CN103324893B - The method and apparatus of secret protection - Google Patents

The method and apparatus of secret protection Download PDF

Info

Publication number
CN103324893B
CN103324893B CN201310214042.0A CN201310214042A CN103324893B CN 103324893 B CN103324893 B CN 103324893B CN 201310214042 A CN201310214042 A CN 201310214042A CN 103324893 B CN103324893 B CN 103324893B
Authority
CN
China
Prior art keywords
privacy
access
privacy object
strategy
access module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310214042.0A
Other languages
Chinese (zh)
Other versions
CN103324893A (en
Inventor
张朋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
XFusion Digital Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN201310214042.0A priority Critical patent/CN103324893B/en
Publication of CN103324893A publication Critical patent/CN103324893A/en
Application granted granted Critical
Publication of CN103324893B publication Critical patent/CN103324893B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The present invention provides a kind of method and apparatus of secret protection, is related to terminal device, it is possible to increase the security of secret protection.Methods described includes:After the trigger signal for starting privacy access module is obtained, start privacy access module;Under the privacy access module; when receiving privacy object access request; refusal conducts interviews to the corresponding privacy object of the privacy object access request, wherein, the privacy object is that the object present invention being protected the need for pre-setting is used to protect privacy information.

Description

The method and apparatus of secret protection
Technical field
The present invention relates to the method and apparatus of terminal device, more particularly to secret protection.
Background technology
In daily life, we can usually use various terminal equipment, such as mobile phone, personal digital assistant (PDA), Tablet personal computer etc..Moreover, can usually store various privacy informations on the terminal device, these privacy informations are not intended to by other people Viewed.But because terminal device lend or charge etc. cause reason terminal device not at one's side when, often not Cause leaking for privacy information with can avoiding.
The method of current protection privacy information is realized by the way that privacy information is hidden, but such a method is simultaneously Fundamentally privacy information can not be protected, for example, when by means of third party application, still can realize to hidden The access and operation of personal letter breath, thus security is not high.
The content of the invention
Embodiments of the invention provide a kind of method and apparatus of secret protection, it is possible to increase the security of secret protection.
In a first aspect, the present invention provides a kind of method of secret protection, including:
After the trigger signal for starting privacy access module is obtained, start privacy access module;
Under the privacy access module, when receiving privacy object access request, refusal is visited the privacy object Ask that the corresponding privacy object of request conducts interviews, wherein, the privacy object is the object being protected the need for pre-setting.
With reference in a first aspect, in the first possible implementation of first aspect, privacy access mould is started obtaining After the trigger signal of formula, methods described also includes:Enable the access strategy storehouse pre-established;The access strategy storehouse includes The access strategy of all objects on terminal device;
It is described refusal the corresponding privacy object of the privacy object access request is conducted interviews including:
The access strategy of the corresponding privacy object of privacy object access request according to the access strategy storehouse, is obtained The access rights of the privacy object, wherein, the access strategy of the privacy object indicates the access rights of the privacy object To forbid accessing;
According to the access rights of the privacy object, refusal enters to the corresponding privacy object of the privacy object access request Row is accessed.
With reference to the first possible implementation of first aspect, in second of possible implementation of first aspect In, the access strategy that all objects are respectively provided with security attribute, the access strategy storehouse defines security attribute and the visit of object The relation of authority is asked,
The access strategy of the corresponding privacy object of privacy object access request according to the access strategy storehouse, Obtaining the access rights of the privacy object includes:
According to the security attribute of the privacy object and the relation of access rights, the access right of the privacy object is obtained Limit.
Any of second of possible implementation with reference to first aspect to first aspect implementation, first In the third possible implementation of aspect, after the trigger signal for starting privacy access module is obtained, methods described is also Including:
Hide the privacy object.
With reference to the third possible implementation of first aspect, in the 4th kind of possible implementation of first aspect In, methods described also includes:
After the trigger signal for starting normal access module is obtained, the hiding privacy object of display.
With reference to the first implementation or the 4th kind of implementation of first aspect of first aspect or first aspect, In 5th kind of possible implementation of one side, the trigger signal and the startup privacy for starting normal access module is visited Ask that the trigger signal of pattern causes by the change of gravity sensing angle.
Wherein, in any possible implementation of first aspect, the privacy object can for private file or Privacy application program.
Second aspect, the present invention provides a kind of device of secret protection, including:
Start unit, for after the trigger signal for starting privacy access module is obtained, starting privacy access module;
Receiving unit, for receiving the privacy object access request under the privacy access module;
Processing unit, for when the receiving unit receives privacy object access request, refusing to the privacy pair As the corresponding privacy object of access request conducts interviews,
Wherein, the privacy object is the object being protected the need for pre-setting.
With reference to second aspect, in the first possible implementation of second aspect, the start unit is additionally operable to: Obtain after the trigger signal for starting privacy access module, enable in the access strategy storehouse pre-established, the access strategy storehouse Include the access strategy of all objects on terminal device;
The processing unit specifically for:Privacy object access request is corresponding hidden according to the access strategy storehouse The access strategy of private object, obtains the access rights of the privacy object, wherein, the access strategy of the privacy object indicates institute The access rights of privacy object are stated to forbid accessing;According to the access rights of the privacy object, refuse to the privacy object The corresponding privacy object of access request conducts interviews.
With reference to the first possible implementation of second aspect, in second of possible implementation of second aspect In, the access strategy that all objects are respectively provided with security attribute, the access strategy storehouse defines security attribute and the visit of object The relation of authority is asked,
In terms of the access rights of the privacy object are obtained, the processing unit specifically for:According to the privacy The security attribute of object and the relation of access rights, obtain the access rights of the privacy object.
Any of second of possible implementation with reference to second aspect to second aspect implementation, second In the third possible implementation of aspect, described device also includes:
Display unit, for after the start unit starts privacy access module, hiding the privacy object.
With reference to the third possible implementation of second aspect, in the 4th kind of possible implementation of second aspect In, the display unit is additionally operable to:After the start unit starts normal access module, the hiding privacy pair of display As.
After adopting the above technical scheme, the method and apparatus of secret protection provided in an embodiment of the present invention, by additionally setting The privacy access module different from normal access module is put, and under the privacy access module, refuses the visit to privacy object Ask, so, user can not check privacy object, it is thus possible to improve the security of secret protection.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is the accompanying drawing used required in technology description to be briefly described, it should be apparent that, drawings in the following description are only this Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can be with Other accompanying drawings are obtained according to these accompanying drawings.
Figure 1A is the flow chart of the method for secret protection provided in an embodiment of the present invention;
Figure 1B is another flow chart of the method for secret protection provided in an embodiment of the present invention;
Fig. 2A is a structured flowchart of the device of secret protection provided in an embodiment of the present invention;
Fig. 2 B are another structured flowchart of the device of secret protection provided in an embodiment of the present invention;
Fig. 3 is the schematic diagram of terminal device provided in an embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme progress to the embodiment of the present invention is clear, complete Ground is described, it is clear that described embodiment is only a part of embodiment of the present invention, rather than whole embodiments.It is based on Embodiment in the present invention, those of ordinary skill in the art obtained on the premise of creative work is not made it is all its Its embodiment, belongs to the scope of protection of the invention.
The embodiment of the present invention provides a kind of method of secret protection, and the privacy that this method can apply to terminal device is protected Shield, the terminal device is specifically as follows mobile phone, PDA, palm PC, tablet personal computer etc..As shown in Figure 1A, the present invention is implemented The method for the secret protection that example is provided may include:
11st, after the trigger signal for starting privacy access module is obtained, privacy access module is started.
Wherein, the trigger signal for starting privacy access module can be user by changing the gravity-feed tank of terminal device Answer angle and cause, such as rock terminal device, by terminal device uprightly place or lie low placement.It is of course also possible to be to use Family is caused by other shortcuts, is accessed for example, setting one to be individually used for triggering startup privacy on the terminal device The button of pattern, enters privacy access module, button, then revert to normal access module again if the button is pressed.
For example:Terminal device is rocked in response to user and obtains the trigger signal for starting privacy access module;Or
Sent in response to user and specify prompt operation and obtain the trigger signal for starting privacy access module.
12nd, under the privacy access module, when receiving privacy object access request, refuse to the privacy object The corresponding privacy object of access request conducts interviews, wherein, the privacy object is pair being protected the need for pre-setting As.
Object in the embodiment of the present invention can be the object of file type, contact person, short message etc. or The object of Application Type, wechat, MSN etc..Privacy object is that user is wished not by the content that others sees or accesses, In the present invention, user can be according to self-demand, it would be desirable to which any file and/or application program not accessed by others are set For privacy object.
The method of secret protection provided in an embodiment of the present invention, by additionally setting the privacy different from normal access module Access module, and under the privacy access module, refuse the access to privacy object, so, user can not check hidden Private object, it is possible to increase the security of secret protection.
In embodiments of the present invention, the corresponding privacy object of the privacy object access request, i.e., privacy pair to be visited As that can be private file, such as contact person, message registration, short message, picture library;Can also be privacy application program, for example QQ, wechat etc..The privacy object to be visited is contained in the object for needing to carry out secret protection.Protection is needed in setting Privacy object when, not limiting needs the type and quantity of privacy object to be protected, in other words, can by private file and/ Or privacy application program is set to need privacy object to be protected, and quantity can be one or more.For example, it is desired to protection Privacy object can only include private file, such as contact person, message registration, information, picture library;Privacy can also be only included should With program, such as QQ, wechat.Certainly privacy object to be protected is needed to include private file and privacy application journey simultaneously Sequence a, i.e. part is private file, another part is privacy application program.
Specifically, for example, file, such as contact person, message registration, information are if desired protected, can be by contact person, call Record, information are set in advance as needing privacy object to be protected;If desired application program, such as QQ, wechat are protected, can be by QQ, micro- Letter is set in advance as needing privacy object to be protected;If desired file and application program, such as contact person, call note are protected simultaneously Record, information and QQ, wechat, can be set in advance as contact person, message registration, information and QQ, wechat need to be to be protected hidden Private object.
Privacy access module in the embodiment of the present invention is applied to the situation that the content of terminal device may be checked by other people Under use, certainly, to ensure that the genuine owner of terminal device can normally check privacy object, set one normal to access mould Formula is also necessary.When terminal device for public use comes back to genuine owner on hand, normal access mould can be returned to All the elements including privacy object on terminal device are checked under formula.
In one embodiment of the invention, the access module is in addition to including privacy access module, in addition to just Normal access module, it is possible to after receiving access module switching signal between normal access module and privacy access module Switching.Wherein, under the normal access module, all objects including privacy object can normally be accessed; And under the privacy access module, it is impossible to privacy object is conducted interviews.
That is, the method for the secret protection provided in the present embodiment is also wrapped in addition to including above-mentioned steps 11 and step 12 Include:Receive access module switching signal;According to the access module switching signal, in the normal access module and the privacy Switch between access module.
Wherein, the access module switching signal includes the trigger signal for starting privacy access module and starts normal access The trigger signal of pattern, and can be triggered by the change of gravity sensing angle.
Specifically, user is in desired handover access pattern, can by terminal device rock operation (or other The operation that gravity sensing angle can be triggered to change), triggering gravity sensing angle changes, and then in the normal access Switch between pattern and the privacy access module.
It can be seen that, the present embodiment provide secret protection method by setting normal access module and privacy access module, And can switch between the two, the genuine owner of subscriber terminal equipment can be made in different use occasions, different visits is used Ask pattern.For example, at oneself in use, open normal access module, and in public use, privacy access module is opened, in this way, both Facilitate and use, the security of secret protection has been significantly increased again.
It is pointed out that when normal access module and the switching of privacy access module, in embodiments of the present invention may be used Unwarranted access is prevented to set password.Specifically, if switching into normal access module from privacy access module, show Show interface for password input, point out user input password, only in the case of input password is correct, just enter and normally access mould Formula.Meanwhile, if switching into privacy access module from normal access module, interface for password input can also be shown.Certainly, at this In the range of invention, when switching into privacy access module from normal access module, interface for password input can also be not provided with. The embodiment of the present invention, by setting password authentification, can enter one when switching into normal access module from privacy access module Protection of the step enhancing to privacy object, improves security.
Alternatively, an alternative embodiment of the invention is being started in addition to including above-mentioned steps 11 and step 12 After the trigger signal of privacy access module, it may also include:Enable the access strategy storehouse pre-established;In the access strategy storehouse Include the access strategy of all objects on terminal device.Now, refuse described in step 12 to the privacy object access request Corresponding privacy object conduct interviews including:The corresponding privacy of privacy object access request according to the access strategy storehouse The access strategy of object, obtains the access rights of the privacy object, wherein, the access strategy instruction of the privacy object is described The access rights of privacy object are to forbid accessing;According to the access rights of the privacy object, refusal is visited the privacy object Ask that the corresponding privacy object of request conducts interviews.
Wherein, the access strategy storehouse pre-established can be locally stored on terminal device, it is of course possible to be stored in On cloud server, by terminal device from the cloud server dynamic access.
In embodiments of the present invention, under privacy access module, the access rights of all privacy objects can be pre-set To forbid accessing, rather than privacy object can be set in advance as allowing to access.So, privacy can be protected to maximum Object, while realizing the normal access of non-privacy object.
On implementing, it can realize that the access rights of privacy object and non-privacy object are set as follows Put:It is that privacy object and non-privacy object all assign a security attribute, wherein, the safety category of privacy object and non-privacy object Property it is different, and pre-establish an access strategy storehouse, the relation of security attribute and access rights provided in the access strategy storehouse, So, the batch setting of the access rights to privacy object can just be realized by changing the security attribute of privacy object.
I.e., alternatively, in yet another embodiment of the present invention, the privacy object has security attribute, the access Access strategy in policy library defines the security attribute of object and the relation of access rights.It is described according to the access strategy storehouse Described in the corresponding privacy object of privacy object access request access strategy, obtain the access rights bag of the privacy object Include:
According to the security attribute of the privacy object and the relation of access rights, the access right of the privacy object is obtained Limit.
For example, if user is intended to set the picture library in terminal device, file manager and picture processing application program For non-privacy object, picture is set to privacy object, then can be by the picture library in terminal device, file manager and picture processing The security attribute of application program is set to 2, and the security attribute of picture is set to 1, first queried access plan when picture is accessed Slightly storehouse, if in access strategy storehouse access strategy regulation, the main body that security attribute is 2 cannot access safety attribute be 1 Object, then open after privacy access module, and picture library, file manager and picture processing application program do not have permission to access picture File, so, you can realize the protection to privacy object (picture).
In another example, if user is intended to the picture library in terminal device, picture processing application program and picture being both configured to privacy The security attribute of picture library, picture processing application program and picture, then can be set to 1 by object, and in access strategy storehouse Provide, security attribute does not allow to be accessed for 1 object, then open after privacy access module, any application journey in access strategy Sequence or instrument can not all access picture library, picture processing application program and picture, in this way, can be achieved to privacy object (picture library, figure Piece handles application program and picture) protection.
Certainly, the above is simply illustrated with illustrating, within the scope of the invention, can also be with other security attributes Set-up mode, other access strategy storehouse prescribed manner realize the acquisition of access rights, and this is not limited by the present invention.
The method for the secret protection that the present embodiment is provided, sets the security attribute and access strategy of privacy object, is needing Change a certain class privacy object of security attribute identical access rights when, only need to change such privacy object security attribute and Access strategy in access strategy storehouse, so, it is possible to achieve to the batch modification of multiple privacy object accesses authorities.
It may also be noted that on the basis of each above-mentioned embodiment of the present invention, privacy access mould is started obtaining After the trigger signal of formula, the method for secret protection provided in an embodiment of the present invention may also include:
13rd, the privacy object is hidden.Wherein, when privacy object is application program, privacy object bag is hidden Include and do not show the icon of application program on the terminal device.
It should be appreciated that do not have between step 12 here and step 13 sequencing point or in step While refusing to conduct interviews to the corresponding privacy object of the privacy object access request in 12, the privacy object is hidden.
In addition, after the trigger signal for starting normal access module is obtained, secret protection provided in an embodiment of the present invention Method may also include:
14th, the hiding privacy object is shown.
Specific situation can be hidden described hidden as shown in Figure 1B, after the trigger signal for starting privacy access module is obtained Private object, and show the hiding privacy object after the trigger signal for starting normal access module is obtained.
The embodiment of the present invention, can by hiding privacy object after the trigger signal for starting privacy access module is obtained The protection to privacy object is better achieved;After the trigger signal for starting normal access module is obtained, hidden by display The privacy object, the normal access to privacy object can be realized.
For a better understanding of the present invention, the present invention is carried out furtherly by specific embodiment by taking mobile phone as an example below It is bright.It is also noted that, it is set forth below for embodiment be the present invention a part of embodiment, those skilled in the art are by the present invention The content, can be easy to expect other embodiment, they are within.
The present embodiment provides a kind of method of secret protection, and methods described includes:
Receive user and pass through the startup privacy access module signal that rocks the modes such as mobile phone and trigger.Specifically, mobile phone is worked as Need to lend other people in use, being protection privacy, user, which can trigger, starts privacy access module signal, visits to be switched to privacy Ask pattern.
According to the startup privacy access module signal, current normal access module is switched into privacy access module.
It is determined that under the privacy access module, opening secret protection, enabling the access strategy storehouse pre-established, institute Stating access strategy storehouse includes the access strategy of all objects on terminal device.And receive other people input privacy object accesses please Ask.Wherein, alternatively, under privacy access module, the icon of the application program on maskable screen in privacy object.
According to the privacy object access request, the visit of the privacy object is obtained in the access strategy storehouse pre-established Ask strategy;
The access strategy of the corresponding privacy object of privacy object access request according to the access strategy storehouse, is obtained The access rights of the privacy object, wherein, the access strategy of the privacy object indicates the access rights of the privacy object To forbid accessing;
According to the access rights of the privacy object, refusal enters to the corresponding privacy object of the privacy object access request Row is accessed.
Receive user and pass through the signal for the normal access module of startup for rocking the modes such as mobile phone and triggering.Specifically, when User bring back after mobile phone, it is necessary to normally using mobile phone when, pattern switching letter can be triggered for example, by rocking the modes such as mobile phone Number, so that privacy access module before is switched back into normal access module.
Interface for password input is shown to user, to ensure that user only in the case where inputting correct password, can just enter Enter the interface of normal access module, prevent unauthorized user from arbitrarily entering normal access module, so as to check privacy of user.
When user's input password is correct, into normal access module, user can access all the elements on mobile phone.
The method for the secret protection that the present embodiment is provided, by additionally setting the privacy different from normal access module to access Pattern, and under the privacy access module, refuse the access to privacy object, privacy can be effectively protected, security is improved.
Corresponding with the above method, the embodiment of the present invention also provides a kind of device of secret protection, the dress of the secret protection It can be terminal device to put, as shown in Figure 2 A, and described device 20 includes start unit 21, receiving unit 22 and processing unit 23.
Wherein, start unit 21, are accessed for after the trigger signal for starting privacy access module is obtained, starting privacy Pattern;
Receiving unit 22, for receiving the privacy object access request under the privacy access module;
Processing unit 23, for when the receiving unit 22 receives privacy object access request, refusing to described hidden The corresponding privacy object of private object access request conducts interviews,
Wherein, the privacy object is the object being protected the need for pre-setting.Object in the embodiment of the present invention Can be the object of file type, the object of contact person, short message etc. or Application Type, such as wechat, MSN etc..Privacy object is that user wishes that in the present invention, user can be according to itself not by the content that others sees or accesses Demand, it would be desirable to which any file and/or application program not accessed by others are set to privacy object.
Alternatively, in one embodiment of the invention, the start unit 21 is additionally operable to:Start privacy access obtaining After the trigger signal of pattern, the access strategy storehouse pre-established is enabled, the access strategy storehouse includes institute on terminal device There is the access strategy of object;
The processing unit 22 specifically for:Privacy object access request is corresponding according to the access strategy storehouse The access strategy of privacy object, obtains the access rights of the privacy object, wherein, the access strategy of the privacy object is indicated The access rights of the privacy object are to forbid accessing;According to the access rights of the privacy object, refuse to the privacy pair As the corresponding privacy object of access request conducts interviews.
Wherein, the access strategy storehouse pre-established can be locally stored on the device of secret protection, it is of course possible to It is stored on cloud server, by the device of secret protection from the cloud server dynamic access.
On the basis of a upper embodiment, further, in another embodiment of the present invention, all objects are respectively provided with peace Access strategy in full attribute, the access strategy storehouse defines the security attribute of object and the relation of access rights,
In terms of the access rights of the privacy object are obtained, the processing unit 23 specifically for:According to described hidden The security attribute of private object and the relation of access rights, obtain the access rights of the privacy object.
On the basis of the device embodiment of each above-mentioned secret protection, as shown in Figure 2 B, further embodiment of this invention is carried The device of the secret protection of confession also includes:
Display unit 24, for after the start unit 21 starts privacy access module, hiding the privacy object.
Further, the display unit 24 is additionally operable to:After the start unit 21 starts normal access module, show Show the hiding privacy object.
It should be noted that in actual applications, in the embodiment of the present invention, it should be appreciated that in a kind of implementation Under, the device of the secret protection can be mobile phone;Under another implementation, the device of the secret protection can also be Other terminal devices, its product form can be palm PC, PDA etc..
It can be seen that, the device of secret protection provided in an embodiment of the present invention, by additionally setting different from normal access module Privacy access module, and under the privacy access module, refuse the access to privacy object, so, user can not Check privacy object, it is possible to increase the security of secret protection.
It is worth noting that, in each embodiment of the device of above-mentioned secret protection, included unit is to press Divided according to function logic, but be not limited to above-mentioned division, as long as corresponding function can be realized;In addition, The specific name of each functional unit is also only to facilitate mutually distinguish, the protection domain being not intended to limit the invention.
Fig. 3 is the schematic diagram of terminal device provided in an embodiment of the present invention.Fig. 3 is refer to, it is provided in an embodiment of the present invention Terminal device 300 can be mobile phone, PDA, palm PC, tablet personal computer etc., and the terminal device 300 may include:Processor 310, communication interface 320, memory 330 and bus 340.
Wherein, processor 310, communication interface 320, memory 330 complete mutual communication by bus 340.
The communication interface 320, is used for and external device communication.
The memory 330, for depositing program 332, memory 330 can be high-speed random access memory (Random Access Memory, RAM) or nonvolatile memory (non-volatile memory), such as magnetic Disk storage.
Specifically, program 332 can include program code, and described program code includes computer-managed instruction.
Processor 310 is probably a central processing unit (CPU), or specific integrated circuit (Application Specific Integrated Circuit, ASIC), or be arranged to implement the one or more of the embodiment of the present invention Integrated circuit.
The processor 310, for reading described program 332, is performed:Obtaining the triggering letter of startup privacy access module After number, start privacy access module;Under the privacy access module, when receiving privacy object access request, refusal Privacy object corresponding to the privacy object access request conducts interviews, wherein, the privacy object is the need pre-set The object to be protected.
In one embodiment, the processor 310 is additionally operable to perform:Enable the access strategy storehouse pre-established;It is described Access strategy storehouse includes the access strategy of all objects on terminal device;The privacy object according to the access strategy storehouse The access strategy of the corresponding privacy object of access request, obtains the access rights of the privacy object, wherein, the privacy object Access strategy the access rights of the privacy object are indicated to forbid accessing;According to the access rights of the privacy object, refuse The definitely corresponding privacy object of the privacy object access request conducts interviews.
Wherein, the access strategy storehouse pre-established can be locally stored on terminal device, it is of course possible to be stored in On cloud server, by terminal device from the cloud server dynamic access.
Further, in another embodiment, all objects are respectively provided with the visit in security attribute, the access strategy storehouse Ask that strategy defines the security attribute of object and the relation of access rights;
In terms of the access rights of the privacy object are obtained, the processor 310 is specifically for performing:According to described The security attribute of privacy object and the relation of access rights, obtain the access rights of the privacy object.
In each above-mentioned embodiment, further, the processor 310 is additionally operable to perform:Start privacy visit obtaining After the trigger signal for asking pattern, the privacy object is hidden.
Wherein, the privacy object can be private file or privacy application program.
Further, in another embodiment, the processor 310 is additionally operable to perform:Start normal access obtaining After the trigger signal of pattern, the hiding privacy object of display.
Wherein, in embodiments of the present invention, the trigger signal and the startup privacy for starting normal access module is visited Ask that the trigger signal of pattern causes by the change of gravity sensing angle.
It can be seen that, terminal device provided in an embodiment of the present invention, by additionally setting the privacy different from normal access module Access module, and under the privacy access module, refuse the access to privacy object, so, user can not check hidden Private object, it is possible to increase the security of secret protection.
Each embodiment in this specification is described by the way of progressive, identical similar portion between each embodiment Divide mutually referring to what each embodiment was stressed is the difference with other embodiment.It is real especially for device Apply for example, because it is substantially similar to embodiment of the method, so describing fairly simple, related part is referring to embodiment of the method Part explanation.
It should be noted that, device embodiment described above is only schematical, wherein described be used as separating component The unit of explanation can be or may not be physically separate, and the part shown as unit can be or can also It is not physical location, you can with positioned at a place, or can also be distributed on multiple NEs.Can be according to reality Selection some or all of module therein is needed to realize the purpose of this embodiment scheme.In addition, the device that the present invention is provided In embodiment accompanying drawing, the annexation between module represents there is communication connection between them, specifically can be implemented as one or A plurality of communication bus or signal wire.Those of ordinary skill in the art are without creative efforts, you can to understand And implement.
Through the above description of the embodiments, it is apparent to those skilled in the art that the present invention can be borrowed Software is helped to add the mode of required common hardware to realize, naturally it is also possible to include application specific integrated circuit, specially by specialized hardware Realized with CPU, private memory, special components and parts etc..Generally, all functions of being completed by computer program can Easily realized with corresponding hardware, moreover, can also be a variety of many for the particular hardware structure for realizing same function Sample, such as analog circuit, digital circuit or special circuit.But, it is more for the purpose of the present invention in the case of software program it is real It is now more preferably embodiment.Understood based on such, technical scheme is substantially made to prior art in other words The part of contribution can be embodied in the form of software product, and the computer software product is stored in the storage medium that can be read In, such as floppy disk of computer, USB flash disk, mobile hard disk, read-only storage (Read-Only Memory, ROM), random access memory Device (Random Access Memory, RAM), magnetic disc or CD etc., including some instructions are to cause a computer to set Standby (can be personal computer, server, or network equipment etc.) performs the method described in each embodiment of the invention.
The foregoing is only a specific embodiment of the invention, but protection scope of the present invention is not limited thereto, any Those familiar with the art the invention discloses technical scope in, change or replacement can be readily occurred in, should all be contained Cover within protection scope of the present invention.Therefore, protection scope of the present invention should be based on the protection scope of the described claims.

Claims (10)

1. a kind of method of secret protection, it is characterised in that including:
After the trigger signal for starting privacy access module is obtained, start privacy access module, wherein, the startup privacy is visited Ask that the trigger signal of pattern is caused by the change of gravity sensing angle;
Under the privacy access module, when receiving privacy object access request, refusal please to the privacy object accesses Corresponding privacy object is asked to conduct interviews, wherein, the privacy object is the object being protected the need for pre-setting;
After refusal conducts interviews to the corresponding privacy object of the privacy object access request, methods described also includes:
Hide the privacy object.
2. according to the method described in claim 1, it is characterised in that obtain start privacy access module trigger signal it Afterwards, methods described also includes:Enable the access strategy storehouse pre-established;The access strategy storehouse includes owning on terminal device The access strategy of object;
It is described refusal the corresponding privacy object of the privacy object access request is conducted interviews including:
The access strategy of the corresponding privacy object of privacy object access request according to the access strategy storehouse, obtains described The access rights of privacy object, wherein, the access strategy of the privacy object indicates the access rights of the privacy object to prohibit Only access;
According to the access rights of the privacy object, refusal is visited the corresponding privacy object of the privacy object access request Ask.
3. method according to claim 2, it is characterised in that all objects are respectively provided with security attribute, the access strategy Access strategy in storehouse defines the security attribute of object and the relation of access rights,
The access strategy of the corresponding privacy object of privacy object access request according to the access strategy storehouse, is obtained The access rights of the privacy object include:
According to the security attribute of the privacy object and the relation of access rights, the access rights of the privacy object are obtained.
4. according to the method described in claim 1, it is characterised in that methods described also includes:
After the trigger signal for starting normal access module is obtained, the hiding privacy object of display.
5. the method according to any one of Claims 1-4, it is characterised in that the privacy object include private file or Privacy application program.
6. method according to claim 4, it is characterised in that the trigger signal of the normal access module of startup is by gravity Sense the change of angle and cause.
7. a kind of device of secret protection, it is characterised in that including:
Start unit, for after the trigger signal for starting privacy access module is obtained, starting privacy access module, wherein, The trigger signal for starting privacy access module is caused by the change of gravity sensing angle;
Receiving unit, for receiving the privacy object access request under the privacy access module;
Processing unit, for when the receiving unit receives privacy object access request, refusal to be visited the privacy object Ask that the corresponding privacy object of request conducts interviews,
Wherein, the privacy object is the object being protected the need for pre-setting;
Described device also includes:
Display unit, after being conducted interviews in refusal to the corresponding privacy object of the privacy object access request, hides The privacy object.
8. device according to claim 7, it is characterised in that the start unit is additionally operable to:Start privacy visit obtaining After the trigger signal for asking pattern, the access strategy storehouse pre-established is enabled, the access strategy storehouse is included on terminal device The access strategy of all objects;
The processing unit specifically for:The corresponding privacy pair of privacy object access request according to the access strategy storehouse The access strategy of elephant, obtains the access rights of the privacy object, wherein, the access strategy instruction of the privacy object is described hidden The access rights of private object are to forbid accessing;According to the access rights of the privacy object, refuse to the privacy object accesses Corresponding privacy object is asked to conduct interviews.
9. device according to claim 8, it is characterised in that all objects are respectively provided with security attribute, the access strategy Access strategy in storehouse defines the security attribute of object and the relation of access rights,
In terms of the access rights of the privacy object are obtained, the processing unit specifically for:According to the privacy object Security attribute and access rights relation, obtain the access rights of the privacy object.
10. device according to claim 7, it is characterised in that the display unit is additionally operable to:Opened in the start unit Move after normal access module, show the hiding privacy object.
CN201310214042.0A 2013-05-31 2013-05-31 The method and apparatus of secret protection Active CN103324893B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310214042.0A CN103324893B (en) 2013-05-31 2013-05-31 The method and apparatus of secret protection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310214042.0A CN103324893B (en) 2013-05-31 2013-05-31 The method and apparatus of secret protection

Publications (2)

Publication Number Publication Date
CN103324893A CN103324893A (en) 2013-09-25
CN103324893B true CN103324893B (en) 2017-11-07

Family

ID=49193627

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310214042.0A Active CN103324893B (en) 2013-05-31 2013-05-31 The method and apparatus of secret protection

Country Status (1)

Country Link
CN (1) CN103324893B (en)

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103886262A (en) * 2014-02-21 2014-06-25 联想(北京)有限公司 Information processing method and electronic equipment
CN103885858B (en) * 2014-03-11 2017-05-10 惠州Tcl移动通信有限公司 Method and system for mobile phone backup and data recovery
EP3119158A4 (en) * 2014-03-31 2017-03-08 Huawei Technologies Co. Ltd. Privacy protection method and terminal device
CN104168277A (en) * 2014-08-15 2014-11-26 小米科技有限责任公司 File security maintaining method and device
CN104318145A (en) * 2014-09-26 2015-01-28 来安县新元机电设备设计有限公司 Method and system for privacy protection
CN105574423B (en) * 2014-10-09 2021-05-04 中兴通讯股份有限公司 Terminal equipment and file management method thereof
CN104468997B (en) * 2014-12-01 2017-09-19 努比亚技术有限公司 Encrypted state processing method and processing device
CN104462954B (en) * 2014-12-18 2018-02-27 联想(北京)有限公司 control method and device
WO2016119164A1 (en) * 2015-01-29 2016-08-04 宇龙计算机通信科技(深圳)有限公司 Terminal security management method and apparatus
CN106485137B (en) * 2015-08-26 2020-02-07 北京安云世纪科技有限公司 Application program control method, application program control device and terminal
CN106485102A (en) * 2015-08-26 2017-03-08 北京奇虎科技有限公司 Application control method, application program controlling device and terminal
CN105262909B (en) * 2015-11-30 2020-06-12 腾讯科技(深圳)有限公司 Mobile terminal using method, mobile terminal and storage medium
CN107103245B (en) * 2016-02-23 2022-08-02 中兴通讯股份有限公司 File authority management method and device
CN106033330B (en) * 2016-05-24 2019-10-08 努比亚技术有限公司 A kind of display methods and terminal device
CN106022148A (en) * 2016-05-26 2016-10-12 北京金山安全软件有限公司 File encryption method and device
CN106569862A (en) * 2016-11-08 2017-04-19 深圳Tcl新技术有限公司 Intelligent application start method and apparatus
CN107122686B (en) * 2017-05-05 2020-02-21 广东小天才科技有限公司 Method and device for sharing screen content and mobile terminal
CN107704766A (en) * 2017-08-29 2018-02-16 努比亚技术有限公司 Multimedia file access control method, terminal and computer-readable recording medium
CN108197506B (en) * 2017-11-27 2021-05-04 努比亚技术有限公司 Terminal display control method, terminal and computer readable storage medium
CN110287667A (en) * 2019-06-03 2019-09-27 Oppo(重庆)智能科技有限公司 Privacy information processing method and relevant device
CN115495721A (en) * 2021-06-18 2022-12-20 华为技术有限公司 Access control method and related device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101588572A (en) * 2009-04-28 2009-11-25 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and control method thereof
CN102508609A (en) * 2011-11-17 2012-06-20 潘天华 Method for controlling displaying and hiding of computer application program window
CN102567105A (en) * 2010-12-31 2012-07-11 上海格尔软件股份有限公司 Method for hiding Windows system tray
CN102662649A (en) * 2012-03-06 2012-09-12 惠州Tcl移动通信有限公司 Method and apparatus for customizing function menu of application programs
CN102880837A (en) * 2012-08-24 2013-01-16 腾讯科技(深圳)有限公司 Method for improving security of mobile terminal and mobile terminal

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202178815U (en) * 2011-08-12 2012-03-28 北京新媒传信科技有限公司 Cell phone capable of automatic switchover of scene mode

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101588572A (en) * 2009-04-28 2009-11-25 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and control method thereof
CN102567105A (en) * 2010-12-31 2012-07-11 上海格尔软件股份有限公司 Method for hiding Windows system tray
CN102508609A (en) * 2011-11-17 2012-06-20 潘天华 Method for controlling displaying and hiding of computer application program window
CN102662649A (en) * 2012-03-06 2012-09-12 惠州Tcl移动通信有限公司 Method and apparatus for customizing function menu of application programs
CN102880837A (en) * 2012-08-24 2013-01-16 腾讯科技(深圳)有限公司 Method for improving security of mobile terminal and mobile terminal

Also Published As

Publication number Publication date
CN103324893A (en) 2013-09-25

Similar Documents

Publication Publication Date Title
CN103324893B (en) The method and apparatus of secret protection
CN103902862B (en) A kind of mobile device management method, apparatus and a kind of mobile equipment
US10635456B2 (en) Method for entering operating system desktop and mobile intelligent terminal
US20160275281A1 (en) Selectively providing personal information and access to functionality on lock screen based on biometric user authentication
RU2630553C2 (en) Method, instrumentation, and device for adding connected expansion to address book
CN105701420B (en) A kind of management method and terminal of user data
CN107038369A (en) The method and terminal of a kind of resources accessing control
CN106462713B (en) The interface display method and terminal of terminal
CN102710847A (en) Method for managing access of multiple visitors to mobile terminal
US8881268B2 (en) Secure area for apps
CN106815509B (en) Multimedia file protection method and device and electronic equipment
WO2016145706A1 (en) Method and device for implementing user mode switching on smart terminal, and smart terminal
EP1512057A1 (en) Trusted user interface for a secure mobile wireless device
WO2017008348A1 (en) Data card switching control method and apparatus, and terminal device
CN107770146B (en) User data authority control method and device
CN106959754A (en) Method for controlling mobile terminal and mobile terminal
CN108932435A (en) A kind of information security management method, terminal device and computer readable storage medium
CN107506637A (en) Information displaying method and device, terminal and readable storage medium storing program for executing
US20140310606A1 (en) Method and device for providing plugin in contact list
CN107483704A (en) A kind of private space method to set up and terminal device
CN109426735A (en) A kind of method and system for protecting individual privacy
CN107391977B (en) Permission control and automatic switching method, device and equipment
CN107766712A (en) Message prompt method, terminal and computer-readable medium
CN112800401B (en) Privacy processing method, privacy processing device and terminal
Wijesekera et al. Dynamically regulating mobile application permissions

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20211227

Address after: 450046 Floor 9, building 1, Zhengshang Boya Plaza, Longzihu wisdom Island, Zhengdong New Area, Zhengzhou City, Henan Province

Patentee after: xFusion Digital Technologies Co., Ltd.

Address before: 518129 Bantian HUAWEI headquarters office building, Longgang District, Guangdong, Shenzhen

Patentee before: HUAWEI TECHNOLOGIES Co.,Ltd.

TR01 Transfer of patent right