CN103024558A - Television camera privacy security protection method and system - Google Patents

Television camera privacy security protection method and system Download PDF

Info

Publication number
CN103024558A
CN103024558A CN2012104519795A CN201210451979A CN103024558A CN 103024558 A CN103024558 A CN 103024558A CN 2012104519795 A CN2012104519795 A CN 2012104519795A CN 201210451979 A CN201210451979 A CN 201210451979A CN 103024558 A CN103024558 A CN 103024558A
Authority
CN
China
Prior art keywords
stack top
camera
top process
application
authority
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012104519795A
Other languages
Chinese (zh)
Other versions
CN103024558B (en
Inventor
张晋源
王鑫
王源
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201210451979.5A priority Critical patent/CN103024558B/en
Publication of CN103024558A publication Critical patent/CN103024558A/en
Application granted granted Critical
Publication of CN103024558B publication Critical patent/CN103024558B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Studio Devices (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a television camera privacy security protection method and a system. The television camera privacy security protection method comprises the following steps of: monitoring an application stack list corresponding to the current running application program of an intelligent television installed with an operating system in real time; obtaining a stack top progress from the application stack list; determining whether the stack top progress registers the authority for operating a camera; if the stack top progress registers the authority for operating the camera, judging whether the stack top progress is legal according to a blacklist and/or a white list; and if the stack top progress is illegal, stopping the stack top progress from running. By the method and the system, the video privacy security of a user using the intelligent television can be improved.

Description

Telephotography personal secrets guard method and system
Technical field
The present invention relates to the intelligent television technical field, be specifically related to a kind of telephotography personal secrets guard method and system.
Background technology
As everyone knows, the display mode of liquid crystal TV set is identical with the display mode of computer monitor, and this is that the high definition of digital multimedia content, especially computword shows and to provide the foundation.For this reason, intelligent television has appearred.So-called intelligent television refers to have the full open model platform, carried the TV of operation control system and application system, the user can install and unload types of applications software voluntarily when appreciating the common TV content, continue the new tv product that function is expanded and upgrades.
At present, intelligent television on the market adopts Android (Android) operating system mostly, can support portable hard drive, USB flash disk, the first-class external equipment of shooting, and can carry out data transfer by network.
Because above-mentioned these characteristics of intelligent television; so that the secret protection of intelligent television, especially video secret protection seem even more important; because in case intelligent television has been gone up the long-range trojan horse program of usurping camera by kind; the health of not only user's data, and user, every act and every move all can be completely exposed.
Summary of the invention
In view of the above problems, the invention provides a kind of telephotography personal secrets guard method and system, to improve the fail safe of user's video privacy when using intelligent television.
According to one aspect of the present invention, a kind of telephotography personal secrets guard method is provided, the method comprises:
The application stack tabulation that the application program of the current operation of the intelligent television of Real-Time Monitoring lift-launch operating system is corresponding;
From described application stack tabulation, obtain the stack top process;
Check whether described stack top process has registered the authority of operation camera;
If registered the authority of operation camera, then determined according to blacklist and/or white list whether described stack top process is legal;
If described stack top process is illegal, then stop described stack top process operation.
Preferably, application stack tabulation corresponding to the application program of the current operation of the described intelligent television of described Real-Time Monitoring comprises:
The screen management device interface that utilizes the SDK of described operating system to provide, the application stack tabulation that the application program of the current operation of the described intelligent television of Real-time Obtaining is corresponding.
Preferably, describedly determine whether described stack top process has been registered the authority of operation camera and comprised:
Obtain application bag name corresponding to described stack top process;
Whether the stack top process that the package manager interface that utilizes the SDK of described operating system to provide determines to have described application bag name has registered the authority of operation camera.
Preferably, described application bag name corresponding to described stack top process of obtaining comprises:
Utilize the method in the package manager interface that described SDK provides to obtain application bag name corresponding to described stack top process.
Preferably, the package manager interface that provides of the described SDK that the utilizes described operating system stack top process of determining the to have described application bag name authority of whether having registered the operation camera comprises:
Import operation camera authority and the described application bag name that needs inspection into to the scope check method of described package manager interface;
The result who returns according to described scope check method determines whether the stack top process with described application bag name has registered the authority that operates camera.
Alternatively, describedly determine described stack top process legal comprising whether according to blacklist and/or white list:
Utilize local built-in blacklist and/or white list to carry out this locality and check, determine whether described stack top process is legal; And/or
Utilize blacklist and/or white list on the server to carry out long-range inspection, determine whether described stack top process is legal.
Preferably, described method also comprises:
If described stack top process is legal, then from described application stack tabulation, obtain other process successively;
Determine according to described blacklist and/or white list whether other process of obtaining is legal;
If described other process is illegal, then stop described other process operation.
Preferably, described method also comprises:
If can't determine whether described stack top process or described other process be legal, then the user carried out suspicious program prompts.
Preferably, describedly the user is carried out suspicious program prompts comprise: the prompting user current process has the purpose of operation camera, and ejects dialog box, whether uses camera by user selection;
Correspondingly, described method also comprises:
If receive the instruction that user selection uses camera, then move described stack top process or described other process;
If receive the instruction that user selection does not use camera, then stop described stack top process or described other process operation.
Preferably, described method also comprises:
When stoping described stack top process operation or stoping described other process operation, the prompting user current process is dangerous, and ejects dialog box, whether unloads current process by user selection;
If user selection unloading current process then guides the user to unload current process;
If user selection does not unload current process, then current process is locked.
Preferably, described method also comprises:
If can't determine whether described stack top process or described other process be legal, then when described stack top process or described other process requested video data, the video flowing that will come from described camera replaces with the replacement data that presets and sends to described stack top process or described other process, and the ejection dialog box, whether use camera by user selection;
After the instruction that receives user selection use camera, stop replacement operation.
According to a further aspect in the invention, provide a kind of telephotography personal secrets protection system, this system comprises:
Monitoring means is used for the application stack tabulation corresponding to application program of current operation that Real-Time Monitoring carries the intelligent television of operating system;
The process acquiring unit is used for obtaining the stack top process from described application stack tabulation;
The scope check unit is used for checking whether described stack top process has registered the authority of operation camera;
The validity checking unit is used for determining according to blacklist and/or white list whether described stack top process is legal after described scope check unit determines that described stack top process has been registered the authority of operation camera;
Stop the unit, be used for after described validity checking unit determines that described stack top process is illegal, stop described stack top process operation.
Preferably, described monitoring means, the screen management device interface that concrete SDK for utilizing described operating system provides obtains the application stack corresponding to application program of the current operation of described intelligent television and tabulates.
Preferably, described scope check unit comprises:
The bag name is obtained subelement, is used for obtaining application bag name corresponding to described stack top process;
Authority is determined subelement, determines for the package manager interface that the SDK that utilizes described operating system provides whether the stack top process with described application bag name has registered the authority that operates camera.
Preferably, described bag name is obtained subelement, and the concrete package manager interface that is used for utilizing described SDK to provide obtains application bag name corresponding to described stack top process.
Preferably, described authority is determined subelement, concrete being used for imported operation camera authority and the described application bag name that needs inspection into to the scope check method of described package manager interface, and the result who returns according to described scope check method determines whether the stack top process with described application bag name has registered the authority that operates camera.
Alternatively, institute validity checking unit comprises:
The local subelement that checks is used for utilizing local built-in blacklist and/or white list to carry out this locality and checks, determines whether described stack top process is legal; And/or
Long-range inspection subelement is used for utilizing blacklist and/or white list on the server to carry out long-range inspection, determines whether described stack top process is legal.
Preferably, described system also comprises:
Described process acquiring unit also is used for after described validity checking unit determines that described stack top process is legal, obtains other process successively from described application stack tabulation;
Described validity checking unit also is used for determining according to described blacklist and/or white list whether other process that described process acquiring unit obtains is legal;
Described prevention unit also is used for after described validity checking unit determines that described other process is illegal, stops described other process operation.
Preferably, described system also comprises:
The first Tip element when being used for can't determining in described validity checking unit that described stack top process or described other process be whether legal, carries out suspicious program prompts to the user.
Preferably, described the first Tip element specifically is used for the purpose that the prompting user current process has the operation camera, and ejects dialog box, so that whether user selection uses camera;
Described system also comprises:
The command reception unit is used for receiving the instruction whether user selection uses camera;
The operation unit is used for moving described stack top process or described other process after described command reception unit receives the instruction of user selection use camera;
Described prevention unit also is used for stoping described stack top process or described other process operation after described command reception unit receives the instruction that user selection do not use camera.
Preferably, described Tip element, when also being used for stoping in described prevention unit described stack top process operation or stoping described other process operation, the prompting user current process is dangerous, and ejects dialog box, whether unloads current process by user selection;
Correspondingly, described command reception unit also is used for receiving the instruction that is used for selecting whether to unload current process;
Correspondingly, described system also comprises:
Unloading unit is used for after described command reception unit receives user selection unloading current process, and the guiding user unloads current process;
Add lock unit, be used for after described command reception unit receives user selection and do not unload current process, current process being locked.
Preferably, described system also comprises:
The video flowing control unit, be used for to determine in described validity checking unit whether described stack top process or described other process be legal, and when described stack top process or described other process requested video data, the video flowing that will come from described camera replaces with the replacement data that presets and sends to described stack top process or described other process;
The second Tip element, be used for to determine in described validity checking unit whether described stack top process or described other process be legal, and when described stack top process or described other process requested video data, eject dialog box, so that whether user selection uses camera;
The command reception unit is used for receiving the instruction whether user selection uses camera;
Described video flowing control unit also is used for stopping replacement operation after described command reception unit receives the instruction of user selection use camera.
Telephotography of the present invention personal secrets guard method and system; the application stack tabulation corresponding to application program of current operation of can Real-Time Monitoring carrying the intelligent television of operating system; to using the stack top process in the stack tabulation; check whether it has registered the authority of operation camera; if registered the authority of operation camera; then further determine according to blacklist and/or white list whether described stack top process is legal, if described stack top process is illegal, then stop described stack top process operation.Realized thus monitoring that user's camera is called effectively having prevented the privacy of user leakage.
Above-mentioned explanation only is the general introduction of technical solution of the present invention, for can clearer understanding technological means of the present invention, and can be implemented according to the content of specification, and for above and other objects of the present invention, feature and advantage can be become apparent, below especially exemplified by the specific embodiment of the present invention.
Description of drawings
By reading hereinafter detailed description of the preferred embodiment, various other advantage and benefits will become cheer and bright for those of ordinary skills.Accompanying drawing only is used for the purpose of preferred implementation is shown, and does not think limitation of the present invention.And in whole accompanying drawing, represent identical parts with identical reference symbol.In the accompanying drawings:
Fig. 1 shows the flow chart of an according to an embodiment of the invention telephotography personal secrets guard method;
Fig. 2 shows another flow chart of an according to an embodiment of the invention telephotography personal secrets guard method;
Fig. 3 shows another flow chart of an according to an embodiment of the invention telephotography personal secrets guard method;
Fig. 4 shows the structural representation of an according to an embodiment of the invention telephotography personal secrets protection system;
Fig. 5 shows another structural representation of an according to an embodiment of the invention telephotography personal secrets protection system;
Fig. 6 shows another structural representation of an according to an embodiment of the invention telephotography personal secrets protection system.
Embodiment
Exemplary embodiment of the present disclosure is described below with reference to accompanying drawings in more detail.Although shown exemplary embodiment of the present disclosure in the accompanying drawing, yet should be appreciated that and to realize the disclosure and the embodiment that should do not set forth limits here with various forms.On the contrary, it is in order to understand the disclosure more thoroughly that these embodiment are provided, and can with the scope of the present disclosure complete convey to those skilled in the art.
Main characteristics of intelligent television are to have carried operating system, and have open platform, make the user not only can watch the common TV content, but also can install voluntarily and unload types of applications software.Therefore, the protection of the camera personal secrets of intelligent television is even more important.
For the demand; the embodiment of the invention provides a kind of telephotography personal secrets guard method and system; carry the application stack tabulation corresponding to application program of current operation of the intelligent television of operating system by Real-Time Monitoring; to using the stack top process in the stack tabulation; check whether it has registered the authority of operation camera; if registered the authority of operation camera; then further determine according to blacklist and/or white list whether described stack top process is legal; if described stack top process is illegal; then stop described stack top process operation; thereby realized monitoring that user's camera is called, effectively prevented the privacy of user leakage.
As shown in Figure 1, be the flow chart of an according to an embodiment of the invention telephotography personal secrets guard method.
The method may further comprise the steps:
Step 101, the application stack tabulation that the application program of the current operation of the intelligent television of Real-Time Monitoring lift-launch operating system is corresponding.
Because no matter which kind of operating system intelligent television carry, when the application program operation of its installation, all can be recorded in process that should application program and to use in the stack tabulation.Described process is the running example of application program, is a Dynamic Execution of application program, it can be interpreted as simply the executive program of the current operation of operating system.In the executive program of the current operation of system, comprise: system management intelligent television and finish the necessary program of various operations; The additional programs that the user opens, carries out comprises also that certainly the user does not know, and the illegal program that automatically moves.
Therefore, by the described application stack tabulation of Real-Time Monitoring, can obtain all processes of current operation.And when each application program was moved first, its corresponding process all can be recorded in the stack top of using the stack tabulation.
Particularly, the screen management device interface that can utilize the SDK (SDK, Software Development Kit) of described operating system to provide by the background service program, the described application stack tabulation of Real-time Obtaining.
Such as, for the intelligent television that carries Android operating system, can by the getRunningTasks method of ActivityManager, obtain and use the stack tabulation.
Step 102 is obtained the stack top process from described application stack tabulation.
Extract first data in the described application stack tabulation, be the stack top process.
Step 103 checks whether described stack top process has registered the authority of operation camera.
When the stack top process is carried out scope check, can at first obtain application bag name corresponding to described stack top process, particularly, can utilize the method in the package manager interface that SDK provides to obtain application bag name corresponding to described stack top process.Then the package manager interface that utilizes SDK to provide determines whether the stack top process with described application bag name has registered the authority that operates camera.
Such as, for the intelligent television that carries Android operating system, the stack top that can utilize SDK to provide is used the getPackageName method of topActivity attribute and is obtained current application bag name.Then, with the application bag name that obtains and the operation camera authority that needs to check import checkPermission method in the PackageManager interface that SDK provides into, whether the stack top process that the result who returns according to the checkPermission method can determine to have described application bag name has registered the authority of operation camera.
Need to prove, whether each process has the authority of operation camera, be to register to described operating system when application and development corresponding to this process, if the registered authority of operation camera, then the checkPermission method will normally be returned.
Step 104 if registered the authority of operation camera, then determines according to blacklist and/or white list whether described stack top process is legal.
If the authority of operation camera has been registered in certain application, illustrate that this application can call camera.For the operating system with open platform, as long as any application can operate the authority of camera based on this operating system to described operating system registration when exploitation.That is to say, the authority of operation camera has been registered in certain application, and then this application just may operate camera, and no matter this application is legal or illegal.
Therefore, in embodiments of the present invention, as long as detect the authority that the stack top process has been registered the operation camera, in order to guarantee the personal secrets of camera, also will be further according to blacklist or white list or set up simultaneously black and white lists, determine whether described stack top process legal.
Certainly, if certain uses the authority of registration operation camera, then this application can not called camera, that is to say operation that can the executable operations camera.Therefore, if detect the authority that the stack top process is not registered the operation camera, can let slip this process, namely this process not intervened, make its normal operation.
Need to prove, above-mentioned blacklist and/or white list need to be collected the sample of some and set up in advance.Above-mentioned blacklist and/or white list can be kept at intelligent television this locality, also can be kept on the server.Therefore, in actual applications, can utilize local built-in blacklist and/or white list to carry out this locality and check, determine whether described stack top process is legal; Also can utilize blacklist and/or white list on the server to carry out long-range inspection, determine whether described stack top process is legal.Certainly, also can utilize simultaneously local built-in blacklist and/or the blacklist on white list and the server and/or white list respectively described stack top to be carried out validity checking.
Need to prove, if only adopting local built-in blacklist and/or white list that the stack top process is carried out this locality checks, then local built-in blacklist and/or white list need to server on up-to-date blacklist and/or white list keep synchronously, in a single day blacklist on the server and/or white list have renewal, then real-time synchronization is local to intelligent television, the concrete method of synchronization can adopt intelligent television request mode or server active push mode, and this embodiment of the invention is not done restriction.
Certainly, in the situation that all preserve above-mentioned blacklist and/or white list on intelligent television this locality and the server, when the stack top process is carried out validity checking, also can check at first whether local built-in blacklist and/or white list is latest edition by intelligent television, such as, its version information is uploaded to server, and server returns corresponding information to intelligent television.If latest edition is then only carried out this locality inspection, otherwise, carry out long-range inspection.
Above-mentioned blacklist and/or the white list of utilizing determined whether legal process of described stack top process, with to utilize virus base to carry out the process of virus filtration in the prior art similar, is not described in detail at this.
Step 105 if described stack top process is illegal, then stops described stack top process operation.
A telephotography of the present invention personal secrets guard method; carry the application stack tabulation corresponding to application program of current operation of the intelligent television of operating system by Real-Time Monitoring; to using the stack top process in the stack tabulation; check whether it has registered the authority of operation camera; if registered the authority of operation camera; then further determine according to blacklist and/or white list whether described stack top process is legal, if described stack top process is illegal, then stop described stack top process operation.Realized thus monitoring that user's camera is called effectively having prevented the privacy of user leakage.
Because the use of camera can have dual mode: a kind of is that the camera that directly creates is used, and another is that other application call camera is used.
Camera to above-mentioned first kind of way is used, and can by flow process shown in Figure 1, guarantee the fail safe that camera is used.
Camera for the above-mentioned second way is used, can whether legal by checking other process (being non-stack top process) in the described application stack tabulation, guarantee the fail safe that camera is used.Particularly, if described stack top process is legal, then from described application stack tabulation, obtain other process successively, then, determine according to described blacklist and/or white list whether other process of obtaining is legal, if illegal, then described other process operation of same prevention.Like this, can further guarantee the fail safe that the different modes camera is used.
As shown in Figure 2, be another flow chart of an according to an embodiment of the invention telephotography personal secrets guard method.
Wherein, step 201 is identical with flow process shown in Figure 1 to step 205, is specially:
Step 201, the application stack tabulation that the application program of the current operation of the intelligent television of Real-Time Monitoring lift-launch operating system is corresponding.
Step 202 is obtained the stack top process from described application stack tabulation.
Step 203 checks whether described stack top process has registered the authority of operation camera.
Step 204 if registered the authority of operation camera, then determines according to blacklist and/or white list whether described stack top process is legal.If illegal, then execution in step 205; If legal, then execution in step 206; If whether can not determine legal, then execution in step 207.
Can not determine whether the stack top process is legal, refer to that application corresponding to described stack top process not in black, white list, in this case, can not determine accurately that this application is Secure Application or hazardous applications.
Step 205 stops described stack top process operation.
From shown in Figure 1 different be, in this embodiment, further comprising the steps of:
Step 206 is normally moved described stack top process.
Step 207 is carried out suspicious program prompts to the user.
Wherein, it can be the purpose that the prompting user current process has the operation camera that the user is carried out suspicious program prompts, and ejects dialog box, whether uses camera by user selection.
Step 208 if receive the instruction that user selection uses camera, is then moved described stack top process or described other process; If receive the instruction that user selection does not use camera, then stop described stack top process or described other process operation.
Bring potential safety hazard for fear of some dangerous processes to user's intelligent television, in actual applications, can also be when stoping described stack top process operation or stoping described other process operation, further the prompting user current process is dangerous, and the ejection dialog box, whether unload current process by user selection; If user selection unloading current process then guides the user to unload current process; If user selection does not unload current process, then current process is locked.Like this, the guiding user finishes the cleaning of dangerous process, has avoided some potential potential safety hazards.Owing to whether unloading current process selected by the user fully, therefore also can not unload by force the more needed processes of user, both guaranteed the safety of camera privacy, convenient for users to use again.
Need to prove, above-mentioned steps 207 is to the process of step 208, and when quoting process that the user unloads current process and being equally applicable to that non-stack top process carried out validity checking, can't determine whether legal situation of corresponding process.
As shown in Figure 3, be another flow chart of an according to an embodiment of the invention telephotography personal secrets guard method.
Wherein, step 301 is identical with flow process shown in Figure 1 to step 305, is specially:
Step 301, the application stack tabulation that the application program of the current operation of the intelligent television of Real-Time Monitoring lift-launch operating system is corresponding.
Step 302 is obtained the stack top process from described application stack tabulation.
Step 303 checks whether described stack top process has registered the authority of operation camera.
Step 304 if registered the authority of operation camera, then determines according to blacklist and/or white list whether described stack top process is legal.If illegal, then execution in step 305; If legal, then execution in step 306; If whether can not determine legal, then execution in step 307.
Can not determine whether the stack top process is legal, refer to that application corresponding to described stack top process not in black, white list, in this case, can not determine accurately that this application is Secure Application or hazardous applications.
Step 305 then stops described stack top process operation.
From shown in Figure 1 different be, in this embodiment, further comprising the steps of:
Step 306 is normally moved described stack top process.
Step 307, when described stack top process requested video data, the video flowing that will come from described camera replaces with the replacement data that presets and sends to described stack top process, and ejects dialog box, whether uses camera by user selection.
Step 308 after the instruction that receives user selection use camera, stops replacement operation.
Need to prove, above-mentioned steps 307 is to the process of step 308, when being equally applicable to that non-stack top process carried out validity checking, can't determine whether legal situation of corresponding process.
The telephotography of this an embodiment personal secrets guard method; in the situation that can't determine according to blacklist and/or white list whether stack top process and other non-stack top process be legal; replace with the replacement data (such as image data) that presets by the video data with corresponding process requested; rather than directly the video flowing of camera is sent to corresponding process; and the ejection dialog box, whether use camera by user selection.Thereby guaranteed equally the safety of camera privacy.
This shows that the telephotography of an embodiment of the invention personal secrets guard method can prevent effectively that the telephotography head from by illegal applications exploiting, having strengthened user's personal secrets greatly.User's automatically early warning when using camera is illegally used, help the user to strengthen the camera secret protection.Need to prove, the telephotography of an embodiment of the invention personal secrets guard method can be applied to carry the intelligent television of various different operating systems, prevents that privacy of user from leaking by camera.
Correspondingly, the embodiment of the invention also provides a kind of telephotography personal secrets protection system, as shown in Figure 4, is a kind of structural representation of this system.
In this embodiment, described system comprises: monitoring means 401, process acquiring unit 402, scope check unit 403, validity checking unit 404 and prevention unit 405.Wherein:
Monitoring means 401 is for application stack tabulation corresponding to the application program of the current operation of the intelligent television of Real-Time Monitoring lift-launch operating system.Particularly, the screen management device interface that can utilize the SDK of described operating system to provide, the described application stack tabulation of Real-time Obtaining.Such as, for the intelligent television that carries Android operating system, can by the getRunningTasks method of ActivityManager, obtain and use the stack tabulation.
Process acquiring unit 402 is used for obtaining the stack top process from the application stack tabulation that monitoring means 401 gets access to, and described stack top process is exactly to be arranged in first data of using the stack tabulation.
Scope check unit 403 is used for checking whether described stack top process has registered the authority of operation camera.
Scope check unit 403 is when carrying out scope check to the stack top process, can at first obtain application bag name corresponding to described stack top process, the package manager interface that then utilizes SDK to provide determines whether the stack top process with described application bag name has registered the authority that operates camera.
For this reason, a kind of implementation of above-mentioned scope check unit 403 can comprise: the bag name obtains subelement and authority is determined subelement.Wherein:
Described bag name is obtained subelement and is used for obtaining application bag name corresponding to described stack top process, particularly, can utilize the method in the package manager interface that SDK provides to obtain application bag name corresponding to described stack top process.Such as, for the intelligent television that carries Android operating system, the stack top that can utilize SDK to provide is used the getPackageName method of topActivity attribute and is obtained current application bag name.
Described authority determines that package manager interface that subelement is used to utilize the SDK of described operating system to provide determines to have the authority whether the stack top process of described application bag name has registered the operation camera.Such as, for the intelligent television that carries Android operating system, described authority determines that subelement obtains the application bag name that subelement obtains with described bag name and the operation camera authority that needs to check is imported checkPermission method in the PackageManager interface that SDK provides into, and whether the stack top process that the result who returns according to the checkPermission method can determine to have described application bag name has registered the authority of operation camera.
Validity checking unit 404 is used for determining according to blacklist and/or white list whether described stack top process is legal after described scope check unit determines that described stack top process has been registered the authority of operation camera.
If the authority of operation camera has been registered in certain application, illustrate that this application can call camera.For the operating system with open platform, as long as any application can operate the authority of camera based on this operating system to described operating system registration when exploitation.That is to say, the authority of operation camera has been registered in certain application, and then this application just may operate camera, and no matter this application is legal or illegal.
Therefore, in embodiments of the present invention, as long as scope check unit 403 detects the authority that the stack top process has been registered the operation camera, in order to guarantee the personal secrets of camera, also need validity checking unit 404 to determine further according to blacklist and/or white list whether the stack top process is legal.
Certainly, if certain uses the authority of registration operation camera, then this application can not called camera, that is to say operation that can the executable operations camera.Therefore, if scope check unit 403 detects the authority that the stack top process is not registered the operation camera, can let slip this process, namely this process not intervened, make its normal operation.
Need to prove, above-mentioned blacklist and/or white list need to set up in advance, and can be kept at intelligent television this locality, also can be kept on the server.
For this reason, a kind of preferred implementation of above-mentioned validity checking unit 404 can comprise: local subelement and/or the long-range inspection subelement of checking.Wherein:
The described local subelement that checks checks for utilizing local built-in blacklist and/or white list to carry out this locality, determines whether described stack top process is legal;
Described long-range inspection subelement is used for utilizing blacklist and/or white list on the server to carry out long-range inspection, determines whether described stack top process is legal.
Need to prove, in the situation that validity checking unit 404 includes only the described local subelement that checks, local built-in blacklist and/or white list need to server on up-to-date blacklist and/or white list keep synchronously, in a single day blacklist on the server and/or white list have renewal, then real-time synchronization is local to intelligent television, the concrete method of synchronization can adopt intelligent television request mode or server active push mode, and this embodiment of the invention is not done restriction.
Need to prove in addition, in the situation that validity checking unit 404 comprises described local subelement and the described long-range inspection subelement of checking simultaneously, when the stack top process is carried out validity checking, also can check by this locality whether local built-in blacklist and/or the white list of subelement inspection is latest edition first, such as, its version information is uploaded to server, and server returns corresponding information to intelligent television.If latest edition is then only carried out this locality inspection, otherwise, by described long-range inspection subelement the relevant information of described stack top process is uploaded onto the server again and carry out long-range inspection.
Stop unit 405 to be used for after described validity checking unit determines that described stack top process is illegal, stop described stack top process operation.
A telephotography of the present invention personal secrets protection system; carry the application stack tabulation corresponding to application program of current operation of the intelligent television of operating system by Real-Time Monitoring; to using the stack top process in the stack tabulation; check whether it has registered the authority of operation camera; if registered the authority of operation camera; then further determine according to blacklist and/or white list whether described stack top process is legal, if described stack top process is illegal, then stop described stack top process operation.Realized thus monitoring that user's camera is called effectively having prevented the privacy of user leakage.
Because the use of camera can have dual mode: a kind of is that the camera that directly creates is used, and another is that other application call camera is used.
Therefore, the potential safety hazard of bringing for fear of other application call camera, in embodiments of the present invention, described process acquiring unit 402 also is used for after described validity checking unit 404 determines that described stack top process is legal, obtains other process successively from described application stack tabulation.
Correspondingly, described validity checking unit 404 also is used for determining according to described blacklist and/or white list whether other process that described process acquiring unit 402 obtains is legal.
Correspondingly, described prevention unit 405 also is used for after described validity checking unit 404 determines that described other process is illegal, stops described other process operation.
As seen, by to using the inspection of non-stack top process in the stack tabulation, further guaranteed the fail safe that the different modes camera is used.
As shown in Figure 5, be another structural representation of an according to an embodiment of the invention telephotography personal secrets protection system.
From embodiment illustrated in fig. 4 different be that in this embodiment, described system also comprises:
The first Tip element 501 when being used for can't determining in described validity checking unit 404 that described stack top process or described other process be whether legal, carries out suspicious program prompts to the user.
Such as, the first Tip element 501 specifically can the prompting user current process have the purpose of operation camera, and ejects dialog box, so that whether user selection uses camera.
Correspondingly, described system also further comprises: command reception unit 502 and operation unit 503.Wherein: described command reception unit 502 is used for receiving the instruction whether user selection uses camera; Described operation unit 503 is used for moving described stack top process or described other process after described command reception unit 502 receives the instruction of user selection use camera.
Correspondingly, described prevention unit 405 also is used for stoping described stack top process or described other process operation after described command reception unit 502 receives the instruction that user selection do not use camera.
Bring potential safety hazard for fear of some dangerous processes to user's intelligent television, in actual applications, can also be when stoping unit 405 to stop described stack top process operation or stoping described other process operation, dangerous by the first Tip element 501 further prompting user current process, and the ejection dialog box, whether unload current process by user selection.
Correspondingly, described command reception unit 502 also is used for receiving the instruction that is used for selecting whether to unload current process.
Correspondingly, described system also can further comprise: unloading unit and add lock unit (not shown).Wherein:
Described unloading unit is used for after described command reception unit 502 receives user selection unloading current process, and the guiding user unloads current process;
The described lock unit that adds is used for after described command reception unit 502 receives user selection and do not unload current process current process being locked.
Like this, finish the cleaning of dangerous process by the positive guide user of system, avoided some potential potential safety hazards.Owing to whether unloading current process selected by the user fully, therefore also can not unload by force the more needed processes of user, both guaranteed the safety of camera privacy, convenient for users to use again.
Need to prove, in actual applications, above-mentioned the first Tip element 501 can also adopt other implementation, such as, by figure sheet mode, suspended window mode, animation mode etc., this embodiment of the invention is not done restriction.
As shown in Figure 6, be another structural representation of an according to an embodiment of the invention telephotography personal secrets protection system.
From embodiment illustrated in fig. 4 different be that in this embodiment, described system also comprises:
Video flowing control unit 601, be used for to determine in described validity checking unit 404 whether described stack top process or described other process be legal, and when described stack top process or described other process requested video data, the video flowing that will come from described camera replaces with the replacement data that presets and sends to described stack top process or described other process;
The second Tip element 602, be used for to determine in described validity checking unit 404 whether described stack top process or described other process be legal, and when described stack top process or described other process requested video data, eject dialog box, so that whether user selection uses camera;
Command reception unit 603 is used for receiving the instruction whether user selection uses camera.
Correspondingly, described video flowing control unit 601 also is used for stopping replacement operation after described command reception unit 603 receives the instruction of user selection use camera.
The telephotography of this an embodiment personal secrets protection system; in the situation that can't determine according to blacklist and/or white list whether stack top process and other non-stack top process be legal; replace with the replacement data (such as image data) that presets by the video data with corresponding process requested; rather than directly the video flowing of camera is sent to corresponding process; and the ejection dialog box, whether use camera by user selection.Thereby guaranteed equally the safety of camera privacy.
Description by the various embodiments described above as can be known, the telephotography of an embodiment of the invention personal secrets protection system can prevent effectively that the telephotography head from by illegal applications exploiting, having strengthened user's personal secrets greatly.User's automatically early warning when using camera is illegally used, help the user to strengthen the camera secret protection.Need to prove, the telephotography of an embodiment of the invention personal secrets guard method can be applied to carry the intelligent television of various different operating systems, prevents that privacy of user from leaking by camera.
Need to prove, intrinsic not relevant with any certain computer, virtual system or miscellaneous equipment with demonstration at this algorithm that provides.Various general-purpose systems also can be with using based on the teaching at this.According to top description, it is apparent constructing the desired structure of this type systematic.In addition, the present invention is not also for any certain programmed language.Should be understood that and to utilize various programming languages to realize content of the present invention described here, and the top description that language-specific is done is in order to disclose preferred forms of the present invention.
In the specification that provides herein, a large amount of details have been described.Yet, can understand, embodiments of the invention can be in the situation that there be these details to put into practice.In some instances, be not shown specifically known method, structure and technology, so that not fuzzy understanding of this description.
Similarly, be to be understood that, in order to simplify the disclosure and to help to understand one or more in each inventive aspect, in the description to exemplary embodiment of the present invention, each feature of the present invention is grouped together in single embodiment, figure or the description to it sometimes in the above.Yet the method for the disclosure should be construed to the following intention of reflection: namely the present invention for required protection requires the more feature of feature clearly put down in writing than institute in each claim.Or rather, as following claims reflected, inventive aspect was to be less than all features of the disclosed single embodiment in front.Therefore, follow claims of embodiment and incorporate clearly thus this embodiment into, wherein each claim itself is as independent embodiment of the present invention.
Those skilled in the art are appreciated that can to the module in the system among the embodiment or the unit adaptively changes and they are arranged in one or more equipment different from this embodiment.Can be combined into a module or unit or assembly to the module among the embodiment or unit or assembly, and can be divided into a plurality of submodules or subelement or sub-component to them in addition.In such feature and/or process or unit at least some are mutually repelling, and can adopt any combination to disclosed all features in this specification (comprising claim, summary and the accompanying drawing followed) and so all processes or the unit of disclosed any method or equipment make up.Unless in addition clearly statement, disclosed each feature can be by providing identical, being equal to or the alternative features of similar purpose replaces in this specification (comprising claim, summary and the accompanying drawing followed).
In addition, those skilled in the art can understand, although embodiment more described herein comprise some feature rather than further feature included among other embodiment, the combination of the feature of different embodiment means and is within the scope of the present invention and forms different embodiment.For example, in the following claims, the one of any of embodiment required for protection can be used with compound mode arbitrarily.
All parts embodiment of the present invention can realize with hardware, perhaps realizes with the software module of moving at one or more processor, and perhaps the combination with them realizes.It will be understood by those of skill in the art that and to use in practice microprocessor or digital signal processor (DSP) to realize according to some or all some or repertoire of parts in the telephotography personal secrets protection system of the embodiment of the invention.The present invention can also be embodied as be used to part or all equipment or the device program (for example, computer program and computer program) of carrying out method as described herein.Such realization program of the present invention can be stored on the computer-readable medium, perhaps can have the form of one or more signal.Such signal can be downloaded from internet website and obtain, and perhaps provides at carrier signal, perhaps provides with any other form.
It should be noted above-described embodiment the present invention will be described rather than limit the invention, and those skilled in the art can design alternative embodiment in the situation of the scope that does not break away from claims.In the claims, any reference symbol between bracket should be configured to limitations on claims.Word " comprises " not to be got rid of existence and is not listed in element or step in the claim.Being positioned at word " " before the element or " one " does not get rid of and has a plurality of such elements.The present invention can realize by means of the hardware that includes some different elements and by means of the computer of suitably programming.In having enumerated the unit claim of some devices, several in these devices can be to come imbody by same hardware branch.The use of word first, second and C grade does not represent any order.Can be title with these word explanations.
Herein disclosed is A1, a kind of telephotography personal secrets guard method, it is characterized in that, comprising: the application stack tabulation that the application program of the current operation of the intelligent television of Real-Time Monitoring lift-launch operating system is corresponding; From described application stack tabulation, obtain the stack top process; Check whether described stack top process has registered the authority of operation camera; If registered the authority of operation camera, then determined according to blacklist and/or white list whether described stack top process is legal; If described stack top process is illegal, then stop described stack top process operation.A2, such as the described method of A1, it is characterized in that, the tabulation of application stack corresponding to the application program of the current operation of the described intelligent television of described Real-Time Monitoring comprises: the screen management device interface that utilizes the SDK of described operating system to provide, the application stack tabulation that the application program of the current operation of the described intelligent television of Real-time Obtaining is corresponding.A3, such as the described method of A1, it is characterized in that, the authority whether described stack top process of described inspection has registered the operation camera comprises: obtain application bag name corresponding to described stack top process; Whether the stack top process that the package manager interface that utilizes the SDK of described operating system to provide determines to have described application bag name has registered the authority of operation camera.A4, such as the described method of A3, it is characterized in that, described application bag name corresponding to described stack top process of obtaining comprises: utilize the method in the package manager interface that described SDK provides to obtain application bag name corresponding to described stack top process.A5, such as the described method of A3, it is characterized in that, the authority whether the stack top process that the package manager interface that the described SDK that utilizes described operating system provides determines to have described application bag name has registered the operation camera comprises: operation camera authority and the described application bag name of importing needs inspection to the scope check method of described package manager interface into; The result who returns according to described scope check method determines whether the stack top process with described application bag name has registered the authority that operates camera.A6, such as the described method of A1, it is characterized in that, describedly determine described stack top process legal comprising whether according to blacklist and/or white list: utilize local built-in blacklist and/or white list to carry out this locality inspection, determine whether described stack top process legal; And/or utilize blacklist and/or white list on the server to carry out long-range inspection, determine whether described stack top process is legal.A7, such as each described method of A1 to A6, it is characterized in that, described method also comprises: if described stack top process is legal, then obtain other process successively from the tabulation of described application stack; Determine according to described blacklist and/or white list whether other process of obtaining is legal; If described other process is illegal, then stop described other process operation.A8, such as the described method of A7, it is characterized in that, described method also comprises: if can't determine that whether described stack top process or described other process legal, then carry out suspicious program prompts to the user.A9, such as the described method of A8, it is characterized in that, describedly the user is carried out suspicious program prompts comprise: the prompting user current process has the purpose of operation camera, and ejects dialog box, whether uses camera by user selection; Described method also comprises: if receive the instruction that user selection uses camera, then move described stack top process or described other process; If receive the instruction that user selection does not use camera, then stop described stack top process or described other process operation.A10, such as the described method of A9, it is characterized in that, described method also comprises: when stoping described stack top process operation or stoping described other process operation, the prompting user current process is dangerous, and ejects dialog box, whether unloads current process by user selection; If user selection unloading current process then guides the user to unload current process; If user selection does not unload current process, then current process is locked.A11, such as the described method of A7, it is characterized in that, described method also comprises: if can't determine whether described stack top process or described other process be legal, then when described stack top process or described other process requested video data, the video flowing that will come from described camera replaces with the replacement data that presets and sends to described stack top process or described other process, and the ejection dialog box, whether use camera by user selection; After the instruction that receives user selection use camera, stop replacement operation.
Herein disclosed is B12, a kind of telephotography personal secrets protection system, it is characterized in that, comprising: monitoring means is used for the application stack tabulation corresponding to application program of current operation that Real-Time Monitoring carries the intelligent television of operating system; The process acquiring unit is used for obtaining the stack top process from described application stack tabulation; The scope check unit is used for checking whether described stack top process has registered the authority of operation camera; The validity checking unit is used for determining according to blacklist and/or white list whether described stack top process is legal after described scope check unit determines that described stack top process has been registered the authority of operation camera; Stop the unit, be used for after described validity checking unit determines that described stack top process is illegal, stop described stack top process operation.B13, such as the described system of B12, it is characterized in that, described monitoring means, the screen management device interface that concrete SDK for utilizing described operating system provides obtains the application stack corresponding to application program of the current operation of described intelligent television and tabulates.B14, such as the described system of B12, it is characterized in that, described scope check unit comprises: bag name is obtained subelement, is used for obtaining application bag name corresponding to described stack top process; Authority is determined subelement, determines for the package manager interface that the SDK that utilizes described operating system provides whether the stack top process with described application bag name has registered the authority that operates camera.B15, such as the described system of B14, it is characterized in that, described bag name is obtained subelement, the concrete package manager interface that is used for utilizing described SDK to provide obtains application bag name corresponding to described stack top process.B16, such as the described system of B14, it is characterized in that, described authority is determined subelement, concrete being used for imported operation camera authority and the described application bag name that needs inspection into to the scope check method of described package manager interface, and the result who returns according to described scope check method determines whether the stack top process with described application bag name has registered the authority that operates camera.B17, such as the described system of B12, it is characterized in that, institute validity checking unit comprises: the local subelement that checks, be used for utilizing local built-in blacklist and/or white list to carry out this locality inspection, determine whether described stack top process legal; And/or long-range inspection subelement, be used for utilizing blacklist and/or white list on the server to carry out long-range inspection, determine whether described stack top process is legal.B18, such as each described system of B12 to B17, it is characterized in that, described system also comprises: described process acquiring unit, also be used for after described validity checking unit determines that described stack top process is legal, and from described application stack tabulation, obtain other process successively; Described validity checking unit also is used for determining according to described blacklist and/or white list whether other process that described process acquiring unit obtains is legal; Described prevention unit also is used for after described validity checking unit determines that described other process is illegal, stops described other process operation.B19, such as the described system of B18, it is characterized in that, described system also comprises: the first Tip element, when being used for can't determining in described validity checking unit that described stack top process or described other process be whether legal, the user is carried out suspicious program prompts.B20, such as the described system of B19, it is characterized in that, described the first Tip element specifically is used for the purpose that the prompting user current process has the operation camera, and ejects dialog box, so that whether user selection uses camera; Described system also comprises: the command reception unit is used for receiving the instruction whether user selection uses camera; The operation unit is used for moving described stack top process or described other process after described command reception unit receives the instruction of user selection use camera; Described prevention unit also is used for stoping described stack top process or described other process operation after described command reception unit receives the instruction that user selection do not use camera.B21, such as the described system of B20, it is characterized in that described the first Tip element, when also being used for stoping in described prevention unit described stack top process operation or stoping described other process operation, the prompting user current process is dangerous, and ejects dialog box, whether unloads current process by user selection; Described command reception unit also is used for receiving the instruction that is used for selecting whether to unload current process; Described system also comprises: unloading unit, be used for after described command reception unit receives user selection unloading current process, and the guiding user unloads current process; Add lock unit, be used for after described command reception unit receives user selection and do not unload current process, current process being locked.B22, such as the described system of B18, it is characterized in that, described system also comprises: the video flowing control unit, be used for to determine in described validity checking unit whether described stack top process or described other process be legal, and when described stack top process or described other process requested video data, the video flowing that will come from described camera replaces with the replacement data that presets and sends to described stack top process or described other process; The second Tip element, be used for to determine in described validity checking unit whether described stack top process or described other process be legal, and when described stack top process or described other process requested video data, eject dialog box, so that whether user selection uses camera; The command reception unit is used for receiving the instruction whether user selection uses camera; Described video flowing control unit also is used for stopping replacement operation after described command reception unit receives the instruction of user selection use camera.

Claims (20)

1. a telephotography personal secrets guard method is characterized in that, comprising:
The application stack tabulation that the application program of the current operation of the intelligent television of Real-Time Monitoring lift-launch operating system is corresponding;
From described application stack tabulation, obtain the stack top process;
Check whether described stack top process has registered the authority of operation camera;
If registered the authority of operation camera, then determined according to blacklist and/or white list whether described stack top process is legal;
If described stack top process is illegal, then stop described stack top process operation.
2. the method for claim 1 is characterized in that, application stack tabulation corresponding to the application program of the current operation of the described intelligent television of described Real-Time Monitoring comprises:
The screen management device interface that utilizes the SDK of described operating system to provide, the application stack tabulation that the application program of the current operation of the described intelligent television of Real-time Obtaining is corresponding.
3. the method for claim 1 is characterized in that, the authority whether described stack top process of described inspection has registered the operation camera comprises:
Obtain application bag name corresponding to described stack top process;
Whether the stack top process that the package manager interface that utilizes the SDK of described operating system to provide determines to have described application bag name has registered the authority of operation camera.
4. method as claimed in claim 3 is characterized in that, described application bag name corresponding to described stack top process of obtaining comprises:
Utilize the method in the package manager interface that described SDK provides to obtain application bag name corresponding to described stack top process.
5. method as claimed in claim 3 is characterized in that, the authority whether the stack top process that the package manager interface that the described SDK that utilizes described operating system provides determines to have described application bag name has registered the operation camera comprises:
Import operation camera authority and the described application bag name that needs inspection into to the scope check method of described package manager interface;
The result who returns according to described scope check method determines whether the stack top process with described application bag name has registered the authority that operates camera.
6. the method for claim 1 is characterized in that, describedly determines described stack top process legal comprising whether according to blacklist and/or white list:
Utilize local built-in blacklist and/or white list to carry out this locality and check, determine whether described stack top process is legal; And/or
Utilize blacklist and/or white list on the server to carry out long-range inspection, determine whether described stack top process is legal.
7. such as each described method of claim 1 to 6, it is characterized in that, described method also comprises:
If described stack top process is legal, then from described application stack tabulation, obtain other process successively;
Determine according to described blacklist and/or white list whether other process of obtaining is legal;
If described other process is illegal, then stop described other process operation.
8. method as claimed in claim 7 is characterized in that, described method also comprises:
If can't determine whether described stack top process or described other process be legal, then the user carried out suspicious program prompts.
9. method as claimed in claim 8 is characterized in that, describedly the user is carried out suspicious program prompts comprises: the prompting user current process has the purpose of operation camera, and ejects dialog box, whether uses camera by user selection;
Described method also comprises:
If receive the instruction that user selection uses camera, then move described stack top process or described other process;
If receive the instruction that user selection does not use camera, then stop described stack top process or described other process operation.
10. method as claimed in claim 9 is characterized in that, described method also comprises:
When stoping described stack top process operation or stoping described other process operation, the prompting user current process is dangerous, and ejects dialog box, whether unloads current process by user selection;
If user selection unloading current process then guides the user to unload current process;
If user selection does not unload current process, then current process is locked.
11. method as claimed in claim 7 is characterized in that, described method also comprises:
If can't determine whether described stack top process or described other process be legal, then when described stack top process or described other process requested video data, the video flowing that will come from described camera replaces with the replacement data that presets and sends to described stack top process or described other process, and the ejection dialog box, whether use camera by user selection;
After the instruction that receives user selection use camera, stop replacement operation.
12. a telephotography personal secrets protection system is characterized in that, comprising:
Monitoring means is used for the application stack tabulation corresponding to application program of current operation that Real-Time Monitoring carries the intelligent television of operating system;
The process acquiring unit is used for obtaining the stack top process from described application stack tabulation;
The scope check unit is used for checking whether described stack top process has registered the authority of operation camera;
The validity checking unit is used for determining according to blacklist and/or white list whether described stack top process is legal after described scope check unit determines that described stack top process has been registered the authority of operation camera;
Stop the unit, be used for after described validity checking unit determines that described stack top process is illegal, stop described stack top process operation.
13. system as claimed in claim 12 is characterized in that,
Described monitoring means, the screen management device interface that concrete SDK for utilizing described operating system provides obtains the application stack corresponding to application program of the current operation of described intelligent television and tabulates.
14. system as claimed in claim 12 is characterized in that, described scope check unit comprises:
The bag name is obtained subelement, is used for obtaining application bag name corresponding to described stack top process;
Authority is determined subelement, determines for the package manager interface that the SDK that utilizes described operating system provides whether the stack top process with described application bag name has registered the authority that operates camera.
15. system as claimed in claim 14 is characterized in that,
Described bag name is obtained subelement, and the concrete package manager interface that is used for utilizing described SDK to provide obtains application bag name corresponding to described stack top process.
16. system as claimed in claim 14 is characterized in that,
Described authority is determined subelement, concrete being used for imported operation camera authority and the described application bag name that needs inspection into to the scope check method of described package manager interface, and the result who returns according to described scope check method determines whether the stack top process with described application bag name has registered the authority that operates camera.
17. system as claimed in claim 12 is characterized in that, institute validity checking unit comprises:
The local subelement that checks is used for utilizing local built-in blacklist and/or white list to carry out this locality and checks, determines whether described stack top process is legal; And/or
Long-range inspection subelement is used for utilizing blacklist and/or white list on the server to carry out long-range inspection, determines whether described stack top process is legal.
18. such as each described system of claim 12 to 17, it is characterized in that, described system also comprises:
Described process acquiring unit also is used for after described validity checking unit determines that described stack top process is legal, obtains other process successively from described application stack tabulation;
Described validity checking unit also is used for determining according to described blacklist and/or white list whether other process that described process acquiring unit obtains is legal;
Described prevention unit also is used for after described validity checking unit determines that described other process is illegal, stops described other process operation.
19. system as claimed in claim 18 is characterized in that, described system also comprises:
The first Tip element when being used for can't determining in described validity checking unit that described stack top process or described other process be whether legal, carries out suspicious program prompts to the user.
20. system as claimed in claim 19 is characterized in that,
Described the first Tip element specifically is used for the purpose that the prompting user current process has the operation camera, and ejects dialog box, so that whether user selection uses camera;
Described system also comprises:
The command reception unit is used for receiving the instruction whether user selection uses camera;
The operation unit is used for moving described stack top process or described other process after described command reception unit receives the instruction of user selection use camera;
Described prevention unit also is used for stoping described stack top process or described other process operation after described command reception unit receives the instruction that user selection do not use camera.
CN201210451979.5A 2012-11-12 2012-11-12 Television camera privacy security protection method and system Active CN103024558B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210451979.5A CN103024558B (en) 2012-11-12 2012-11-12 Television camera privacy security protection method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210451979.5A CN103024558B (en) 2012-11-12 2012-11-12 Television camera privacy security protection method and system

Publications (2)

Publication Number Publication Date
CN103024558A true CN103024558A (en) 2013-04-03
CN103024558B CN103024558B (en) 2016-03-30

Family

ID=47972610

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210451979.5A Active CN103024558B (en) 2012-11-12 2012-11-12 Television camera privacy security protection method and system

Country Status (1)

Country Link
CN (1) CN103024558B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104184945A (en) * 2014-08-18 2014-12-03 厦门美图之家科技有限公司 Method for setting shooting limits of authority
CN105101366A (en) * 2015-05-29 2015-11-25 努比亚技术有限公司 Mobile terminal control method and mobile terminal
CN105657550A (en) * 2016-02-04 2016-06-08 四川长虹电器股份有限公司 Audio and video security permission management system in Android television system
CN109697359A (en) * 2018-12-19 2019-04-30 惠州Tcl移动通信有限公司 A kind of message prompt method, device, storage medium and electronic equipment
CN114390190A (en) * 2020-10-22 2022-04-22 海信视像科技股份有限公司 Display equipment and method for monitoring application to start camera

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20090081200A (en) * 2008-01-23 2009-07-28 주식회사 안철수연구소 Security system for internet site and method thereof
CN101667235A (en) * 2008-09-02 2010-03-10 北京瑞星国际软件有限公司 Method and device for protecting user privacy
CN101751594A (en) * 2008-12-11 2010-06-23 爱思开电讯投资(中国)有限公司 Method and device for controlling intelligent card and extra-card equipment
CN102045712A (en) * 2011-01-04 2011-05-04 奇智软件(北京)有限公司 Anti-monitoring method and system for mobile terminal
CN102663293A (en) * 2012-03-28 2012-09-12 奇智软件(北京)有限公司 Protection method and protection device for video devices of computer

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20090081200A (en) * 2008-01-23 2009-07-28 주식회사 안철수연구소 Security system for internet site and method thereof
CN101667235A (en) * 2008-09-02 2010-03-10 北京瑞星国际软件有限公司 Method and device for protecting user privacy
CN101751594A (en) * 2008-12-11 2010-06-23 爱思开电讯投资(中国)有限公司 Method and device for controlling intelligent card and extra-card equipment
CN102045712A (en) * 2011-01-04 2011-05-04 奇智软件(北京)有限公司 Anti-monitoring method and system for mobile terminal
CN102663293A (en) * 2012-03-28 2012-09-12 奇智软件(北京)有限公司 Protection method and protection device for video devices of computer

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104184945A (en) * 2014-08-18 2014-12-03 厦门美图之家科技有限公司 Method for setting shooting limits of authority
CN104184945B (en) * 2014-08-18 2018-07-13 厦门美图之家科技有限公司 A kind of setting method of shooting permission
CN105101366A (en) * 2015-05-29 2015-11-25 努比亚技术有限公司 Mobile terminal control method and mobile terminal
CN105101366B (en) * 2015-05-29 2019-02-22 努比亚技术有限公司 Method for controlling mobile terminal and mobile terminal
CN105657550A (en) * 2016-02-04 2016-06-08 四川长虹电器股份有限公司 Audio and video security permission management system in Android television system
CN109697359A (en) * 2018-12-19 2019-04-30 惠州Tcl移动通信有限公司 A kind of message prompt method, device, storage medium and electronic equipment
CN114390190A (en) * 2020-10-22 2022-04-22 海信视像科技股份有限公司 Display equipment and method for monitoring application to start camera
CN114390190B (en) * 2020-10-22 2023-10-31 海信视像科技股份有限公司 Display equipment and method for monitoring application to start camera

Also Published As

Publication number Publication date
CN103024558B (en) 2016-03-30

Similar Documents

Publication Publication Date Title
CN103002342A (en) Method and system for protecting television camera
US9268935B2 (en) Smart containerization of mobile computing device resources
US20110029881A1 (en) Devices and methods for providing software programs compatible with a computer system for download by a user
CN100524333C (en) Method for preventing illegal using software
CN102289633A (en) Method for managing dynamic permission of application program under Android platform
US10176327B2 (en) Method and device for preventing application in an operating system from being uninstalled
CN103024558A (en) Television camera privacy security protection method and system
US8615737B2 (en) Systems and methods for building software packages in secure development environments
US9432369B2 (en) Secure data containers
CN103839000A (en) Application program installation method and device based on intelligent terminal equipment
CN106557669A (en) A kind of authority control method and device of application program installation process
US9378384B2 (en) Secure endpoint file export in a business environment
CN104123490A (en) Method and device for processing malicious bundled software and mobile terminal
US10552132B2 (en) Binary merging device, method, and computer program
CN106557687A (en) A kind of authority control method and device of application program installation process
US20070038573A1 (en) System and method for information handling system software registration code management
US9430674B2 (en) Secure data access
US20150006580A1 (en) Controlling access to one or more datasets of an operating system in use
US20230222185A1 (en) Threat control and prevention for android systems
US8745714B2 (en) Secure software development environments
CN104462890A (en) Application authority management method under Android platform
CN111222122A (en) Application authority management method and device and embedded equipment
CN113110849A (en) Loading resources on demand
CN105653904A (en) Application screen-locking processing method and apparatus as well as mobile terminal
US20210409438A1 (en) Method and system for automated protection against vulnerability and notification to service provider

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20220725

Address after: Room 801, 8th floor, No. 104, floors 1-19, building 2, yard 6, Jiuxianqiao Road, Chaoyang District, Beijing 100015

Patentee after: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Patentee before: Qizhi software (Beijing) Co.,Ltd.

TR01 Transfer of patent right