CN103324893B - The method and apparatus of secret protection - Google Patents
The method and apparatus of secret protection Download PDFInfo
- Publication number
- CN103324893B CN103324893B CN201310214042.0A CN201310214042A CN103324893B CN 103324893 B CN103324893 B CN 103324893B CN 201310214042 A CN201310214042 A CN 201310214042A CN 103324893 B CN103324893 B CN 103324893B
- Authority
- CN
- China
- Prior art keywords
- privacy
- access
- privacy object
- strategy
- access module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 40
- 230000005484 gravity Effects 0.000 claims description 8
- GOLXNESZZPUPJE-UHFFFAOYSA-N spiromesifen Chemical compound CC1=CC(C)=CC(C)=C1C(C(O1)=O)=C(OC(=O)CC(C)(C)C)C11CCCC1 GOLXNESZZPUPJE-UHFFFAOYSA-N 0.000 claims description 8
- 241000406668 Loxodonta cyclotis Species 0.000 claims 1
- 238000004891 communication Methods 0.000 description 7
- 230000006870 function Effects 0.000 description 4
- 239000011435 rock Substances 0.000 description 3
- 230000001960 triggered effect Effects 0.000 description 3
- 238000010586 diagram Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 238000004590 computer program Methods 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 238000012163 sequencing technique Methods 0.000 description 1
Landscapes
- Storage Device Security (AREA)
Abstract
The present invention provides a kind of method and apparatus of secret protection, is related to terminal device, it is possible to increase the security of secret protection.Methods described includes:After the trigger signal for starting privacy access module is obtained, start privacy access module;Under the privacy access module; when receiving privacy object access request; refusal conducts interviews to the corresponding privacy object of the privacy object access request, wherein, the privacy object is that the object present invention being protected the need for pre-setting is used to protect privacy information.
Description
Technical field
The present invention relates to the method and apparatus of terminal device, more particularly to secret protection.
Background technology
In daily life, we can usually use various terminal equipment, such as mobile phone, personal digital assistant (PDA),
Tablet personal computer etc..Moreover, can usually store various privacy informations on the terminal device, these privacy informations are not intended to by other people
Viewed.But because terminal device lend or charge etc. cause reason terminal device not at one's side when, often not
Cause leaking for privacy information with can avoiding.
The method of current protection privacy information is realized by the way that privacy information is hidden, but such a method is simultaneously
Fundamentally privacy information can not be protected, for example, when by means of third party application, still can realize to hidden
The access and operation of personal letter breath, thus security is not high.
The content of the invention
Embodiments of the invention provide a kind of method and apparatus of secret protection, it is possible to increase the security of secret protection.
In a first aspect, the present invention provides a kind of method of secret protection, including:
After the trigger signal for starting privacy access module is obtained, start privacy access module;
Under the privacy access module, when receiving privacy object access request, refusal is visited the privacy object
Ask that the corresponding privacy object of request conducts interviews, wherein, the privacy object is the object being protected the need for pre-setting.
With reference in a first aspect, in the first possible implementation of first aspect, privacy access mould is started obtaining
After the trigger signal of formula, methods described also includes:Enable the access strategy storehouse pre-established;The access strategy storehouse includes
The access strategy of all objects on terminal device;
It is described refusal the corresponding privacy object of the privacy object access request is conducted interviews including:
The access strategy of the corresponding privacy object of privacy object access request according to the access strategy storehouse, is obtained
The access rights of the privacy object, wherein, the access strategy of the privacy object indicates the access rights of the privacy object
To forbid accessing;
According to the access rights of the privacy object, refusal enters to the corresponding privacy object of the privacy object access request
Row is accessed.
With reference to the first possible implementation of first aspect, in second of possible implementation of first aspect
In, the access strategy that all objects are respectively provided with security attribute, the access strategy storehouse defines security attribute and the visit of object
The relation of authority is asked,
The access strategy of the corresponding privacy object of privacy object access request according to the access strategy storehouse,
Obtaining the access rights of the privacy object includes:
According to the security attribute of the privacy object and the relation of access rights, the access right of the privacy object is obtained
Limit.
Any of second of possible implementation with reference to first aspect to first aspect implementation, first
In the third possible implementation of aspect, after the trigger signal for starting privacy access module is obtained, methods described is also
Including:
Hide the privacy object.
With reference to the third possible implementation of first aspect, in the 4th kind of possible implementation of first aspect
In, methods described also includes:
After the trigger signal for starting normal access module is obtained, the hiding privacy object of display.
With reference to the first implementation or the 4th kind of implementation of first aspect of first aspect or first aspect,
In 5th kind of possible implementation of one side, the trigger signal and the startup privacy for starting normal access module is visited
Ask that the trigger signal of pattern causes by the change of gravity sensing angle.
Wherein, in any possible implementation of first aspect, the privacy object can for private file or
Privacy application program.
Second aspect, the present invention provides a kind of device of secret protection, including:
Start unit, for after the trigger signal for starting privacy access module is obtained, starting privacy access module;
Receiving unit, for receiving the privacy object access request under the privacy access module;
Processing unit, for when the receiving unit receives privacy object access request, refusing to the privacy pair
As the corresponding privacy object of access request conducts interviews,
Wherein, the privacy object is the object being protected the need for pre-setting.
With reference to second aspect, in the first possible implementation of second aspect, the start unit is additionally operable to:
Obtain after the trigger signal for starting privacy access module, enable in the access strategy storehouse pre-established, the access strategy storehouse
Include the access strategy of all objects on terminal device;
The processing unit specifically for:Privacy object access request is corresponding hidden according to the access strategy storehouse
The access strategy of private object, obtains the access rights of the privacy object, wherein, the access strategy of the privacy object indicates institute
The access rights of privacy object are stated to forbid accessing;According to the access rights of the privacy object, refuse to the privacy object
The corresponding privacy object of access request conducts interviews.
With reference to the first possible implementation of second aspect, in second of possible implementation of second aspect
In, the access strategy that all objects are respectively provided with security attribute, the access strategy storehouse defines security attribute and the visit of object
The relation of authority is asked,
In terms of the access rights of the privacy object are obtained, the processing unit specifically for:According to the privacy
The security attribute of object and the relation of access rights, obtain the access rights of the privacy object.
Any of second of possible implementation with reference to second aspect to second aspect implementation, second
In the third possible implementation of aspect, described device also includes:
Display unit, for after the start unit starts privacy access module, hiding the privacy object.
With reference to the third possible implementation of second aspect, in the 4th kind of possible implementation of second aspect
In, the display unit is additionally operable to:After the start unit starts normal access module, the hiding privacy pair of display
As.
After adopting the above technical scheme, the method and apparatus of secret protection provided in an embodiment of the present invention, by additionally setting
The privacy access module different from normal access module is put, and under the privacy access module, refuses the visit to privacy object
Ask, so, user can not check privacy object, it is thus possible to improve the security of secret protection.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
There is the accompanying drawing used required in technology description to be briefly described, it should be apparent that, drawings in the following description are only this
Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can be with
Other accompanying drawings are obtained according to these accompanying drawings.
Figure 1A is the flow chart of the method for secret protection provided in an embodiment of the present invention;
Figure 1B is another flow chart of the method for secret protection provided in an embodiment of the present invention;
Fig. 2A is a structured flowchart of the device of secret protection provided in an embodiment of the present invention;
Fig. 2 B are another structured flowchart of the device of secret protection provided in an embodiment of the present invention;
Fig. 3 is the schematic diagram of terminal device provided in an embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme progress to the embodiment of the present invention is clear, complete
Ground is described, it is clear that described embodiment is only a part of embodiment of the present invention, rather than whole embodiments.It is based on
Embodiment in the present invention, those of ordinary skill in the art obtained on the premise of creative work is not made it is all its
Its embodiment, belongs to the scope of protection of the invention.
The embodiment of the present invention provides a kind of method of secret protection, and the privacy that this method can apply to terminal device is protected
Shield, the terminal device is specifically as follows mobile phone, PDA, palm PC, tablet personal computer etc..As shown in Figure 1A, the present invention is implemented
The method for the secret protection that example is provided may include:
11st, after the trigger signal for starting privacy access module is obtained, privacy access module is started.
Wherein, the trigger signal for starting privacy access module can be user by changing the gravity-feed tank of terminal device
Answer angle and cause, such as rock terminal device, by terminal device uprightly place or lie low placement.It is of course also possible to be to use
Family is caused by other shortcuts, is accessed for example, setting one to be individually used for triggering startup privacy on the terminal device
The button of pattern, enters privacy access module, button, then revert to normal access module again if the button is pressed.
For example:Terminal device is rocked in response to user and obtains the trigger signal for starting privacy access module;Or
Sent in response to user and specify prompt operation and obtain the trigger signal for starting privacy access module.
12nd, under the privacy access module, when receiving privacy object access request, refuse to the privacy object
The corresponding privacy object of access request conducts interviews, wherein, the privacy object is pair being protected the need for pre-setting
As.
Object in the embodiment of the present invention can be the object of file type, contact person, short message etc. or
The object of Application Type, wechat, MSN etc..Privacy object is that user is wished not by the content that others sees or accesses,
In the present invention, user can be according to self-demand, it would be desirable to which any file and/or application program not accessed by others are set
For privacy object.
The method of secret protection provided in an embodiment of the present invention, by additionally setting the privacy different from normal access module
Access module, and under the privacy access module, refuse the access to privacy object, so, user can not check hidden
Private object, it is possible to increase the security of secret protection.
In embodiments of the present invention, the corresponding privacy object of the privacy object access request, i.e., privacy pair to be visited
As that can be private file, such as contact person, message registration, short message, picture library;Can also be privacy application program, for example
QQ, wechat etc..The privacy object to be visited is contained in the object for needing to carry out secret protection.Protection is needed in setting
Privacy object when, not limiting needs the type and quantity of privacy object to be protected, in other words, can by private file and/
Or privacy application program is set to need privacy object to be protected, and quantity can be one or more.For example, it is desired to protection
Privacy object can only include private file, such as contact person, message registration, information, picture library;Privacy can also be only included should
With program, such as QQ, wechat.Certainly privacy object to be protected is needed to include private file and privacy application journey simultaneously
Sequence a, i.e. part is private file, another part is privacy application program.
Specifically, for example, file, such as contact person, message registration, information are if desired protected, can be by contact person, call
Record, information are set in advance as needing privacy object to be protected;If desired application program, such as QQ, wechat are protected, can be by QQ, micro-
Letter is set in advance as needing privacy object to be protected;If desired file and application program, such as contact person, call note are protected simultaneously
Record, information and QQ, wechat, can be set in advance as contact person, message registration, information and QQ, wechat need to be to be protected hidden
Private object.
Privacy access module in the embodiment of the present invention is applied to the situation that the content of terminal device may be checked by other people
Under use, certainly, to ensure that the genuine owner of terminal device can normally check privacy object, set one normal to access mould
Formula is also necessary.When terminal device for public use comes back to genuine owner on hand, normal access mould can be returned to
All the elements including privacy object on terminal device are checked under formula.
In one embodiment of the invention, the access module is in addition to including privacy access module, in addition to just
Normal access module, it is possible to after receiving access module switching signal between normal access module and privacy access module
Switching.Wherein, under the normal access module, all objects including privacy object can normally be accessed;
And under the privacy access module, it is impossible to privacy object is conducted interviews.
That is, the method for the secret protection provided in the present embodiment is also wrapped in addition to including above-mentioned steps 11 and step 12
Include:Receive access module switching signal;According to the access module switching signal, in the normal access module and the privacy
Switch between access module.
Wherein, the access module switching signal includes the trigger signal for starting privacy access module and starts normal access
The trigger signal of pattern, and can be triggered by the change of gravity sensing angle.
Specifically, user is in desired handover access pattern, can by terminal device rock operation (or other
The operation that gravity sensing angle can be triggered to change), triggering gravity sensing angle changes, and then in the normal access
Switch between pattern and the privacy access module.
It can be seen that, the present embodiment provide secret protection method by setting normal access module and privacy access module,
And can switch between the two, the genuine owner of subscriber terminal equipment can be made in different use occasions, different visits is used
Ask pattern.For example, at oneself in use, open normal access module, and in public use, privacy access module is opened, in this way, both
Facilitate and use, the security of secret protection has been significantly increased again.
It is pointed out that when normal access module and the switching of privacy access module, in embodiments of the present invention may be used
Unwarranted access is prevented to set password.Specifically, if switching into normal access module from privacy access module, show
Show interface for password input, point out user input password, only in the case of input password is correct, just enter and normally access mould
Formula.Meanwhile, if switching into privacy access module from normal access module, interface for password input can also be shown.Certainly, at this
In the range of invention, when switching into privacy access module from normal access module, interface for password input can also be not provided with.
The embodiment of the present invention, by setting password authentification, can enter one when switching into normal access module from privacy access module
Protection of the step enhancing to privacy object, improves security.
Alternatively, an alternative embodiment of the invention is being started in addition to including above-mentioned steps 11 and step 12
After the trigger signal of privacy access module, it may also include:Enable the access strategy storehouse pre-established;In the access strategy storehouse
Include the access strategy of all objects on terminal device.Now, refuse described in step 12 to the privacy object access request
Corresponding privacy object conduct interviews including:The corresponding privacy of privacy object access request according to the access strategy storehouse
The access strategy of object, obtains the access rights of the privacy object, wherein, the access strategy instruction of the privacy object is described
The access rights of privacy object are to forbid accessing;According to the access rights of the privacy object, refusal is visited the privacy object
Ask that the corresponding privacy object of request conducts interviews.
Wherein, the access strategy storehouse pre-established can be locally stored on terminal device, it is of course possible to be stored in
On cloud server, by terminal device from the cloud server dynamic access.
In embodiments of the present invention, under privacy access module, the access rights of all privacy objects can be pre-set
To forbid accessing, rather than privacy object can be set in advance as allowing to access.So, privacy can be protected to maximum
Object, while realizing the normal access of non-privacy object.
On implementing, it can realize that the access rights of privacy object and non-privacy object are set as follows
Put:It is that privacy object and non-privacy object all assign a security attribute, wherein, the safety category of privacy object and non-privacy object
Property it is different, and pre-establish an access strategy storehouse, the relation of security attribute and access rights provided in the access strategy storehouse,
So, the batch setting of the access rights to privacy object can just be realized by changing the security attribute of privacy object.
I.e., alternatively, in yet another embodiment of the present invention, the privacy object has security attribute, the access
Access strategy in policy library defines the security attribute of object and the relation of access rights.It is described according to the access strategy storehouse
Described in the corresponding privacy object of privacy object access request access strategy, obtain the access rights bag of the privacy object
Include:
According to the security attribute of the privacy object and the relation of access rights, the access right of the privacy object is obtained
Limit.
For example, if user is intended to set the picture library in terminal device, file manager and picture processing application program
For non-privacy object, picture is set to privacy object, then can be by the picture library in terminal device, file manager and picture processing
The security attribute of application program is set to 2, and the security attribute of picture is set to 1, first queried access plan when picture is accessed
Slightly storehouse, if in access strategy storehouse access strategy regulation, the main body that security attribute is 2 cannot access safety attribute be 1
Object, then open after privacy access module, and picture library, file manager and picture processing application program do not have permission to access picture
File, so, you can realize the protection to privacy object (picture).
In another example, if user is intended to the picture library in terminal device, picture processing application program and picture being both configured to privacy
The security attribute of picture library, picture processing application program and picture, then can be set to 1 by object, and in access strategy storehouse
Provide, security attribute does not allow to be accessed for 1 object, then open after privacy access module, any application journey in access strategy
Sequence or instrument can not all access picture library, picture processing application program and picture, in this way, can be achieved to privacy object (picture library, figure
Piece handles application program and picture) protection.
Certainly, the above is simply illustrated with illustrating, within the scope of the invention, can also be with other security attributes
Set-up mode, other access strategy storehouse prescribed manner realize the acquisition of access rights, and this is not limited by the present invention.
The method for the secret protection that the present embodiment is provided, sets the security attribute and access strategy of privacy object, is needing
Change a certain class privacy object of security attribute identical access rights when, only need to change such privacy object security attribute and
Access strategy in access strategy storehouse, so, it is possible to achieve to the batch modification of multiple privacy object accesses authorities.
It may also be noted that on the basis of each above-mentioned embodiment of the present invention, privacy access mould is started obtaining
After the trigger signal of formula, the method for secret protection provided in an embodiment of the present invention may also include:
13rd, the privacy object is hidden.Wherein, when privacy object is application program, privacy object bag is hidden
Include and do not show the icon of application program on the terminal device.
It should be appreciated that do not have between step 12 here and step 13 sequencing point or in step
While refusing to conduct interviews to the corresponding privacy object of the privacy object access request in 12, the privacy object is hidden.
In addition, after the trigger signal for starting normal access module is obtained, secret protection provided in an embodiment of the present invention
Method may also include:
14th, the hiding privacy object is shown.
Specific situation can be hidden described hidden as shown in Figure 1B, after the trigger signal for starting privacy access module is obtained
Private object, and show the hiding privacy object after the trigger signal for starting normal access module is obtained.
The embodiment of the present invention, can by hiding privacy object after the trigger signal for starting privacy access module is obtained
The protection to privacy object is better achieved;After the trigger signal for starting normal access module is obtained, hidden by display
The privacy object, the normal access to privacy object can be realized.
For a better understanding of the present invention, the present invention is carried out furtherly by specific embodiment by taking mobile phone as an example below
It is bright.It is also noted that, it is set forth below for embodiment be the present invention a part of embodiment, those skilled in the art are by the present invention
The content, can be easy to expect other embodiment, they are within.
The present embodiment provides a kind of method of secret protection, and methods described includes:
Receive user and pass through the startup privacy access module signal that rocks the modes such as mobile phone and trigger.Specifically, mobile phone is worked as
Need to lend other people in use, being protection privacy, user, which can trigger, starts privacy access module signal, visits to be switched to privacy
Ask pattern.
According to the startup privacy access module signal, current normal access module is switched into privacy access module.
It is determined that under the privacy access module, opening secret protection, enabling the access strategy storehouse pre-established, institute
Stating access strategy storehouse includes the access strategy of all objects on terminal device.And receive other people input privacy object accesses please
Ask.Wherein, alternatively, under privacy access module, the icon of the application program on maskable screen in privacy object.
According to the privacy object access request, the visit of the privacy object is obtained in the access strategy storehouse pre-established
Ask strategy;
The access strategy of the corresponding privacy object of privacy object access request according to the access strategy storehouse, is obtained
The access rights of the privacy object, wherein, the access strategy of the privacy object indicates the access rights of the privacy object
To forbid accessing;
According to the access rights of the privacy object, refusal enters to the corresponding privacy object of the privacy object access request
Row is accessed.
Receive user and pass through the signal for the normal access module of startup for rocking the modes such as mobile phone and triggering.Specifically, when
User bring back after mobile phone, it is necessary to normally using mobile phone when, pattern switching letter can be triggered for example, by rocking the modes such as mobile phone
Number, so that privacy access module before is switched back into normal access module.
Interface for password input is shown to user, to ensure that user only in the case where inputting correct password, can just enter
Enter the interface of normal access module, prevent unauthorized user from arbitrarily entering normal access module, so as to check privacy of user.
When user's input password is correct, into normal access module, user can access all the elements on mobile phone.
The method for the secret protection that the present embodiment is provided, by additionally setting the privacy different from normal access module to access
Pattern, and under the privacy access module, refuse the access to privacy object, privacy can be effectively protected, security is improved.
Corresponding with the above method, the embodiment of the present invention also provides a kind of device of secret protection, the dress of the secret protection
It can be terminal device to put, as shown in Figure 2 A, and described device 20 includes start unit 21, receiving unit 22 and processing unit 23.
Wherein, start unit 21, are accessed for after the trigger signal for starting privacy access module is obtained, starting privacy
Pattern;
Receiving unit 22, for receiving the privacy object access request under the privacy access module;
Processing unit 23, for when the receiving unit 22 receives privacy object access request, refusing to described hidden
The corresponding privacy object of private object access request conducts interviews,
Wherein, the privacy object is the object being protected the need for pre-setting.Object in the embodiment of the present invention
Can be the object of file type, the object of contact person, short message etc. or Application Type, such as wechat,
MSN etc..Privacy object is that user wishes that in the present invention, user can be according to itself not by the content that others sees or accesses
Demand, it would be desirable to which any file and/or application program not accessed by others are set to privacy object.
Alternatively, in one embodiment of the invention, the start unit 21 is additionally operable to:Start privacy access obtaining
After the trigger signal of pattern, the access strategy storehouse pre-established is enabled, the access strategy storehouse includes institute on terminal device
There is the access strategy of object;
The processing unit 22 specifically for:Privacy object access request is corresponding according to the access strategy storehouse
The access strategy of privacy object, obtains the access rights of the privacy object, wherein, the access strategy of the privacy object is indicated
The access rights of the privacy object are to forbid accessing;According to the access rights of the privacy object, refuse to the privacy pair
As the corresponding privacy object of access request conducts interviews.
Wherein, the access strategy storehouse pre-established can be locally stored on the device of secret protection, it is of course possible to
It is stored on cloud server, by the device of secret protection from the cloud server dynamic access.
On the basis of a upper embodiment, further, in another embodiment of the present invention, all objects are respectively provided with peace
Access strategy in full attribute, the access strategy storehouse defines the security attribute of object and the relation of access rights,
In terms of the access rights of the privacy object are obtained, the processing unit 23 specifically for:According to described hidden
The security attribute of private object and the relation of access rights, obtain the access rights of the privacy object.
On the basis of the device embodiment of each above-mentioned secret protection, as shown in Figure 2 B, further embodiment of this invention is carried
The device of the secret protection of confession also includes:
Display unit 24, for after the start unit 21 starts privacy access module, hiding the privacy object.
Further, the display unit 24 is additionally operable to:After the start unit 21 starts normal access module, show
Show the hiding privacy object.
It should be noted that in actual applications, in the embodiment of the present invention, it should be appreciated that in a kind of implementation
Under, the device of the secret protection can be mobile phone;Under another implementation, the device of the secret protection can also be
Other terminal devices, its product form can be palm PC, PDA etc..
It can be seen that, the device of secret protection provided in an embodiment of the present invention, by additionally setting different from normal access module
Privacy access module, and under the privacy access module, refuse the access to privacy object, so, user can not
Check privacy object, it is possible to increase the security of secret protection.
It is worth noting that, in each embodiment of the device of above-mentioned secret protection, included unit is to press
Divided according to function logic, but be not limited to above-mentioned division, as long as corresponding function can be realized;In addition,
The specific name of each functional unit is also only to facilitate mutually distinguish, the protection domain being not intended to limit the invention.
Fig. 3 is the schematic diagram of terminal device provided in an embodiment of the present invention.Fig. 3 is refer to, it is provided in an embodiment of the present invention
Terminal device 300 can be mobile phone, PDA, palm PC, tablet personal computer etc., and the terminal device 300 may include:Processor
310, communication interface 320, memory 330 and bus 340.
Wherein, processor 310, communication interface 320, memory 330 complete mutual communication by bus 340.
The communication interface 320, is used for and external device communication.
The memory 330, for depositing program 332, memory 330 can be high-speed random access memory
(Random Access Memory, RAM) or nonvolatile memory (non-volatile memory), such as magnetic
Disk storage.
Specifically, program 332 can include program code, and described program code includes computer-managed instruction.
Processor 310 is probably a central processing unit (CPU), or specific integrated circuit (Application
Specific Integrated Circuit, ASIC), or be arranged to implement the one or more of the embodiment of the present invention
Integrated circuit.
The processor 310, for reading described program 332, is performed:Obtaining the triggering letter of startup privacy access module
After number, start privacy access module;Under the privacy access module, when receiving privacy object access request, refusal
Privacy object corresponding to the privacy object access request conducts interviews, wherein, the privacy object is the need pre-set
The object to be protected.
In one embodiment, the processor 310 is additionally operable to perform:Enable the access strategy storehouse pre-established;It is described
Access strategy storehouse includes the access strategy of all objects on terminal device;The privacy object according to the access strategy storehouse
The access strategy of the corresponding privacy object of access request, obtains the access rights of the privacy object, wherein, the privacy object
Access strategy the access rights of the privacy object are indicated to forbid accessing;According to the access rights of the privacy object, refuse
The definitely corresponding privacy object of the privacy object access request conducts interviews.
Wherein, the access strategy storehouse pre-established can be locally stored on terminal device, it is of course possible to be stored in
On cloud server, by terminal device from the cloud server dynamic access.
Further, in another embodiment, all objects are respectively provided with the visit in security attribute, the access strategy storehouse
Ask that strategy defines the security attribute of object and the relation of access rights;
In terms of the access rights of the privacy object are obtained, the processor 310 is specifically for performing:According to described
The security attribute of privacy object and the relation of access rights, obtain the access rights of the privacy object.
In each above-mentioned embodiment, further, the processor 310 is additionally operable to perform:Start privacy visit obtaining
After the trigger signal for asking pattern, the privacy object is hidden.
Wherein, the privacy object can be private file or privacy application program.
Further, in another embodiment, the processor 310 is additionally operable to perform:Start normal access obtaining
After the trigger signal of pattern, the hiding privacy object of display.
Wherein, in embodiments of the present invention, the trigger signal and the startup privacy for starting normal access module is visited
Ask that the trigger signal of pattern causes by the change of gravity sensing angle.
It can be seen that, terminal device provided in an embodiment of the present invention, by additionally setting the privacy different from normal access module
Access module, and under the privacy access module, refuse the access to privacy object, so, user can not check hidden
Private object, it is possible to increase the security of secret protection.
Each embodiment in this specification is described by the way of progressive, identical similar portion between each embodiment
Divide mutually referring to what each embodiment was stressed is the difference with other embodiment.It is real especially for device
Apply for example, because it is substantially similar to embodiment of the method, so describing fairly simple, related part is referring to embodiment of the method
Part explanation.
It should be noted that, device embodiment described above is only schematical, wherein described be used as separating component
The unit of explanation can be or may not be physically separate, and the part shown as unit can be or can also
It is not physical location, you can with positioned at a place, or can also be distributed on multiple NEs.Can be according to reality
Selection some or all of module therein is needed to realize the purpose of this embodiment scheme.In addition, the device that the present invention is provided
In embodiment accompanying drawing, the annexation between module represents there is communication connection between them, specifically can be implemented as one or
A plurality of communication bus or signal wire.Those of ordinary skill in the art are without creative efforts, you can to understand
And implement.
Through the above description of the embodiments, it is apparent to those skilled in the art that the present invention can be borrowed
Software is helped to add the mode of required common hardware to realize, naturally it is also possible to include application specific integrated circuit, specially by specialized hardware
Realized with CPU, private memory, special components and parts etc..Generally, all functions of being completed by computer program can
Easily realized with corresponding hardware, moreover, can also be a variety of many for the particular hardware structure for realizing same function
Sample, such as analog circuit, digital circuit or special circuit.But, it is more for the purpose of the present invention in the case of software program it is real
It is now more preferably embodiment.Understood based on such, technical scheme is substantially made to prior art in other words
The part of contribution can be embodied in the form of software product, and the computer software product is stored in the storage medium that can be read
In, such as floppy disk of computer, USB flash disk, mobile hard disk, read-only storage (Read-Only Memory, ROM), random access memory
Device (Random Access Memory, RAM), magnetic disc or CD etc., including some instructions are to cause a computer to set
Standby (can be personal computer, server, or network equipment etc.) performs the method described in each embodiment of the invention.
The foregoing is only a specific embodiment of the invention, but protection scope of the present invention is not limited thereto, any
Those familiar with the art the invention discloses technical scope in, change or replacement can be readily occurred in, should all be contained
Cover within protection scope of the present invention.Therefore, protection scope of the present invention should be based on the protection scope of the described claims.
Claims (10)
1. a kind of method of secret protection, it is characterised in that including:
After the trigger signal for starting privacy access module is obtained, start privacy access module, wherein, the startup privacy is visited
Ask that the trigger signal of pattern is caused by the change of gravity sensing angle;
Under the privacy access module, when receiving privacy object access request, refusal please to the privacy object accesses
Corresponding privacy object is asked to conduct interviews, wherein, the privacy object is the object being protected the need for pre-setting;
After refusal conducts interviews to the corresponding privacy object of the privacy object access request, methods described also includes:
Hide the privacy object.
2. according to the method described in claim 1, it is characterised in that obtain start privacy access module trigger signal it
Afterwards, methods described also includes:Enable the access strategy storehouse pre-established;The access strategy storehouse includes owning on terminal device
The access strategy of object;
It is described refusal the corresponding privacy object of the privacy object access request is conducted interviews including:
The access strategy of the corresponding privacy object of privacy object access request according to the access strategy storehouse, obtains described
The access rights of privacy object, wherein, the access strategy of the privacy object indicates the access rights of the privacy object to prohibit
Only access;
According to the access rights of the privacy object, refusal is visited the corresponding privacy object of the privacy object access request
Ask.
3. method according to claim 2, it is characterised in that all objects are respectively provided with security attribute, the access strategy
Access strategy in storehouse defines the security attribute of object and the relation of access rights,
The access strategy of the corresponding privacy object of privacy object access request according to the access strategy storehouse, is obtained
The access rights of the privacy object include:
According to the security attribute of the privacy object and the relation of access rights, the access rights of the privacy object are obtained.
4. according to the method described in claim 1, it is characterised in that methods described also includes:
After the trigger signal for starting normal access module is obtained, the hiding privacy object of display.
5. the method according to any one of Claims 1-4, it is characterised in that the privacy object include private file or
Privacy application program.
6. method according to claim 4, it is characterised in that the trigger signal of the normal access module of startup is by gravity
Sense the change of angle and cause.
7. a kind of device of secret protection, it is characterised in that including:
Start unit, for after the trigger signal for starting privacy access module is obtained, starting privacy access module, wherein,
The trigger signal for starting privacy access module is caused by the change of gravity sensing angle;
Receiving unit, for receiving the privacy object access request under the privacy access module;
Processing unit, for when the receiving unit receives privacy object access request, refusal to be visited the privacy object
Ask that the corresponding privacy object of request conducts interviews,
Wherein, the privacy object is the object being protected the need for pre-setting;
Described device also includes:
Display unit, after being conducted interviews in refusal to the corresponding privacy object of the privacy object access request, hides
The privacy object.
8. device according to claim 7, it is characterised in that the start unit is additionally operable to:Start privacy visit obtaining
After the trigger signal for asking pattern, the access strategy storehouse pre-established is enabled, the access strategy storehouse is included on terminal device
The access strategy of all objects;
The processing unit specifically for:The corresponding privacy pair of privacy object access request according to the access strategy storehouse
The access strategy of elephant, obtains the access rights of the privacy object, wherein, the access strategy instruction of the privacy object is described hidden
The access rights of private object are to forbid accessing;According to the access rights of the privacy object, refuse to the privacy object accesses
Corresponding privacy object is asked to conduct interviews.
9. device according to claim 8, it is characterised in that all objects are respectively provided with security attribute, the access strategy
Access strategy in storehouse defines the security attribute of object and the relation of access rights,
In terms of the access rights of the privacy object are obtained, the processing unit specifically for:According to the privacy object
Security attribute and access rights relation, obtain the access rights of the privacy object.
10. device according to claim 7, it is characterised in that the display unit is additionally operable to:Opened in the start unit
Move after normal access module, show the hiding privacy object.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310214042.0A CN103324893B (en) | 2013-05-31 | 2013-05-31 | The method and apparatus of secret protection |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310214042.0A CN103324893B (en) | 2013-05-31 | 2013-05-31 | The method and apparatus of secret protection |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103324893A CN103324893A (en) | 2013-09-25 |
CN103324893B true CN103324893B (en) | 2017-11-07 |
Family
ID=49193627
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310214042.0A Active CN103324893B (en) | 2013-05-31 | 2013-05-31 | The method and apparatus of secret protection |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103324893B (en) |
Families Citing this family (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103886262A (en) * | 2014-02-21 | 2014-06-25 | 联想(北京)有限公司 | Information processing method and electronic equipment |
CN103885858B (en) * | 2014-03-11 | 2017-05-10 | 惠州Tcl移动通信有限公司 | Method and system for mobile phone backup and data recovery |
EP3119158A4 (en) * | 2014-03-31 | 2017-03-08 | Huawei Technologies Co. Ltd. | Privacy protection method and terminal device |
CN104168277A (en) * | 2014-08-15 | 2014-11-26 | 小米科技有限责任公司 | File security maintaining method and device |
CN104318145A (en) * | 2014-09-26 | 2015-01-28 | 来安县新元机电设备设计有限公司 | Method and system for privacy protection |
CN105574423B (en) * | 2014-10-09 | 2021-05-04 | 中兴通讯股份有限公司 | Terminal equipment and file management method thereof |
CN104468997B (en) * | 2014-12-01 | 2017-09-19 | 努比亚技术有限公司 | Encrypted state processing method and processing device |
CN104462954B (en) * | 2014-12-18 | 2018-02-27 | 联想(北京)有限公司 | control method and device |
WO2016119164A1 (en) * | 2015-01-29 | 2016-08-04 | 宇龙计算机通信科技(深圳)有限公司 | Terminal security management method and apparatus |
CN106485137B (en) * | 2015-08-26 | 2020-02-07 | 北京安云世纪科技有限公司 | Application program control method, application program control device and terminal |
CN106485102A (en) * | 2015-08-26 | 2017-03-08 | 北京奇虎科技有限公司 | Application control method, application program controlling device and terminal |
CN105262909B (en) * | 2015-11-30 | 2020-06-12 | 腾讯科技(深圳)有限公司 | Mobile terminal using method, mobile terminal and storage medium |
CN107103245B (en) * | 2016-02-23 | 2022-08-02 | 中兴通讯股份有限公司 | File authority management method and device |
CN106033330B (en) * | 2016-05-24 | 2019-10-08 | 努比亚技术有限公司 | A kind of display methods and terminal device |
CN106022148A (en) * | 2016-05-26 | 2016-10-12 | 北京金山安全软件有限公司 | File encryption method and device |
CN106569862A (en) * | 2016-11-08 | 2017-04-19 | 深圳Tcl新技术有限公司 | Intelligent application start method and apparatus |
CN107122686B (en) * | 2017-05-05 | 2020-02-21 | 广东小天才科技有限公司 | Method and device for sharing screen content and mobile terminal |
CN107704766A (en) * | 2017-08-29 | 2018-02-16 | 努比亚技术有限公司 | Multimedia file access control method, terminal and computer-readable recording medium |
CN108197506B (en) * | 2017-11-27 | 2021-05-04 | 努比亚技术有限公司 | Terminal display control method, terminal and computer readable storage medium |
CN110287667A (en) * | 2019-06-03 | 2019-09-27 | Oppo(重庆)智能科技有限公司 | Privacy information processing method and relevant device |
CN115495721A (en) * | 2021-06-18 | 2022-12-20 | 华为技术有限公司 | Access control method and related device |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101588572A (en) * | 2009-04-28 | 2009-11-25 | 宇龙计算机通信科技(深圳)有限公司 | Mobile terminal and control method thereof |
CN102508609A (en) * | 2011-11-17 | 2012-06-20 | 潘天华 | Method for controlling displaying and hiding of computer application program window |
CN102567105A (en) * | 2010-12-31 | 2012-07-11 | 上海格尔软件股份有限公司 | Method for hiding Windows system tray |
CN102662649A (en) * | 2012-03-06 | 2012-09-12 | 惠州Tcl移动通信有限公司 | Method and apparatus for customizing function menu of application programs |
CN102880837A (en) * | 2012-08-24 | 2013-01-16 | 腾讯科技(深圳)有限公司 | Method for improving security of mobile terminal and mobile terminal |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN202178815U (en) * | 2011-08-12 | 2012-03-28 | 北京新媒传信科技有限公司 | Cell phone capable of automatic switchover of scene mode |
-
2013
- 2013-05-31 CN CN201310214042.0A patent/CN103324893B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101588572A (en) * | 2009-04-28 | 2009-11-25 | 宇龙计算机通信科技(深圳)有限公司 | Mobile terminal and control method thereof |
CN102567105A (en) * | 2010-12-31 | 2012-07-11 | 上海格尔软件股份有限公司 | Method for hiding Windows system tray |
CN102508609A (en) * | 2011-11-17 | 2012-06-20 | 潘天华 | Method for controlling displaying and hiding of computer application program window |
CN102662649A (en) * | 2012-03-06 | 2012-09-12 | 惠州Tcl移动通信有限公司 | Method and apparatus for customizing function menu of application programs |
CN102880837A (en) * | 2012-08-24 | 2013-01-16 | 腾讯科技(深圳)有限公司 | Method for improving security of mobile terminal and mobile terminal |
Also Published As
Publication number | Publication date |
---|---|
CN103324893A (en) | 2013-09-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103324893B (en) | The method and apparatus of secret protection | |
CN103902862B (en) | A kind of mobile device management method, apparatus and a kind of mobile equipment | |
US10635456B2 (en) | Method for entering operating system desktop and mobile intelligent terminal | |
US20160275281A1 (en) | Selectively providing personal information and access to functionality on lock screen based on biometric user authentication | |
RU2630553C2 (en) | Method, instrumentation, and device for adding connected expansion to address book | |
CN105701420B (en) | A kind of management method and terminal of user data | |
CN107038369A (en) | The method and terminal of a kind of resources accessing control | |
CN106462713B (en) | The interface display method and terminal of terminal | |
CN102710847A (en) | Method for managing access of multiple visitors to mobile terminal | |
US8881268B2 (en) | Secure area for apps | |
CN106815509B (en) | Multimedia file protection method and device and electronic equipment | |
WO2016145706A1 (en) | Method and device for implementing user mode switching on smart terminal, and smart terminal | |
EP1512057A1 (en) | Trusted user interface for a secure mobile wireless device | |
WO2017008348A1 (en) | Data card switching control method and apparatus, and terminal device | |
CN107770146B (en) | User data authority control method and device | |
CN106959754A (en) | Method for controlling mobile terminal and mobile terminal | |
CN108932435A (en) | A kind of information security management method, terminal device and computer readable storage medium | |
CN107506637A (en) | Information displaying method and device, terminal and readable storage medium storing program for executing | |
US20140310606A1 (en) | Method and device for providing plugin in contact list | |
CN107483704A (en) | A kind of private space method to set up and terminal device | |
CN109426735A (en) | A kind of method and system for protecting individual privacy | |
CN107391977B (en) | Permission control and automatic switching method, device and equipment | |
CN107766712A (en) | Message prompt method, terminal and computer-readable medium | |
CN112800401B (en) | Privacy processing method, privacy processing device and terminal | |
Wijesekera et al. | Dynamically regulating mobile application permissions |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20211227 Address after: 450046 Floor 9, building 1, Zhengshang Boya Plaza, Longzihu wisdom Island, Zhengdong New Area, Zhengzhou City, Henan Province Patentee after: xFusion Digital Technologies Co., Ltd. Address before: 518129 Bantian HUAWEI headquarters office building, Longgang District, Guangdong, Shenzhen Patentee before: HUAWEI TECHNOLOGIES Co.,Ltd. |
|
TR01 | Transfer of patent right |