
  • the attribute information for prohibiting deletion is used to indicate that the application is prohibited from deleting (for example, unlink) the file
  • the attribute information for prohibiting modification is used to indicate that the application is prohibited from modifying the content of the file (for example, adding data to the file, reducing data) Or replace data) and prohibit the modification of the name of the file (that is, prohibit the renaming (eg, rename) of the file)
  • the read-inhibited attribute information is used to indicate that the application is prohibited from reading the file.
  • the electronic device determines to refuse deletion according to the attribute information corresponding to the file.
  • the electronic device can save the correspondence between the folder and the attribute information.
  • the attribute information for prohibiting deletion is used to indicate that the application is prohibited from deleting the folder, and specifically includes the application is prohibited from deleting the files in the folder and the application is prohibited from deleting the folder;
  • the attribute information forbidden to modify is used to indicate that the application is prohibited Modifying the folder specifically includes prohibiting the name of the folder from being modified (that is, prohibiting renaming the folder), prohibiting modifying the contents of the files in the folder, and prohibiting modifying the name of the files in the folder (that is, prohibiting renaming the folder File), etc .
  • the read-inhibited attribute information is used to indicate that the application is prohibited from reading the folder (including the file from the folder).
  • the electronic device determines to refuse execution according to the attribute information.
  • the delete operation when the correspondence between a folder and attribute information is stored on the electronic device, and the attribute information is forbidden to delete, if the application requests to delete a file in the folder, the electronic device determines to refuse execution according to the attribute information. The delete operation.
  • the parameter information may be a forbidden operation set, the operations in the forbidden operation set are prohibited from being performed, and the forbidden operation set may include one or any combination of a delete operation, a modify operation, or a read operation.
  • the electronic device can save the correspondence between the file and the prohibited operation set.
  • the delete operation in the forbidden operation set is used to indicate that the application is prohibited from deleting the file;
  • the modify operation in the forbidden operation set is used to indicate that the application is prohibited from modifying the content of the file and the file name;
  • the read operation in the forbidden operation set is prohibited Used to indicate that the application is prevented from reading the file.
  • the electronic device can save the correspondence between the folder and the prohibited operation set.
  • the delete operation in the forbidden operation set is used to indicate that the application is prohibited from deleting the folder, and specifically includes the prohibition of the application from deleting the files in the folder and the application to delete the folder;
  • the modify operation in the forbidden operation collection is used for Indicates that the application is prohibited from modifying the folder, which specifically includes prohibiting the modification of the name of the folder and the content of the file in the folder and the name of the file;
  • the read operation in the prohibited operation set is used to indicate that the application is prohibited from reading The folder.
  • the foregoing parameter information may also be other information, which is not specifically limited in the embodiment of the present application.
  • the application program on the electronic device may include a native application program and a third-party application program on the electronic device.
  • the application may be a WeChat application, a gallery application, a phone application, a Weibo application, and the like.
  • parameter information is used to indicate that a file or folder is prohibited from being deleted, modified, or read by any application program, without requiring the user to set each application program and each file or file separately as in the prior art.
  • the corresponding relationship between the operation permissions (such as delete, modify, and other operation permissions) of each folder can improve the processing efficiency of the operation control process.
  • the prior art also provides another solution for improving data security, that is, the electronic device periodically backs up user data to an external memory card, a computer, or a cloud.
  • This solution cannot achieve real-time backup, and the problem may occur that user data has been deleted before the backup.
  • users need to pay additional costs to purchase storage devices or cloud storage space.
  • For storage on the cloud users will also worry about privacy leaks. problem.
  • user data does not need to be stored in an additional storage device or cloud storage space, and user data can be protected in real time, and users do not need to worry about issues such as privacy leakage.
  • the operation control method provided in the embodiments of the present application can be applied to mobile phones, tablet computers, wearable devices, in-vehicle devices, augmented reality (AR) / virtual reality (VR) devices, notebook computers, and super mobile personal computers.
  • AR augmented reality
  • VR virtual reality
  • UMPC ultra-mobile personal computer
  • netbooks personal digital assistants (personal digital assistants, PDAs) and other electronic devices, the embodiments of this application do not place any restrictions on the specific types of electronic devices.
  • FIG. 2 shows a schematic structural diagram of the electronic device 100.
  • the electronic device 100 may include a processor 110, an external memory interface 120, an internal memory 121, a universal serial bus (USB) interface 130, a charge management module 140, a power management module 141, a battery 142, an antenna 1, and an antenna 2 , Mobile communication module 150, wireless communication module 160, audio module 170, speaker 170A, receiver 170B, microphone 170C, headphone interface 170D, sensor module 180, button 190, motor 191, indicator 192, camera 193, display 194, and Subscriber identification module (SIM) card interface 195 and the like.
  • SIM Subscriber identification module
  • the sensor module 180 may include a pressure sensor 180A, a gyro sensor 180B, an air pressure sensor 180C, a magnetic sensor 180D, an acceleration sensor 180E, a distance sensor 180F, a proximity light sensor 180G, a fingerprint sensor 180H, a temperature sensor 180J, a touch sensor 180K, and ambient light. Sensor 180L, bone conduction sensor 180M, etc.
  • the structure illustrated in the embodiment of the present application does not constitute a specific limitation on the electronic device 100.
  • the electronic device 100 may include more or fewer parts than shown, or some parts may be combined, or some parts may be split, or different parts may be arranged.
  • the illustrated components can be implemented in hardware, software, or a combination of software and hardware.
  • the processor 110 may include one or more processing units.
  • the processor 110 may include an application processor (AP), a modem processor, a graphics processing unit (GPU), and an image signal processor. (image, signal processor, ISP), controller, memory, video codec, digital signal processor (DSP), baseband processor, and / or neural-network processing unit (NPU) Wait.
  • AP application processor
  • modem processor graphics processing unit
  • GPU graphics processing unit
  • image signal processor image signal processor
  • ISP image signal processor
  • DSP digital signal processor
  • NPU neural-network processing unit
  • different processing units may be independent devices or integrated in one or more processors.
  • the controller may be a command center of the electronic device 100.
  • the controller can generate operation control signals according to the instruction operation code and timing signals, and complete the control of fetching and executing instructions.
  • the processor 110 may further include a memory for storing instructions and data.
  • the memory in the processor 110 is a cache memory.
  • the memory may store instructions or data that the processor 110 has just used or used cyclically. If the processor 110 needs to use the instruction or data again, it can be directly called from the memory. Repeated accesses are avoided and the waiting time of the processor 110 is reduced, thereby improving the efficiency of the system.
  • the processor 110 may include one or more interfaces.
  • the interface may include an integrated circuit (inter-integrated circuit, I2C) interface, an integrated circuit (inter-integrated circuit, sound, I2S) interface, a pulse code modulation (pulse code modulation, PCM) interface, a universal asynchronous transceiver receiver / transmitter (UART) interface, mobile industry processor interface (MIPI), general-purpose input / output (GPIO) interface, subscriber identity module (SIM) interface, and / Or universal serial bus (universal serial bus, USB) interface.
  • I2C integrated circuit
  • I2S integrated circuit
  • PCM pulse code modulation
  • UART universal asynchronous transceiver receiver / transmitter
  • MIPI mobile industry processor interface
  • GPIO general-purpose input / output
  • SIM subscriber identity module
  • USB universal serial bus
  • the interface connection relationship between the modules shown in the embodiments of the present application is only a schematic description, and does not constitute a limitation on the structure of the electronic device 100.
  • the electronic device 100 may also adopt different interface connection modes or a combination of multiple interface connection modes in the above embodiments.
  • the charging management module 140 is configured to receive a charging input from a charger.
  • the power management module 141 is used to connect the battery 142, the charge management module 140 and the processor 110.
  • the wireless communication function of the electronic device 100 may be implemented by the antenna 1, the antenna 2, the mobile communication module 150, the wireless communication module 160, a modem processor, and a baseband processor.
  • the antenna 1 and the antenna 2 are used for transmitting and receiving electromagnetic wave signals.
  • Each antenna in the electronic device 100 may be used to cover a single or multiple communication frequency bands. Different antennas can also be multiplexed to improve antenna utilization.
  • antenna 1 can be multiplexed into a diversity antenna for a wireless local area network.
  • the antenna may be used in conjunction with a tuning switch.
  • the mobile communication module 150 may provide a wireless communication solution including 2G / 3G / 4G / 5G and the like applied on the electronic device 100.
  • the mobile communication module 150 may include at least one filter, a switch, a power amplifier, a low noise amplifier (LNA), and the like.
  • at least part of the functional modules of the mobile communication module 150 may be provided in the processor 110.
  • at least part of the functional modules of the mobile communication module 150 may be provided in the same device as at least part of the modules of the processor 110.
  • the modem processor may include a modulator and a demodulator.
  • the modulator is configured to modulate a low-frequency baseband signal to be transmitted into a high-frequency signal.
  • the demodulator is used to demodulate the received electromagnetic wave signal into a low-frequency baseband signal.
  • the wireless communication module 160 may provide wireless local area networks (WLAN) (such as wireless fidelity (Wi-Fi) networks), Bluetooth (bluetooth, BT), and global navigation satellites applied to the electronic device 100.
  • WLAN wireless local area networks
  • Bluetooth blue, BT
  • BT Bluetooth
  • global navigation satellites applied to the electronic device 100.
  • Wireless communication solutions such as global navigation system, GNSS, frequency modulation (FM), near field communication (NFC), and infrared technology (infrared, IR).
  • the wireless communication module 160 may be one or more devices that integrate at least one communication processing module.
  • the antenna 1 of the electronic device 100 is coupled with the mobile communication module 150, and the antenna 2 is coupled with the wireless communication module 160, so that the electronic device 100 can communicate with the network and other devices through wireless communication technology.
  • Wireless communication technologies can include global mobile communication systems (GSM), general packet radio services (GPRS), code division multiple access (code division multiple access, CDMA), and broadband code division Multiple access (wideband code division multiple access (WCDMA), time-division code division multiple access (TD-SCDMA), long-term evolution (LTE), BT, GNSS, WLAN, NFC, FM , And / or IR technology.
  • GNSS can include global positioning system (GPS), global navigation satellite system (GLONASS), crizot navigation system (BDS), quasi-zenith satellite system (quasi-zenith satellite system (QZSS) and / or satellite-based augmentation systems (SBAS).
  • GPS global positioning system
  • GLONASS global navigation satellite system
  • BDS Bertdou navigation system
  • QZSS quasi-zenith satellite system
  • SBAS satellite-based augmentation systems
  • the electronic device 100 implements a display function through a GPU, a display screen 194, and an application processor.
  • the GPU is a microprocessor for image processing and is connected to the display 194 and an application processor.
  • the GPU is used to perform mathematical and geometric calculations for graphics rendering.
  • the processor 110 may include one or more GPUs that execute program instructions to generate or change display information.
  • the display screen 194 is used to display images, videos, and the like.
  • the display screen 194 includes a display panel.
  • the display panel can use a liquid crystal display (LCD), an organic light-emitting diode (OLED), an active matrix organic light emitting diode or an active matrix organic light emitting diode (active-matrix organic light-emitting diode).
  • LCD liquid crystal display
  • OLED organic light-emitting diode
  • active matrix organic light emitting diode active-matrix organic light-emitting diode
  • active-matrix organic light-emitting diode active-matrix organic light-emitting diode
  • emitting diodes AMOLED
  • flexible light-emitting diodes FLEDs
  • Miniled MicroLed
  • Micro-oLed quantum dot light emitting diodes
  • QLEDs quantum dot light emitting diodes
  • the electronic device 100 may include one or N display screens 194, where N is a positive integer
  • the electronic device 100 may implement a shooting function through an ISP, a camera 193, a video codec, a GPU, a display screen 194, and an application processor.
  • the ISP processes the data fed back from the camera 193.
  • the camera 193 is used to capture still images or videos.
  • Video codecs are used to compress or decompress digital video.
  • the external memory interface 120 may be used to connect an external memory card, such as a Micro SD card, to extend the storage capacity of the electronic device 100.
  • the external memory card communicates with the processor 110 through the external memory interface 120 to implement a data storage function. For example, save music, videos and other files on an external memory card.
  • the internal memory 121 may be used to store computer executable program code, and the executable program code includes instructions.
  • the processor 110 executes various functional applications and data processing of the electronic device 100 by executing instructions stored in the internal memory 121.
  • the internal memory 121 may include a storage program area and a storage data area.
  • the storage program area may store an operating system, at least one application required by a function (such as a sound playback function, an image playback function, etc.) and the like.
  • the storage data area can store data (such as audio files, phonebook files, parameter information corresponding to files or folders) created during the use of the electronic device 100.
  • the internal memory 121 may include a high-speed random access memory, and may also include a non-volatile memory, such as at least one magnetic disk storage device, a flash memory device, a universal flash memory (UFS), and the like.
  • UFS universal flash memory
  • the electronic device 100 may implement audio functions through an audio module 170, a speaker 170A, a receiver 170B, a microphone 170C, a headphone interface 170D, and an application processor. Such as music playback, recording, etc.
  • the audio module 170 is configured to convert digital audio signals and analog audio signals, and encode and decode audio signals. It can also be used to give voice prompts to users, and detect voice signals input by users.
  • the pressure sensor 180A is used to sense a pressure signal, and can convert the pressure signal into an electrical signal.
  • the fingerprint sensor 180H is used to collect fingerprints.
  • the electronic device 100 may use the collected fingerprint characteristics to realize fingerprint unlocking, access application lock, fingerprint photographing, fingerprint answering an incoming call, and the like.
  • the touch sensor 180K is also called “touch panel”.
  • the touch sensor 180K may be disposed on the display screen 194, and the touch screen is composed of the touch sensor 180K and the display screen 194, which is also referred to as a "touch screen”.
  • the touch sensor 180K is used to detect a touch operation on or near the user.
  • the touch sensor 180K can pass the detected touch operation to the application processor to determine the type of touch event.
  • a visual output related to the touch operation may be provided through the display screen 194.
  • the touch sensor 180K may also be disposed on the surface of the electronic device 100, which is different from the position of the display screen 194. For example, when a user long presses a certain file displayed on the electronic device, the touch sensor 180K can detect the touch operation and pass the touch operation to the application processor to determine the type of touch event.
  • the key 190 includes a start key, a volume key, and the like, and may be a mechanical key or a touch key.
  • the motor 191 may generate a vibration alert.
  • the motor 191 can be used for vibration alert for incoming calls, and can also be used for touch vibration feedback.
  • the touch operation applied to different applications can correspond to different vibration feedback effects.
  • the indicator 192 can be an indicator light, which can be used to indicate the charging status, power change, and can also be used to indicate messages, missed calls, notifications, and so on.
  • the SIM card interface 195 is used to connect a SIM card.
  • the electronic device 100 may support one or N SIM card interfaces, and N is a positive integer greater than 1.
  • the SIM card interface 195 is also compatible with external memory cards.
  • the electronic device 100 interacts with the network through a SIM card to implement functions such as calling and data communication.
  • the touch sensor 180K can detect a user's operation of adding the data unit k to the partition k on the display screen 194 and report the operation to the processor 110.
  • the processor 110 stores parameter information k corresponding to the data unit k and the partition k. Corresponding relationship.
  • the processor 110 may read parameter information k corresponding to the data unit k and determine whether the parameter information k prohibits the operation k.
  • the operation k may include deleting, modifying, or reading the data unit k. If the parameter information k indicates that the operation k is prohibited, the processor 110 refuses to perform the operation k.
  • the processor 110 executes the operation k.
  • the parameter information is used to indicate that the data unit is prohibited from being deleted, modified, or read by any application program, which can improve the security of the data unit and the processing efficiency of the operation control process.
  • the processor 110 can also determine whether the application program k is a specific application program. If the application k is not a specific application, the processor 110 does not perform processing. If the application program k is a specific application program, the processor 110 determines whether the data unit k is within a partition and whether the partition k is prohibited from operating k. If the data unit k is not in the partition or the operation of the data unit k is not prohibited, the processor 110 does not perform processing. If the data unit k is in the partition and the operation k is prohibited in the partition, the processor 110 instructs the display screen 194 to prompt the user whether to authorize the operation k.
  • the touch sensor 180K detects an operation authorized by the user on the operation k on the display screen 194, the operation is reported to the processor 110, and the processor 110 executes the operation k.
  • the processor 110 instructs the audio module 170 to prompt the user whether to authorize the operation k. If the audio module 170 detects the voice information authorized by the user for the operation k, it reports it to the processor 110, and the processor 110 executes the operation k.
  • the software system of the electronic device 100 may adopt a layered architecture, an event-driven architecture, a micro-core architecture, a micro-service architecture, or a cloud architecture.
  • the embodiment of the present application takes the Android system with a layered architecture as an example, and exemplifies a software structure of the electronic device 100.
  • FIG. 3 is a software block diagram of an electronic device 100 according to an embodiment of the present application.
  • the layered architecture divides the software into layers. The layers communicate with each other through a software interface.
  • the Android system is divided into four layers, which are an application layer, an application framework layer, an Android runtime and a system library, and a kernel layer from top to bottom.
  • the application layer can include a series of application packages.
  • the application package can include applications such as camera, gallery, calendar, call, map, navigation, WLAN, Bluetooth, music, video, SMS, etc.
  • the application framework layer provides an application programming interface (API) and a programming framework for applications at the application layer.
  • API application programming interface
  • the application framework layer includes some predefined functions.
  • the application framework layer may include a window manager, a content provider, a view system, a phone manager, a resource manager, a notification manager, and the like.
  • the window manager is used to manage window programs.
  • the window manager can obtain the display size, determine whether there is a status bar, lock the screen, take a screenshot, etc.
  • Content providers are used to store and retrieve data and make it accessible to applications.
  • Data can include videos, images, audio, calls made and received, browsing history and bookmarks, phone books, and more.
  • the view system includes visual controls, such as controls that display text, controls that display pictures, and so on.
  • the view system can be used to build applications.
  • the display interface can consist of one or more views.
  • the display interface including the SMS notification icon may include a view that displays text and a view that displays pictures.
  • the phone manager is used to provide a communication function of the electronic device 100. For example, management of call status (including connection, hang up, etc.).
  • the resource manager provides various resources for the application, such as localized strings, icons, pictures, layout files, video files, and so on.
  • the notification manager enables the application to display notification information in the status bar, which can be used to convey notification-type messages that can disappear automatically after a short stay without user interaction.
  • the notification manager is used to inform download completion, message reminders, etc.
  • the notification manager can also be a notification that appears in the status bar at the top of the system in the form of a chart or scroll bar text, such as a notification of an application running in the background, or a notification that appears on the screen in the form of a dialog window.
  • text messages are displayed in the status bar, sounds are emitted, electronic equipment vibrates, and the indicator light flashes.
  • Android Runtime includes core libraries and virtual machines. Android runtime is responsible for the scheduling and management of the Android system.
  • the core library contains two parts: one is the functional functions that the Java language needs to call, and the other is the Android core library.
  • the application layer and the application framework layer run in a virtual machine.
  • the virtual machine executes the java files of the application layer and the application framework layer as binary files.
  • Virtual machines are used to perform object lifecycle management, stack management, thread management, security and exception management, and garbage collection.
  • the system library can include multiple functional modules. For example: surface manager (media manager), media library (Media library), three-dimensional graphics processing library (for example: OpenGL ES), 2D graphics engine (for example: SGL) and so on.
  • surface manager media manager
  • media library Media library
  • Three-dimensional graphics processing library for example: OpenGL ES
  • 2D graphics engine for example: SGL
  • the Surface Manager is used to manage the display subsystem and provides a fusion of 2D and 3D layers for multiple applications.
  • the media library supports a variety of commonly used audio and video formats for playback and recording, as well as still image files.
  • the media library can support multiple audio and video encoding formats, such as: MPEG4, H.264, MP3, AAC, AMR, JPG, PNG, etc.
  • the 3D graphics processing library is used to implement 3D graphics drawing, image rendering, compositing, and layer processing.
  • the 2D graphics engine is a graphics engine for 2D graphics.
  • the kernel layer is the layer between hardware and software.
  • the kernel layer contains at least a display driver, a camera driver, an audio driver, and a sensor driver.
  • the kernel layer can also include storage device drivers and file system drivers.
  • the file system driver can accept file-oriented input / output (I / O) requests and convert these requests into I / O requests for a certain storage device.
  • the electronic device may include an application program, an interaction manager, a monitoring agent, an operation result checker, and an operation manager.
  • the interaction manager may be implemented by a user program and modules such as a window manager, a view system, a notification manager, a resource manager, and a content provider in an application framework layer.
  • the monitoring agent and operation result checker can be implemented by multiple modules in the system library and application framework layer.
  • the operation manager can be implemented by modules such as a file system driver and a storage device driver in the kernel layer. The embodiment of the present invention does not limit which modules are specifically implemented.
  • the monitoring agent can monitor the data unit k added to the partition k, and save the correspondence between the data unit k and the parameter information k. In addition, if the partition to which the data unit k belongs is changed, the monitoring agent may also update parameter information corresponding to the data unit k.
  • the application k may request the operation manager to perform operation k.
  • the operation k may be deleting, modifying, or reading the data unit k.
  • the operation manager may read the parameter information k corresponding to the data unit k and determine whether the parameter information k prohibits the operation k. If the parameter information k indicates that the operation k is prohibited, the operation manager refuses to perform the operation k. If the parameter information k indicates that the operation k is not prohibited, the operation manager executes the operation k. In this way, the parameter information is used to indicate that the data unit is prohibited from being deleted, modified, or read by any application program, which can improve the security of the data unit and the processing efficiency of the operation control process.
  • the operation manager may notify the operation result checker after refusing to perform the operation k.
  • the operation result checker determines whether the application k is a specific application. If the application k is not a specific application, the operation result checker does not process it. If the application k is a specific application, the operation result checker determines to the operation manager whether the data unit k is within a partition and whether the partition prohibits operation k. If the data unit k is not in the partition or the partition k is not prohibited from operating, the operation result checker does not process it. If the data unit k is in a partition and the operation k is prohibited in the partition, the operation result checker requests the monitoring agent to authorize the operation k. The monitoring agent notifies the interaction manager to prompt the user whether to authorize the operation k. If the interaction manager detects that the user has authorized the operation k, it notifies the monitoring agent, and the monitoring agent executes the operation k.
  • the operation manager can successfully perform operations such as deletion and modification requested by the application on most data units. Compared with the electronic device that first determines whether the data unit to be operated is in the partition each time it is deleted and modified, if the electronic device refuses to perform operations such as deletion and modification in the operation manager, the operation fails, which indicates the data to be operated.
  • the unit may be in the partition, and then determine whether the data unit to be operated is in the partition, thereby prompting the user whether to perform authorization when determining that the data unit to be operated is in the partition, thereby reducing the electronic device determining whether the data unit to be operated is in the partition. Times, reducing the workload of electronic equipment and reducing the power consumption of electronic equipment.
  • the parameter information is used as the attribute information
  • the electronic device is a mobile phone as an example
  • the operation control method provided in the embodiment of the present application will be described.
  • the parameter information is other information
  • the electronic device may include a 0th partition, and the attribute information corresponding to the 0th partition is prohibited from modification.
  • the correspondence between the file and the attribute information forbidden to be modified is stored on the electronic device. No application on the electronic device can modify the file until the correspondence has changed. ; After the folder is added to the 0th partition, the correspondence between the file and the attribute information forbidden to be modified is stored on the electronic device. No application on the electronic device can modify the folder and the relationship until the correspondence has not changed. Files in the folder. However, applications in the electronic device can delete and read files and folders in partition 0.
  • the electronic device may notify the user that the application is prohibited from modifying the files in the 0th partition, so that the user can know which applications intend to tamper with the 0th partition.
  • Files in the partition For example, taking a mobile phone as an example, see FIG. 4, when the game software A requests to modify the contacts stored on the mobile phone, the mobile phone displays a prompt box 401 to prompt the user "Please note: Game A intends to modify your contacts!
  • the electronic device may not prompt the user, thereby preventing an illegal application from prompting the user maliciously and frequently, which may cause the electronic device to malfunction. Problems at work.
  • the electronic device may include a first partition, and the attribute information corresponding to the first partition includes deletion prohibition and modification prohibition. That is, after the file is added to the first partition, the correspondence between the file and the prohibition of deleting attribute information and the prohibition of modifying attribute information is saved on the electronic device. Before the correspondence relationship changes, any application program on the electronic device is The file cannot be deleted and modified; after the folder is added to the first partition, the corresponding relationship between the file and the prohibition of deletion and modification is saved on the electronic device. Before the corresponding relationship does not change, any application on the electronic device is You cannot delete and modify this folder and the files in this folder. However, applications in the electronic device can read files and folders in the first partition.
  • the first partition can be used to store very important user data, such as evidence files of legal procedures, so that the evidence files cannot be modified, deleted, or renamed by the application program, to ensure that the evidence files are not tampered with or lost, and improve the evidence files. Security.
  • the first partition may be used to store user data such as contacts, short messages, call records, recordings, or location information of the user, so that the user data is not tampered or lost, and the security of the user data is improved.
  • the electronic device may prompt the user that the application is prohibited from deleting or modifying files in the first partition, so that the user can know which applications are convenient Intent to delete or tamper with files in the first partition.
  • the electronic device may not prompt the user, thereby preventing an illegal application from prompting the user maliciously and frequently, resulting in the electronic device. Not working properly.
  • the electronic device may include a second partition, and the attribute information corresponding to the second partition is prohibited from being deleted.
  • the corresponding relationship between the file and the attribute information forbidden to be deleted is stored on the electronic device.
  • No application on the electronic device can delete the file until the corresponding relationship has changed.
  • the correspondence between the folder and the attribute information forbidden to be deleted is stored on the electronic device.
  • No application on the electronic device can delete the folder until the correspondence does not change.
  • an application in the electronic device can modify and read files in the second partition and files in the folder of the second partition.
  • the second partition can be used to store more important user data, such as user photos and videos, so that the user's photos and videos cannot be deleted by the application to prevent user photos or videos from being lost; but the second partition
  • the photos or videos can be modified or renamed, for example, they can be beautified by some retouching software, etc., for the convenience of users.
  • the electronic device may indicate to the user that the application is prohibited from deleting the file in the second partition, or the electronic device may not prompt the user.
  • the electronic device may include a third partition, and attribute information corresponding to the third partition includes deletion prohibition, modification prohibition, and read prohibition.
  • attribute information corresponding to the third partition includes deletion prohibition, modification prohibition, and read prohibition.
  • the third partition can be used to store some private information, such as the user's diary and the user's private photo.
  • the electronic device may prompt the user that the application is prohibited from deleting, modifying, or reading files in the third partition; or, electronic The device may not provide the prompt to the user.
  • the electronic device may include at least two partitions among the 0th partition, the first partition, the second partition, and the third partition.
  • the following description is made by taking an electronic device including a first partition and a second partition as an example.
  • the first partition and the data unit in the first partition may correspond to the attribute information i.
  • the attribute information i includes the first attribute information and the second attribute information.
  • the first attribute information indicates that the modification is prohibited and the second attribute information indicates that the modification is prohibited.
  • Delete; the second partition and the data unit in the second partition correspond to the second attribute information.
  • the files and folders in each partition on the electronic device may be preset when the electronic device is shipped from the factory.
  • the electronic device stores the correspondence between the files and folders preset in the partition and the attribute information. For example, the electronic device presets the camera's DCIM folder in the second partition.
  • the files and folders in each partition on the electronic device may also be automatically set by the electronic device during use.
  • the electronic device may determine whether to set a file in a partition and in which partition, according to the types of files and folders. Exemplarily, if the file or folder is a text message type or a recording type, the electronic device may set the file in the first partition; if the file or folder is a photo type or a video type, the electronic device may set the file or The folder is set in the second partition.
  • the electronic device may determine whether to set a file in a partition and in which partition, according to a file name, a label or a keyword of the file.
  • the electronic device may set the file in the second partition; if the file name is "recording", the electronic device may set the file in the first partition.
  • the file name includes the keyword "important”
  • the electronic device may set the file in the second partition; if the file name includes the keyword “evidence”, the electronic device may set the file The file is set in the first partition.
  • the files and folders in each partition on the electronic device may be set by the user.
  • the electronic device can save the correspondence between the files and folders and the above-mentioned attribute information.
  • the step of the electronic device actively setting files and files in each partition may include:
  • the electronic device When the electronic device detects a user's operation of adding the first data unit to the first partition, the electronic device saves the correspondence between the first data unit and the first attribute information and the second attribute information.
  • the first attribute information and the second attribute information may be collectively referred to as a group of attribute information i.
  • the electronic device can save the correspondence between the folder 1 and the attribute information i; in another case, the electronic device can save the folder 1 and the attribute information i And the corresponding relationship between the files and folders in the folder 1 and the attribute information i.
  • the electronic device When the electronic device detects an operation that the user adds the second data unit to the second partition, the electronic device saves the correspondence between the second data unit and the second attribute information.
  • a menu list 601 is displayed.
  • the menu list 601 includes setting a partition, copying, cutting, deleting, compressing, renaming, etc. Options.
  • the electronic device may display a menu list 602 as shown in (c) in FIG. 6.
  • the menu list 602 includes adding a first partition and adding a second partition. Options such as partitioning and unsetting.
  • the DCIM folder When the user clicks on the option to join the first partition, the DCIM folder is set to belong to the first partition, and the electronic device can set the icon of the DCIM folder to color 1. Similarly, when the user clicks on the option to join the second partition The DCIM folder is set to belong to the second partition, and the electronic device can set the icon of the DCIM folder to color 2. When the user clicks the cancel setting option, the electronic device exits the setting about the partition.
  • the electronic device when the electronic device detects that the user has long pressed the DCIM folder, the electronic device displays a menu list 601.
  • the menu list 601 includes options such as adding a first partition, adding a second partition, and canceling settings.
  • the user can change the partition to which the file or folder belongs or move the file or folder out of the partition.
  • the DCIM folder is currently in the first partition, and the electronic device stores a correspondence between the DCIM folder and the first attribute information and the second attribute information.
  • the electronic device can display options such as moving to the second partition and moving out of the partition.
  • the DCIM folder is set to belong to the second partition; the electronic device can delete the correspondence between the DCIM folder and the first attribute information, and save the correspondence between the DCIM folder and the second attribute information .
  • the remove partition option the DCIM file is removed from the partition, and the electronic device can delete the correspondence between the DCIM folder and the attribute information.
  • the electronic device when the electronic device includes multiple partitions, different partitions may also correspond to different security levels.
  • the first partition may correspond to the security level 1
  • the second partition may correspond to the security level 2
  • the security level of the security level 1 is higher than the security level 2.
  • the electronic device may display options such as a “reduced partition level” option 701 and a “remove partition” option 702.
  • the DCIM folder is set to belong to the second partition that is one security level lower than the first partition.
  • the user can also set the correspondence between files and partitions in other ways.
  • the electronic device in response to the user's gesture of drawing a circle on the touch screen, the electronic device displays the control 801 of the first partition and the control 802 of the second partition.
  • the control 801 of the first partition indicates that files and folders in the partition are not allowed to be deleted and modified by the application;
  • the control 802 of the second partition indicates that files and folders in the partition are not allowed to be deleted by the application.
  • the DCIM folder is set to belong to the first partition.
  • the DCIM folder is set to belong to the first partition. After the DCIM folder is added to the first partition, as shown in FIG. 8 (c), the DCIM folder is restored to the original location.
  • the user can add the DCIM folder to the first partition by voice.
  • the display status of files and folders in the partition may be different from the display status of files and folders outside the partition, so that the user can know whether the file or folder is in the partition and is an important file.
  • the icon of the file in the partition is a semi-transparent icon; the icon of the file outside the partition is a normal icon.
  • the display status of files and folders in different partitions may also be different, so as to facilitate users to distinguish files of different security levels.
  • the different display states may include one or any combination of different colors of the icons of the files or folders, different marks, different shapes, different marks, or different transparency.
  • the first partition is called the red area, and the recording folder belongs to the red area;
  • the second partition is called the blue area, and the DCIM folder belongs to the blue area;
  • the "download folder" is outside the partition as an example.
  • the icon color of the recording folder in the red area is red
  • the icon color of the DCIM folder in the blue area is blue
  • the icon of the download folder outside the partition is yellow.
  • the icon of the recording folder in the red area is displayed with a label “red area”
  • the icon of the DCIM folder in the blue area is displayed with a label “blue area”. There is no red or blue label on the download folder icon outside the partition.
  • the outline of the icon of the recording folder in the red area is rectangular
  • the outline of the icon of the DCIM folder in the blue area is circular
  • the icon of the folder icon outside the partition is round.
  • the shape of a normal folder is rectangular
  • the icon of the recording folder in the red area is displayed with a mark prohibiting deletion and modification as shown in (c) of FIG. 9, and the icon of the DCIM folder in the blue area is displayed as shown in FIG.
  • the deletion prohibition mark shown in (c) in 9 is the normal icon for the "Download Folder" icon outside the partition.
  • a semi-transparent window is displayed in front of the icon of the recording folder in the red zone, and the semi-transparent window is used to prompt the user that the folder cannot be deleted or modified ;
  • a semi-transparent window is displayed in front of the icon of the DCIM folder in the blue area. This semi-transparent window is used to remind the user that the folder must not be deleted.
  • the icon of the "Download Folder" outside the partition is not displayed in front of it Translucent form.
  • the electronic device includes a first partition and a second partition, and the first data unit belongs to the first partition and the second data unit belongs to the second partition.
  • the electronic device stores a correspondence between the first data unit and the attribute information i, and the attribute information i includes first attribute information and second attribute information.
  • the first attribute information is prohibited from modification and the second attribute information is prohibited from being deleted.
  • the correspondence between the second data unit and the second attribute information is also stored on the electronic device as an example.
  • the operation control method provided in the embodiment of the present application. Referring to FIG. 10, the operation control method may include:
  • the electronic device If the electronic device detects first request information used by the first application to request the first operation, and the first operation is an operation to modify the first data unit, the electronic device according to the first attribute information corresponding to the first data unit , Refuse to perform the first operation.
  • the first operation is an operation prohibited by the first attribute information (that is, the first parameter information) corresponding to the first data unit.
  • the first operation may be an operation (for example, write, replace, delete data, etc.) that the first application requests to modify the content of the file in the first data unit, or the first operation may be repeated for the first application.
  • the electronic device may also refuse to perform the first operation according to the first attribute information corresponding to the first data unit.
  • the deletion operation is an operation prohibited by the second attribute information (that is, the second parameter information) corresponding to the first data unit.
  • the electronic device refuses to perform the deleting operation according to the second attribute information.
  • the deletion operation may be an operation that the first application requests to delete files (including files in the folder) in the first data unit, or the first operation may request that the files in the first data unit be deleted in the first application. Clip operation, etc.
  • the electronic device If the electronic device detects second request information used by the second application to request the second operation, and the second operation is an operation to delete the second data unit, the electronic device according to the second attribute information corresponding to the second data unit. , Refuse to perform the second operation.
  • the second operation is an operation prohibited by the second attribute information (that is, the second parameter information) corresponding to the second data unit.
  • the second operation may be an operation that the second application requests to delete files (including files in the folder) in the second data unit, or the second operation may request that the files in the second data unit be deleted in the second application. Clip operation, etc.
  • the application program when the file or folder belongs to the first or second partition, and the electronic device saves the correspondence between the file or folder and the attribute information, for the file or folder, the application program
  • the deletion or modification operation forbidden by the attribute information cannot be performed successfully, so that the data in the file or folder can be prevented from being lost or tampered with, and the security of the data in the file or folder is improved.
  • the file or folder attribute information can be used to identify the file or folder forbidden to be deleted or modified by any application, without requiring the user to separately set each application and each file or folder as in the prior art.
  • the corresponding relationship of the operation authority can reduce the user's operation.
  • step 1001 there is no clear sequence relationship between step 1001 and step 1002, and step 1001 may be before step 1002 or after step 1002.
  • the electronic device may consider the application to be a secure application. Therefore, after determining that the operation is refused to be performed according to the attribute information corresponding to the file or folder, the electronic device may also request the user to authorize the operation, so as to perform the operation after the user authorizes.
  • these specific applications can be applications developed by the manufacturer of the electronic device, or applications preset when the electronic device leaves the factory, or applications in a white list set by the user, or high-priority applications Wait. In this way, the electronic device can delete or modify files and folders in the partition only after the user grants permission, so the files and folders in the partition have higher security.
  • the method may further include:
  • the electronic device prompts the user whether to authorize the first operation.
  • the electronic device ends the data operation flow and does not perform the first operation.
  • the electronic device detects that the user refuses to instruct the first operation to authorize the operation, the electronic device ends the data operation process and does not perform the first operation.
  • the electronic device may consider the first application to be a trusted application. . Therefore, when the electronic device refuses to perform the first operation according to the attribute information corresponding to the file or folder, the electronic device may also request the user to authorize the first operation, so that the first operation is performed after the user authorizes.
  • the electronic device stores a correspondence between the contact file and the first attribute information, and the first attribute information is prohibited from being deleted and modified from being prohibited.
  • the phone application requests modification of the contact information in the first partition.
  • the electronic device determines that modifying the contact information in the first partition is an operation prohibited by the first attribute information according to the first attribute information corresponding to the contact file, and therefore refuses to modify the contact in the first partition.
  • the phone application is a specific application program, so the electronic device can request the user to authorize the operation of modifying the contact information in the first partition. For example, referring to (a) in FIG.
  • the electronic device may display a prompt box 1201 to prompt the user whether to authorize the operation; if the user clicks “Cancel”, the electronic device does not perform the operation of modifying the contact information in the first partition; If the user clicks "Agree", the electronic device performs an operation of modifying the contact information in the first partition.
  • the electronic device may further prompt the user that the modification operation has been successfully performed. For example, referring to (b) in FIG. 12, the electronic device notifies the user that the contact information has been successfully modified through the prompt box 1202.
  • the method may further include:
  • the electronic device prompts the user whether to authorize the second operation.
  • the electronic device ends the data operation flow and does not perform the second operation.
  • the electronic device If the electronic device detects an instruction operation for authorizing the second operation by the user, the electronic device performs the second operation.
  • the electronic device detects that the user refuses to instruct the second operation to authorize the instruction operation, the electronic device ends the data operation flow and does not perform the second operation.
  • the electronic device may consider the second application to be a trusted application. . Therefore, when the electronic device refuses to perform the second operation according to the attribute information corresponding to the file or folder, the electronic device may also request the user to authorize the second operation, so that the second operation is performed after the user authorizes.
  • the electronic device stores the correspondence between the DCIM folder and the second attribute information, and the second attribute information is prohibited from being deleted. If the photo editing software requests to modify the photo A in the DCIM folder, the modification operation is not an operation prohibited by the second attribute information, so the electronic device performs an operation of modifying the photo A in the DCIM folder. If the photo editing software requests to delete the photo A in the DCIM folder, the modification operation is an operation prohibited by the second attribute information, so the electronic device refuses to modify the photo A in the DCIM folder. Retouching software is not a specific application, so the electronic device does not prompt the user for authorization.
  • the modification operation is an operation prohibited by the second attribute information, so the electronic device rejects the operation of modifying the photo A in the DCIM folder.
  • the gallery is a specific application, so the electronic device prompts the user to authorize the operation of deleting photo A in the DCIM folder. For example, referring to FIG. 13, the electronic device may display a prompt box 1301 to prompt the user whether to authorize the operation; if the user clicks "Yes", the electronic device performs an operation of deleting the photo; if the user clicks "No", the electronic device Do not delete the photo.
  • the electronic device displays a prompt box on the interface to prompt the user to authorize, and the user performs authorization by clicking the right control on the interface as an example.
  • the electronic device can also prompt the user to authorize in other ways, and the user can also authorize in other ways.
  • the electronic device can also prompt the user to authorize by sound, and the user can also authorize by voice.
  • the electronic device may prompt the user for authorization through an interface or voice, and the user may also perform authorization through fingerprint authentication.
  • the electronic device may prompt the user for authorization through an interface or voice, and the user may also perform authorization through facial authentication.
  • an application requests an operation prohibited by the attribute information of a file or folder in the above partition to be initiated by a user, although the file or folder in the above partition is important, the user may The user really wants to delete or modify the file or folder, so after the electronic device refuses to perform the operation according to the attribute information corresponding to the file or folder, the electronic device may also request the user to authorize the operation, so that the operation is performed after the user authorizes.
  • the electronic device prohibits the application from automatically performing operations prohibited by the attribute information on the files or folders in the partition; when the user actively instructs the application to perform the operations prohibited by the attribute information on the files or folders in the partition, The electronic device prompts the user to authorize and performs operations prohibited by the attribute information on the files or folders in the partition after the user authorizes. That is, the electronic device can delete or modify files and folders in the partition only after the user grants permission, so the security of the files and folders in the partition is high.
  • the electronic device may determine whether operations such as deletion and modification are initiated by the user. For example, before the electronic device detects that the application sends request information to request an operation prohibited by the attribute information on a file or folder in the partition, the electronic device detects the user's input operation and determines the target input event corresponding to the input operation And save. The electronic device distributes the target input event to the corresponding application. If the difference between the distribution time and the time when the electronic device detects that the application sends the request information is less than or equal to a preset value (the preset value may be smaller), the electronic device may determine that the operation is initiated by the user.
  • a preset value the preset value may be smaller
  • the click operation is processed into a target input event.
  • the electronic device recognizes that the control corresponding to the target input event is a delete control of the gallery, and distributes the target input event to the gallery.
  • the electronic device detected a request message from the gallery to request deletion of the photo. And, the distribution time is earlier than the time when the gallery request delete operation, and the difference between the time when the distribution time and the gallery request delete operation is less than or equal to a preset value, the electronic device may determine that the delete operation is initiated by the user.
  • the electronic device detects an input operation of the user, determines a target input event corresponding to the input operation, and saves it.
  • the electronic device distributes the target input event to the corresponding application.
  • the application sends request information for performing an operation and information for identifying a user input operation.
  • the electronic device may determine that the operation is initiated by the user according to the operation request and information used to identify the user's input operation.
  • an application requests an operation prohibited by the attribute information of a file or folder in the partition
  • the operation is initiated by a user, and the application is a specific application.
  • the file or folder is important, but the user may indeed want to delete or modify the file or folder, and the application is a specific and secure application, so the electronic device is refusing to execute based on the attribute information corresponding to the file or folder
  • the user can also be requested to authorize the operation, so that the operation can be performed after the user authorizes.
  • the electronic device may also create a log file, which is used to track and record the deletion of files and folders in each of the above partitions and the change of partitions, in order to facilitate relevant personnel and users to understand the files and folders How it was deleted or what security level it is currently in.
  • a log file After the log file is created, only the appended content cannot be deleted, that is, the log file has an append attribute.
  • the case of changing a partition may include a case where a file or a folder is changed between different partitions, a case where a file or a folder is changed from outside the partition to a partition, and a file or folder is changed from inside the partition to the partition Outside the situation.
  • the electronic device may save a deletion log for recording deletion of files or folders in the first and second partitions.
  • Information such as time, subject of deletion, and path of the deleted file or folder; where the subject of deletion is an application that deletes the file or folder.
  • the electronic device prompts the user for authorization; after the user authorizes, the electronic device deletes the photo A at 2018-09-18, 09:23:56; then the delete log Can be "2018-09-18, 09: 23: 56 + Gallery + Mobile Storage / DCIM / IMG_20180917_080630.jpg".
  • the electronic device if the electronic device detects that the user moves the fourth data unit from one of the partitions to another partition, the electronic device saves a partition change log, and the partition change log includes a change time of the fourth data unit of the changed partition.
  • the electronic device switches the recording file 1 to the second partition at 2018-09-18, 12:35:18.
  • the partition change log can be "2018-09-18, 12: 35: 18 + Mobile storage / recording / 7: 36 pm.
  • Ogg + belongs to the first partition before the change + belongs to the second partition after the change".
  • the electronic device moves the recording file 1 out of the first partition at 2018-09-18, 20:08:08.
  • the partition change log may be “2018 -09-18, 12: 35: 18 + mobile storage / recording / 7: 36 pm.
  • Ogg + belongs to the first partition before the change + outside the partition after the change ".
  • the electronic device can also save the corresponding partition change log, which will not be repeated here.
  • the method may include:
  • the electronic device detects an operation that the user adds the data unit 1 to the first partition.
  • the user may add the data unit 1 to the first partition in the manner shown in FIG. 6 to FIG. 8.
  • the electronic device detects that the user modifies the operation of the data unit 1 through the application program 1.
  • the operation of the user to modify the data unit 1 may be the operation of modifying the contact information shown in (a) and (b) in FIG. 12.
  • the electronic device prompts the user that operation 1 has been rejected.
  • the electronic device may prompt the user that operation 1 has been rejected.
  • FIG. 4 Exemplarily, a schematic interface diagram of the electronic device notifying the user that an operation has been rejected can be seen in FIG. 4.
  • the electronic device may also prompt the user that the operation has been rejected.
  • the electronic device prompts the user whether to authorize operation 1.
  • the electronic device may prompt the user whether to authorize operation 1, so as to improve the security of the data unit 1 to be operated.
  • a schematic interface diagram of the electronic device prompting the user whether to authorize the modification operation may refer to (a) in FIG. 12.
  • the electronic device If the electronic device detects that the user instructs the operation 1 to be authorized, the electronic device prompts the user that the operation 1 has been successfully performed.
  • the electronic device can perform operation 1 and notify the user that operation 1 has been successfully performed, thereby realizing the user's need to perform operation 1.
  • the operation that the electronic device authorizes the operation 1 may be an operation that the user clicks "agree" in (a) in FIG. 12.
  • the method may include:
  • the electronic device detects an operation that the user adds the data unit 1 to the second partition.
  • the electronic device detects an operation of the user to delete the data unit 1 through the application 1.
  • the electronic device prompts the user that operation 1 has been rejected.
  • the electronic device may prompt the user that operation 1 has been rejected.
  • the electronic device may further prompt the user that the operation has been rejected.
  • the electronic device prompts the user whether to authorize operation 1.
  • the electronic device may prompt the user whether to authorize operation 1, so as to improve the security of the data unit 1 to be operated.
  • FIG. 13 Exemplarily, a schematic interface diagram of the electronic device prompting the user whether to authorize the delete operation can be seen in FIG. 13.
  • the electronic device If the electronic device detects that the user instructs the operation 1 to be authorized, the electronic device prompts the user that the operation 1 has been successfully performed.
  • the electronic device can perform operation 1 and notify the user that operation 1 has been successfully performed, thereby realizing the user's need to perform operation 1.
  • the method may include:
  • the electronic device detects an operation that the user adds the data unit 1 to the third partition.
  • the electronic device detects an operation that the user reads the data unit 1 through the application program 1.
  • the electronic device prompts the user that operation 1 has been rejected.
  • the electronic device may prompt the user that operation 1 has been rejected.
  • the electronic device may further prompt the user that the operation has been rejected.
  • the electronic device prompts the user whether to authorize operation 1.
  • the electronic device may prompt the user whether to authorize operation 1, so as to improve the security of the data unit 1 to be operated.
  • the electronic device If the electronic device detects that the user instructs the operation 1 to be authorized, the electronic device prompts the user that the operation 1 has been successfully performed.
  • the electronic device can perform operation 1 and notify the user that operation 1 has been successfully performed, thereby realizing the user's need to perform operation 1.
  • the electronic device may include any combination of the first partition, the second partition, or the third partition.
  • the operation control methods described in FIG. 14, FIG. 15, and FIG. 16 can also be arbitrarily combined.
  • one operation control method includes steps 1401-1405 and 1501-1505
  • another operation control method includes steps 1501-1505 and 1601-1605
  • another operation control method includes steps 1401-1405 and 1501-150. 1505 and steps 1601-1605 are not described in the embodiment of the present application.
  • the electronic device includes hardware and / or software modules corresponding to performing each function.
  • the present application can be implemented in the form of hardware or a combination of hardware and computer software. Whether a certain function is performed by hardware or computer software-driven hardware depends on the specific application of the technical solution and design constraints. Those skilled in the art can use different methods to implement the described functions for each specific application in combination with the embodiments, but such implementation should not be considered to be beyond the scope of the present application.
  • the electronic device may be divided into functional modules according to the foregoing method example.
  • each functional module may be divided corresponding to each function, or two or more functions may be integrated into one processing module.
  • the above integrated modules may be implemented in the form of hardware. It should be noted that the division of the modules in this embodiment is schematic, and is only a logical function division. In actual implementation, there may be another division manner.
  • FIG. 17 shows a possible composition diagram of the electronic device 1700 involved in the foregoing embodiment.
  • the electronic device 1700 may include: a saving unit 1701, a detection unit 1702, a processing unit 1703, and a prompting unit 1704.
  • the saving unit 1701 may be used to support the electronic device 1700 to perform the above steps 501, 502, etc., and / or other processes for the techniques described herein.
  • the detection unit 1702 may be used to support the electronic device 1700 to perform the above steps 1401, 1402, 1501, 1502, 1601, 1602, etc., and / or other processes for the technology described herein.
  • the processing unit 1703 may be used to support the electronic device 1700 to perform the above steps 1001, 1002, 1102, 1104, etc., and / or other processes used in the technology described herein.
  • the prompting unit 1704 may be used to support the electronic device 1700 to perform the above steps 1101, 1103, 1403-1405, 1503-1505, 1603-1605, etc., and / or other processes for the technology described herein.
  • the electronic device 1700 provided in this embodiment is configured to execute the foregoing operation control method or operation control method, and therefore, the same effect as the above implementation method can be achieved.
  • the electronic device 1700 may include a processing module, a storage module, and a communication module.
  • the processing module may be used to control and manage the actions of the electronic device 1700.
  • the processing module may be used to support the electronic device 1700 to perform the steps performed by the detection unit 1702, the processing unit 1703, and the prompt unit 1704.
  • the storage module may be used to support the electronic device 1700 to execute the steps performed by the saving unit 1701 described above, and to store program code and data.
  • the communication module can be used to support communication between the electronic device 1700 and other devices.
  • the processing module may be a processor or a controller. It may implement or execute various exemplary logical blocks, modules, and circuits described in connection with the present disclosure.
  • the processor may also be a combination that implements computing functions, such as a combination including one or more microprocessors, a combination of digital signal processing (DSP) and a microprocessor, and so on.
  • the memory module may be a memory.
  • the communication module may specifically be a device that interacts with other devices such as a radio frequency circuit, a Bluetooth chip, and a Wi-Fi chip.
  • the electronic device involved in this embodiment may be an electronic device having a structure shown in FIG. 2 and FIG. 3.
  • An embodiment of the present application further provides a computer storage medium.
  • the computer storage medium stores computer instructions, and when the computer instructions are run on the electronic device, the electronic device is caused to execute the related method steps to implement the operation control in the foregoing embodiment. Method or operation control method.
  • An embodiment of the present application further provides a computer program product, when the computer program product is run on a computer, the computer is caused to execute the foregoing related steps to implement the operation control method or the operation control method performed by the electronic device in the foregoing embodiment.
  • an embodiment of the present application further provides a device.
  • the device may specifically be a chip, a component, or a module.
  • the device may include a connected processor and a memory.
  • the memory is used to store a computer to execute instructions.
  • the processor may execute computer execution instructions stored in the memory, so that the chip executes the operation control method or the operation control method performed by the electronic device in the foregoing method embodiments.
  • the electronic device, the computer storage medium, the computer program product, or the chip provided in this embodiment are used to execute the corresponding methods provided above. Therefore, for the beneficial effects that can be achieved, refer to the corresponding ones provided above. The beneficial effects in the method are not repeated here.
  • the disclosed apparatus and method may be implemented in other ways.
  • the device embodiments described above are only schematic.
  • the division of the modules or units is only a logical function division.
  • multiple units or components may be divided.
  • the combination can either be integrated into another device, or some features can be ignored or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, which may be electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may be one physical unit or multiple physical units, that is, may be located in one place, or may be distributed to multiple different places. . Some or all of the units may be selected according to actual needs to achieve the objective of the solution of this embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each of the units may exist separately physically, or two or more units may be integrated into one unit.
  • the above integrated unit may be implemented in the form of hardware or in the form of software functional unit.
  • the integrated unit When the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it may be stored in a readable storage medium.
  • the technical solution of the embodiments of the present application is essentially a part that contributes to the existing technology or all or part of the technical solution may be embodied in the form of a software product that is stored in a storage medium. Included are several instructions for causing a device (which can be a single-chip microcomputer, a chip, etc.) or a processor to execute all or part of the steps of the method described in the embodiments of the present application.
  • the foregoing storage media include: U disks, mobile hard disks, read-only memory (ROM), random access memory (RAM), magnetic disks, or optical disks, which can store program codes.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

Provided are an operation control method and an electronic device, relating to the technical field of electronics, capable of improving the security of user data, and increasing processing efficiency. The specific solution is: if the electronic device detects first request information that is used by a first application program to request execution of a first operation, the first operation being an operation used to modify a first data unit, denying, according to first parameter information corresponding to the first data unit, execution of the first operation, the first parameter information being used to represent a prohibition to modify the first data unit; and if the electronic device detects second request information that is used by a second application program to request execution of a second operation, the second operation being an operation used to remove a second data unit, denying, according to second parameter information corresponding to the second data unit, execution of the second operation, the second parameter information being used to represent a prohibition to remove the first data unit; wherein, a data unit is a file or a file folder. The present method is used to control an operation.

Description

一种操作控制方法及电子设备Operation control method and electronic equipment 技术领域Technical field
本申请实施例涉及电子技术领域,尤其涉及一种操作控制方法及电子设备。The embodiments of the present application relate to the field of electronic technology, and in particular, to an operation control method and an electronic device.
背景技术Background technique
为了方便学习、工作和生活,用户通常会在手机、ipad等电子设备上安装十几个,甚至几十个应用程序。这些安装在电子设备中的应用程序可能会无意甚至有意地篡改或删除手机上的用户数据,例如一些恶意软件或流氓软件会篡改或删除用户的照片或联系人信息等,从而严重威胁了用户的隐私安全。In order to facilitate study, work and life, users usually install a dozen or even dozens of applications on electronic devices such as mobile phones and iPads. These applications installed in electronic devices may inadvertently or even intentionally tamper with or delete user data on the phone. For example, some malicious software or rogue software may tamper or delete user photos or contact information, which seriously threatens users Privacy and security.
对此,现有技术提供了一种数据保护方案,即用户通过设定不同应用程序与待保护的用户数据的删除权限的对应关系,来达到保护用户数据的目的。例如,用户分别设置应用程序1与禁止删除联系人信息的对应关系,设置应用程序2与禁止删除联系人信息的对应关系,以提高联系人信息的安全性。在该方案中,用户需要分别设定每个应用程序与待保护的用户数据的操作权限的对应关系,处理效率较低。In this regard, the prior art provides a data protection solution, that is, the user achieves the purpose of protecting user data by setting a correspondence relationship between different application programs and deletion rights of the user data to be protected. For example, the user sets the correspondence between the application 1 and the deletion of the contact information, and sets the correspondence between the application 2 and the deletion of the contact information to improve the security of the contact information. In this solution, the user needs to set the corresponding relationship between each application and the operation authority of the user data to be protected, and the processing efficiency is low.
发明内容Summary of the Invention
本申请实施例提供一种操作控制方法及电子设备,能够提高待保护的用户数据的安全性和操作控制过程中的处理效率。The embodiments of the present application provide an operation control method and an electronic device, which can improve the security of user data to be protected and the processing efficiency in the operation control process.
为达到上述目的,本申请实施例采用如下技术方案:To achieve the above purpose, the embodiments of the present application adopt the following technical solutions:
第一方面,本申请技术方案提供了一种操作控制方法,电子设备上保存有第一数据单元与第一参数信息的对应关系。该数据单元为文件或文件夹,第一参数信息用于表示禁止修改第一数据单元。电子设备上还保存有第二数据单元与第二参数信息的对应关系,第二参数信息用于表示禁止删除第二数据单元。这样,若电子设备检测到第一应用程序用于请求执行第一操作的第一请求信息,第一操作为修改第一数据单元的操作,则电子设备根据第一数据单元对应的第一参数信息确定第一操作被禁止,因而可以拒绝执行第一操作。若电子设备检测到第二应用程序用于请求执行第二操作的第二请求信息,第二操作为删除第二数据单元的操作,则电子设备根据第二数据单元对应的第二参数信息确定第二操作被禁止,因而可以拒绝执行第二操作。这样,通过参数信息来表示数据单元禁止被任何应用程序删除、修改或读取,可以提高数据单元的安全性和操作控制过程的处理效率。In a first aspect, the technical solution of the present application provides an operation control method. A correspondence relationship between a first data unit and first parameter information is stored on an electronic device. The data unit is a file or a folder, and the first parameter information is used to indicate that modification of the first data unit is prohibited. The electronic device also stores a correspondence between the second data unit and the second parameter information. The second parameter information is used to indicate that deletion of the second data unit is prohibited. In this way, if the electronic device detects the first request information used by the first application to request the first operation, and the first operation is an operation to modify the first data unit, the electronic device according to the first parameter information corresponding to the first data unit It is determined that the first operation is prohibited, and thus the execution of the first operation may be refused. If the electronic device detects the second request information used by the second application to request the second operation, and the second operation is an operation to delete the second data unit, the electronic device determines the first request information according to the second parameter information corresponding to the second data unit. The second operation is prohibited, so the second operation can be refused. In this way, the parameter information is used to indicate that the data unit is prohibited from being deleted, modified, or read by any application program, which can improve the security of the data unit and the processing efficiency of the operation control process.
在一种可能的实现方式中,在电子设备拒绝执行第一操作之后,该方法还包括:若第一应用程序为特定的应用程序,则表明第一应用程序可能是安全的应用程序,因而电子设备可以提示用户是否对第一操作进行授权,并在电子设备检测到用户对第一操作进行授权的指示操作后,电子设备执行第一操作。In a possible implementation manner, after the electronic device refuses to perform the first operation, the method further includes: if the first application is a specific application, indicating that the first application may be a secure application, and thus the electronic The device may prompt the user whether to authorize the first operation, and the electronic device performs the first operation after the electronic device detects the instructed operation of the user to authorize the first operation.
在另一种可能的实现方式中,在电子设备拒绝执行第一操作之后,该方法还包括:若第一操作是由用户发起的操作,则表明用户可能确实想要执行该第一操作,因而电子设备可以提示用户是否对第一操作进行授权,并在电子设备检测到用户对第一操作 进行授权的指示操作后,电子设备执行第一操作。In another possible implementation manner, after the electronic device refuses to perform the first operation, the method further includes: if the first operation is an operation initiated by the user, it indicates that the user may indeed want to perform the first operation, so The electronic device may prompt the user whether to authorize the first operation, and after the electronic device detects the instructed operation of the user to authorize the first operation, the electronic device performs the first operation.
在另一种可能的实现方式中,在电子设备拒绝执行第二操作之后,该方法还包括:若第二应用程序为特定的应用程序,则表明第二应用程序可能是安全的应用程序,因而电子设备可以提示用户是否对第二操作进行授权。在电子设备检测到用户对第二操作进行授权的指示操作后,电子设备执行第二操作。In another possible implementation manner, after the electronic device refuses to perform the second operation, the method further includes: if the second application is a specific application, indicating that the second application may be a secure application, and thus The electronic device may prompt the user whether to authorize the second operation. After the electronic device detects the user's instruction to authorize the second operation, the electronic device performs the second operation.
在另一种可能的实现方式中,该方法还包括:若电子设备检测到第三应用程序用于请求执行第一操作的第三操作请求,则电子设备根据第一数据单元对应的第一参数信息确定第一操作被禁止,因而电子设备拒绝执行第一操作。In another possible implementation manner, the method further includes: if the electronic device detects a third operation request that the third application uses to request the first operation, the electronic device according to the first parameter corresponding to the first data unit The information determines that the first operation is prohibited, and thus the electronic device refuses to perform the first operation.
在另一种可能的实现方式中,电子设备上保存有第三数据单元与第三参数信息的对应关系,第三参数信息用于表示禁止读取第三数据单元。若电子设备检测到第四应用程序用于请求执行第三操作的第四请求信息,第三操作为读取第三数据单元的操作,则电子设备根据第三数据单元对应的第三参数信息,确定第三操作被禁止,因而电子设备拒绝执行第三操作。In another possible implementation manner, the correspondence between the third data unit and the third parameter information is stored on the electronic device, and the third parameter information is used to indicate that reading of the third data unit is prohibited. If the electronic device detects the fourth request information used by the fourth application program to request the third operation, and the third operation is an operation of reading the third data unit, the electronic device according to the third parameter information corresponding to the third data unit, It is determined that the third operation is prohibited, and thus the electronic device refuses to perform the third operation.
在另一种可能的实现方式中,电子设备在检测到用户将第一数据单元加入第一分区的操作时,保存第一数据单元与第一参数信息和第二参数信息的对应关系,以表明第一数据单元属于第一分区。In another possible implementation manner, when the electronic device detects an operation that the user adds the first data unit to the first partition, the electronic device saves the correspondence between the first data unit and the first parameter information and the second parameter information to indicate that The first data unit belongs to the first partition.
在另一种可能的实现方式中,电子设备在检测到用户将第二数据单元加入第二分区的操作时,保存第二数据单元与第二参数信息的对应关系,以表明第二数据单元属于第二分区。In another possible implementation manner, when the electronic device detects an operation that the user adds the second data unit to the second partition, the electronic device saves the correspondence between the second data unit and the second parameter information to indicate that the second data unit belongs to The second partition.
在另一种可能的实现方式中,电子设备在检测到用户将第三数据单元加入第三分区的操作时,保存第三数据单元与第一参数信息、第二参数信息和第三参数信息的对应关系,以表明第三数据单元属于第三分区。In another possible implementation manner, the electronic device saves the third data unit and the first parameter information, the second parameter information, and the third parameter information when detecting that the user adds the third data unit to the third partition. Correspondence relationship to indicate that the third data unit belongs to the third partition.
在另一种可能的实现方式中,该方法还包括:在第一分区、第二分区或第三分区中的数据单元被删除之后,电子设备保存删除日志,删除日志用于记录这些分区中被删除的数据单元的删除时间、删除主体以及被删除的数据单元的路径。其中,删除主体为请求删除操作的应用程序。这样,电子设备可以跟踪记录第二分区中的数据单元的删除情况,以方便相关人员和用户了解文件和文件夹是如何被删除的。In another possible implementation manner, the method further includes: after the data unit in the first partition, the second partition, or the third partition is deleted, the electronic device saves a delete log, and the delete log is used to record the data in these partitions. The deletion time of the deleted data unit, the deletion subject, and the path of the deleted data unit. The deletion subject is an application that requests a deletion operation. In this way, the electronic device can track and record the deletion of the data unit in the second partition, so that relevant personnel and users can understand how the files and folders are deleted.
在另一种可能的实现方式中,在第四数据单元变更分区后,电子设备保存分区变更日志,分区变更日志包括第四数据单元变更分区的时间、第四数据单元的路径,变更分区前的位置以及变更分区后的位置。这样,可以方便相关人员和用户实时获知文件和文件夹当前的安全级别。In another possible implementation manner, after the fourth data unit changes the partition, the electronic device saves the partition change log. The partition change log includes the time when the fourth data unit changes the partition, the path of the fourth data unit, and the time before the partition is changed. Location and location after changing partitions. In this way, relevant personnel and users can know the current security level of files and folders in real time.
其中,第四数据单元变更分区包括,第四数据单元从第一分区、第二分区和第三分区中的其中一个分区变更到第一分区、第二分区和第三分区中的另一个分区,或者第三数据单元从分区外变更到第一分区内、第二分区内或第三分区内,或者第四数据单元从第一分区内、第二分区内或第三分区内变更到分区外。Wherein, changing the fourth data unit includes changing the fourth data unit from one of the first, second, and third partitions to another of the first, second, and third partitions. Either the third data unit is changed from outside the partition to the first, the second, or the third partition, or the fourth data unit is changed from the first, the second, or the third partition to the outside of the partition.
在另一种可能的实现方式中,在上述分区内的文件和文件夹的显示状态,可以不同于分区以外的文件和文件夹的显示状态,以方便用户获知文件或文件夹是否在分区中,是否为重要文件。In another possible implementation manner, the display status of files and folders in the partition may be different from the display status of files and folders outside the partition, so that the user can know whether the file or folder is in the partition. Whether it is an important document.
在另一种可能的实现方式中,不同分区中的数据单元的显示状态不同,以方便用 户区别不同安全级别的文件。其中,显示状态包括数据单元的图标的颜色、数据单元的图标上的标记、数据单元的图标的形状或数据单元的图标的透明度中的一个或任意组合。In another possible implementation manner, the display states of the data units in different partitions are different, so that users can distinguish files of different security levels. The display state includes one or any combination of a color of the data unit icon, a mark on the data unit icon, a shape of the data unit icon, or a transparency of the data unit icon.
第二方面,本申请技术方案提供了一种操作控制方法,电子设备上保存有第一数据单元与第一参数信息的对应关系。第一数据单元为文件或文件夹,第一参数信息用于表示禁止修改第一数据单元。这样,若电子设备检测到第一应用程序用于请求执行第一操作的第一请求信息,第一操作为修改第一数据单元的操作,则电子设备根据第一数据单元对应的第一参数信息确定第一操作被禁止,因而可以拒绝执行第一操作。这样,通过参数信息来表示数据单元禁止被任何应用程序修改,可以提高数据单元的安全性和操作控制过程的处理效率。In a second aspect, the technical solution of the present application provides an operation control method. A correspondence relationship between a first data unit and first parameter information is stored on an electronic device. The first data unit is a file or a folder, and the first parameter information is used to indicate that modification of the first data unit is prohibited. In this way, if the electronic device detects the first request information used by the first application to request the first operation, and the first operation is an operation to modify the first data unit, the electronic device according to the first parameter information corresponding to the first data unit It is determined that the first operation is prohibited, and thus the execution of the first operation may be refused. In this way, the parameter information is used to indicate that the data unit is prohibited from being modified by any application program, which can improve the security of the data unit and the processing efficiency of the operation control process.
第三方面,本申请技术方案提供了一种操作控制方法,电子设备上保存有第一数据单元与第一参数信息的对应关系。第一数据单元为文件或文件夹,第一参数信息用于表示禁止删除第一数据单元。这样,若电子设备检测到第一应用程序用于请求执行第一操作的第一请求信息,第一操作为删除第一数据单元的操作,则电子设备根据第一数据单元对应的第一参数信息确定第一操作被禁止,因而可以拒绝执行第一操作。这样,通过参数信息来表示数据单元禁止被任何应用程序删除,可以提高数据单元的安全性和操作控制过程的处理效率。In a third aspect, the technical solution of the present application provides an operation control method. The electronic device stores a correspondence between the first data unit and the first parameter information. The first data unit is a file or a folder, and the first parameter information is used to indicate that deletion of the first data unit is prohibited. In this way, if the electronic device detects the first request information used by the first application to request the first operation, and the first operation is an operation to delete the first data unit, the electronic device according to the first parameter information corresponding to the first data unit It is determined that the first operation is prohibited, and thus the execution of the first operation may be refused. In this way, the parameter information is used to indicate that the data unit is prohibited from being deleted by any application program, which can improve the security of the data unit and the processing efficiency of the operation control process.
第四方面,本申请技术方案提供了一种操作控制方法,电子设备上保存有第一数据单元与第一参数信息的对应关系。第一数据单元为文件或文件夹,第一参数信息用于表示禁止读取第一数据单元。这样,若电子设备检测到第一应用程序用于请求执行第一操作的第一请求信息,第一操作为读取第一数据单元的操作,则电子设备根据第一数据单元对应的第一参数信息确定第一操作被禁止,因而可以拒绝执行第一操作。这样,通过参数信息来表示数据单元禁止被任何应用程序读取,可以提高数据单元的安全性和操作控制过程的处理效率。In a fourth aspect, the technical solution of the present application provides an operation control method. The correspondence relationship between the first data unit and the first parameter information is stored on the electronic device. The first data unit is a file or a folder, and the first parameter information is used to indicate that reading of the first data unit is prohibited. In this way, if the electronic device detects the first request information used by the first application to request the first operation, and the first operation is an operation of reading the first data unit, the electronic device according to the first parameter corresponding to the first data unit The information determines that the first operation is prohibited, and thus the execution of the first operation may be refused. In this way, the parameter unit is used to indicate that the data unit is forbidden to be read by any application program, which can improve the security of the data unit and the processing efficiency of the operation control process.
第五方面,本申请技术方案提供了一种操作控制方法,包括:电子设备检测到用户将第一数据单元加入第一分区的操作,电子设备检测到用户通过第一应用程序修改第一数据单元的第一操作,电子设备提示用户第一操作已被拒绝,电子设备提示用户是否对第一操作进行授权。In a fifth aspect, the technical solution of the present application provides an operation control method, including: the electronic device detects that the user adds the first data unit to the first partition, and the electronic device detects that the user modifies the first data unit through the first application program For the first operation, the electronic device prompts the user that the first operation has been rejected, and the electronic device prompts the user whether to authorize the first operation.
可选地,若电子设备检测到用户对第一操作的授权操作,则电子设备提示用户第一操作已成功执行。Optionally, if the electronic device detects an authorized operation of the first operation by the user, the electronic device prompts the user that the first operation has been successfully performed.
在一种可能的实现方式中,该方法还包括:电子设备检测到用户通过第二应用程序修改第一数据单元的第二操作,电子设备提示用户第二操作已被拒绝。In a possible implementation manner, the method further includes: the electronic device detects that the user modifies the second operation of the first data unit through the second application program, and the electronic device prompts the user that the second operation has been rejected.
在另一种可能的实现方式中,该方法还包括:电子设备检测到用户将第二数据单元加入第二分区的操作;电子设备检测到用户通过第三应用程序删除第二数据单元的第三操作;电子设备提示用户第三操作已被拒绝;电子设备提示用户是否对第三操作进行授权;若电子设备检测到用户对第三操作的授权操作,则电子设备提示用户第三操作已成功执行。In another possible implementation manner, the method further includes: the electronic device detects that the user adds the second data unit to the second partition; the electronic device detects that the user deletes the third of the second data unit through the third application program Operation; the electronic device prompts the user that the third operation has been rejected; the electronic device prompts the user whether to authorize the third operation; if the electronic device detects the user's authorized operation on the third operation, the electronic device prompts the user that the third operation has been successfully performed .
在另一种可能的实现方式中,该方法还包括:电子设备检测到用户将第三数据单元加入第三分区的操作;电子设备检测到用户通过第四应用程序读取第三数据单元的 第四操作;电子设备提示用户第四操作已被拒绝;电子设备提示用户是否对第四操作进行授权;若电子设备检测到用户对第四操作的授权操作,则电子设备提示用户第四操作已成功执行。In another possible implementation manner, the method further includes: the electronic device detects that the user adds the third data unit to the third partition; the electronic device detects that the user reads the third data unit through the fourth application program. Four operations; the electronic device prompts the user that the fourth operation has been rejected; the electronic device prompts the user whether to authorize the fourth operation; if the electronic device detects the user's authorized operation on the fourth operation, the electronic device prompts the user that the fourth operation has succeeded carried out.
第六方面,本申请技术方案提供了一种操作控制方法,包括:电子设备检测到用户将第一数据单元加入第一分区的操作;电子设备检测到用户通过第一应用程序修改或删除第一数据单元的第一操作;电子设备提示用户第一操作已被拒绝;电子设备提示用户是否对第一操作进行授权。According to a sixth aspect, the technical solution of the present application provides an operation control method, including: the electronic device detects that the user adds the first data unit to the first partition; the electronic device detects that the user modifies or deletes the first data unit through the first application program; The first operation of the data unit; the electronic device prompts the user that the first operation has been rejected; the electronic device prompts the user whether to authorize the first operation.
第七方面,本申请技术方案提供了一种操作控制方法,包括:电子设备检测到用户将第一数据单元加入第二分区的操作;电子设备检测到用户通过第一应用程序删除第一数据单元的第一操作;电子设备提示用户第一操作已被拒绝;电子设备提示用户是否对第一操作进行授权。In a seventh aspect, the technical solution of the present application provides an operation control method, including: the electronic device detects that the user adds the first data unit to the second partition; the electronic device detects that the user deletes the first data unit through the first application program The electronic device prompts the user that the first operation has been rejected; the electronic device prompts the user whether to authorize the first operation.
第八方面,本申请技术方案提供了一种操作控制方法,包括:电子设备检测到用户将第一数据单元加入第三分区的操作;电子设备检测到用户通过第一应用程序修改、删除或读取第一数据单元的第一操作;电子设备提示用户第一操作已被拒绝;电子设备提示用户是否对第一操作进行授权。In an eighth aspect, the technical solution of the present application provides an operation control method, including: the electronic device detects that the user adds the first data unit to the third partition; the electronic device detects that the user modifies, deletes, or reads through the first application program Take the first operation of the first data unit; the electronic device prompts the user that the first operation has been rejected; the electronic device prompts the user whether to authorize the first operation.
第九方面,本申请技术方案提供了一种操作控制装置,该装置包含在电子设备中,该装置具有实现上述第一方面至第八方面及其可能实现方式中电子设备行为的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。硬件或软件包括一个或多个与上述功能相对应的模块或单元。例如,保存模块或单元、检测模块或单元、处理模块或单元、提示模块或单元等。In a ninth aspect, the technical solution of the present application provides an operation control device, which is included in an electronic device, and the device has a function of implementing the behavior of the electronic device in the first to eighth aspects and possible implementation manners. This function can be realized by hardware, and can also be implemented by hardware executing corresponding software. The hardware or software includes one or more modules or units corresponding to the above functions. For example, a save module or unit, a detection module or unit, a processing module or unit, a prompt module or unit, and so on.
第十方面,本申请技术方案提供了一种电子设备,包括一个或多个处理器和一个或多个存储器。该一个或多个存储器与一个或多个处理器耦合,一个或多个存储器用于存储计算机程序代码,计算机程序代码包括计算机指令,当一个或多个处理器执行计算机指令时,使得电子设备执行上述第一方面至第八方面任一项可能的实现中的操作控制方法。In a tenth aspect, the technical solution of the present application provides an electronic device including one or more processors and one or more memories. The one or more memories are coupled to one or more processors. The one or more memories are used to store computer program code. The computer program code includes computer instructions. When the one or more processors execute the computer instructions, the electronic device executes the instructions. The operation control method in any possible implementation of the foregoing first to eighth aspects.
第十一方面,本申请技术方案提供了一种计算机存储介质,包括计算机指令,当计算机指令在电子设备上运行时,使得电子设备执行上述第一方面至第八方面任一项可能的实现中的操作控制方法。According to an eleventh aspect, the technical solution of the present application provides a computer storage medium including computer instructions, and when the computer instructions are run on the electronic device, the electronic device is caused to execute any one of the foregoing first to eighth possible implementations. Operation control method.
第十二方面,本申请技术方案提供了一种计算机程序产品,当计算机程序产品在计算机上运行时,使得计算机执行上述第一方面至第八方面任一项可能的实现中的操作控制方法。In a twelfth aspect, the technical solution of the present application provides a computer program product. When the computer program product runs on a computer, the computer is caused to execute the operation control method in any one of the possible implementations of the first aspect to the eighth aspect.
附图说明BRIEF DESCRIPTION OF THE DRAWINGS
图1为本申请实施例提供的一组界面示意图;FIG. 1 is a schematic diagram of a group of interfaces according to an embodiment of the present application;
图2为本申请实施例提供的一种电子设备的硬件结构示意图;2 is a schematic diagram of a hardware structure of an electronic device according to an embodiment of the present application;
图3为本申请实施例提供的一种电子设备的软件结构示意图;3 is a schematic diagram of a software structure of an electronic device according to an embodiment of the present application;
图4为本申请实施例提供的一种界面示意图;FIG. 4 is a schematic interface diagram according to an embodiment of the present application; FIG.
图5为本申请实施例提供的一种方法流程图;5 is a flowchart of a method according to an embodiment of the present application;
图6为本申请实施例提供的另一组界面示意图;FIG. 6 is a schematic diagram of another group of interfaces according to an embodiment of the present application; FIG.
图7为本申请实施例提供的另一种界面示意图;7 is a schematic diagram of another interface according to an embodiment of the present application;
图8为本申请实施例提供的另一组界面示意图;FIG. 8 is a schematic diagram of another group of interfaces according to an embodiment of the present application; FIG.
图9为本申请实施例提供的另一组界面示意图;FIG. 9 is a schematic diagram of another group of interfaces according to an embodiment of the present application; FIG.
图10为本申请实施例提供的另一种方法流程图;FIG. 10 is a flowchart of another method according to an embodiment of the present application; FIG.
图11为本申请实施例提供的另一种方法流程图;11 is a flowchart of another method according to an embodiment of the present application;
图12为本申请实施例提供的另一组界面示意图;FIG. 12 is a schematic diagram of another group of interfaces according to an embodiment of the present application; FIG.
图13为本申请实施例提供的另一种界面示意图;13 is a schematic diagram of another interface according to an embodiment of the present application;
图14为本申请实施例提供的另一种方法流程图;14 is a flowchart of another method according to an embodiment of the present application;
图15为本申请实施例提供的另一种方法流程图;15 is a flowchart of another method according to an embodiment of the present application;
图16为本申请实施例提供的另一种方法流程图;16 is a flowchart of another method according to an embodiment of the present application;
图17为本申请实施例提供的一种电子设备的结构示意图。FIG. 17 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
具体实施方式detailed description
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行描述。其中,在本申请实施例的描述中,除非另有说明,“/”表示或的意思,例如,A/B可以表示A或B;本文中的“和/或”仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,在本申请实施例的描述中,“多个”是指两个或多于两个。The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application. Wherein, in the description of the embodiments of the present application, unless otherwise stated, "/" represents or means, for example, A / B may represent A or B; "and / or" herein is only a description of an associated object The association relationship indicates that there can be three types of relationships, for example, A and / or B can indicate: there are three cases where A exists alone, A and B exist simultaneously, and B exists alone. In addition, in the description of the embodiments of the present application, “multiple” means two or more than two.
本申请实施例提供了一种操作控制方法,可以应用于电子设备,提高电子设备上用户数据的安全性。其中,用户数据是指用户在使用电子设备上的过程中产生的数据,例如用户在电子设备上存入的联系人信息,用户利用电子设备拍摄的照片,用户通过电子设备从其他设备接收的文档,用户利用电子设备录制的音频文件,用户使用微信时的聊天记录等等。The embodiments of the present application provide an operation control method, which can be applied to an electronic device to improve the security of user data on the electronic device. Among them, user data refers to data generated by the user in the process of using the electronic device, such as contact information stored by the user on the electronic device, photos taken by the user with the electronic device, and documents received by the user from other devices through the electronic device , Audio files recorded by users using electronic devices, chat records when users use WeChat, and so on.
电子设备上可以包括至少一个分区,该分区可以是虚拟的存储分区,也可以是真是的磁盘分区(例如磁盘D、SD卡1等),本申请实施例不予限定。不同分区内可以包括不同的数据单元。该数据单元可以是文件或者文件夹。其中,文件夹中可以只包括文件,或者还包括子文件夹,本申请实施例不予具体限定。The electronic device may include at least one partition, and the partition may be a virtual storage partition or a real disk partition (for example, disk D, SD card 1, etc.), which is not limited in the embodiment of the present application. Different partitions can include different data units. The data unit can be a file or a folder. The folder may include only files or subfolders, which are not specifically limited in the embodiment of the present application.
可以理解的是,电子设备所采用的操作系统不同,不同分区中数据单元的类型也可以不同。例如,在安卓操作系统下,分区1中的数据单元可以是文件或文件夹,分区2中的数据单元可以是文件夹。在其他操作系统中,分区1中的数据单元可以是文件或文件夹,分区2中的数据单元也可以是文件或文件夹。It can be understood that the operating systems adopted by the electronic devices are different, and the types of data units in different partitions may also be different. For example, under the Android operating system, the data unit in partition 1 may be a file or a folder, and the data unit in partition 2 may be a folder. In other operating systems, the data unit in partition 1 may be a file or folder, and the data unit in partition 2 may also be a file or folder.
当电子设备检测到用户用于打开某个分区的操作时,电子设备上可以显示该分区中的文件和文件夹。示例性的,在电子设备上用于存储照片的数码相机存储(digital camera in memory,DCIM)文件夹已经加入分区1之后,参见图1中的(a),当用户点击分区1的控件01时,如图1中的(b)所示,电子设备可以显示分区1中包括的文件和文件夹即DCIM文件夹。当用户点击分区2的控件02时,电子设备可以显示分区2中包括的文件和文件夹。当电子设备上的分区是虚拟的存储分区时,在某个文件或文件夹加入分区后,该文件或文件夹从逻辑上归属于某个分区,但该文件或文件夹的存储路径并没有改变。例如,DCIM文件夹在加入到第一分区后,DCIM文件仍为原来的存储路径。When the electronic device detects a user operation to open a partition, files and folders in the partition can be displayed on the electronic device. Exemplarily, after a digital camera storage (DCIM) folder for storing photos on an electronic device has been added to the partition 1, see FIG. 1 (a), when the user clicks on the control 01 of the partition 1 As shown in FIG. 1 (b), the electronic device can display files and folders included in the partition 1, that is, a DCIM folder. When the user clicks on the control 02 of the partition 2, the electronic device can display files and folders included in the partition 2. When the partition on the electronic device is a virtual storage partition, after a file or folder is added to the partition, the file or folder logically belongs to a partition, but the storage path of the file or folder has not changed. . For example, after the DCIM folder is added to the first partition, the DCIM file is still the original storage path.
电子设备上的每个分区可以对应一组参数信息,当一个数据单元加入某个分区后, 电子设备可以保存该数据单元与该分区相应的参数信息的对应关系,以表示该数据单元属于该分区。也就是说,若电子设备上保存有数据单元与一组参数信息的对应关系,则可以表明该数据单元属于该参数信息对应的分区。其中,参数信息用于表示禁止应用程序删除数据单元、修改数据单元或读取数据单元中的一种或任意组合。Each partition on the electronic device can correspond to a set of parameter information. When a data unit is added to a partition, the electronic device can save the correspondence between the data unit and the corresponding parameter information of the partition to indicate that the data unit belongs to the partition. . That is, if a correspondence between a data unit and a set of parameter information is stored on the electronic device, it can be shown that the data unit belongs to a partition corresponding to the parameter information. The parameter information is used to indicate that the application is prohibited from deleting one or any combination of data units, modifying data units, or reading data units.
在一些实施例中,电子设备上保存的与数据单元对应的参数信息可以是数据单元的属性信息,该属性信息可以包括禁止删除的属性信息、禁止修改的属性信息或禁止读取的属性信息中的一种或任意组合。In some embodiments, the parameter information corresponding to the data unit stored on the electronic device may be attribute information of the data unit. The attribute information may include attribute information forbidden to delete, attribute information forbidden to modify, or attribute information forbidden to read. One or any combination.
当数据单元为文件时,电子设备可以保存文件与属性信息的对应关系。其中,禁止删除的属性信息用于表示禁止应用程序删除(例如,unlink)该文件;禁止修改的属性信息用于表示禁止应用程序修改该文件的内容(例如,在该文件中增加数据、减少数据或替换数据)和禁止修改文件的名称(即禁止重命名(例如,rename)文件);禁止读取的属性信息用于表示禁止应用程序读取该文件。When the data unit is a file, the electronic device can save the correspondence between the file and the attribute information. Wherein, the attribute information for prohibiting deletion is used to indicate that the application is prohibited from deleting (for example, unlink) the file; the attribute information for prohibiting modification is used to indicate that the application is prohibited from modifying the content of the file (for example, adding data to the file, reducing data) Or replace data) and prohibit the modification of the name of the file (that is, prohibit the renaming (eg, rename) of the file); the read-inhibited attribute information is used to indicate that the application is prohibited from reading the file.
举例来说,当电子设备保存有文件和属性信息的对应关系,该属性信息为禁止删除时,若应用程序请求删除该文件,则电子设备根据该文件对应的属性信息确定拒绝删除。For example, when the electronic device has a correspondence between a file and attribute information, and the attribute information is forbidden to delete, if the application requests deletion of the file, the electronic device determines to refuse deletion according to the attribute information corresponding to the file.
当数据单元为文件夹时,电子设备可以保存文件夹与属性信息的对应关系。其中,禁止删除的属性信息用于表示禁止应用程序删除该文件夹,具体包括禁止应用程序删除该文件夹中的文件以及禁止应用程序删除该文件夹;禁止修改的属性信息用于表示禁止应用程序修改该文件夹,具体包括禁止修改该文件夹的名称(即禁止重命名文件夹),禁止修改该文件夹中文件的内容,以及禁止修改文件夹中文件的名称(即禁止重命名文件夹中的文件)等;禁止读取的属性信息用于表示禁止应用程序读取该文件夹(包括禁止读取该文件夹中的文件)。When the data unit is a folder, the electronic device can save the correspondence between the folder and the attribute information. The attribute information for prohibiting deletion is used to indicate that the application is prohibited from deleting the folder, and specifically includes the application is prohibited from deleting the files in the folder and the application is prohibited from deleting the folder; the attribute information forbidden to modify is used to indicate that the application is prohibited Modifying the folder specifically includes prohibiting the name of the folder from being modified (that is, prohibiting renaming the folder), prohibiting modifying the contents of the files in the folder, and prohibiting modifying the name of the files in the folder (that is, prohibiting renaming the folder File), etc .; the read-inhibited attribute information is used to indicate that the application is prohibited from reading the folder (including the file from the folder).
举例来说,当电子设备上保存有文件夹和属性信息的对应关系,该属性信息为禁止删除时,若应用程序请求删除该文件夹中的一个文件,则电子设备根据该属性信息确定拒绝执行该删除操作。For example, when the correspondence between a folder and attribute information is stored on the electronic device, and the attribute information is forbidden to delete, if the application requests to delete a file in the folder, the electronic device determines to refuse execution according to the attribute information. The delete operation.
在另一些实施例中,参数信息可以是一个禁止操作集合,该禁止操作集合中的操作禁止执行,该禁止操作集合可以包括删除操作、修改操作或读取操作中的一种或任意组合。In other embodiments, the parameter information may be a forbidden operation set, the operations in the forbidden operation set are prohibited from being performed, and the forbidden operation set may include one or any combination of a delete operation, a modify operation, or a read operation.
当数据单元为文件时,电子设备可以保存文件与禁止操作集合的对应关系。其中,禁止操作集合中的删除操作用于表示禁止应用程序删除该文件;禁止操作集合中的修改操作用于表示禁止应用程序修改该文件的内容和文件的名称;禁止操作集合中的读取操作用于表示禁止应用程序读取该文件。When the data unit is a file, the electronic device can save the correspondence between the file and the prohibited operation set. The delete operation in the forbidden operation set is used to indicate that the application is prohibited from deleting the file; the modify operation in the forbidden operation set is used to indicate that the application is prohibited from modifying the content of the file and the file name; and the read operation in the forbidden operation set is prohibited Used to indicate that the application is prevented from reading the file.
当数据单元为文件夹时,电子设备可以保存文件夹与禁止操作集合的对应关系。其中,禁止操作集合中的删除操作用于表示禁止应用程序删除该文件夹,具体包括禁止应用程序删除该文件夹中的文件以及禁止应用程序删除该文件夹;禁止操作集合中的修改操作用于表示禁止应用程序修改该文件夹,具体包括禁止修改该文件夹的名称以及禁止修改该文件夹中文件的内容和文件的名称等;禁止操作集合中的读取操作用于表示禁止应用程序读取该文件夹。When the data unit is a folder, the electronic device can save the correspondence between the folder and the prohibited operation set. The delete operation in the forbidden operation set is used to indicate that the application is prohibited from deleting the folder, and specifically includes the prohibition of the application from deleting the files in the folder and the application to delete the folder; the modify operation in the forbidden operation collection is used for Indicates that the application is prohibited from modifying the folder, which specifically includes prohibiting the modification of the name of the folder and the content of the file in the folder and the name of the file; the read operation in the prohibited operation set is used to indicate that the application is prohibited from reading The folder.
可以理解的是,除了属性信息和禁止操作集合以外,上述参数信息还可以是其他 的信息,本申请实施例不予具体限定。It can be understood that, in addition to the attribute information and the prohibited operation set, the foregoing parameter information may also be other information, which is not specifically limited in the embodiment of the present application.
当电子设备上的应用程序请求对分区中的文件或文件夹进行删除、修改或读取操作时,电子设备读取文件或文件夹对应的参数信息,若根据该文件或文件夹对应的参数信息确定该操作被禁止,则电子设备拒绝执行该操作。其中,电子设备上的应用程序可以包括电子设备上原生的应用程序和第三方应用程序。例如,该应用程序可以是微信应用、图库应用、电话应用、微博应用等。When an application program on an electronic device requests deletion, modification, or reading of a file or folder in a partition, the electronic device reads parameter information corresponding to the file or folder. If it is determined that the operation is prohibited, the electronic device refuses to perform the operation. The application program on the electronic device may include a native application program and a third-party application program on the electronic device. For example, the application may be a WeChat application, a gallery application, a phone application, a Weibo application, and the like.
也就是说,当文件或文件夹属于某个分区,电子设备上保存有文件或文件夹与参数信息的对应关系时,由于电子设备在对这些文件或文件夹进行操作之前,需要根据参数信息来确定该操作是否允许,因此电子设备上的应用程序无法成功对该文件或文件夹进行参数信息中所禁止的操作(例如删除、修改或读取操作),因而可以防止文件或文件夹中数据的丢失或篡改,提高数据的安全性。In other words, when a file or folder belongs to a certain partition, and the correspondence between the file or folder and the parameter information is stored on the electronic device, since the electronic device needs to operate according to the parameter information before operating these files or folders, Determine whether the operation is allowed, so the application on the electronic device cannot successfully perform an operation (such as delete, modify, or read operation) prohibited in the parameter information of the file or folder, thus preventing the data in the file or folder Lost or tampered with to increase data security.
需要说明的是,本申请实施例通过参数信息来表示文件或文件夹禁止被任何应用程序删除、修改或读取,而不需要用户像现有技术那样分别设置每个应用程序与每个文件或每个文件夹的操作权限(例如删除、修改等操作权限)的对应关系,因而可以提高操作控制过程的处理效率。It should be noted that, in the embodiment of the present application, parameter information is used to indicate that a file or folder is prohibited from being deleted, modified, or read by any application program, without requiring the user to set each application program and each file or file separately as in the prior art. The corresponding relationship between the operation permissions (such as delete, modify, and other operation permissions) of each folder can improve the processing efficiency of the operation control process.
并且,由于电子设备上的应用程序较多(例如可能有几十个),若用户需要针对某一文件或文件夹设置多个应用程序中的每个应用程序与该文件或文件夹的删除、修改等操作权限的对应关系,则可能出现用户不小心误设了某个应用程序与该文件或文件夹的某个操作权限的对应关系,使得该应用程序可以自动删除或修改该文件或文件夹,从而可能导致该文件或文件夹中重要数据的丢失。而采用本申请实施例提供的方法,可以从文件和文件夹的角度出发,通过设置参数信息来统一设定禁止任何应用程序删除或修改该文件或文件夹,因而可以避免现有技术中出现的由于误设导致数据丢失的问题。In addition, since there are many applications on the electronic device (for example, there may be dozens), if a user needs to set each application in a plurality of applications for a certain file or folder and delete the file or folder, Correspondence between operation permissions such as modification, the user may accidentally set the correspondence between an application and an operation permission of the file or folder, so that the application can automatically delete or modify the file or folder , Which may cause loss of important data in the file or folder. By using the method provided in the embodiment of the present application, from the perspective of files and folders, it is possible to uniformly prevent any application from deleting or modifying the file or folder by setting parameter information. The problem of data loss due to missetting.
此外,现有技术中还提供了另一种提高数据安全性的方案,即事先设定一些重要文件需要放到回收站,当这些文件被删除时则转移到回收站保存。该种方案无法阻止文件名和文件中的用户数据被篡改,并且文件在回收站超过保存期限时会被清除,因而仍会导致数据的丢失。而采用本申请以上实施例提供的操作控制方法,可以使得加入分区的重要文件和文件夹不会被应用程序篡改或删除。In addition, another solution to improve data security is provided in the prior art, that is, it is set in advance that some important files need to be placed in the recycle bin, and when these files are deleted, they are transferred to the recycle bin for storage. This solution cannot prevent the file name and user data in the file from being tampered with, and the file will be cleared when the recycle bin exceeds the storage period, thus still causing data loss. By adopting the operation control method provided in the foregoing embodiments of the present application, important files and folders added to the partition cannot be tampered or deleted by the application program.
现有技术中还提供了另一种提高数据安全性的方案,即电子设备周期性的将用户数据备份到外置存储卡、电脑或者云上。该种方案无法做到实时备份,可能出现在备份前用户数据已被删除的问题;并且,用户需要付出额外的费用购买存储设备或者云存储空间;对于云上存储,用户还会担心隐私泄露的问题。而采用本申请以上实施例提供的操作控制方法不需要将用户数据存储到额外的存储设备或云存储空间,可以实时保护用户数据,用户不需要担心隐私泄露等问题。The prior art also provides another solution for improving data security, that is, the electronic device periodically backs up user data to an external memory card, a computer, or a cloud. This solution cannot achieve real-time backup, and the problem may occur that user data has been deleted before the backup. In addition, users need to pay additional costs to purchase storage devices or cloud storage space. For storage on the cloud, users will also worry about privacy leaks. problem. By adopting the operation control method provided by the above embodiments of the present application, user data does not need to be stored in an additional storage device or cloud storage space, and user data can be protected in real time, and users do not need to worry about issues such as privacy leakage.
本申请实施例提供的操作控制方法可以应用于手机、平板电脑、可穿戴设备、车载设备、增强现实(augmented reality,AR)/虚拟现实(virtual reality,VR)设备、笔记本电脑、超级移动个人计算机(ultra-mobile personal computer,UMPC)、上网本、个人数字助理(personal digital assistant,PDA)等电子设备上,本申请实施例对电子设备的具体类型不作任何限制。The operation control method provided in the embodiments of the present application can be applied to mobile phones, tablet computers, wearable devices, in-vehicle devices, augmented reality (AR) / virtual reality (VR) devices, notebook computers, and super mobile personal computers. (ultra-mobile personal computer (UMPC)), netbooks, personal digital assistants (personal digital assistants, PDAs) and other electronic devices, the embodiments of this application do not place any restrictions on the specific types of electronic devices.
示例性的,图2示出了电子设备100的结构示意图。电子设备100可以包括处理器110,外部存储器接口120,内部存储器121,通用串行总线(universal serial bus,USB)接口130,充电管理模块140,电源管理模块141,电池142,天线1,天线2,移动通信模块150,无线通信模块160,音频模块170,扬声器170A,受话器170B,麦克风170C,耳机接口170D,传感器模块180,按键190,马达191,指示器192,摄像头193,显示屏194,以及用户标识模块(subscriber identification module,SIM)卡接口195等。其中传感器模块180可以包括压力传感器180A,陀螺仪传感器180B,气压传感器180C,磁传感器180D,加速度传感器180E,距离传感器180F,接近光传感器180G,指纹传感器180H,温度传感器180J,触摸传感器180K,环境光传感器180L,骨传导传感器180M等。Exemplarily, FIG. 2 shows a schematic structural diagram of the electronic device 100. The electronic device 100 may include a processor 110, an external memory interface 120, an internal memory 121, a universal serial bus (USB) interface 130, a charge management module 140, a power management module 141, a battery 142, an antenna 1, and an antenna 2 , Mobile communication module 150, wireless communication module 160, audio module 170, speaker 170A, receiver 170B, microphone 170C, headphone interface 170D, sensor module 180, button 190, motor 191, indicator 192, camera 193, display 194, and Subscriber identification module (SIM) card interface 195 and the like. The sensor module 180 may include a pressure sensor 180A, a gyro sensor 180B, an air pressure sensor 180C, a magnetic sensor 180D, an acceleration sensor 180E, a distance sensor 180F, a proximity light sensor 180G, a fingerprint sensor 180H, a temperature sensor 180J, a touch sensor 180K, and ambient light. Sensor 180L, bone conduction sensor 180M, etc.
可以理解的是,本申请实施例示意的结构并不构成对电子设备100的具体限定。在本申请另一些实施例中,电子设备100可以包括比图示更多或更少的部件,或者组合某些部件,或者拆分某些部件,或者不同的部件布置。图示的部件可以以硬件,软件或软件和硬件的组合实现。It can be understood that the structure illustrated in the embodiment of the present application does not constitute a specific limitation on the electronic device 100. In other embodiments of the present application, the electronic device 100 may include more or fewer parts than shown, or some parts may be combined, or some parts may be split, or different parts may be arranged. The illustrated components can be implemented in hardware, software, or a combination of software and hardware.
处理器110可以包括一个或多个处理单元,例如:处理器110可以包括应用处理器(application processor,AP),调制解调处理器,图形处理器(graphics processing unit,GPU),图像信号处理器(image signal processor,ISP),控制器,存储器,视频编解码器,数字信号处理器(digital signal processor,DSP),基带处理器,和/或神经网络处理器(neural-network processing unit,NPU)等。其中,不同的处理单元可以是独立的器件,也可以集成在一个或多个处理器中。The processor 110 may include one or more processing units. For example, the processor 110 may include an application processor (AP), a modem processor, a graphics processing unit (GPU), and an image signal processor. (image, signal processor, ISP), controller, memory, video codec, digital signal processor (DSP), baseband processor, and / or neural-network processing unit (NPU) Wait. Among them, different processing units may be independent devices or integrated in one or more processors.
其中,控制器可以是电子设备100的指挥中心。控制器可以根据指令操作码和时序信号,产生操作控制信号,完成取指令和执行指令的控制。The controller may be a command center of the electronic device 100. The controller can generate operation control signals according to the instruction operation code and timing signals, and complete the control of fetching and executing instructions.
处理器110中还可以设置存储器,用于存储指令和数据。在一些实施例中,处理器110中的存储器为高速缓冲存储器。该存储器可以保存处理器110刚用过或循环使用的指令或数据。如果处理器110需要再次使用该指令或数据,可从存储器中直接调用。避免了重复存取,减少了处理器110的等待时间,因而提高了系统的效率。The processor 110 may further include a memory for storing instructions and data. In some embodiments, the memory in the processor 110 is a cache memory. The memory may store instructions or data that the processor 110 has just used or used cyclically. If the processor 110 needs to use the instruction or data again, it can be directly called from the memory. Repeated accesses are avoided and the waiting time of the processor 110 is reduced, thereby improving the efficiency of the system.
在一些实施例中,处理器110可以包括一个或多个接口。接口可以包括集成电路(inter-integrated circuit,I2C)接口,集成电路内置音频(inter-integrated circuit sound,I2S)接口,脉冲编码调制(pulse code modulation,PCM)接口,通用异步收发传输器(universal asynchronous receiver/transmitter,UART)接口,移动产业处理器接口(mobile industry processor interface,MIPI),通用输入输出(general-purpose input/output,GPIO)接口,用户标识模块(subscriber identity module,SIM)接口,和/或通用串行总线(universal serial bus,USB)接口等。In some embodiments, the processor 110 may include one or more interfaces. The interface may include an integrated circuit (inter-integrated circuit, I2C) interface, an integrated circuit (inter-integrated circuit, sound, I2S) interface, a pulse code modulation (pulse code modulation, PCM) interface, a universal asynchronous transceiver receiver / transmitter (UART) interface, mobile industry processor interface (MIPI), general-purpose input / output (GPIO) interface, subscriber identity module (SIM) interface, and / Or universal serial bus (universal serial bus, USB) interface.
可以理解的是,本申请实施例示意的各模块间的接口连接关系,只是示意性说明,并不构成对电子设备100的结构限定。在本申请另一些实施例中,电子设备100也可以采用上述实施例中不同的接口连接方式,或多种接口连接方式的组合。It can be understood that the interface connection relationship between the modules shown in the embodiments of the present application is only a schematic description, and does not constitute a limitation on the structure of the electronic device 100. In other embodiments of the present application, the electronic device 100 may also adopt different interface connection modes or a combination of multiple interface connection modes in the above embodiments.
充电管理模块140用于从充电器接收充电输入。电源管理模块141用于连接电池142,充电管理模块140与处理器110。The charging management module 140 is configured to receive a charging input from a charger. The power management module 141 is used to connect the battery 142, the charge management module 140 and the processor 110.
电子设备100的无线通信功能可以通过天线1,天线2,移动通信模块150,无线 通信模块160,调制解调处理器以及基带处理器等实现。The wireless communication function of the electronic device 100 may be implemented by the antenna 1, the antenna 2, the mobile communication module 150, the wireless communication module 160, a modem processor, and a baseband processor.
天线1和天线2用于发射和接收电磁波信号。电子设备100中的每个天线可用于覆盖单个或多个通信频带。不同的天线还可以复用,以提高天线的利用率。例如:可以将天线1复用为无线局域网的分集天线。在另外一些实施例中,天线可以和调谐开关结合使用。The antenna 1 and the antenna 2 are used for transmitting and receiving electromagnetic wave signals. Each antenna in the electronic device 100 may be used to cover a single or multiple communication frequency bands. Different antennas can also be multiplexed to improve antenna utilization. For example, antenna 1 can be multiplexed into a diversity antenna for a wireless local area network. In other embodiments, the antenna may be used in conjunction with a tuning switch.
移动通信模块150可以提供应用在电子设备100上的包括2G/3G/4G/5G等无线通信的解决方案。移动通信模块150可以包括至少一个滤波器,开关,功率放大器,低噪声放大器(low noise amplifier,LNA)等。在一些实施例中,移动通信模块150的至少部分功能模块可以被设置于处理器110中。在一些实施例中,移动通信模块150的至少部分功能模块可以与处理器110的至少部分模块被设置在同一个器件中。The mobile communication module 150 may provide a wireless communication solution including 2G / 3G / 4G / 5G and the like applied on the electronic device 100. The mobile communication module 150 may include at least one filter, a switch, a power amplifier, a low noise amplifier (LNA), and the like. In some embodiments, at least part of the functional modules of the mobile communication module 150 may be provided in the processor 110. In some embodiments, at least part of the functional modules of the mobile communication module 150 may be provided in the same device as at least part of the modules of the processor 110.
调制解调处理器可以包括调制器和解调器。其中,调制器用于将待发送的低频基带信号调制成中高频信号。解调器用于将接收的电磁波信号解调为低频基带信号。The modem processor may include a modulator and a demodulator. The modulator is configured to modulate a low-frequency baseband signal to be transmitted into a high-frequency signal. The demodulator is used to demodulate the received electromagnetic wave signal into a low-frequency baseband signal.
无线通信模块160可以提供应用在电子设备100上的包括无线局域网(wireless local area networks,WLAN)(如无线保真(wireless fidelity,Wi-Fi)网络),蓝牙(bluetooth,BT),全球导航卫星系统(global navigation satellite system,GNSS),调频(frequency modulation,FM),近距离无线通信技术(near field communication,NFC),红外技术(infrared,IR)等无线通信的解决方案。无线通信模块160可以是集成至少一个通信处理模块的一个或多个器件。The wireless communication module 160 may provide wireless local area networks (WLAN) (such as wireless fidelity (Wi-Fi) networks), Bluetooth (bluetooth, BT), and global navigation satellites applied to the electronic device 100. Wireless communication solutions such as global navigation system, GNSS, frequency modulation (FM), near field communication (NFC), and infrared technology (infrared, IR). The wireless communication module 160 may be one or more devices that integrate at least one communication processing module.
在一些实施例中,电子设备100的天线1和移动通信模块150耦合,天线2和无线通信模块160耦合,使得电子设备100可以通过无线通信技术与网络以及其他设备通信。无线通信技术可以包括全球移动通讯系统(global system for mobile communications,GSM),通用分组无线服务(general packet radio service,GPRS),码分多址接入(code division multiple access,CDMA),宽带码分多址(wideband code division multiple access,WCDMA),时分码分多址(time-division code division multiple access,TD-SCDMA),长期演进(long term evolution,LTE),BT,GNSS,WLAN,NFC,FM,和/或IR技术等。GNSS可以包括全球卫星定位系统(global positioning system,GPS),全球导航卫星系统(global navigation satellite system,GLONASS),北斗卫星导航系统(beidou navigation satellite system,BDS),准天顶卫星系统(quasi-zenith satellite system,QZSS)和/或星基增强系统(satellite based augmentation systems,SBAS)。In some embodiments, the antenna 1 of the electronic device 100 is coupled with the mobile communication module 150, and the antenna 2 is coupled with the wireless communication module 160, so that the electronic device 100 can communicate with the network and other devices through wireless communication technology. Wireless communication technologies can include global mobile communication systems (GSM), general packet radio services (GPRS), code division multiple access (code division multiple access, CDMA), and broadband code division Multiple access (wideband code division multiple access (WCDMA), time-division code division multiple access (TD-SCDMA), long-term evolution (LTE), BT, GNSS, WLAN, NFC, FM , And / or IR technology. GNSS can include global positioning system (GPS), global navigation satellite system (GLONASS), beidou navigation system (BDS), quasi-zenith satellite system (quasi-zenith satellite system (QZSS) and / or satellite-based augmentation systems (SBAS).
电子设备100通过GPU,显示屏194,以及应用处理器等实现显示功能。GPU为图像处理的微处理器,连接显示屏194和应用处理器。GPU用于执行数学和几何计算,用于图形渲染。处理器110可包括一个或多个GPU,其执行程序指令以生成或改变显示信息。The electronic device 100 implements a display function through a GPU, a display screen 194, and an application processor. The GPU is a microprocessor for image processing and is connected to the display 194 and an application processor. The GPU is used to perform mathematical and geometric calculations for graphics rendering. The processor 110 may include one or more GPUs that execute program instructions to generate or change display information.
显示屏194用于显示图像,视频等。显示屏194包括显示面板。显示面板可以采用液晶显示屏(liquid crystal display,LCD),有机发光二极管(organic light-emitting diode,OLED),有源矩阵有机发光二极体或主动矩阵有机发光二极体(active-matrix organic light emitting diode的,AMOLED),柔性发光二极管(flex light-emitting diode,FLED),Miniled,MicroLed,Micro-oLed,量子点发光二极管(quantum dot light emitting diodes,QLED)等。在一些实施例中,电子设备100可以包括1个或N个显示屏194,N为大 于1的正整数。The display screen 194 is used to display images, videos, and the like. The display screen 194 includes a display panel. The display panel can use a liquid crystal display (LCD), an organic light-emitting diode (OLED), an active matrix organic light emitting diode or an active matrix organic light emitting diode (active-matrix organic light-emitting diode). emitting diodes (AMOLED), flexible light-emitting diodes (FLEDs), Miniled, MicroLed, Micro-oLed, quantum dot light emitting diodes (QLEDs), etc. In some embodiments, the electronic device 100 may include one or N display screens 194, where N is a positive integer greater than one.
电子设备100可以通过ISP,摄像头193,视频编解码器,GPU,显示屏194以及应用处理器等实现拍摄功能。The electronic device 100 may implement a shooting function through an ISP, a camera 193, a video codec, a GPU, a display screen 194, and an application processor.
ISP用于处理摄像头193反馈的数据。摄像头193用于捕获静态图像或视频。视频编解码器用于对数字视频压缩或解压缩。The ISP processes the data fed back from the camera 193. The camera 193 is used to capture still images or videos. Video codecs are used to compress or decompress digital video.
外部存储器接口120可以用于连接外部存储卡,例如Micro SD卡,实现扩展电子设备100的存储能力。外部存储卡通过外部存储器接口120与处理器110通信,实现数据存储功能。例如将音乐,视频等文件保存在外部存储卡中。The external memory interface 120 may be used to connect an external memory card, such as a Micro SD card, to extend the storage capacity of the electronic device 100. The external memory card communicates with the processor 110 through the external memory interface 120 to implement a data storage function. For example, save music, videos and other files on an external memory card.
内部存储器121可以用于存储计算机可执行程序代码,可执行程序代码包括指令。处理器110通过运行存储在内部存储器121的指令,从而执行电子设备100的各种功能应用以及数据处理。内部存储器121可以包括存储程序区和存储数据区。其中,存储程序区可存储操作系统,至少一个功能所需的应用程序(比如声音播放功能,图像播放功能等)等。存储数据区可存储电子设备100使用过程中所创建的数据(比如音频文件,电话本文件,文件或文件夹对应的参数信息)等。此外,内部存储器121可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件,闪存器件,通用闪存存储器(universal flash storage,UFS)等。The internal memory 121 may be used to store computer executable program code, and the executable program code includes instructions. The processor 110 executes various functional applications and data processing of the electronic device 100 by executing instructions stored in the internal memory 121. The internal memory 121 may include a storage program area and a storage data area. The storage program area may store an operating system, at least one application required by a function (such as a sound playback function, an image playback function, etc.) and the like. The storage data area can store data (such as audio files, phonebook files, parameter information corresponding to files or folders) created during the use of the electronic device 100. In addition, the internal memory 121 may include a high-speed random access memory, and may also include a non-volatile memory, such as at least one magnetic disk storage device, a flash memory device, a universal flash memory (UFS), and the like.
电子设备100可以通过音频模块170,扬声器170A,受话器170B,麦克风170C,耳机接口170D,以及应用处理器等实现音频功能。例如音乐播放,录音等。The electronic device 100 may implement audio functions through an audio module 170, a speaker 170A, a receiver 170B, a microphone 170C, a headphone interface 170D, and an application processor. Such as music playback, recording, etc.
音频模块170用于进行数字音频信号和模拟音频信号的转换,对音频信号进行编码和解码。还可以用于向用户进行语音提示,以及检测用户输入的语音信号等。The audio module 170 is configured to convert digital audio signals and analog audio signals, and encode and decode audio signals. It can also be used to give voice prompts to users, and detect voice signals input by users.
压力传感器180A用于感受压力信号,可以将压力信号转换成电信号。The pressure sensor 180A is used to sense a pressure signal, and can convert the pressure signal into an electrical signal.
指纹传感器180H用于采集指纹。电子设备100可以利用采集的指纹特性实现指纹解锁,访问应用锁,指纹拍照,指纹接听来电等。The fingerprint sensor 180H is used to collect fingerprints. The electronic device 100 may use the collected fingerprint characteristics to realize fingerprint unlocking, access application lock, fingerprint photographing, fingerprint answering an incoming call, and the like.
触摸传感器180K,也称“触控面板”。触摸传感器180K可以设置于显示屏194,由触摸传感器180K与显示屏194组成触摸屏,也称“触控屏”。触摸传感器180K用于检测用户作用于其上或附近的触摸操作。触摸传感器180K可以将检测到的触摸操作传递给应用处理器,以确定触摸事件类型。可以通过显示屏194提供与触摸操作相关的视觉输出。在另一些实施例中,触摸传感器180K也可以设置于电子设备100的表面,与显示屏194所处的位置不同。例如,当用户长按电子设备上显示的某个文件时,触摸传感器180K可以检测到该触摸操作,并将该触摸操作传递给应用处理器,以确定触摸事件类型。The touch sensor 180K is also called "touch panel". The touch sensor 180K may be disposed on the display screen 194, and the touch screen is composed of the touch sensor 180K and the display screen 194, which is also referred to as a "touch screen". The touch sensor 180K is used to detect a touch operation on or near the user. The touch sensor 180K can pass the detected touch operation to the application processor to determine the type of touch event. A visual output related to the touch operation may be provided through the display screen 194. In other embodiments, the touch sensor 180K may also be disposed on the surface of the electronic device 100, which is different from the position of the display screen 194. For example, when a user long presses a certain file displayed on the electronic device, the touch sensor 180K can detect the touch operation and pass the touch operation to the application processor to determine the type of touch event.
按键190包括开机键,音量键等,可以是机械按键,也可以是触摸式按键。The key 190 includes a start key, a volume key, and the like, and may be a mechanical key or a touch key.
马达191可以产生振动提示。马达191可以用于来电振动提示,也可以用于触摸振动反馈。例如,作用于不同应用(例如拍照,音频播放等)的触摸操作,可以对应不同的振动反馈效果。The motor 191 may generate a vibration alert. The motor 191 can be used for vibration alert for incoming calls, and can also be used for touch vibration feedback. For example, the touch operation applied to different applications (such as taking pictures, playing audio, etc.) can correspond to different vibration feedback effects.
指示器192可以是指示灯,可以用于指示充电状态,电量变化,也可以用于指示消息,未接来电,通知等。The indicator 192 can be an indicator light, which can be used to indicate the charging status, power change, and can also be used to indicate messages, missed calls, notifications, and so on.
SIM卡接口195用于连接SIM卡。电子设备100可以支持1个或N个SIM卡接口,N为大于1的正整数。SIM卡接口195也可以兼容外部存储卡。电子设备100通 过SIM卡和网络交互,实现通话以及数据通信等功能。The SIM card interface 195 is used to connect a SIM card. The electronic device 100 may support one or N SIM card interfaces, and N is a positive integer greater than 1. The SIM card interface 195 is also compatible with external memory cards. The electronic device 100 interacts with the network through a SIM card to implement functions such as calling and data communication.
在本申请实施例中,触摸传感器180K可以检测用户在显示屏194上将数据单元k加入分区k的操作,并上报给处理器110,处理器110保存数据单元k与分区k相应的参数信息k的对应关系。当处理器110检测到应用程序k请求对分区k中的数据单元k执行操作k时,处理器110可以读取数据单元k对应的参数信息k,并确定该参数信息k是否禁止该操作k。其中,该操作k可以包括删除、修改或读取数据单元k。若该参数信息k表示禁止该操作k,则处理器110拒绝执行该操作k。若该参数信息k表示未禁止该操作k,则处理器110执行该操作k。这样,通过参数信息来表示数据单元禁止被任何应用程序删除、修改或读取,可以提高数据单元的安全性和操作控制过程的处理效率。In the embodiment of the present application, the touch sensor 180K can detect a user's operation of adding the data unit k to the partition k on the display screen 194 and report the operation to the processor 110. The processor 110 stores parameter information k corresponding to the data unit k and the partition k. Corresponding relationship. When the processor 110 detects that the application program k requests to perform operation k on the data unit k in the partition k, the processor 110 may read parameter information k corresponding to the data unit k and determine whether the parameter information k prohibits the operation k. The operation k may include deleting, modifying, or reading the data unit k. If the parameter information k indicates that the operation k is prohibited, the processor 110 refuses to perform the operation k. If the parameter information k indicates that the operation k is not prohibited, the processor 110 executes the operation k. In this way, the parameter information is used to indicate that the data unit is prohibited from being deleted, modified, or read by any application program, which can improve the security of the data unit and the processing efficiency of the operation control process.
并且,处理器110在拒绝执行该操作k后,还可以判断该应用程序k是否为特定的应用程序。如果应用程序k不是特定的应用程序,则处理器110不进行处理。如果应用程序k是特定的应用程序,则处理器110确定数据单元k是否在分区内且所在分区是否禁止操作k。若数据单元k不在分区内或所在分区未禁止操作k,则处理器110不进行处理。若数据单元k在分区内且所在分区禁止操作k,则处理器110指示显示屏194提示用户是否对该操作k进行授权。若触摸传感器180K在显示屏194上检测到用户对该操作k进行授权的操作,则上报给处理器110,处理器110执行该操作k。或者,若数据单元k在分区内且所在分区禁止操作k,则处理器110指示音频模块170提示用户是否对该操作k进行授权。若音频模块170检测到用户对该操作k进行授权的语音信息,则上报给处理器110,处理器110执行该操作k。In addition, after the processor 110 refuses to perform the operation k, it can also determine whether the application program k is a specific application program. If the application k is not a specific application, the processor 110 does not perform processing. If the application program k is a specific application program, the processor 110 determines whether the data unit k is within a partition and whether the partition k is prohibited from operating k. If the data unit k is not in the partition or the operation of the data unit k is not prohibited, the processor 110 does not perform processing. If the data unit k is in the partition and the operation k is prohibited in the partition, the processor 110 instructs the display screen 194 to prompt the user whether to authorize the operation k. If the touch sensor 180K detects an operation authorized by the user on the operation k on the display screen 194, the operation is reported to the processor 110, and the processor 110 executes the operation k. Alternatively, if the data unit k is in a partition and the operation k is prohibited in the partition, the processor 110 instructs the audio module 170 to prompt the user whether to authorize the operation k. If the audio module 170 detects the voice information authorized by the user for the operation k, it reports it to the processor 110, and the processor 110 executes the operation k.
电子设备100的软件系统可以采用分层架构,事件驱动架构,微核架构,微服务架构,或云架构。本申请实施例以分层架构的Android系统为例,示例性说明电子设备100的软件结构。The software system of the electronic device 100 may adopt a layered architecture, an event-driven architecture, a micro-core architecture, a micro-service architecture, or a cloud architecture. The embodiment of the present application takes the Android system with a layered architecture as an example, and exemplifies a software structure of the electronic device 100.
图3是本申请实施例的电子设备100的软件结构框图。分层架构将软件分成若干个层。层与层之间通过软件接口通信。在一些实施例中,将Android系统分为四层,从上至下分别为应用程序层,应用程序框架层,安卓运行时(Android runtime)和系统库,以及内核层。应用程序层可以包括一系列应用程序包。FIG. 3 is a software block diagram of an electronic device 100 according to an embodiment of the present application. The layered architecture divides the software into layers. The layers communicate with each other through a software interface. In some embodiments, the Android system is divided into four layers, which are an application layer, an application framework layer, an Android runtime and a system library, and a kernel layer from top to bottom. The application layer can include a series of application packages.
如图3所示,应用程序包可以包括相机,图库,日历,通话,地图,导航,WLAN,蓝牙,音乐,视频,短信息等应用程序。As shown in Figure 3, the application package can include applications such as camera, gallery, calendar, call, map, navigation, WLAN, Bluetooth, music, video, SMS, etc.
应用程序框架层为应用程序层的应用程序提供应用编程接口(application programming interface,API)和编程框架。应用程序框架层包括一些预先定义的函数。The application framework layer provides an application programming interface (API) and a programming framework for applications at the application layer. The application framework layer includes some predefined functions.
如图3所示,应用程序框架层可以包括窗口管理器,内容提供器,视图系统,电话管理器,资源管理器,通知管理器等。As shown in FIG. 3, the application framework layer may include a window manager, a content provider, a view system, a phone manager, a resource manager, a notification manager, and the like.
其中,窗口管理器用于管理窗口程序。窗口管理器可以获取显示屏大小,判断是否有状态栏,锁定屏幕,截取屏幕等。Among them, the window manager is used to manage window programs. The window manager can obtain the display size, determine whether there is a status bar, lock the screen, take a screenshot, etc.
内容提供器用来存放和获取数据,并使这些数据可以被应用程序访问。数据可以包括视频,图像,音频,拨打和接听的电话,浏览历史和书签,电话簿等。Content providers are used to store and retrieve data and make it accessible to applications. Data can include videos, images, audio, calls made and received, browsing history and bookmarks, phone books, and more.
视图系统包括可视控件,例如显示文字的控件,显示图片的控件等。视图系统可用于构建应用程序。显示界面可以由一个或多个视图组成的。例如,包括短信通知图标的显示界面,可以包括显示文字的视图以及显示图片的视图。The view system includes visual controls, such as controls that display text, controls that display pictures, and so on. The view system can be used to build applications. The display interface can consist of one or more views. For example, the display interface including the SMS notification icon may include a view that displays text and a view that displays pictures.
电话管理器用于提供电子设备100的通信功能。例如通话状态的管理(包括接通,挂断等)。The phone manager is used to provide a communication function of the electronic device 100. For example, management of call status (including connection, hang up, etc.).
资源管理器为应用程序提供各种资源,比如本地化字符串,图标,图片,布局文件,视频文件等等。The resource manager provides various resources for the application, such as localized strings, icons, pictures, layout files, video files, and so on.
通知管理器使应用程序可以在状态栏中显示通知信息,可以用于传达告知类型的消息,可以短暂停留后自动消失,无需用户交互。比如通知管理器被用于告知下载完成,消息提醒等。通知管理器还可以是以图表或者滚动条文本形式出现在系统顶部状态栏的通知,例如后台运行的应用程序的通知,还可以是以对话窗口形式出现在屏幕上的通知。例如在状态栏提示文本信息,发出提示音,电子设备振动,指示灯闪烁等。The notification manager enables the application to display notification information in the status bar, which can be used to convey notification-type messages that can disappear automatically after a short stay without user interaction. For example, the notification manager is used to inform download completion, message reminders, etc. The notification manager can also be a notification that appears in the status bar at the top of the system in the form of a chart or scroll bar text, such as a notification of an application running in the background, or a notification that appears on the screen in the form of a dialog window. For example, text messages are displayed in the status bar, sounds are emitted, electronic equipment vibrates, and the indicator light flashes.
Android Runtime包括核心库和虚拟机。Android runtime负责安卓系统的调度和管理。Android Runtime includes core libraries and virtual machines. Android runtime is responsible for the scheduling and management of the Android system.
核心库包含两部分:一部分是java语言需要调用的功能函数,另一部分是安卓的核心库。The core library contains two parts: one is the functional functions that the Java language needs to call, and the other is the Android core library.
应用程序层和应用程序框架层运行在虚拟机中。虚拟机将应用程序层和应用程序框架层的java文件执行为二进制文件。虚拟机用于执行对象生命周期的管理,堆栈管理,线程管理,安全和异常的管理,以及垃圾回收等功能。The application layer and the application framework layer run in a virtual machine. The virtual machine executes the java files of the application layer and the application framework layer as binary files. Virtual machines are used to perform object lifecycle management, stack management, thread management, security and exception management, and garbage collection.
系统库可以包括多个功能模块。例如:表面管理器(surface manager),媒体库(Media Libraries),三维图形处理库(例如:OpenGL ES),2D图形引擎(例如:SGL)等。The system library can include multiple functional modules. For example: surface manager (media manager), media library (Media library), three-dimensional graphics processing library (for example: OpenGL ES), 2D graphics engine (for example: SGL) and so on.
表面管理器用于对显示子系统进行管理,并且为多个应用程序提供了2D和3D图层的融合。The Surface Manager is used to manage the display subsystem and provides a fusion of 2D and 3D layers for multiple applications.
媒体库支持多种常用的音频,视频格式回放和录制,以及静态图像文件等。媒体库可以支持多种音视频编码格式,例如:MPEG4,H.264,MP3,AAC,AMR,JPG,PNG等。The media library supports a variety of commonly used audio and video formats for playback and recording, as well as still image files. The media library can support multiple audio and video encoding formats, such as: MPEG4, H.264, MP3, AAC, AMR, JPG, PNG, etc.
三维图形处理库用于实现三维图形绘图,图像渲染,合成,和图层处理等。2D图形引擎是2D绘图的绘图引擎。The 3D graphics processing library is used to implement 3D graphics drawing, image rendering, compositing, and layer processing. The 2D graphics engine is a graphics engine for 2D graphics.
内核层是硬件和软件之间的层。内核层至少包含显示驱动,摄像头驱动,音频驱动,传感器驱动。内核层还可以包括存储设备驱动和文件系统驱动等。其中,文件系统驱动可以接受面向文件的输入/输出(input/output,I/O)请求,并将这些请求转换成针对某一存储设备的I/O请求。The kernel layer is the layer between hardware and software. The kernel layer contains at least a display driver, a camera driver, an audio driver, and a sensor driver. The kernel layer can also include storage device drivers and file system drivers. The file system driver can accept file-oriented input / output (I / O) requests and convert these requests into I / O requests for a certain storage device.
在本申请实施例中,电子设备可以包括应用程序、交互管理器、监控代理器、操作结果检查器和操作管理器。其中,交互管理器可以由用户程序以及应用程序框架层中的窗口管理器、视图系统、通知管理器、资源管理器、内容提供器等模块来实现。监控代理器和操作结果检查器可以由系统库和应用程序框架层中的多个模块来实现。操作管理器可以由内核层中的文件系统驱动、存储设备驱动等模块来实现。本发明实施例不限定具体由哪些模块来实现。In the embodiment of the present application, the electronic device may include an application program, an interaction manager, a monitoring agent, an operation result checker, and an operation manager. The interaction manager may be implemented by a user program and modules such as a window manager, a view system, a notification manager, a resource manager, and a content provider in an application framework layer. The monitoring agent and operation result checker can be implemented by multiple modules in the system library and application framework layer. The operation manager can be implemented by modules such as a file system driver and a storage device driver in the kernel layer. The embodiment of the present invention does not limit which modules are specifically implemented.
其中,监控代理器可以监控加入分区k中的数据单元k,保存数据单元k与参数信息k的对应关系。并且,若数据单元k所属分区发生更改,则监控代理器还可以更新数据单元k对应的参数信息。应用程序k可以请求操作管理器执行操作k。其中,操作k可以是删除、修改或读取数据单元k。操作管理器可以读取数据单元k对应的 参数信息k,并确定该参数信息k是否禁止该操作k。若该参数信息k表示禁止该操作k,则操作管理器拒绝执行该操作k。若该参数信息k表示未禁止该操作k,则操作管理器执行该操作k。这样,通过参数信息来表示数据单元禁止被任何应用程序删除、修改或读取,可以提高数据单元的安全性和操作控制过程的处理效率。The monitoring agent can monitor the data unit k added to the partition k, and save the correspondence between the data unit k and the parameter information k. In addition, if the partition to which the data unit k belongs is changed, the monitoring agent may also update parameter information corresponding to the data unit k. The application k may request the operation manager to perform operation k. The operation k may be deleting, modifying, or reading the data unit k. The operation manager may read the parameter information k corresponding to the data unit k and determine whether the parameter information k prohibits the operation k. If the parameter information k indicates that the operation k is prohibited, the operation manager refuses to perform the operation k. If the parameter information k indicates that the operation k is not prohibited, the operation manager executes the operation k. In this way, the parameter information is used to indicate that the data unit is prohibited from being deleted, modified, or read by any application program, which can improve the security of the data unit and the processing efficiency of the operation control process.
并且,操作管理器在拒绝执行该操作k后,可以通知操作结果检查器。操作结果检查器判断该应用程序k是否为特定的应用程序。如果应用程序k不是特定的应用程序,则操作结果检查器不作处理。如果应用程序k是特定的应用程序,则操作结果检查器向操作管理器确定数据单元k是否在分区内且该分区是否禁止操作k。若数据单元k不在分区内或所在分区未禁止操作k,则操作结果检查器不作处理。若数据单元k在分区内且所在分区禁止操作k,则操作结果检查器请求监控代理器对该操作k进行授权。监控代理器通知交互管理器提示用户是否对该操作k进行授权。若交互管理器检测到用户对该操作k进行授权的操作,则通知监控代理器,监控代理器执行该操作k。And, the operation manager may notify the operation result checker after refusing to perform the operation k. The operation result checker determines whether the application k is a specific application. If the application k is not a specific application, the operation result checker does not process it. If the application k is a specific application, the operation result checker determines to the operation manager whether the data unit k is within a partition and whether the partition prohibits operation k. If the data unit k is not in the partition or the partition k is not prohibited from operating, the operation result checker does not process it. If the data unit k is in a partition and the operation k is prohibited in the partition, the operation result checker requests the monitoring agent to authorize the operation k. The monitoring agent notifies the interaction manager to prompt the user whether to authorize the operation k. If the interaction manager detects that the user has authorized the operation k, it notifies the monitoring agent, and the monitoring agent executes the operation k.
需要说明的是,一般情况下,电子设备上大多数的数据单元不在分区中,仅有少数重要数据单元在分区中,应用程序对不在分区中的大多数数据单元具有删除、修改等操作权限,因而操作管理器可以成功执行应用程序对大多数数据单元请求的删除、修改等操作。与电子设备每进行一次删除和修改操作时都先确定待操作数据单元是否在分区中相比,若电子设备在操作管理器拒绝进行删除、修改等操作,得到操作失败的结果,表明待操作数据单元可能在分区中之后,再确定待操作数据单元是否在分区中,从而在确定待操作数据单元在分区中时提示用户是否进行授权,因而可以减少电子设备确定待操作数据单元是否在分区中的次数,减少电子设备的工作量,降低电子设备的功耗。It should be noted that, in general, most of the data units on the electronic device are not in the partition, and only a few important data units are in the partition. The application has the operation rights of deleting and modifying most data units that are not in the partition. Therefore, the operation manager can successfully perform operations such as deletion and modification requested by the application on most data units. Compared with the electronic device that first determines whether the data unit to be operated is in the partition each time it is deleted and modified, if the electronic device refuses to perform operations such as deletion and modification in the operation manager, the operation fails, which indicates the data to be operated. The unit may be in the partition, and then determine whether the data unit to be operated is in the partition, thereby prompting the user whether to perform authorization when determining that the data unit to be operated is in the partition, thereby reducing the electronic device determining whether the data unit to be operated is in the partition. Times, reducing the workload of electronic equipment and reducing the power consumption of electronic equipment.
以下将以参数信息为属性信息,电子设备为手机为例,对本申请实施例提供的操作控制方法进行说明。对于参数信息为其他信息的情况,可以参见关于参数信息为属性信息的具体描述过程,以下实施例将不再赘述。In the following, the parameter information is used as the attribute information, and the electronic device is a mobile phone as an example, the operation control method provided in the embodiment of the present application will be described. For the case where the parameter information is other information, refer to the specific description process of the parameter information being attribute information, which will not be described in the following embodiments.
在一些实施例中,电子设备上可以包括第0分区,该第0分区对应的属性信息为禁止修改。也就是说,在文件加入第0分区后,电子设备上保存有该文件与禁止修改的属性信息的对应关系,在该对应关系没有发生变化之前,电子设备上的任何应用程序均不能修改该文件;在文件夹加入第0分区后,电子设备上保存有该文件与禁止修改的属性信息的对应关系,在该对应关系没有发生变化之前,电子设备上的任何应用程序均不能修改该文件夹和该文件夹中的文件。但是,电子设备中的应用程序可以删除和读取第0分区中的文件和文件夹。In some embodiments, the electronic device may include a 0th partition, and the attribute information corresponding to the 0th partition is prohibited from modification. In other words, after the file is added to the 0th partition, the correspondence between the file and the attribute information forbidden to be modified is stored on the electronic device. No application on the electronic device can modify the file until the correspondence has changed. ; After the folder is added to the 0th partition, the correspondence between the file and the attribute information forbidden to be modified is stored on the electronic device. No application on the electronic device can modify the folder and the relationship until the correspondence has not changed. Files in the folder. However, applications in the electronic device can delete and read files and folders in partition 0.
在一些方案中,当应用程序请求删除第0分区中的文件或文件夹时,电子设备可以向用户提示已禁止应用程序修改第0分区中的文件,以方便用户获知哪些应用程序意图篡改第0分区中的文件。例如,以手机为例,参见图4,当游戏软件A请求修改手机上保存的联系人时,手机显示提示框401以提示用户“请注意:游戏A意图修改您的联系人!”。In some solutions, when the application requests to delete files or folders in the 0th partition, the electronic device may notify the user that the application is prohibited from modifying the files in the 0th partition, so that the user can know which applications intend to tamper with the 0th partition. Files in the partition. For example, taking a mobile phone as an example, see FIG. 4, when the game software A requests to modify the contacts stored on the mobile phone, the mobile phone displays a prompt box 401 to prompt the user "Please note: Game A intends to modify your contacts!"
在另一些方案中,当应用程序请求删除第0分区中的文件或文件夹时,电子设备可以不向用户进行提示,从而可以避免非法应用程序恶意地、频繁地提示用户,导致电子设备无法正常工作的问题。In other solutions, when an application requests to delete a file or folder in the 0th partition, the electronic device may not prompt the user, thereby preventing an illegal application from prompting the user maliciously and frequently, which may cause the electronic device to malfunction. Problems at work.
在另一些实施例中,电子设备上可以包括第一分区,该第一分区对应的属性信息包括禁止删除和禁止修改。也就是说,在文件加入第一分区后,电子设备上保存有该文件与禁止删除属性信息和禁止修改属性信息的对应关系,在该对应关系没有发生变化之前,电子设备上的任何应用程序均不能删除和修改该文件;在文件夹加入第一分区后,电子设备上保存有该文件与禁止删除和禁止修改的对应关系,在该对应关系没有发生变化之前,电子设备上的任何应用程序均不能删除和修改该文件夹和该文件夹中的文件。但是,电子设备中的应用程序可以读取第一分区中的文件和文件夹。In other embodiments, the electronic device may include a first partition, and the attribute information corresponding to the first partition includes deletion prohibition and modification prohibition. That is, after the file is added to the first partition, the correspondence between the file and the prohibition of deleting attribute information and the prohibition of modifying attribute information is saved on the electronic device. Before the correspondence relationship changes, any application program on the electronic device is The file cannot be deleted and modified; after the folder is added to the first partition, the corresponding relationship between the file and the prohibition of deletion and modification is saved on the electronic device. Before the corresponding relationship does not change, any application on the electronic device is You cannot delete and modify this folder and the files in this folder. However, applications in the electronic device can read files and folders in the first partition.
其中,该第一分区可以用于存放非常重要的用户数据,例如法律程序的证据文件,以使得证据文件不能被应用程序修改、删除或重命名,保证证据文件不被篡改或丢失,提高证据文件的安全性。再例如,该第一分区可以用于存放用户的联系人、短信、通话记录、录音或位置信息等用户数据,以使得这些用户数据不被篡改或丢失,提高用户数据的安全性。The first partition can be used to store very important user data, such as evidence files of legal procedures, so that the evidence files cannot be modified, deleted, or renamed by the application program, to ensure that the evidence files are not tampered with or lost, and improve the evidence files. Security. For another example, the first partition may be used to store user data such as contacts, short messages, call records, recordings, or location information of the user, so that the user data is not tampered or lost, and the security of the user data is improved.
在一些方案中,当应用程序请求删除或修改第一分区中的文件或文件夹时,电子设备可以向用户提示已禁止应用程序删除或修改第一分区中的文件,以方便用户获知哪些应用程序意图删除或篡改第一分区中的文件。In some solutions, when the application requests to delete or modify files or folders in the first partition, the electronic device may prompt the user that the application is prohibited from deleting or modifying files in the first partition, so that the user can know which applications are convenient Intent to delete or tamper with files in the first partition.
在另一些方案中,当应用程序请求删除或修改第一分区中的文件或文件夹时,电子设备可以不向用户进行提示,从而可以避免非法应用程序恶意地、频繁地提示用户,导致电子设备无法正常工作的问题。In other solutions, when an application requests to delete or modify a file or folder in the first partition, the electronic device may not prompt the user, thereby preventing an illegal application from prompting the user maliciously and frequently, resulting in the electronic device. Not working properly.
在另一些实施例中,电子设备上可以包括第二分区,该第二分区对应的属性信息为禁止删除。也就是说,在文件加入第二分区后,电子设备上保存有该文件与禁止删除的属性信息的对应关系,在该对应关系没有发生变化之前,电子设备上的任何应用程序均不能删除该文件;在文件夹加入第二分区后,电子设备上保存有该文件夹与禁止删除的属性信息的对应关系,在该对应关系没有发生变化之前,电子设备上的任何应用程序均不能删除该文件夹以及该文件夹中的文件。但是,电子设备中的应用程序可以修改和读取第二分区中的文件和第二分区的文件夹中的文件。In other embodiments, the electronic device may include a second partition, and the attribute information corresponding to the second partition is prohibited from being deleted. In other words, after the file is added to the second partition, the corresponding relationship between the file and the attribute information forbidden to be deleted is stored on the electronic device. No application on the electronic device can delete the file until the corresponding relationship has changed. ; After the folder is added to the second partition, the correspondence between the folder and the attribute information forbidden to be deleted is stored on the electronic device. No application on the electronic device can delete the folder until the correspondence does not change. And the files in that folder. However, an application in the electronic device can modify and read files in the second partition and files in the folder of the second partition.
其中,该第二分区可以用于存放较为重要的用户数据,例如用户的照片、视频等,以使得用户的照片、视频等数据不能被应用程序删除,防止用户照片或视频丢失;但第二分区中的照片或视频可以被修改或重命名,例如可以被一些修图软件美化等,以方便用户使用。The second partition can be used to store more important user data, such as user photos and videos, so that the user's photos and videos cannot be deleted by the application to prevent user photos or videos from being lost; but the second partition The photos or videos can be modified or renamed, for example, they can be beautified by some retouching software, etc., for the convenience of users.
同样地,当应用程序请求删除第二分区中的文件或文件夹时,电子设备可以向用户提示已禁止应用程序删除第二分区中的文件,或者,电子设备也可以不向用户进行该提示。Similarly, when the application requests to delete a file or folder in the second partition, the electronic device may indicate to the user that the application is prohibited from deleting the file in the second partition, or the electronic device may not prompt the user.
在另一些实施例中,电子设备上可以包括第三分区,该第三分区对应的属性信息包括禁止删除、禁止修改和禁止读取。也就是说,在文件加入第三分区后,电子设备上保存有该文件与禁止删除的属性信息、禁止修改的属性信息和禁止读取的属性信息的对应关系,在该对应关系发生修改之前,电子设备上的任何应用程序均不能删除、修改或读取该文件;在文件夹加入第三分区后,电子设备上保存有该文件与禁止删除的属性信息、禁止修改的属性信息和禁止读取的属性信息的对应关系,电子设备上的任何应用程序均不能删除、修改或读取该文件夹以及该文件夹中的文件。In other embodiments, the electronic device may include a third partition, and attribute information corresponding to the third partition includes deletion prohibition, modification prohibition, and read prohibition. In other words, after the file is added to the third partition, the correspondence between the file and the attribute information forbidden to be deleted, the attribute information forbidden to be modified, and the attribute information forbidden to be read is stored on the electronic device. Before the correspondence relationship is modified, No application on the electronic device can delete, modify, or read the file; after the folder is added to the third partition, the electronic device holds the file and the attribute information forbidden to delete, the attribute information forbidden to modify, and the read prohibited For the corresponding relationship of the attribute information, no application on the electronic device can delete, modify or read the folder and the files in the folder.
其中,该第三分区可以用于存放一些私密信息,比如用户的日记,用户的私密照片等。The third partition can be used to store some private information, such as the user's diary and the user's private photo.
同样地,当应用程序请求删除、修改或读取第三分区中的文件或文件夹时,电子设备可以向用户提示已禁止应用程序删除、修改或读取第三分区中的文件;或者,电子设备也可以不向用户进行该提示。Similarly, when the application requests to delete, modify, or read files or folders in the third partition, the electronic device may prompt the user that the application is prohibited from deleting, modifying, or reading files in the third partition; or, electronic The device may not provide the prompt to the user.
在另一些实施例中,电子设备可以包括第0分区、第一分区、第二分区和第三分区中的至少两个分区。以下将以电子设备包括第一分区和第二分区为例进行说明。In other embodiments, the electronic device may include at least two partitions among the 0th partition, the first partition, the second partition, and the third partition. The following description is made by taking an electronic device including a first partition and a second partition as an example.
根据以上描述可知,第一分区和第一分区中的数据单元可以对应属性信息i,属性信息i包括第一属性信息和第二属性信息,第一属性信息表示禁止修改,第二属性信息表示禁止删除;第二分区和第二分区中的数据单元对应第二属性信息。According to the above description, the first partition and the data unit in the first partition may correspond to the attribute information i. The attribute information i includes the first attribute information and the second attribute information. The first attribute information indicates that the modification is prohibited and the second attribute information indicates that the modification is prohibited. Delete; the second partition and the data unit in the second partition correspond to the second attribute information.
在一些实施例中,电子设备上各分区中的文件和文件夹可以是电子设备出厂时预设的。电子设备上保存有分区内预设的文件和文件夹与上述属性信息的对应关系。例如,电子设备预设了相机的DCIM文件夹在第二分区中。In some embodiments, the files and folders in each partition on the electronic device may be preset when the electronic device is shipped from the factory. The electronic device stores the correspondence between the files and folders preset in the partition and the attribute information. For example, the electronic device presets the camera's DCIM folder in the second partition.
在另一些实施例中,电子设备上各分区中的文件和文件夹还可以是电子设备在使用过程中自动设置的。例如,电子设备可以根据文件和文件夹的类型确定是否将文件设置于分区以及具体设置于哪个分区中。示例性的,若文件或文件夹为短信类或录音类,则电子设备可以将该文件设置于第一分区中;若文件或文件夹为照片类或视频类,则电子设备可以将该文件或文件夹设置于第二分区中。再例如,电子设备可以根据文件名、文件的标签或关键字确定是否将文件设置于分区中以及具体设置于哪个分区中。示例性的,若文件名为“相机”,则电子设备可以将该文件设置于第二分区中;若文件名为“录音”,则电子设备可以将该文件设置于第一分区中。示例性的,若文件名中包括“重要”这一关键字,则电子设备可以将该文件设置于第二分区中;若文件名中包括“证据”这一关键字,则电子设备可以将该文件设置于第一分区中。电子设备在将文件或文件夹自动设置到分区中时,可以保存文件或文件夹与上述属性信息的对应关系。In other embodiments, the files and folders in each partition on the electronic device may also be automatically set by the electronic device during use. For example, the electronic device may determine whether to set a file in a partition and in which partition, according to the types of files and folders. Exemplarily, if the file or folder is a text message type or a recording type, the electronic device may set the file in the first partition; if the file or folder is a photo type or a video type, the electronic device may set the file or The folder is set in the second partition. For another example, the electronic device may determine whether to set a file in a partition and in which partition, according to a file name, a label or a keyword of the file. Exemplarily, if the file name is "camera", the electronic device may set the file in the second partition; if the file name is "recording", the electronic device may set the file in the first partition. Exemplarily, if the file name includes the keyword "important", the electronic device may set the file in the second partition; if the file name includes the keyword "evidence", the electronic device may set the file The file is set in the first partition. When an electronic device automatically sets a file or folder into a partition, it can save the correspondence between the file or folder and the above-mentioned attribute information.
在另一些实施例中,电子设备上各分区中的文件和文件夹还可以是用户主动设置的。在用户主动设置分区中的文件或文件夹时,电子设备可以保存文件和文件夹与上述属性信息的对应关系。例如,参见图5,电子设备主动设置各分区中的文件和文件的步骤可以包括:In other embodiments, the files and folders in each partition on the electronic device may be set by the user. When the user actively sets files or folders in the partition, the electronic device can save the correspondence between the files and folders and the above-mentioned attribute information. For example, referring to FIG. 5, the step of the electronic device actively setting files and files in each partition may include:
501、电子设备在检测到用户将第一数据单元加入第一分区的操作时,保存第一数据单元与第一属性信息和第二属性信息的对应关系。501. When the electronic device detects a user's operation of adding the first data unit to the first partition, the electronic device saves the correspondence between the first data unit and the first attribute information and the second attribute information.
其中,第一属性信息和第二属性信息也可以合起来称为一组属性信息i。以第一数据单元为文件夹1为例,一种情况下,电子设备可以保存为文件夹1与属性信息i的对应关系;另一种情况下,电子设备可以保存文件夹1与属性信息i的对应关系,以及文件夹1中的文件和文件夹与属性信息i的对应关系。The first attribute information and the second attribute information may be collectively referred to as a group of attribute information i. Taking the first data unit as the folder 1, for example, in one case, the electronic device can save the correspondence between the folder 1 and the attribute information i; in another case, the electronic device can save the folder 1 and the attribute information i And the corresponding relationship between the files and folders in the folder 1 and the attribute information i.
502、电子设备在检测到用户将第二数据单元加入第二分区的操作时,保存第二数据单元与第二属性信息的对应关系。502. When the electronic device detects an operation that the user adds the second data unit to the second partition, the electronic device saves the correspondence between the second data unit and the second attribute information.
以下以用户主动将分区外的文件夹DCIM设置于分区内为例进行示例性说明。参见图6中的(a),电子设备在检测到用户长按DCIM文件夹的操作时,显示菜单列表 601,该菜单列表601中包括设置分区、复制、剪切、删除、压缩、重命名等选项。参见图6中的(b),当用户点击设置分区选项时,电子设备可以显示如图6中的(c)所示的菜单列表602,该菜单列表602中包括加入第一分区、加入第二分区和取消设置等选项。当用户点击加入第一分区的选项时,DCIM文件夹被设置为属于第一分区,并且电子设备可以将DCIM文件夹的图标设置为颜色1;同理,当用户点击加入第二分区的选项时,DCIM文件夹被设置为属于第二分区,并且电子设备可以将DCIM文件夹的图标设置为颜色2;当用户点击取消设置选项时,电子设备退出关于分区的设置。The following takes the user's initiative to set the folder DCIM outside the partition as an example. Referring to (a) in FIG. 6, when the electronic device detects that the user has long pressed the DCIM folder, a menu list 601 is displayed. The menu list 601 includes setting a partition, copying, cutting, deleting, compressing, renaming, etc. Options. Referring to (b) in FIG. 6, when the user clicks the set partition option, the electronic device may display a menu list 602 as shown in (c) in FIG. 6. The menu list 602 includes adding a first partition and adding a second partition. Options such as partitioning and unsetting. When the user clicks on the option to join the first partition, the DCIM folder is set to belong to the first partition, and the electronic device can set the icon of the DCIM folder to color 1. Similarly, when the user clicks on the option to join the second partition The DCIM folder is set to belong to the second partition, and the electronic device can set the icon of the DCIM folder to color 2. When the user clicks the cancel setting option, the electronic device exits the setting about the partition.
或者,电子设备在检测到用户长按DCIM文件夹的操作时,显示菜单列表601,菜单列表601中包括加入第一分区、加入第二分区和取消设置等选项。Alternatively, when the electronic device detects that the user has long pressed the DCIM folder, the electronic device displays a menu list 601. The menu list 601 includes options such as adding a first partition, adding a second partition, and canceling settings.
此外,用户还可以更改文件或文件夹所属的分区或者将文件或文件夹移出分区。示例性的,DCIM文件夹当前在第一分区,电子设备保存有DCIM文件夹与第一属性信息和第二属性信息的对应关系。当用户点击设置分区选项后,电子设备可以显示移动到第二分区和移出分区等选项。当用户点击移动到第二分区选项时,DCIM文件夹被设置为属于第二分区;电子设备可以删除DCIM文件夹与第一属性信息的对应关系,保存DCIM文件夹与第二属性信息的对应关系。当用户点击移出分区选项时,DCIM文件移出分区,电子设备可以删除DCIM文件夹与属性信息的对应关系。In addition, the user can change the partition to which the file or folder belongs or move the file or folder out of the partition. Exemplarily, the DCIM folder is currently in the first partition, and the electronic device stores a correspondence between the DCIM folder and the first attribute information and the second attribute information. When the user clicks the set partition option, the electronic device can display options such as moving to the second partition and moving out of the partition. When the user clicks the move to the second partition option, the DCIM folder is set to belong to the second partition; the electronic device can delete the correspondence between the DCIM folder and the first attribute information, and save the correspondence between the DCIM folder and the second attribute information . When the user clicks the remove partition option, the DCIM file is removed from the partition, and the electronic device can delete the correspondence between the DCIM folder and the attribute information.
另外,当电子设备上包括多个分区时,不同的分区还可以对应不同的安全级别。例如,上述第一分区可以对应安全级别1,上述第二分区可以对应安全级别2,且安全级别1的安全等级高于安全级别2。若DCIM文件夹当前在第一分区,则当用户点击设置分区选项后,参见图7,电子设备可以显示“降低分区级别”选项701和“移出分区”选项702等选项。当用户点击“降低分区级别”选项701时,DCIM文件夹被设置为属于比第一分区低一个安全级别的第二分区。In addition, when the electronic device includes multiple partitions, different partitions may also correspond to different security levels. For example, the first partition may correspond to the security level 1, the second partition may correspond to the security level 2, and the security level of the security level 1 is higher than the security level 2. If the DCIM folder is currently in the first partition, when the user clicks on the set partition option, referring to FIG. 7, the electronic device may display options such as a “reduced partition level” option 701 and a “remove partition” option 702. When the user clicks the "reduced partition level" option 701, the DCIM folder is set to belong to the second partition that is one security level lower than the first partition.
除了通过图6和图7所示的菜单列表以外,用户还可以通过其他的方式来设置文件与分区的对应关系。例如,参见图8中的(a),电子设备响应于用户在触控屏上划一个圆圈的手势,显示第一分区的控件801和第二分区的控件802。其中,第一分区的控件801表示该分区中的文件和文件夹不允许被应用程序删除和修改;第二分区的控件802表示该分区中的文件和文件夹不允许被应用程序删除。参见图8中的(b),当用户将DCIM文件夹拖动到第一分区的控件801的位置时,DCIM文件夹被设置为属于第一分区。或者,当用户将第一分区的控件801拖动至DCIM文件夹的位置时,DCIM文件夹被设置为属于第一分区。在将DCIM文件夹加入到第一分区后,如图8中的(c)所示,DCIM文件夹恢复显示在原来的位置。In addition to the menu list shown in FIG. 6 and FIG. 7, the user can also set the correspondence between files and partitions in other ways. For example, referring to (a) in FIG. 8, in response to the user's gesture of drawing a circle on the touch screen, the electronic device displays the control 801 of the first partition and the control 802 of the second partition. Among them, the control 801 of the first partition indicates that files and folders in the partition are not allowed to be deleted and modified by the application; the control 802 of the second partition indicates that files and folders in the partition are not allowed to be deleted by the application. Referring to (b) in FIG. 8, when the user drags the DCIM folder to the position of the control 801 of the first partition, the DCIM folder is set to belong to the first partition. Alternatively, when the user drags the control 801 of the first partition to the position of the DCIM folder, the DCIM folder is set to belong to the first partition. After the DCIM folder is added to the first partition, as shown in FIG. 8 (c), the DCIM folder is restored to the original location.
再例如,用户可以通过语音的方式将DCIM文件夹加入第一分区。For another example, the user can add the DCIM folder to the first partition by voice.
可以理解的是,还可以有其他设置文件和文件夹与分区对应关系的方式,此处不予赘述。It can be understood that there may be other ways to set the correspondence between files and folders and partitions, which will not be repeated here.
在一些实施例中,在上述分区内的文件和文件夹的显示状态,可以不同于分区以外的文件和文件夹的显示状态,以方便用户获知文件或文件夹是否在分区中,是否为重要文件。示例性的,分区中的文件的图标为半透明的图标;分区以外的文件的图标为正常图标。In some embodiments, the display status of files and folders in the partition may be different from the display status of files and folders outside the partition, so that the user can know whether the file or folder is in the partition and is an important file. . Exemplarily, the icon of the file in the partition is a semi-transparent icon; the icon of the file outside the partition is a normal icon.
在其他一些实施例中,不同分区内的文件和文件夹的显示状态也可以不同,以方便用户区别不同安全级别的文件。其中,显示状态不同可以包括文件或文件夹的图标的颜色不同、标记不同、形状不同、标记不同或透明度不同等中的一种或任意组合。In other embodiments, the display status of files and folders in different partitions may also be different, so as to facilitate users to distinguish files of different security levels. The different display states may include one or any combination of different colors of the icons of the files or folders, different marks, different shapes, different marks, or different transparency.
为方便描述,此处以第一分区称为红区,录音文件夹属于红区;第二分区称为蓝区,DCIM文件夹属于蓝区;“下载文件夹”在分区外为例进行说明。For the convenience of description, the first partition is called the red area, and the recording folder belongs to the red area; the second partition is called the blue area, and the DCIM folder belongs to the blue area; the "download folder" is outside the partition as an example.
示例性的,红区内的录音文件夹的图标颜色为红色,蓝区内的DCIM文件夹的图标颜色为蓝色,分区外的下载文件夹图标的颜色为黄色。Exemplarily, the icon color of the recording folder in the red area is red, the icon color of the DCIM folder in the blue area is blue, and the icon of the download folder outside the partition is yellow.
再示例性的,参见图9中的(a),红区内的录音文件夹的图标上显示有标签“红区”,蓝区内的DCIM文件夹的图标上显示有标签“蓝区”,分区外的下载文件夹的图标上未显示有红区或蓝区标签。For another example, referring to (a) in FIG. 9, the icon of the recording folder in the red area is displayed with a label “red area”, and the icon of the DCIM folder in the blue area is displayed with a label “blue area”. There is no red or blue label on the download folder icon outside the partition.
再示例性的,参见图9中的(b),红区内的录音文件夹的图标的轮廓为矩形,蓝区内的DCIM文件夹的图标的轮廓为圆形,分区外的文件夹图标的为正常文件夹的形状。For another example, referring to FIG. 9 (b), the outline of the icon of the recording folder in the red area is rectangular, the outline of the icon of the DCIM folder in the blue area is circular, and the icon of the folder icon outside the partition is round. The shape of a normal folder.
再示例性的,红区内的录音文件夹的图标上显示有标如图9中的(c)所示的禁止删除和禁止修改的标记,蓝区内的DCIM文件夹的图标上显示有如图9中的(c)所示的禁止删除的标记,分区外的“下载文件夹”的图标为正常图标。For another example, the icon of the recording folder in the red area is displayed with a mark prohibiting deletion and modification as shown in (c) of FIG. 9, and the icon of the DCIM folder in the blue area is displayed as shown in FIG. The deletion prohibition mark shown in (c) in 9 is the normal icon for the "Download Folder" icon outside the partition.
再示例性的,参见图9中的(d),红区内的录音文件夹的图标的前方显示有半透明的窗体,该半透明窗体用于提示用户该文件夹禁止被删除和修改;蓝区内的DCIM文件夹的图标的前方显示有半透明窗体,该半透明窗体用于提示用户该文件夹禁止被删除,分区外的“下载文件夹”的图标的前方未显示有半透明窗体。As another example, referring to (d) in FIG. 9, a semi-transparent window is displayed in front of the icon of the recording folder in the red zone, and the semi-transparent window is used to prompt the user that the folder cannot be deleted or modified ; A semi-transparent window is displayed in front of the icon of the DCIM folder in the blue area. This semi-transparent window is used to remind the user that the folder must not be deleted. The icon of the "Download Folder" outside the partition is not displayed in front of it Translucent form.
以电子设备包括第一分区和第二分区,且第一数据单元属于第一分区,第二数据单元属于第二分区,电子设备上保存有第一数据单元与属性信息i的对应关系,属性信息i包括第一属性信息和第二属性信息,第一属性信息为禁止修改,第二属性信息为禁止删除;电子设备上还保存有第二数据单元与第二属性信息的对应关系为例,描述本申请实施例提供的操作控制方法。参见图10,该操作控制方法可以包括:The electronic device includes a first partition and a second partition, and the first data unit belongs to the first partition and the second data unit belongs to the second partition. The electronic device stores a correspondence between the first data unit and the attribute information i, and the attribute information i includes first attribute information and second attribute information. The first attribute information is prohibited from modification and the second attribute information is prohibited from being deleted. The correspondence between the second data unit and the second attribute information is also stored on the electronic device as an example. The operation control method provided in the embodiment of the present application. Referring to FIG. 10, the operation control method may include:
1001、若电子设备检测到第一应用程序用于请求执行第一操作的第一请求信息,第一操作为修改第一数据单元的操作,则电子设备根据第一数据单元对应的第一属性信息,拒绝执行第一操作。1001: If the electronic device detects first request information used by the first application to request the first operation, and the first operation is an operation to modify the first data unit, the electronic device according to the first attribute information corresponding to the first data unit , Refuse to perform the first operation.
其中,第一操作为第一数据单元对应的第一属性信息(即第一参数信息)所禁止的操作。例如,第一操作可以为第一应用程序请求修改第一数据单元中的文件的内容的操作(例如写入(write)、替换、删除数据等),或者第一操作可以为第一应用程序重命名第一数据单元中的文件(包括文件夹中的文件)的操作,或者第一操作可以为第一应用程序重命名第一数据单元中的文件夹的操作等。The first operation is an operation prohibited by the first attribute information (that is, the first parameter information) corresponding to the first data unit. For example, the first operation may be an operation (for example, write, replace, delete data, etc.) that the first application requests to modify the content of the file in the first data unit, or the first operation may be repeated for the first application. An operation of naming a file (including a file in a folder) in the first data unit, or an operation of renaming a folder in the first data unit for the first application, or the like.
同样地,若电子设备检测到第三应用程序用于请求执行第一操作的第三请求信息,则电子设备也可以根据第一数据单元对应的第一属性信息拒绝执行第一操作。Similarly, if the electronic device detects the third request information used by the third application to request the first operation, the electronic device may also refuse to perform the first operation according to the first attribute information corresponding to the first data unit.
此外,若电子设备检测到第一应用程序用于请求删除第一数据单元对应的请求信息,则该删除操作是第一数据单元对应的第二属性信息(即第二参数信息)所禁止的操作,电子设备根据该第二属性信息拒绝执行该删除操作。其中,该删除操作可以为第一应用程序请求删除第一数据单元中的文件(包括文件夹中的文件)的操作,或者 第一操作可以为第一应用程序请求删除第一数据单元中的文件夹的操作等。In addition, if the electronic device detects that the first application is used to request deletion of the request information corresponding to the first data unit, the deletion operation is an operation prohibited by the second attribute information (that is, the second parameter information) corresponding to the first data unit. , The electronic device refuses to perform the deleting operation according to the second attribute information. The deletion operation may be an operation that the first application requests to delete files (including files in the folder) in the first data unit, or the first operation may request that the files in the first data unit be deleted in the first application. Clip operation, etc.
1002、若电子设备检测到第二应用程序用于请求执行第二操作的第二请求信息,第二操作为删除第二数据单元的操作,则电子设备根据第二数据单元对应的第二属性信息,拒绝执行第二操作。1002: If the electronic device detects second request information used by the second application to request the second operation, and the second operation is an operation to delete the second data unit, the electronic device according to the second attribute information corresponding to the second data unit. , Refuse to perform the second operation.
其中,第二操作为第二数据单元对应的第二属性信息(即第二参数信息)所禁止的操作。例如,第二操作可以为第二应用程序请求删除第二数据单元中的文件(包括文件夹中的文件)的操作,或者第二操作可以为第二应用程序请求删除第二数据单元中的文件夹的操作等。The second operation is an operation prohibited by the second attribute information (that is, the second parameter information) corresponding to the second data unit. For example, the second operation may be an operation that the second application requests to delete files (including files in the folder) in the second data unit, or the second operation may request that the files in the second data unit be deleted in the second application. Clip operation, etc.
在步骤1001-1002描述的方案中,当文件或文件夹属于上述第一分区或第二分区,电子设备保存有文件或文件夹与属性信息的对应关系时,对于该文件或文件夹,应用程序无法成功进行该属性信息所禁止的删除或修改操作,因而可以防止文件或文件夹中数据的丢失或被篡改,提高该文件或文件夹中数据的安全性。并且,可以通过文件或文件夹的属性信息来标识文件或文件夹禁止被任何应用程序删除或修改,而不需要用户像现有技术那样分别设置每个应用程序与每个文件或每个文件夹的操作权限的对应关系,因而可以减少用户的操作。In the solution described in steps 1001-1002, when the file or folder belongs to the first or second partition, and the electronic device saves the correspondence between the file or folder and the attribute information, for the file or folder, the application program The deletion or modification operation forbidden by the attribute information cannot be performed successfully, so that the data in the file or folder can be prevented from being lost or tampered with, and the security of the data in the file or folder is improved. In addition, the file or folder attribute information can be used to identify the file or folder forbidden to be deleted or modified by any application, without requiring the user to separately set each application and each file or folder as in the prior art. The corresponding relationship of the operation authority can reduce the user's operation.
需要注意的是,上述步骤1001和步骤1002没有明确的先后关系,步骤1001可以在步骤1002之前也可以在步骤1002之后。It should be noted that there is no clear sequence relationship between step 1001 and step 1002, and step 1001 may be before step 1002 or after step 1002.
在其他一些实施例中,若请求对分区中的文件或文件夹进行属性信息所禁止的操作的应用程序为一些特定的应用程序,则电子设备可以认为该应用程序是安全的应用程序。因而,电子设备在根据文件或文件夹对应的属性信息确定拒绝执行该操作后,还可以请求用户对该操作进行授权,从而在用户授权后执行该操作。例如,这些特定的应用程序可以为电子设备的厂商开发的应用程序,或者为电子设备出厂时预置的应用程序,或者为用户设置的白名单中的应用程序,或者为高优先级的应用程序等。这样,只有在用户授权许可后,电子设备才可以删除或修改分区中的文件和文件夹,因而分区中的文件和文件夹的安全性较高。In other embodiments, if the application requesting the operation prohibited by the attribute information on the file or folder in the partition is some specific application, the electronic device may consider the application to be a secure application. Therefore, after determining that the operation is refused to be performed according to the attribute information corresponding to the file or folder, the electronic device may also request the user to authorize the operation, so as to perform the operation after the user authorizes. For example, these specific applications can be applications developed by the manufacturer of the electronic device, or applications preset when the electronic device leaves the factory, or applications in a white list set by the user, or high-priority applications Wait. In this way, the electronic device can delete or modify files and folders in the partition only after the user grants permission, so the files and folders in the partition have higher security.
仍以电子设备包括第一分区和第二分区为例,参见图11,电子设备在步骤1001中拒绝执行第一操作之后,该方法还可以包括:Taking the electronic device including the first partition and the second partition as an example, referring to FIG. 11, after the electronic device refuses to perform the first operation in step 1001, the method may further include:
1101、若第一应用程序为特定的应用程序,则电子设备提示用户是否对第一操作进行授权。1101. If the first application is a specific application, the electronic device prompts the user whether to authorize the first operation.
此外,若第一应用程序不是特定的应用程序,则电子设备结束数据操作流程,不执行第一操作。In addition, if the first application is not a specific application, the electronic device ends the data operation flow and does not perform the first operation.
1102、若电子设备检测到用户对第一操作进行授权的指示操作,则电子设备执行第一操作。1102: If the electronic device detects an instruction operation for authorizing the first operation by the user, the electronic device executes the first operation.
此外,若电子设备检测到用户拒绝对第一操作进行授权的指示操作,则电子设备结束数据操作流程,不执行第一操作。In addition, if the electronic device detects that the user refuses to instruct the first operation to authorize the operation, the electronic device ends the data operation process and does not perform the first operation.
也就是说,若请求对分区中的文件或文件夹进行属性信息所禁止的第一操作的第一应用程序为特定的应用程序,则电子设备可以认为该第一应用程序是可信的应用程序。因而,在电子设备根据文件或文件夹对应的属性信息拒绝执行第一操作时,电子设备还可以请求用户对该第一操作进行授权,从而在用户授权后执行该第一操作。That is, if the first application requesting the first operation prohibited by the attribute information on the file or folder in the partition is a specific application, the electronic device may consider the first application to be a trusted application. . Therefore, when the electronic device refuses to perform the first operation according to the attribute information corresponding to the file or folder, the electronic device may also request the user to authorize the first operation, so that the first operation is performed after the user authorizes.
示例性的,若联系人文件属于第一分区,电子设备保存有联系人文件与第一属性信息的对应关系,第一属性信息为禁止删除和禁止修改。电话应用请求修改第一分区中的联系人信息。电子设备根据联系人文件对应的第一属性信息,确定修改第一分区中的联系人信息为第一属性信息所禁止的操作,因而拒绝修改第一分区中的联系人。电话应用为特定的应用程序,因而电子设备可以请求用户对修改第一分区中的联系人信息的操作进行授权。例如,参见图12中的(a),电子设备可以显示提示框1201以提示用户是否授权该操作;若用户点击“取消”,则电子设备不执行修改第一分区中的联系人信息的操作;若用户点击“同意”,则电子设备执行修改第一分区中的联系人信息的操作。此外,在电子设备执行修改第一分区中的联系人信息的操作后,电子设备还可以提示用户修改操作已成功执行。例如,参见图12中的(b),电子设备通过提示框1202提示用户已成功修改联系人信息。Exemplarily, if the contact file belongs to the first partition, the electronic device stores a correspondence between the contact file and the first attribute information, and the first attribute information is prohibited from being deleted and modified from being prohibited. The phone application requests modification of the contact information in the first partition. The electronic device determines that modifying the contact information in the first partition is an operation prohibited by the first attribute information according to the first attribute information corresponding to the contact file, and therefore refuses to modify the contact in the first partition. The phone application is a specific application program, so the electronic device can request the user to authorize the operation of modifying the contact information in the first partition. For example, referring to (a) in FIG. 12, the electronic device may display a prompt box 1201 to prompt the user whether to authorize the operation; if the user clicks “Cancel”, the electronic device does not perform the operation of modifying the contact information in the first partition; If the user clicks "Agree", the electronic device performs an operation of modifying the contact information in the first partition. In addition, after the electronic device performs an operation of modifying the contact information in the first partition, the electronic device may further prompt the user that the modification operation has been successfully performed. For example, referring to (b) in FIG. 12, the electronic device notifies the user that the contact information has been successfully modified through the prompt box 1202.
电子设备在步骤1002中拒绝执行第二操作之后,该方法还可以包括:After the electronic device refuses to perform the second operation in step 1002, the method may further include:
1103、若第二应用程序为特定的应用程序,则电子设备提示用户是否对第二操作进行授权。1103. If the second application is a specific application, the electronic device prompts the user whether to authorize the second operation.
此外,若第二应用程序不是特定的应用程序,则电子设备结束数据操作流程,不执行第二操作。In addition, if the second application is not a specific application, the electronic device ends the data operation flow and does not perform the second operation.
1104、若电子设备检测到用户对第二操作进行授权的指示操作,则电子设备执行第二操作。1104. If the electronic device detects an instruction operation for authorizing the second operation by the user, the electronic device performs the second operation.
此外,若电子设备检测到用户拒绝对第二操作进行授权的指示操作,则电子设备结束数据操作流程,不执行第二操作。In addition, if the electronic device detects that the user refuses to instruct the second operation to authorize the instruction operation, the electronic device ends the data operation flow and does not perform the second operation.
也就是说,若请求对分区中的文件或文件夹进行属性信息所禁止的第二操作的第二应用程序为特定的应用程序,则电子设备可以认为该第二应用程序是可信的应用程序。因而,在电子设备根据文件或文件夹对应的属性信息拒绝执行第二操作时,电子设备还可以请求用户对该第二操作进行授权,从而在用户授权后执行该第二操作。That is, if the second application requesting the second operation prohibited by the attribute information of the file or folder in the partition is a specific application, the electronic device may consider the second application to be a trusted application. . Therefore, when the electronic device refuses to perform the second operation according to the attribute information corresponding to the file or folder, the electronic device may also request the user to authorize the second operation, so that the second operation is performed after the user authorizes.
示例性的,若DCIM文件夹属于第二分区,电子设备保存有DCIM文件夹与第二属性信息的对应关系,第二属性信息为禁止删除。若修图软件请求修改DCIM文件夹中的照片A,则该修改操作不是第二属性信息所禁止的操作,因而电子设备执行修改DCIM文件夹中的照片A的操作。若修图软件请求删除DCIM文件夹中的照片A,则该修改操作是第二属性信息所禁止的操作,因而电子设备拒绝修改DCIM文件夹中的照片A的操作。修图软件不是特定的应用程序,因而电子设备不会提示用户进行授权。Exemplarily, if the DCIM folder belongs to the second partition, the electronic device stores the correspondence between the DCIM folder and the second attribute information, and the second attribute information is prohibited from being deleted. If the photo editing software requests to modify the photo A in the DCIM folder, the modification operation is not an operation prohibited by the second attribute information, so the electronic device performs an operation of modifying the photo A in the DCIM folder. If the photo editing software requests to delete the photo A in the DCIM folder, the modification operation is an operation prohibited by the second attribute information, so the electronic device refuses to modify the photo A in the DCIM folder. Retouching software is not a specific application, so the electronic device does not prompt the user for authorization.
若图库这一应用程序请求删除DCIM文件夹中的照片A,则该修改操作是第二属性信息所禁止的操作,因而电子设备拒绝修改DCIM文件夹中的照片A的操作。图库为特定的应用程序,因而电子设备提示用户对删除DCIM文件夹中的照片A的操作进行授权。示例性的,参见图13,电子设备可以显示提示框1301以提示用户是否授权该操作;若用户点击“是”,则电子设备执行删除该照片的操作;若用户点击“否”,则电子设备不执行删除该照片的操作。If the application of the gallery requests to delete the photo A in the DCIM folder, the modification operation is an operation prohibited by the second attribute information, so the electronic device rejects the operation of modifying the photo A in the DCIM folder. The gallery is a specific application, so the electronic device prompts the user to authorize the operation of deleting photo A in the DCIM folder. For example, referring to FIG. 13, the electronic device may display a prompt box 1301 to prompt the user whether to authorize the operation; if the user clicks "Yes", the electronic device performs an operation of deleting the photo; if the user clicks "No", the electronic device Do not delete the photo.
需要说明的是,以上是以电子设备在界面上显示提示框来提示用户进行授权,用户通过点击界面上的确权控件进行授权为例进行说明的。电子设备还可以采用其他方式提示用户进行授权,用户还可以通过其他方式进行授权。例如,电子设备还可以通 过声音提示用户进行授权,用户还可以通过语音进行授权。再例如,电子设备还可以通过界面或语音提示用户进行授权,用户还可以通过指纹认证进行授权。再例如,电子设备还可以通过界面或语音提示用户进行授权,用户还可以通过面部认证进行授权。It should be noted that in the above, the electronic device displays a prompt box on the interface to prompt the user to authorize, and the user performs authorization by clicking the right control on the interface as an example. The electronic device can also prompt the user to authorize in other ways, and the user can also authorize in other ways. For example, the electronic device can also prompt the user to authorize by sound, and the user can also authorize by voice. As another example, the electronic device may prompt the user for authorization through an interface or voice, and the user may also perform authorization through fingerprint authentication. As another example, the electronic device may prompt the user for authorization through an interface or voice, and the user may also perform authorization through facial authentication.
在其他一些实施例中,若应用程序请求对上述分区中的文件或文件夹进行属性信息所禁止的操作是由用户发起的,则虽然上述分区中的该文件或文件夹很重要,但是用户可能确实想要删除或修改该文件或文件夹,因而电子设备在根据文件或文件夹对应的属性信息拒绝执行操作后,还可以请求用户对该操作进行授权,从而在用户授权后执行该操作。In some other embodiments, if an application requests an operation prohibited by the attribute information of a file or folder in the above partition to be initiated by a user, although the file or folder in the above partition is important, the user may The user really wants to delete or modify the file or folder, so after the electronic device refuses to perform the operation according to the attribute information corresponding to the file or folder, the electronic device may also request the user to authorize the operation, so that the operation is performed after the user authorizes.
也就是说,电子设备禁止应用程序自动对分区中的文件或文件夹进行属性信息所禁止的操作;在用户主动指示通过应用程序对分区中的文件或文件夹进行属性信息所禁止的操作时,电子设备提示用户进行授权,并在用户授权后对分区中的文件或文件夹执行属性信息所禁止的操作。即,只有在用户授权许可后,电子设备才可以删除或修改分区中的文件和文件夹,因而分区中的文件和文件夹的安全性较高。In other words, the electronic device prohibits the application from automatically performing operations prohibited by the attribute information on the files or folders in the partition; when the user actively instructs the application to perform the operations prohibited by the attribute information on the files or folders in the partition, The electronic device prompts the user to authorize and performs operations prohibited by the attribute information on the files or folders in the partition after the user authorizes. That is, the electronic device can delete or modify files and folders in the partition only after the user grants permission, so the security of the files and folders in the partition is high.
其中,电子设备确定删除、修改等操作是否由用户发起的方式可以有多种。例如,在电子设备检测到应用程序发送请求信息,以请求对分区中的文件或文件夹进行属性信息所禁止的操作之前,电子设备检测到用户的输入操作,确定该输入操作对应的目标输入事件并保存。电子设备将目标输入事件分发到相应的应用程序。若分发时间与电子设备检测到应用程序发送请求信息的时间之间的差值小于或者等于预设值(该预设值可以较小),则电子设备可以确定该操作是由用户发起的。Among them, there may be various ways for the electronic device to determine whether operations such as deletion and modification are initiated by the user. For example, before the electronic device detects that the application sends request information to request an operation prohibited by the attribute information on a file or folder in the partition, the electronic device detects the user's input operation and determines the target input event corresponding to the input operation And save. The electronic device distributes the target input event to the corresponding application. If the difference between the distribution time and the time when the electronic device detects that the application sends the request information is less than or equal to a preset value (the preset value may be smaller), the electronic device may determine that the operation is initiated by the user.
示例性的,如图13所示,在电子设备检测到用户点击删除控件1302后,将点击操作加工成目标输入事件。电子设备识别到该目标输入事件所对应的控件为图库的删除控件,将该目标输入事件分发到图库。电子设备检测到图库发送的请求信息,以请求删除该照片。并且,分发时间早于图库请求删除操作的时间,且分发时间和图库请求删除操作的时间之间的差值小于或者等于预设值,则电子设备可以确定该删除操作是用户发起的。For example, as shown in FIG. 13, after the electronic device detects that the user clicks the delete control 1302, the click operation is processed into a target input event. The electronic device recognizes that the control corresponding to the target input event is a delete control of the gallery, and distributes the target input event to the gallery. The electronic device detected a request message from the gallery to request deletion of the photo. And, the distribution time is earlier than the time when the gallery request delete operation, and the difference between the time when the distribution time and the gallery request delete operation is less than or equal to a preset value, the electronic device may determine that the delete operation is initiated by the user.
再例如,电子设备检测到用户的输入操作,确定该输入操作对应的目标输入事件并保存。电子设备将目标输入事件分发到相应的应用程序。应用程序发送用于执行操作的请求信息以及用于标识用户输入操作的信息。电子设备根据该操作请求以及用于标识用户输入操作的信息可以确定该操作是由用户发起的。For another example, the electronic device detects an input operation of the user, determines a target input event corresponding to the input operation, and saves it. The electronic device distributes the target input event to the corresponding application. The application sends request information for performing an operation and information for identifying a user input operation. The electronic device may determine that the operation is initiated by the user according to the operation request and information used to identify the user's input operation.
在其他一些实施例中,若应用程序请求对上述分区中的文件或文件夹进行属性信息所禁止的操作是由用户发起的,且该应用程序为特定的应用程序,则虽然上述分区中的该文件或文件夹很重要,但是用户可能确实想要删除或修改该文件或文件夹,且该应用程序是特定的、安全的应用程序,因而电子设备在根据文件或文件夹对应的属性信息拒绝执行操作后,还可以请求用户对该操作进行授权,从而在用户授权后执行该操作。In some other embodiments, if an application requests an operation prohibited by the attribute information of a file or folder in the partition, the operation is initiated by a user, and the application is a specific application. The file or folder is important, but the user may indeed want to delete or modify the file or folder, and the application is a specific and secure application, so the electronic device is refusing to execute based on the attribute information corresponding to the file or folder After the operation, the user can also be requested to authorize the operation, so that the operation can be performed after the user authorizes.
在一些实施例中,电子设备还可以创建日志文件,该日志文件用于跟踪和记录以上各分区中文件和文件夹的删除情况和变更分区的情况,以方便相关人员和用户了解文件和文件夹是如何被删除的或者当前处于怎样的安全级别。该日志文件被创建之后,只能追加内容不能被删除,即该日志文件具有附加(append)属性。其中,该变更分 区的情况可以包括文件或文件夹在不同分区之间变更的情况,还可以包括文件或文件夹从分区外变更到分区内的情况,以及文件或文件夹从分区内变更到分区外的情况。In some embodiments, the electronic device may also create a log file, which is used to track and record the deletion of files and folders in each of the above partitions and the change of partitions, in order to facilitate relevant personnel and users to understand the files and folders How it was deleted or what security level it is currently in. After the log file is created, only the appended content cannot be deleted, that is, the log file has an append attribute. Among them, the case of changing a partition may include a case where a file or a folder is changed between different partitions, a case where a file or a folder is changed from outside the partition to a partition, and a file or folder is changed from inside the partition to the partition Outside the situation.
例如,在第一分区和第二分区中的文件或文件夹被删除之后,电子设备可以保存删除日志,该删除日志用于记录第一分区和第二分区中被删除的文件或文件夹的删除时间、删除主体以及被删除的文件或文件夹的路径等信息;其中,该删除主体为删除该文件或文件夹的应用程序。例如,当图库请求删除第二分区中的照片A时,电子设备提示用户进行授权;在用户授权后,电子设备于2018-09-18,09:23:56删除该照片A;则该删除日志可以为“2018-09-18,09:23:56+图库+手机存储/DCIM/IMG_20180917_080630.jpg”。For example, after files or folders in the first and second partitions are deleted, the electronic device may save a deletion log for recording deletion of files or folders in the first and second partitions. Information such as time, subject of deletion, and path of the deleted file or folder; where the subject of deletion is an application that deletes the file or folder. For example, when the gallery requests to delete the photo A in the second partition, the electronic device prompts the user for authorization; after the user authorizes, the electronic device deletes the photo A at 2018-09-18, 09:23:56; then the delete log Can be "2018-09-18, 09: 23: 56 + Gallery + Mobile Storage / DCIM / IMG_20180917_080630.jpg".
又例如,若电子设备检测到用户将第四数据单元从上述分区中的一个分区移动到另一分区,则电子设备保存分区变更日志,分区变更日志包括被变更分区的第四数据单元的变更时间、被变更分区的第四数据单元的路径,变更前的分区以及变更后的分区。例如,在用户指示将第一分区中的录音文件1切换到第二分区后,电子设备于2018-09-18,12:35:18将录音文件1切换到第二分区,该分区变更日志可以为“2018-09-18,12:35:18+手机存储/录音/下午7时36分.ogg+变更前属于第一分区+变更后属于第二分区”。再例如,在用户指示将第一分区中的录音文件1移出分区后,电子设备于2018-09-18,20:08:08将录音文件1移出第一分区,该分区变更日志可以为“2018-09-18,12:35:18+手机存储/录音/下午7时36分.ogg+变更前属于第一分区+变更后在分区外”。For another example, if the electronic device detects that the user moves the fourth data unit from one of the partitions to another partition, the electronic device saves a partition change log, and the partition change log includes a change time of the fourth data unit of the changed partition. The path of the fourth data unit of the changed partition, the partition before the change, and the partition after the change. For example, after the user instructs to switch the recording file 1 in the first partition to the second partition, the electronic device switches the recording file 1 to the second partition at 2018-09-18, 12:35:18. The partition change log can be "2018-09-18, 12: 35: 18 + Mobile storage / recording / 7: 36 pm. Ogg + belongs to the first partition before the change + belongs to the second partition after the change". As another example, after the user instructs to move the recording file 1 in the first partition out of the partition, the electronic device moves the recording file 1 out of the first partition at 2018-09-18, 20:08:08. The partition change log may be “2018 -09-18, 12: 35: 18 + mobile storage / recording / 7: 36 pm. Ogg + belongs to the first partition before the change + outside the partition after the change ".
此外,当一个数据单元从分区外变更到分区内,或者从分区内变更到分区外时,电子设备也可以保存对应的分区变更日志,此处不予赘述。In addition, when a data unit is changed from outside the partition to inside the partition, or from inside the partition to outside the partition, the electronic device can also save the corresponding partition change log, which will not be repeated here.
本申请另一实施例提供了另一种操作控制方法,如图14所示,该方法可以包括:Another embodiment of the present application provides another operation control method. As shown in FIG. 14, the method may include:
1401、电子设备检测到用户将数据单元1加入第一分区的操作。1401. The electronic device detects an operation that the user adds the data unit 1 to the first partition.
示例性的,用户可以采用图6-图8所示的方式将数据单元1加入第一分区。For example, the user may add the data unit 1 to the first partition in the manner shown in FIG. 6 to FIG. 8.
1402、电子设备检测到用户通过应用程序1修改数据单元1的操作。1402. The electronic device detects that the user modifies the operation of the data unit 1 through the application program 1.
示例性的,用户修改数据单元1的操作可以是图12中的(a)和(b)所示的修改联系人信息的操作。Exemplarily, the operation of the user to modify the data unit 1 may be the operation of modifying the contact information shown in (a) and (b) in FIG. 12.
1403、电子设备提示用户操作1已被拒绝。1403. The electronic device prompts the user that operation 1 has been rejected.
例如,若电子设备根据数据单元1对应的属性信息确定操作1被禁止,则电子设备可以提示用户操作1已被拒绝。For example, if the electronic device determines that operation 1 is prohibited according to the attribute information corresponding to the data unit 1, the electronic device may prompt the user that operation 1 has been rejected.
示例性的,电子设备提示用户某个操作已被拒绝的界面示意图可以参见图4。Exemplarily, a schematic interface diagram of the electronic device notifying the user that an operation has been rejected can be seen in FIG. 4.
与应用程序1类似,当电子设备检测到用户通过应用程序2修改数据单元1的操作时,电子设备也可以提示用户该操作已被拒绝。Similar to the application 1, when the electronic device detects that the user modifies the operation of the data unit 1 through the application 2, the electronic device may also prompt the user that the operation has been rejected.
1404、电子设备提示用户是否对操作1进行授权。1404. The electronic device prompts the user whether to authorize operation 1.
在电子设备提示拒绝执行操作1后,电子设备可以提示用户是否对操作1进行授权,以提高待操作的数据单元1的安全性。After the electronic device prompts to refuse to perform operation 1, the electronic device may prompt the user whether to authorize operation 1, so as to improve the security of the data unit 1 to be operated.
示例性的,电子设备提示用户是否对修改操作进行授权的界面示意图可以参见图12中的(a)。Exemplarily, a schematic interface diagram of the electronic device prompting the user whether to authorize the modification operation may refer to (a) in FIG. 12.
1405、若电子设备检测到用户对操作1进行授权的指示操作,则电子设备提示用 户操作1已成功执行。1405. If the electronic device detects that the user instructs the operation 1 to be authorized, the electronic device prompts the user that the operation 1 has been successfully performed.
在用户指示授权后电子设备可以执行操作1,并通知用户已成功执行操作1,实现用户想要执行操作1的需求。示例性的,电子设备对操作1进行授权的操作可以是用户点击图12中的(a)中的“同意”的操作。电子设备提示用户操作1已成功执行的界面示意图可以参见图12中的(b)。After the user indicates authorization, the electronic device can perform operation 1 and notify the user that operation 1 has been successfully performed, thereby realizing the user's need to perform operation 1. Exemplarily, the operation that the electronic device authorizes the operation 1 may be an operation that the user clicks "agree" in (a) in FIG. 12. For a schematic diagram of the interface in which the electronic device prompts the user that the operation 1 has been successfully performed, refer to (b) in FIG. 12.
本申请另一实施例提供了另一种操作控制方法,如图15所示,该方法可以包括:Another embodiment of the present application provides another operation control method. As shown in FIG. 15, the method may include:
1501、电子设备检测到用户将数据单元1加入第二分区的操作。1501. The electronic device detects an operation that the user adds the data unit 1 to the second partition.
1502、电子设备检测到用户通过应用程序1删除数据单元1的操作。1502. The electronic device detects an operation of the user to delete the data unit 1 through the application 1.
1503、电子设备提示用户操作1已被拒绝。1503. The electronic device prompts the user that operation 1 has been rejected.
例如,若电子设备根据数据单元1对应的属性信息确定操作1被禁止,则电子设备可以提示用户操作1已被拒绝。For example, if the electronic device determines that operation 1 is prohibited according to the attribute information corresponding to the data unit 1, the electronic device may prompt the user that operation 1 has been rejected.
与应用程序1类似,当电子设备检测到用户通过应用程序2删除数据单元1的操作时,电子设备还可以提示用户该操作已被拒绝。Similar to the application 1, when the electronic device detects an operation of the user to delete the data unit 1 through the application 2, the electronic device may further prompt the user that the operation has been rejected.
1504、电子设备提示用户是否对操作1进行授权。1504. The electronic device prompts the user whether to authorize operation 1.
在电子设备提示拒绝执行操作1后,电子设备可以提示用户是否对操作1进行授权,以提高待操作的数据单元1的安全性。After the electronic device prompts to refuse to perform operation 1, the electronic device may prompt the user whether to authorize operation 1, so as to improve the security of the data unit 1 to be operated.
示例性的,电子设备提示用户是否对删除操作进行授权的界面示意图可以参见图13。Exemplarily, a schematic interface diagram of the electronic device prompting the user whether to authorize the delete operation can be seen in FIG. 13.
1505、若电子设备检测到用户对操作1进行授权的指示操作,则电子设备提示用户操作1已成功执行。1505. If the electronic device detects that the user instructs the operation 1 to be authorized, the electronic device prompts the user that the operation 1 has been successfully performed.
在用户指示授权后电子设备可以执行操作1,并通知用户已成功执行操作1,实现用户想要执行操作1的需求。After the user indicates authorization, the electronic device can perform operation 1 and notify the user that operation 1 has been successfully performed, thereby realizing the user's need to perform operation 1.
本申请另一实施例提供了另一种操作控制方法,如图16所示,该方法可以包括:Another embodiment of the present application provides another operation control method. As shown in FIG. 16, the method may include:
1601、电子设备检测到用户将数据单元1加入第三分区的操作。1601. The electronic device detects an operation that the user adds the data unit 1 to the third partition.
1602、电子设备检测到用户通过应用程序1读取数据单元1的操作。1602 The electronic device detects an operation that the user reads the data unit 1 through the application program 1.
1603、电子设备提示用户操作1已被拒绝。1603. The electronic device prompts the user that operation 1 has been rejected.
例如,若电子设备根据数据单元1对应的属性信息确定操作1被禁止,则电子设备可以提示用户操作1已被拒绝。For example, if the electronic device determines that operation 1 is prohibited according to the attribute information corresponding to the data unit 1, the electronic device may prompt the user that operation 1 has been rejected.
与应用程序1类似,当电子设备检测到用户通过应用程序2读取数据单元1的操作时,电子设备还可以提示用户该操作已被拒绝。Similar to the application 1, when the electronic device detects an operation that the user reads the data unit 1 through the application 2, the electronic device may further prompt the user that the operation has been rejected.
1604、电子设备提示用户是否对操作1进行授权。1604. The electronic device prompts the user whether to authorize operation 1.
在电子设备提示拒绝执行操作1后,电子设备可以提示用户是否对操作1进行授权,以提高待操作的数据单元1的安全性。After the electronic device prompts to refuse to perform operation 1, the electronic device may prompt the user whether to authorize operation 1, so as to improve the security of the data unit 1 to be operated.
1605、若电子设备检测到用户对操作1进行授权的指示操作,则电子设备提示用户操作1已成功执行。1605. If the electronic device detects that the user instructs the operation 1 to be authorized, the electronic device prompts the user that the operation 1 has been successfully performed.
在用户指示授权后电子设备可以执行操作1,并通知用户已成功执行操作1,实现用户想要执行操作1的需求。After the user indicates authorization, the electronic device can perform operation 1 and notify the user that operation 1 has been successfully performed, thereby realizing the user's need to perform operation 1.
在本申请另一实施例中,电子设备上可以包括第一分区、第二分区或第三分区中的任意组合。图14、图15和图16描述的操作控制方法也可以任意组合。例如,一种 操作控制方法包括步骤1401-1405以及步骤1501-1505,另一种操作控制方法包括步骤1501-1505以及步骤1601-1605,另一种操作控制方法包括步骤1401-1405、步骤1501-1505以及步骤1601-1605,本申请实施例不予赘述。In another embodiment of the present application, the electronic device may include any combination of the first partition, the second partition, or the third partition. The operation control methods described in FIG. 14, FIG. 15, and FIG. 16 can also be arbitrarily combined. For example, one operation control method includes steps 1401-1405 and 1501-1505, another operation control method includes steps 1501-1505 and 1601-1605, and another operation control method includes steps 1401-1405 and 1501-150. 1505 and steps 1601-1605 are not described in the embodiment of the present application.
可以理解的是,电子设备为了实现上述功能,其包含了执行各个功能相应的硬件和/或软件模块。结合本文中所公开的实施例描述的各示例的算法步骤,本申请能够以硬件或硬件和计算机软件的结合形式来实现。某个功能究竟以硬件还是计算机软件驱动硬件的方式来执行,取决于技术方案的特定应用和设计约束条件。本领域技术人员可以结合实施例对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。It can be understood that, in order to implement the foregoing functions, the electronic device includes hardware and / or software modules corresponding to performing each function. With reference to the example algorithm steps described in the embodiments disclosed herein, the present application can be implemented in the form of hardware or a combination of hardware and computer software. Whether a certain function is performed by hardware or computer software-driven hardware depends on the specific application of the technical solution and design constraints. Those skilled in the art can use different methods to implement the described functions for each specific application in combination with the embodiments, but such implementation should not be considered to be beyond the scope of the present application.
本实施例可以根据上述方法示例对电子设备进行功能模块的划分,例如,可以对应各个功能划分各个功能模块,也可以将两个或两个以上的功能集成在一个处理模块中。上述集成的模块可以采用硬件的形式实现。需要说明的是,本实施例中对模块的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。In this embodiment, the electronic device may be divided into functional modules according to the foregoing method example. For example, each functional module may be divided corresponding to each function, or two or more functions may be integrated into one processing module. The above integrated modules may be implemented in the form of hardware. It should be noted that the division of the modules in this embodiment is schematic, and is only a logical function division. In actual implementation, there may be another division manner.
在采用对应各个功能划分各个功能模块的情况下,图17示出了上述实施例中涉及的电子设备1700的一种可能的组成示意图,如图17所示,该电子设备1700可以包括:保存单元1701、检测单元1702、处理单元1703和提示单元1704。In a case where each functional module is divided according to each function, FIG. 17 shows a possible composition diagram of the electronic device 1700 involved in the foregoing embodiment. As shown in FIG. 17, the electronic device 1700 may include: a saving unit 1701, a detection unit 1702, a processing unit 1703, and a prompting unit 1704.
在一些实施例中,保存单元1701可以用于支持电子设备1700执行上述步骤501、步骤502等,和/或用于本文所描述的技术的其他过程。In some embodiments, the saving unit 1701 may be used to support the electronic device 1700 to perform the above steps 501, 502, etc., and / or other processes for the techniques described herein.
检测单元1702可以用于支持电子设备1700执行上述步骤1401、步骤1402、步骤1501、步骤1502、步骤1601、步骤1602等,和/或用于本文所描述的技术的其他过程。The detection unit 1702 may be used to support the electronic device 1700 to perform the above steps 1401, 1402, 1501, 1502, 1601, 1602, etc., and / or other processes for the technology described herein.
处理单元1703可以用于支持电子设备1700执行上述步骤1001、步骤1002、步骤1102、步骤1104等,和/或用于本文所描述的技术的其他过程。The processing unit 1703 may be used to support the electronic device 1700 to perform the above steps 1001, 1002, 1102, 1104, etc., and / or other processes used in the technology described herein.
提示单元1704可以用于支持电子设备1700执行上述步骤1101、步骤1103、步骤1403-1405、步骤1503-1505、步骤1603-1605等,和/或用于本文所描述的技术的其他过程。The prompting unit 1704 may be used to support the electronic device 1700 to perform the above steps 1101, 1103, 1403-1405, 1503-1505, 1603-1605, etc., and / or other processes for the technology described herein.
需要说明的是,上述方法实施例涉及的各步骤的所有相关内容均可以援引到对应功能模块的功能描述,在此不再赘述。It should be noted that all relevant content of each step involved in the foregoing method embodiments can be referred to the functional description of the corresponding functional module, and will not be repeated here.
本实施例提供的电子设备1700,用于执行上述操作控制方法或操作控制方法,因此可以达到与上述实现方法相同的效果。The electronic device 1700 provided in this embodiment is configured to execute the foregoing operation control method or operation control method, and therefore, the same effect as the above implementation method can be achieved.
在采用集成的单元的情况下,电子设备1700可以包括处理模块、存储模块和通信模块。其中,处理模块可以用于对电子设备1700的动作进行控制管理,例如,可以用于支持电子设备1700执行上述检测单元1702、处理单元1703和提示单元1704执行的步骤。存储模块可以用于支持电子设备1700执行上述保存单元1701执行的步骤,以及存储程序代码和数据等。通信模块,可以用于支持电子设备1700与其他设备的通信。In the case where an integrated unit is adopted, the electronic device 1700 may include a processing module, a storage module, and a communication module. The processing module may be used to control and manage the actions of the electronic device 1700. For example, the processing module may be used to support the electronic device 1700 to perform the steps performed by the detection unit 1702, the processing unit 1703, and the prompt unit 1704. The storage module may be used to support the electronic device 1700 to execute the steps performed by the saving unit 1701 described above, and to store program code and data. The communication module can be used to support communication between the electronic device 1700 and other devices.
其中,处理模块可以是处理器或控制器。其可以实现或执行结合本申请公开内容所描述的各种示例性的逻辑方框,模块和电路。处理器也可以是实现计算功能的组合,例如包含一个或多个微处理器组合,数字信号处理(digital signal processing,DSP)和微处理器的组合等等。存储模块可以是存储器。通信模块具体可以为射频电路、蓝牙芯片、Wi-Fi芯片等与其他设备交互的设备。The processing module may be a processor or a controller. It may implement or execute various exemplary logical blocks, modules, and circuits described in connection with the present disclosure. The processor may also be a combination that implements computing functions, such as a combination including one or more microprocessors, a combination of digital signal processing (DSP) and a microprocessor, and so on. The memory module may be a memory. The communication module may specifically be a device that interacts with other devices such as a radio frequency circuit, a Bluetooth chip, and a Wi-Fi chip.
在一个实施例中,当处理模块为处理器,存储模块为存储器时,本实施例所涉及的电子设备可以为具有图2和图3所示结构的电子设备。In one embodiment, when the processing module is a processor and the storage module is a memory, the electronic device involved in this embodiment may be an electronic device having a structure shown in FIG. 2 and FIG. 3.
本申请的实施例还提供一种计算机存储介质,该计算机存储介质中存储有计算机指令,当该计算机指令在电子设备上运行时,使得电子设备执行上述相关方法步骤实现上述实施例中的操作控制方法或操作控制方法。An embodiment of the present application further provides a computer storage medium. The computer storage medium stores computer instructions, and when the computer instructions are run on the electronic device, the electronic device is caused to execute the related method steps to implement the operation control in the foregoing embodiment. Method or operation control method.
本申请的实施例还提供了一种计算机程序产品,当该计算机程序产品在计算机上运行时,使得计算机执行上述相关步骤,以实现上述实施例中电子设备执行的操作控制方法或操作控制方法。An embodiment of the present application further provides a computer program product, when the computer program product is run on a computer, the computer is caused to execute the foregoing related steps to implement the operation control method or the operation control method performed by the electronic device in the foregoing embodiment.
另外,本申请的实施例还提供一种装置,这个装置具体可以是芯片,组件或模块,该装置可包括相连的处理器和存储器;其中,存储器用于存储计算机执行指令,当装置运行时,处理器可执行存储器存储的计算机执行指令,以使芯片执行上述各方法实施例中电子设备执行的操作控制方法或操作控制方法。In addition, an embodiment of the present application further provides a device. The device may specifically be a chip, a component, or a module. The device may include a connected processor and a memory. The memory is used to store a computer to execute instructions. When the device is running, The processor may execute computer execution instructions stored in the memory, so that the chip executes the operation control method or the operation control method performed by the electronic device in the foregoing method embodiments.
其中,本实施例提供的电子设备、计算机存储介质、计算机程序产品或芯片均用于执行上文所提供的对应的方法,因此,其所能达到的有益效果可参考上文所提供的对应的方法中的有益效果,此处不再赘述。The electronic device, the computer storage medium, the computer program product, or the chip provided in this embodiment are used to execute the corresponding methods provided above. Therefore, for the beneficial effects that can be achieved, refer to the corresponding ones provided above. The beneficial effects in the method are not repeated here.
通过以上实施方式的描述,所属领域的技术人员可以了解到,为描述的方便和简洁,仅以上述各功能模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能模块完成,即将装置的内部结构划分成不同的功能模块,以完成以上描述的全部或者部分功能。Through the description of the above embodiments, those skilled in the art can understand that, for the convenience and brevity of the description, only the above-mentioned division of the functional modules is used as an example. In practical applications, the above-mentioned functions can be assigned by different The function module is completed, that is, the internal structure of the device is divided into different function modules to complete all or part of the functions described above.
在本申请所提供的几个实施例中,应该理解到,所揭露的装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述模块或单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个装置,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。In the several embodiments provided in this application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the device embodiments described above are only schematic. For example, the division of the modules or units is only a logical function division. In actual implementation, there may be another division manner. For example, multiple units or components may be divided. The combination can either be integrated into another device, or some features can be ignored or not implemented. In addition, the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, which may be electrical, mechanical or other forms.
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是一个物理单元或多个物理单元,即可以位于一个地方,或者也可以分布到多个不同地方。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separated, and the components displayed as units may be one physical unit or multiple physical units, that is, may be located in one place, or may be distributed to multiple different places. . Some or all of the units may be selected according to actual needs to achieve the objective of the solution of this embodiment.
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。In addition, each functional unit in each embodiment of the present application may be integrated into one processing unit, or each of the units may exist separately physically, or two or more units may be integrated into one unit. The above integrated unit may be implemented in the form of hardware or in the form of software functional unit.
所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个可读取存储介质中。基于这样的理解,本申请实施例的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该软件产品存储在一个存储介质中,包括若干指令用以使得一个设备(可以是单片机,芯片等)或处理器(processor)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(read only memory,ROM)、随机存取存储器(random access memory,RAM)、磁碟或者光盘 等各种可以存储程序代码的介质。When the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it may be stored in a readable storage medium. Based on such an understanding, the technical solution of the embodiments of the present application is essentially a part that contributes to the existing technology or all or part of the technical solution may be embodied in the form of a software product that is stored in a storage medium. Included are several instructions for causing a device (which can be a single-chip microcomputer, a chip, etc.) or a processor to execute all or part of the steps of the method described in the embodiments of the present application. The foregoing storage media include: U disks, mobile hard disks, read-only memory (ROM), random access memory (RAM), magnetic disks, or optical disks, which can store program codes.
以上内容,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。The above content is only a specific implementation of this application, but the scope of protection of this application is not limited to this. Any person skilled in the art can easily think of changes or replacements within the technical scope disclosed in this application. Covered within the scope of this application. Therefore, the protection scope of this application shall be subject to the protection scope of the claims.

Claims (17)

  1. 一种操作控制方法,应用于电子设备,其特征在于,所述电子设备上保存有第一数据单元与第一参数信息的对应关系,所述第一参数信息用于表示禁止修改所述第一数据单元,所述第一数据单元为文件或文件夹;所述电子设备上还保存有第二数据单元与第二参数信息的对应关系,所述第二参数信息用于表示禁止删除所述第二数据单元,所述第二数据单元为文件或文件夹;所述方法包括:An operation control method applied to an electronic device, wherein the electronic device stores a correspondence between a first data unit and first parameter information, and the first parameter information is used to indicate that modification of the first data unit is prohibited A data unit, where the first data unit is a file or a folder; the electronic device also stores a correspondence between a second data unit and second parameter information, and the second parameter information is used to indicate that deletion of the first data unit is prohibited Two data units, the second data unit is a file or a folder; the method includes:
    若所述电子设备检测到第一应用程序用于请求执行第一操作的第一请求信息,所述第一操作为修改所述第一数据单元的操作,则所述电子设备根据所述第一数据单元对应的第一参数信息,拒绝执行所述第一操作;If the electronic device detects first request information used by a first application to request a first operation, and the first operation is an operation to modify the first data unit, the electronic device is configured according to the first The first parameter information corresponding to the data unit refuses to perform the first operation;
    若所述电子设备检测到第二应用程序用于请求执行第二操作的第二请求信息,所述第二操作为删除所述第二数据单元的操作,则所述电子设备根据所述第二数据单元对应的第二参数信息,拒绝执行所述第二操作。If the electronic device detects second request information used by the second application to request a second operation, and the second operation is an operation to delete the second data unit, the electronic device is configured according to the second The second parameter information corresponding to the data unit refuses to perform the second operation.
  2. 根据权利要求1所述的方法,其特征在于,在所述电子设备拒绝执行所述第一操作之后,所述方法还包括:The method according to claim 1, wherein after the electronic device refuses to perform the first operation, the method further comprises:
    若所述第一应用程序为特定的应用程序,则所述电子设备提示用户是否对所述第一操作进行授权;If the first application is a specific application, the electronic device prompts the user whether to authorize the first operation;
    若所述电子设备检测到所述用户对所述第一操作进行授权的指示操作,则所述电子设备执行所述第一操作。If the electronic device detects an instruction operation for the user to authorize the first operation, the electronic device executes the first operation.
  3. 根据权利要求1或2所述的方法,其特征在于,在所述电子设备拒绝执行所述第二操作之后,所述方法还包括:The method according to claim 1 or 2, wherein after the electronic device refuses to perform the second operation, the method further comprises:
    若所述第二应用程序为特定的应用程序,则所述电子设备提示用户是否对所述第二操作进行授权;If the second application is a specific application, the electronic device prompts the user whether to authorize the second operation;
    若所述电子设备检测到所述用户对所述第二操作进行授权的指示操作,则所述电子设备执行所述第二操作。If the electronic device detects an instruction operation for the user to authorize the second operation, the electronic device executes the second operation.
  4. 根据权利要求1-3任一项所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 1 to 3, further comprising:
    若所述电子设备检测到第三应用程序用于请求执行所述第一操作的第三操作请求,则所述电子设备根据所述第一数据单元对应的第一参数信息,拒绝执行所述第一操作。If the electronic device detects a third operation request that the third application uses to request the first operation, the electronic device refuses to execute the first operation according to the first parameter information corresponding to the first data unit. One operation.
  5. 根据权利要求1-4任一项所述的方法,其特征在于,所述电子设备上保存有第三数据单元与第三参数信息的对应关系,所述第三参数信息用于表示禁止读取所述第三数据单元,所述第三数据单元为文件或文件夹;The method according to any one of claims 1-4, wherein a correspondence between a third data unit and third parameter information is stored on the electronic device, and the third parameter information is used to indicate that reading is prohibited The third data unit, and the third data unit is a file or a folder;
    若所述电子设备检测到第四应用程序用于请求执行第三操作的第四请求信息,所述第三操作为读取所述第三数据单元的操作,则所述电子设备根据所述第三数据单元对应的第三参数信息,拒绝执行所述第三操作。If the electronic device detects fourth request information used by the fourth application program to request a third operation, and the third operation is an operation of reading the third data unit, the electronic device according to the first The third parameter information corresponding to the three data units refuses to perform the third operation.
  6. 根据权利要求5所述的方法,其特征在于,在所述电子设备根据所述第一数据单元对应的第一参数信息,拒绝执行所述第一操作之前,所述方法还包括:The method according to claim 5, wherein before the electronic device refuses to perform the first operation according to the first parameter information corresponding to the first data unit, the method further comprises:
    所述电子设备在检测到所述用户将所述第一数据单元加入第一分区的操作时,保存所述第一数据单元与所述第一参数信息和所述第二参数信息的对应关系;When detecting that the user adds the first data unit to the first partition, the electronic device saves the correspondence between the first data unit and the first parameter information and the second parameter information;
    在所述电子设备根据所述第二数据单元对应的第二参数信息,拒绝执行所述第二操作之前,所述方法还包括:Before the electronic device refuses to perform the second operation according to the second parameter information corresponding to the second data unit, the method further includes:
    所述电子设备在检测到所述用户将所述第二数据单元加入第二分区的操作时,保存所述第二数据单元与所述第二参数信息的对应关系;When the electronic device detects an operation that the user adds the second data unit to a second partition, the electronic device stores a correspondence between the second data unit and the second parameter information;
    在所述电子设备根据所述第三数据单元对应的第三参数信息,拒绝执行所述第三操作之前,所述方法还包括:Before the electronic device refuses to perform the third operation according to the third parameter information corresponding to the third data unit, the method further includes:
    所述电子设备在检测到所述用户将所述第三数据单元加入第三分区的操作时,保存所述第三数据单元与所述第一参数信息、所述第二参数信息和所述第三参数信息的对应关系。When the electronic device detects an operation that the user adds the third data unit to the third partition, the electronic device saves the third data unit and the first parameter information, the second parameter information, and the first Correspondence between three parameter information.
  7. 根据权利要求6所述的方法,其特征在于,所述方法还包括:The method according to claim 6, further comprising:
    在所述第一分区、所述第二分区或所述第三分区中的数据单元被删除之后,所述电子设备保存删除日志,所述删除日志用于记录被删除的数据单元的删除时间、删除主体以及所述被删除的数据单元的路径;其中,所述删除主体为请求所述删除操作的应用程序。After the data unit in the first partition, the second partition, or the third partition is deleted, the electronic device stores a deletion log, where the deletion log is used to record the deletion time of the deleted data unit, A deletion subject and a path of the deleted data unit; wherein the deletion subject is an application program requesting the deletion operation.
  8. 根据权利要求6或7所述的方法,其特征在于,所述方法还包括:The method according to claim 6 or 7, further comprising:
    在第四数据单元变更分区后,所述电子设备保存分区变更日志,所述分区变更日志包括所述第四数据单元变更分区的时间、所述第四数据单元的路径,变更分区前的位置以及变更分区后的位置;After the fourth data unit changes the partition, the electronic device saves the partition change log, and the partition change log includes the time when the fourth data unit changed the partition, the path of the fourth data unit, the location before the partition was changed, After changing the location;
    其中,所述第四数据单元为文件或文件夹,所述第四数据单元变更分区包括,所述第四数据单元从所述第一分区、所述第二分区和所述第三分区中的其中一个分区变更到另一个分区,或者所述第三数据单元从分区外变更到所述第一分区内、所述第二分区内或所述第三分区内,或者所述第四数据单元从所述第一分区内、所述第二分区内或所述第三分区内变更到分区外。Wherein, the fourth data unit is a file or a folder, and the fourth data unit changes the partition including that the fourth data unit is from the first partition, the second partition, and the third partition. One of the partitions is changed to another partition, or the third data unit is changed from outside the partition to the first partition, the second partition, or the third partition, or the fourth data unit is changed from The inside of the first partition, the inside of the second partition, or the inside of the third partition is changed outside the partition.
  9. 根据权利要求6-8任一项所述的方法,其特征在于,不同分区中的数据单元的显示状态不同,所述显示状态包括所述数据单元的图标的颜色、所述数据单元的图标上的标记、所述数据单元的图标的形状或所述数据单元的图标的透明度中的一个或任意组合。The method according to any one of claims 6 to 8, wherein display states of data units in different partitions are different, and the display states include a color of an icon of the data unit, and an icon on the data unit. One or any combination of a mark of the icon, the shape of the icon of the data unit, or the transparency of the icon of the data unit.
  10. 一种操作控制方法,其特征在于,包括:An operation control method, comprising:
    电子设备检测到用户将第一数据单元加入第一分区的操作,所述第一数据单元为文件或文件夹;The electronic device detects an operation that a user adds a first data unit to a first partition, where the first data unit is a file or a folder;
    所述电子设备检测到所述用户通过第一应用程序修改所述第一数据单元的第一操作;The electronic device detects that the user modifies a first operation of the first data unit through a first application program;
    所述电子设备提示所述用户所述第一操作已被拒绝;The electronic device prompting the user that the first operation has been rejected;
    所述电子设备提示所述用户是否对所述第一操作进行授权。The electronic device prompts the user whether to authorize the first operation.
  11. 根据权利要求10所述的方法,其特征在于,所述方法还包括:The method according to claim 10, further comprising:
    若所述电子设备检测到所述用户对所述第一操作进行授权的指示操作,则所述电子设备提示所述用户所述第一操作已成功执行。If the electronic device detects an instruction operation for the user to authorize the first operation, the electronic device prompts the user that the first operation has been successfully performed.
  12. 根据权利要求10或11所述的方法,其特征在于,所述方法还包括:The method according to claim 10 or 11, further comprising:
    所述电子设备检测到所述用户通过第二应用程序修改所述第一数据单元的第二操作;The electronic device detects that the user modifies a second operation of the first data unit through a second application program;
    所述电子设备提示所述用户所述第二操作已被拒绝。The electronic device prompts the user that the second operation has been rejected.
  13. 根据权利要求10-12任一项所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 10-12, wherein the method further comprises:
    所述电子设备检测到用户将第二数据单元加入第二分区的操作,所述第二数据单位为文件或文件夹;The electronic device detects an operation that a user adds a second data unit to a second partition, and the second data unit is a file or a folder;
    所述电子设备检测到所述用户通过第三应用程序删除所述第二数据单元的第三操作;The electronic device detects a third operation that the user deletes the second data unit through a third application program;
    所述电子设备提示所述用户所述第三操作已被拒绝;The electronic device prompts the user that the third operation has been rejected;
    所述电子设备提示所述用户是否对所述第三操作进行授权;The electronic device prompting the user whether to authorize the third operation;
    若所述电子设备检测到所述用户对所述第三操作进行授权的指示操作,则所述电子设备提示所述用户所述第三操作已成功执行。If the electronic device detects an instruction operation for the user to authorize the third operation, the electronic device prompts the user that the third operation has been successfully performed.
  14. 根据权利要求10-13任一项所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 10-13, wherein the method further comprises:
    所述电子设备检测到用户将第三数据单元加入第三分区的操作,所述第三数据单元为文件或文件夹;The electronic device detects a user's operation of adding a third data unit to a third partition, and the third data unit is a file or a folder;
    所述电子设备检测到所述用户通过第四应用程序读取所述第三数据单元的第四操作;The electronic device detects a fourth operation that the user reads the third data unit through a fourth application program;
    所述电子设备提示所述用户所述第四操作已被拒绝;The electronic device prompting the user that the fourth operation has been rejected;
    所述电子设备提示所述用户是否对所述第四操作进行授权;The electronic device prompting the user whether to authorize the fourth operation;
    若所述电子设备检测到所述用户对所述第四操作进行授权的指示操作,则所述电子设备提示所述用户所述第四操作已成功执行。If the electronic device detects an instruction operation for the user to authorize the fourth operation, the electronic device prompts the user that the fourth operation has been successfully performed.
  15. 一种电子设备,其特征在于,包括一个或多个处理器和一个或多个存储器;An electronic device, comprising one or more processors and one or more memories;
    所述一个或多个存储器与所述一个或多个处理器耦合,所述一个或多个存储器用于存储计算机程序代码,所述计算机程序代码包括计算机指令,当所述一个或多个处理器执行所述计算机指令时,所述电子设备执行如权利要求1-14任一项所述的操作控制方法。The one or more memories are coupled to the one or more processors, and the one or more memories are configured to store computer program code, where the computer program code includes computer instructions, and when the one or more processors When the computer instruction is executed, the electronic device executes the operation control method according to any one of claims 1-14.
  16. 一种计算机存储介质,其特征在于,包括计算机指令,当所述计算机指令在电子设备上运行时,使得所述电子设备执行如权利要求1-14任一项所述的操作控制方法。A computer storage medium includes computer instructions, and when the computer instructions are run on an electronic device, the electronic device is caused to execute the operation control method according to any one of claims 1-14.
  17. 一种计算机程序产品,其特征在于,当所述计算机程序产品在计算机上运行时,使得所述计算机执行如权利要求1-14任一项所述的操作控制方法。A computer program product, characterized in that when the computer program product is run on a computer, the computer is caused to execute the operation control method according to any one of claims 1-14.
PCT/CN2018/108898 2018-09-29 2018-09-29 Operation control method and electronic device WO2020062192A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2018/108898 WO2020062192A1 (en) 2018-09-29 2018-09-29 Operation control method and electronic device
CN201880085310.4A CN111566632B (en) 2018-09-29 2018-09-29 Operation control method and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/108898 WO2020062192A1 (en) 2018-09-29 2018-09-29 Operation control method and electronic device

Publications (1)

Publication Number Publication Date
WO2020062192A1 true WO2020062192A1 (en) 2020-04-02

Family

ID=69952656

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/108898 WO2020062192A1 (en) 2018-09-29 2018-09-29 Operation control method and electronic device

Country Status (2)

Country Link
CN (1) CN111566632B (en)
WO (1) WO2020062192A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114019810A (en) * 2021-11-04 2022-02-08 安天科技集团股份有限公司 Intelligent home routing anti-intrusion method, intelligent control terminal and intelligent home equipment
CN115017534B (en) * 2021-11-05 2023-08-29 荣耀终端有限公司 File processing authority control method, device and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102254124A (en) * 2011-07-21 2011-11-23 周亮 Information security protecting system and method of mobile terminal
CN103136472A (en) * 2011-11-29 2013-06-05 腾讯科技(深圳)有限公司 Method and mobile device of stopping application program to steal privacy
CN106503586A (en) * 2016-11-18 2017-03-15 北京奇虎科技有限公司 A kind of method for processing application file and mobile communication terminal

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9361243B2 (en) * 1998-07-31 2016-06-07 Kom Networks Inc. Method and system for providing restricted access to a storage medium
KR101098947B1 (en) * 2009-02-03 2011-12-28 김상범 Method and apparatus for data security, and recording medium storing program to implement the method
CN102955746A (en) * 2011-08-18 2013-03-06 北京爱国者信息技术有限公司 Read-only mode mobile storage device and data access method thereof
CN105138564A (en) * 2015-07-23 2015-12-09 小米科技有限责任公司 Data file reading method and apparatus
KR20170024860A (en) * 2015-08-26 2017-03-08 엘지전자 주식회사 Digital device and method for processing data the same
CN106446682A (en) * 2016-06-24 2017-02-22 北京壹人壹本信息科技有限公司 Security protection method and apparatus
US11226929B2 (en) * 2016-09-14 2022-01-18 International Business Machines Corporation WORM data falsification detection
CN107153792B (en) * 2017-04-06 2020-07-24 北京安云世纪科技有限公司 Data security processing method and device and mobile terminal
CN107622203B (en) * 2017-09-30 2020-12-22 Oppo广东移动通信有限公司 Sensitive information protection method and device, storage medium and electronic equipment
CN108256351B (en) * 2018-01-08 2020-08-04 网易(杭州)网络有限公司 File processing method and device, storage medium and terminal
CN108549576A (en) * 2018-04-19 2018-09-18 Oppo广东移动通信有限公司 File monitor method, apparatus, electronic equipment and storage medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102254124A (en) * 2011-07-21 2011-11-23 周亮 Information security protecting system and method of mobile terminal
CN103136472A (en) * 2011-11-29 2013-06-05 腾讯科技(深圳)有限公司 Method and mobile device of stopping application program to steal privacy
CN106503586A (en) * 2016-11-18 2017-03-15 北京奇虎科技有限公司 A kind of method for processing application file and mobile communication terminal

Also Published As

Publication number Publication date
CN111566632B (en) 2023-11-03
CN111566632A (en) 2020-08-21

Similar Documents

Publication Publication Date Title
US11947974B2 (en) Application start method and electronic device
EP3913516B1 (en) File access authority authentication method and electronic device
CN111191213B (en) Method for deleting security service and electronic equipment
WO2020150917A1 (en) Application permission management method and electronic device
CN113032766B (en) Application authority management method and device
WO2022262439A1 (en) Network resource processing method, electronic device, and computer-readable storage medium
WO2020107463A1 (en) Electronic device control method and electronic device
WO2020062192A1 (en) Operation control method and electronic device
CN112262548B (en) File processing method and terminal equipment
EP4095723B1 (en) Permission reuse method, permission reuse-based resource access method, and related device
CN115879088A (en) Authority checking method and electronic equipment
CN115481444B (en) File protection method and electronic equipment
CN113468606A (en) Application program access method and electronic equipment
CN114048469B (en) Directory operation management method, electronic device and readable storage medium
WO2022166502A1 (en) Data protection method and system, and medium and electronic device
US20230350738A1 (en) Method for Reusing Shared Library and Electronic Device
CN113496039A (en) Authority management method and terminal
CN115017473B (en) Authorization method and electronic equipment
CN115828227B (en) Method for identifying advertisement popup, electronic equipment and storage medium
WO2023185881A1 (en) Application program permission management method, system, and related apparatus
WO2024078412A1 (en) Cross-screen sharing method, graphical interface, and related apparatus
CN115981576B (en) Method for sharing data, electronic device and storage medium
WO2023061298A1 (en) Picture backup system and method, and device
WO2024046184A1 (en) File management and application management method, and electronic device
CN117707753A (en) Resource update control method, electronic equipment and chip system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18935407

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18935407

Country of ref document: EP

Kind code of ref document: A1