CN103488942A - Method and device for processing file/application program on mobile communication terminal - Google Patents

Method and device for processing file/application program on mobile communication terminal Download PDF

Info

Publication number
CN103488942A
CN103488942A CN201310436177.1A CN201310436177A CN103488942A CN 103488942 A CN103488942 A CN 103488942A CN 201310436177 A CN201310436177 A CN 201310436177A CN 103488942 A CN103488942 A CN 103488942A
Authority
CN
China
Prior art keywords
file
communication terminal
application program
operated
event
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310436177.1A
Other languages
Chinese (zh)
Inventor
马章栋
冯立夫
黄媛媛
刘中超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201310436177.1A priority Critical patent/CN103488942A/en
Publication of CN103488942A publication Critical patent/CN103488942A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a method and a device for processing a file/application program on a mobile communication terminal. The method includes the steps: monitoring the motion state of the mobile communication terminal and an operated event of the file/application program; determining the operated file/application program as an object needing to be protected as privacy information if the operated event of the file/application program and the motion state of the mobile communication terminal meeting preset conditions within a preset time range are monitored; correspondingly protecting the operated file/application program according to a preset privacy protection operation mode to avoid leakage of the operated file/application program. By the method and the device, the privacy information of a user can be more effectively protected in the process of protecting the object needing to be protected as the privacy information on terminal equipment.

Description

File/applied program processing method on communication terminal and device
Technical field
The present invention relates to file/application program conservation treatment technical field, be specifically related to file/applied program processing method and device on communication terminal.
Background technology
The functions such as at present Intelligent mobile communication terminal (comprising mobile phone, panel computer etc.) provides takes pictures, record a video, recording have been brought happiness adventure in daily life easily for the user really, yet a problem can not be ignored is exactly privacy.The storage space of communication terminal is in continuous increase, can store the files such as a lot of pictures, video and recording in a communication terminal, these multimedia files are generally individual privacies for the user, if communication terminal is obtained by others, these information will face the risk of being revealed.
Therefore, the technical matters solved in the urgent need to those skilled in the art just is: how the information realization that needs to be protected as privacy information on the terminal called terminal is effectively protected.
Summary of the invention
In view of the above problems; the present invention has been proposed so as file/applied program processing method on a kind of communication terminal that overcomes the problems referred to above or address the above problem at least in part to be provided and corresponding mobile communication terminal device on file/application processing apparatus; in the process that can need to be protected as privacy information on to terminal device, more effective protection user's privacy information.
According to one aspect of the present invention, the file/applied program processing method on a kind of communication terminal is provided, comprising:
Motion state and the operated event of file/application program to communication terminal are monitored;
If monitor the operated event of file/application program, and monitor the preset condition of meeting of communication terminal in preset time range, operated file/application program is defined as to the object that need to be protected as privacy information;
According to preset secret protection mode of operation, operated file/application program is carried out to corresponding protection operation, revealed to avoid operated file/application program.
Alternatively, the described motion state to communication terminal is monitored, and comprising:
Sensor from described communication terminal obtains the moving parameter information that described sensor detects;
If described moving parameter information meets preset condition, the motion state of described communication terminal meets prerequisite.
Alternatively, the described motion state to communication terminal and the operated event of file/application program also comprise before monitoring:
The application program of moving in communication terminal is monitored;
If the application program of moving belongs to preset critical applications, start motion state and the operated event of file/application program of communication terminal are monitored.
Alternatively, the described motion state to communication terminal and the operated event of file/application program are monitored and are comprised:
The event that the motion state of communication terminal and new file are created is monitored.
Alternatively, described the event that in communication terminal, new file is created is monitored, being comprised:
New document creation event in assigned catalogue in communication terminal is monitored.
Alternatively, also comprise:
While monitoring the event that creates new file, obtain the file type information of new file;
Monitor the operated event of file/application program if described; and the motion state that monitors communication terminal in preset time range meets preset condition; operated file/application program is defined as to the object that need to be protected as privacy information, comprises:
If monitoring creates the event of new file; and the file type of described new file belongs to preset type; and the motion state that monitors communication terminal in preset time range meets preset condition, described new file is defined as to the object that need to be protected as privacy information.
Alternatively, also comprise:
When monitoring the operated event of file/application program, record the very first time;
When the motion state that monitors communication terminal meets preset condition, recorded for the second time;
Monitor the operated event of file/application program if described; and the motion state that monitors communication terminal in preset time range meets preset condition; operated file/application program is defined as to the object that need to be protected as privacy information, comprises:
If monitor the operated event of file/application program; and the motion state of communication terminal meets preset condition; and the mistiming between the described very first time and the second time is less than preset time threshold, operated file/application program is defined as to the object that need to be protected as privacy information.
Alternatively, described the operated event of file/application program in communication terminal is monitored, being comprised:
The Action Events that file in communication terminal is edited, application program is mounted or application program is used is monitored.
Alternatively, describedly according to preset secret protection mode of operation, operated file/application program is carried out to corresponding protection operation, comprising:
Operated file/application program is carried out to deletion action;
Perhaps,
According to preset catalogue, operated file/application program is transferred under preassigned catalogue;
Perhaps,
According to preset password, operated file/application program is encrypted.
Alternatively, protection mode of operation corresponding to dissimilar file/application program.
According to a further aspect in the invention, provide the file/application processing apparatus on a kind of communication terminal, having comprised:
Monitoring unit, monitored for the motion state to communication terminal and the operated event of file/application program;
Determining unit, if for monitoring the operated event of file/application program, and the motion state that monitors communication terminal in preset time range meets preset condition, operated file/application program is defined as to the object that need to be protected as privacy information;
Operating unit, carry out corresponding protection operation for the secret protection mode of operation according to preset to operated file/application program, to avoid operated file/application program, revealed.
Alternatively, described monitoring unit comprises:
Moving parameter information is obtained subelement, for the sensor from described communication terminal, obtains the moving parameter information that described sensor detects;
The condition judgment subelement, if meet preset condition for described moving parameter information, the motion state of described communication terminal meets prerequisite.
Alternatively, also comprise:
The working procedure monitoring unit, the event be created for the motion state to communication terminal and new file is monitored the application program of moving in communication terminal before being monitored;
Start unit, if belong to preset critical applications for the application program of moving, start the event that the motion state of communication terminal and new file are created and monitored.
Alternatively, described monitoring unit comprises:
The first monitoring subelement, the event be created for the motion state to communication terminal and new file is monitored.
Alternatively, described first the monitoring subelement specifically for:
New document creation event in assigned catalogue in communication terminal is monitored.
Alternatively, also comprise:
The type information acquiring unit, when monitoring the event that creates new file, obtain the file type information of new file;
Described determining unit specifically for:
If monitoring creates the event of new file; and the file type of described new file belongs to preset type; and the motion state that monitors communication terminal in preset time range meets preset condition, described new file is defined as to the object that need to be protected as privacy information.
Alternatively, also comprise:
Very first time record cell, for when monitoring the operated event of file/application program, record the very first time;
The second time record cell, while for the motion state that monitors communication terminal, meeting preset condition, recorded for the second time;
Described determining unit specifically for:
If monitor the operated event of file/application program; and the motion state of communication terminal meets preset condition; and the mistiming between the described very first time and the second time is less than preset time threshold, operated file/application program is defined as to the object that need to be protected as privacy information.
Alternatively, described monitoring unit comprises:
The second monitoring subelement, monitored for the Action Events that the file to communication terminal is edited, application program is mounted or application program is used.
Alternatively, described operating unit comprises:
The deletion action subelement, for carrying out deletion action to operated file/application program;
Perhaps,
Shift subelement, for the catalogue according to preset, operated file/application program is transferred under preassigned catalogue;
Perhaps,
Encrypt subelement, for the password according to preset, operated file/application program is encrypted.
Alternatively, protection mode of operation corresponding to dissimilar file/application program.
According to the file/applied program processing method on communication terminal of the present invention and device; can be monitored motion state and the operated event of file/application program of communication terminal; if find that file/application program is operated; and the motion state that monitors communication terminal in preset time range meets preset condition; can, using it as the user to carrying out the confirmation of secret protection operation, therefore can directly according to preset secret protection mode of operation, to new file, carry out the protection operation.Visible; in this process; can directly by the mode of operation that detects the user, confirm; user-friendly; and, after the user confirms to be protected, can directly according to pre-set protection mode of operation backstage, carry out concrete protection operation, and not need the user to select again the operations such as concrete transfer path, setting code in interface; therefore, can further reduce the risk that user's privacy file is revealed.
Above-mentioned explanation is only the general introduction of technical solution of the present invention, in order to better understand technological means of the present invention, and can be implemented according to the content of instructions, and for above and other objects of the present invention, feature and advantage can be become apparent, below especially exemplified by the specific embodiment of the present invention.
The accompanying drawing explanation
By reading hereinafter detailed description of the preferred embodiment, various other advantage and benefits will become cheer and bright for those of ordinary skills.Accompanying drawing is only for the purpose of preferred implementation is shown, and do not think limitation of the present invention.And, in whole accompanying drawing, by identical reference symbol, mean identical parts.In the accompanying drawings:
Fig. 1 shows the process flow diagram of method according to an embodiment of the invention; And
Fig. 2 shows the schematic diagram of an apparatus in accordance with one embodiment of the invention.
Embodiment
Exemplary embodiment of the present disclosure is described below with reference to accompanying drawings in more detail.Although shown exemplary embodiment of the present disclosure in accompanying drawing, yet should be appreciated that and can realize the disclosure and the embodiment that should do not set forth limits here with various forms.On the contrary, it is in order more thoroughly to understand the disclosure that these embodiment are provided, and can be by the scope of the present disclosure complete conveys to those skilled in the art.
In embodiments of the present invention; can provide a application program of communication terminal that runs on (for ease of describing; in the embodiment of the present invention, this application program is called to " defence program "); this defence program can be monitored motion state and the operated event of file/application program of communication terminal; then according to monitored results, come file/application program is carried out to the secret protection operation.For example; can be monitored the event that creates new file; if finding that there is new file is created; also judge the privacy file that its possibility is the user; if; the event that can shake communication terminal to the user is monitored, if monitor the event of shaking, can carry out the protection operation to the file of new establishment according to preset mode.That is to say, from user perspective, say, can be that file/application program is formulated the protection mode of operation in advance, for example can directly delete, perhaps file is shifted and specifies in advance the target directory position of shifting, perhaps, the password used in the time of can also being encrypted and specify encrypting in advance file, etc., like this, at a newly-generated file, perhaps file is operated, after perhaps application program is mounted or is used, the user just can shake communication terminal, with this, come the trigger protection program to carry out below corresponding secret protection operation this is at length introduced operated file/application program.
Referring to Fig. 1; at first the embodiment of the present invention provides the file/applied program processing method on a kind of communication terminal; in the method, the executive agent of each step can be just previously described defence program, certainly also may realize by the mode of hardware in actual applications.The method can comprise the following steps:
S101: motion state and the operated event of file/application program to communication terminal are monitored;
During specific implementation, the operated event of file/application program just can comprise the event that new file is created, the event that existing file is edited, the event that application program is mounted, event that application program is used etc.Except the operated event of file/application program is monitored, can also be monitored the motion state of communication terminal.During specific implementation, can obtain the moving parameter information that sensor detects by the sensor from communication terminal, judge whether these moving parameter information meet preset condition.Wherein, so-called sensor can be motion sensor, it is generally the sensor carried in mobile communication terminal device, kinematic parameter for detection of communication terminal, and can detect direction of motion, amplitude, acceleration etc., whether the motion state that can judge thus mobile communication terminal device meets preset condition.For example, whether be the event etc. of shaking that the user initiatively sends.The event of shaking refers to the event of shaking communication terminal, shake the communication terminal event just can trigger after meeting the condition of shaking set in advance, such as the transient change of gravity direction and communication terminal coordinate system angle reaches threshold value, and acceleration reaches the event of shaking that just can be identified as the user in the situation of threshold value and occurs.Therefore; defence program in the embodiment of the present invention just can obtain from the sensor of communication terminal the moving parameter information of communication terminal; comprise the information such as direction of motion, acceleration, defence program can be judged the event whether communication terminal has occurred to shake according to predefined angle threshold value, acceleration rate threshold etc.
In addition, generally, only in some specific application programs in when operation, just may produce and may need the file of being protected as privacy information, or this specific application program itself may belong to the application program that need to carry out secret protection.Therefore; defence program in the embodiment of the present invention can also be monitored the application program of current operation in communication terminal; if finding critical applications moves; restart motion state and the operated event of file/application program of communication terminal are monitored; if the application program of current operation does not comprise the critical applications that may produce the privacy file, can start the event that the motion state of communication terminal and new file are created and be monitored.Wherein, so-called critical applications can comprise camera, video recorder, recorder program, instant messaging program etc.Wherein, the API that detecting the current program information moved can provide by system completes, and the program of for example under the Android system, obtaining working procedure information is as follows:
// obtain system service ActivityManager
ActivityManager?manager=(ActivityManager)getSystemService(ACTIVITY_SERVICE);
// obtain the current task stack list moved,
List<RunningTaskInfo>runningTasks=manager.getRunningTasks(1);
// obtain the task stack of current top, i.e. foreground task stack
RunningTaskInforunningTaskInfo=runningTasks.get(0);
// obtain the top Activity of foreground task stack
ComponentNametopActivity=runningTaskInfo.topActivity;
// obtain the bag name of application
String?packageName=topActivity.getPackageName();。
Method getSystemService () wherein, getRunningTasks (), getPackageName () is the api function that the Android system provides.
Wherein, in order to be protected timely the file/application program that may belong to privacy of user, in embodiments of the present invention, at first defence program can be monitored the operated event of file/application program by a background process.Concrete, in order to realize this monitoring, various ways can be arranged.For example, under a kind of mode, can utilize the event sniffer of communication terminal operating system therein, the broadcast that the snoop-operations system is sent, by the filtration to system broadcast message, know the operated event of file/application program.That is to say, background program can pass through the event sniffer of communication terminal operating system, system message to each generation is judged, if type of message is the operated event of file/application program, can therefrom extract filename, the suffix name of operated file, the information such as title of operated application program.For example, under the Android system, when creating new file, system can be sent the broadcast that creates file, background program can arrange a BroadCastReceiver and broadcast monitored and filter, and judges whether to occur to create the event of new file according to the type of message of broadcast.
Perhaps, under another kind of implementation, also can utilize the Hook Function of communication terminal operating system, the operated event of user file/application program is monitored.That is to say, in the operated process of file/application program, need to call relevant program and realize the operation to file/application program, in embodiments of the present invention, can use the API Hook Function, background program can provide Hook Function also by original deflector guide subfunction (usually realizing by the Modification growth function entry address) of calling, Hook Function just can obtain the information such as filename, suffix name of operated file like this, complete the monitoring to the operated event of file/application program, and obtain the information such as filename in event, application name.
It should be noted that, in actual applications, in communication terminal, for the catalogue of preserving file, generally have a lot, but the privacy file that may comprise the user in general only some catalogue, and other catalogue, such as for storage system file etc., for the sightless catalogue of user, generally not depositing user's privacy file.Therefore, in the process of being monitored in the event to creating new file, can only to some specific catalogues, be monitored, monitor the variation of this specific catalogue File, whether judgement wherein has new file to be created.For example, this specific catalogue can be the catalogue of the files such as photo for preserving the user, video.
S102: if monitor the operated event of file/application program, and the motion state that monitors communication terminal in preset time range meets preset condition, operated file/application program is defined as to the object that need to be protected as privacy information;
If monitored the operated event of file/application program; and before this event or the motion state that communication terminal also detected in certain hour section afterwards meet prerequisite; the motion state of communication terminal can be met to this event of prerequisite is defined as the needs that the user sends and file/application program is carried out to the trigger event of secret protection; therefore, just this document/application program can be defined as to the object that need to be protected as privacy information.
During specific implementation, when monitoring the operated event of file/application program, record the very first time, when the motion state that monitors communication terminal meets preset condition, recorded for the second time; Like this; if monitor the operated event of file/application program; and the motion state of communication terminal meets preset condition; and the mistiming between the described very first time and the second time is less than preset time threshold, operated file/application program is defined as to the object that need to be protected as privacy information.Wherein, sequencing relation between the very first time and the second time can not limited; that is to say; for the user; needs using certain file/application program when privacy information is protected; can be before this document/application program be operated or afterwards, carry out operations such as shaking communication terminal, so just can automatically trigger file/application program is carried out to secret protection.
Wherein, for the event that creates new file, being defined as, operated file/application program need to, before the object of privacy information protection, can also further be judged.Specifically when being judged, if be before the monitoring that the event to creating new file in specific catalogue is carried out, can be directly according to the new catalogue at file place, judging that it belongs to need to be as the object of privacy information protection.That is to say, because the catalogue that only to some, may produce the privacy file is in advance monitored, therefore, the new file monitored is all just the file in these specific catalogues, it can be defined as to the file that need to be protected as privacy information.Otherwise, created new file even monitor, and also monitored qualified motion state in the regular hour scope, also can not will its be defined as the file that need to be protected as privacy information.
Perhaps; when monitoring new document creation event; can also get the information such as suffix name of new file; therefore; can analyze accordingly the file type information of the file that makes new advances; and then, can judge whether new file is the object that the user need to be protected as privacy information according to file type information.For example, generally, if find that file type belongs to the types such as picture, video, audio frequency, can be judged to be the object that need to be protected as privacy information.
Certainly, in order further to improve the accuracy of judgement, also above-mentioned two kinds of modes can be combined.Be also; can be monitored the establishment event of new file in some specific catalogues; if find in specific catalogue to have created new file; determine again the file type of the file that makes new advances according to the suffix name of new file; if file type belongs to again preset particular type, can will should the new file created may be just the object that need to be protected as privacy information.
For example, example in practical application can be: at first start application monitor service program (running background), when the application watchdog routine detects the application program (camera relevant to privacy, while sound-track engraving apparatus etc.) starting, startup file monitor service program (running background) and shake trace routine (running background), the establishment event of file under the relevant path of file monitor program monitoring, when the privacy document creation is arranged, the time that log file creates, when the event of shaking occurs, record shakes the time of origin of event, poor between two times relatively, when time of the event of shaking at document creation in the special time threshold value after the time (as 10 seconds) time, the conservation treatment operation of execution to the privacy file.
S103: according to preset secret protection mode of operation, operated file/application program is carried out to corresponding protection operation, revealed to avoid operated file/application program.
Determining after an operated file/application program belongs to the object that need to be protected as privacy information, just can carry out the protection operation by the new file created according to preset secret protection mode of operation.
Wherein, the secret protection operation of operated file/application program is directly deleted operated file/application program; Operated file/application program is shifted, now, can be specified by the user target directory position of shifting when setting in advance; Again or, can also be encrypted operated file/application program, and, can be specified by the user password used while encrypting when setting in advance, etc.It should be noted that; because the operated file/application program under dissimilar or different directories may have different severity levels; operated file/the application program that therefore, can be respectively under dissimilar or different directories arranges different protection modes of operation.For example, the file of picture category is set to shift and preserves, and the privacy file of video class is set to encrypt etc.
In a word; in embodiments of the present invention; can be monitored motion state and the operated event of file/application program of communication terminal; if find that file/application program is operated; and the motion state that monitors communication terminal in preset time range meets preset condition; can, using it as the user to carrying out the confirmation of secret protection operation, therefore can directly according to preset secret protection mode of operation, to new file, carry out the protection operation.Visible; in this process; can directly by the mode of operation that detects the user, confirm; user-friendly; and, after the user confirms to be protected, can directly according to pre-set protection mode of operation backstage, carry out concrete protection operation, and not need the user to select again the operations such as concrete transfer path, setting code in interface; therefore, can further reduce the risk that user's privacy file is revealed.
File/applied program processing method on the communication terminal provided with the embodiment of the present invention is corresponding, and the embodiment of the present invention also provides the file/application processing apparatus on a kind of communication terminal, and referring to Fig. 2, this device can comprise:
Monitoring unit 201, monitored for the motion state to communication terminal and the operated event of file/application program;
Determining unit 202, if for monitoring the operated event of file/application program, and the motion state that monitors communication terminal in preset time range meets preset condition, operated file/application program is defined as to the object that need to be protected as privacy information;
Operating unit 203, carry out corresponding protection operation for the secret protection mode of operation according to preset to operated file/application program, to avoid operated file/application program, revealed.
Wherein, described monitoring unit can comprise:
Moving parameter information is obtained subelement, for the sensor from described communication terminal, obtains the moving parameter information that described sensor detects;
The condition judgment subelement, if meet preset condition for described moving parameter information, the motion state of described communication terminal meets prerequisite.
This device can also comprise:
The working procedure monitoring unit, the event be created for the motion state to communication terminal and new file is monitored the application program of moving in communication terminal before being monitored;
Start unit, if belong to preset critical applications for the application program of moving, start the event that the motion state of communication terminal and new file are created and monitored.
Wherein, described monitoring unit comprises:
The first monitoring subelement, the event be created for the motion state to communication terminal and new file is monitored.
Wherein said first the monitoring subelement specifically for:
New document creation event in assigned catalogue in communication terminal is monitored.
This device can also comprise:
The type information acquiring unit, when monitoring the event that creates new file, obtain the file type information of new file;
Described determining unit specifically for:
If monitoring creates the event of new file; and the file type of described new file belongs to preset type; and the motion state that monitors communication terminal in preset time range meets preset condition, described new file is defined as to the object that need to be protected as privacy information.
This device can also comprise:
Very first time record cell, for when monitoring the operated event of file/application program, record the very first time;
The second time record cell, while for the motion state that monitors communication terminal, meeting preset condition, recorded for the second time;
Described determining unit specifically for:
If monitor the operated event of file/application program; and the motion state of communication terminal meets preset condition; and the mistiming between the described very first time and the second time is less than preset time threshold, operated file/application program is defined as to the object that need to be protected as privacy information.
Described monitoring unit comprises:
The second monitoring subelement, monitored for the Action Events that the file to communication terminal is edited, application program is mounted or application program is used.
Described monitoring unit comprises:
Moving parameter information is obtained subelement, for the sensor from described communication terminal, obtains the moving parameter information that described sensor detects;
The condition judgment subelement, if meet preset condition for described moving parameter information, the motion state of described communication terminal meets prerequisite.
Described operating unit comprises:
The deletion action subelement, for carrying out deletion action to operated file/application program;
Perhaps,
Shift subelement, for the catalogue according to preset, operated file/application program is transferred under preassigned catalogue;
Perhaps,
Encrypt subelement, for the password according to preset, operated file/application program is encrypted.
During specific implementation, the protection mode of operation that dissimilar file/application program can be corresponding different.
Visible; in embodiments of the present invention; can be monitored motion state and the operated event of file/application program of communication terminal; if find that file/application program is operated; and the motion state that monitors communication terminal in preset time range meets preset condition; can, using it as the user to carrying out the confirmation of secret protection operation, therefore can directly according to preset secret protection mode of operation, to new file, carry out the protection operation.Visible; in this process; can directly by the mode of operation that detects the user, confirm; user-friendly; and, after the user confirms to be protected, can directly according to pre-set protection mode of operation backstage, carry out concrete protection operation, and not need the user to select again the operations such as concrete transfer path, setting code in interface; therefore, can further reduce the risk that user's privacy file is revealed.
In a word, the embodiment of the present invention provides the communication terminal of a kind of simple, novelty and easy operating to hide fast the method for privacy file, realize multimedia file hiding apparatus and method fast by detecting the whole action of shaking of communication terminal itself, comprise the method that monitoring is running application, detect communication terminal and shake the method for action, and multimedia file is carried out to hiding method.The present invention is intended to solve because the complicated operation of hiding the privacy file operates to hiding the inconvenience caused.The method and apparatus proposed by this programme, mobile device automatically detects and completes the hidden function under respective operations, make need not be loaded down with trivial details operation just can be by important privacy file hiding.
The algorithm provided at this is intrinsic not relevant to any certain computer, virtual system or miscellaneous equipment with demonstration.Various general-purpose systems also can with based on using together with this teaching.According to top description, it is apparent constructing the desired structure of this type systematic.In addition, the present invention is not also for any certain programmed language.It should be understood that and can utilize various programming languages to realize content of the present invention described here, and the top description that language-specific is done is in order to disclose preferred forms of the present invention.
In the instructions that provided herein, a large amount of details have been described.Yet, can understand, embodiments of the invention can be in the situation that do not have these details to put into practice.In some instances, be not shown specifically known method, structure and technology, so that not fuzzy understanding of this description.
Similarly, be to be understood that, in order to simplify the disclosure and to help to understand one or more in each inventive aspect, in the description to exemplary embodiment of the present invention, each feature of the present invention is grouped together in single embodiment, figure or the description to it sometimes in the above.Yet the method for the disclosure should be construed to the following intention of reflection: the present invention for required protection requires the more feature of feature than institute clearly puts down in writing in each claim.Or rather, as following claims are reflected, inventive aspect is to be less than all features of the disclosed single embodiment in front.Therefore, claims of following embodiment are incorporated to this embodiment thus clearly, and wherein each claim itself is as independent embodiment of the present invention.
Those skilled in the art are appreciated that and can adaptively change and they are arranged in one or more equipment different from this embodiment the module in the equipment in embodiment.Can be combined into a module or unit or assembly to the module in embodiment or unit or assembly, and can put them into a plurality of submodules or subelement or sub-component in addition.At least some in such feature and/or process or unit are mutually repelling, and can adopt any combination to disclosed all features in this instructions (comprising claim, summary and the accompanying drawing followed) and so all processes or the unit of disclosed any method or equipment are combined.Unless clearly statement in addition, in this instructions (comprising claim, summary and the accompanying drawing followed) disclosed each feature can be by providing identical, be equal to or the alternative features of similar purpose replaces.
In addition, those skilled in the art can understand, although embodiment more described herein comprise some feature rather than further feature included in other embodiment, the combination of the feature of different embodiment means within scope of the present invention and forms different embodiment.For example, in the following claims, the one of any of embodiment required for protection can be used with array mode arbitrarily.
All parts embodiment of the present invention can realize with hardware, or realizes with the software module of moving on one or more processor, or realizes with their combination.It will be understood by those of skill in the art that and can use in practice microprocessor or digital signal processor (DSP) to realize according to some or all some or repertoire of parts in the file on the communication terminal of the embodiment of the present invention/application program treatment facility.The present invention for example can also be embodied as, for carrying out part or all equipment or device program (, computer program and computer program) of method as described herein.The program of the present invention that realizes like this can be stored on computer-readable medium, or can have the form of one or more signal.Such signal can be downloaded and obtain from internet website, or provides on carrier signal, or provides with any other form.
It should be noted above-described embodiment the present invention will be described rather than limit the invention, and those skilled in the art can design alternative embodiment in the situation that do not break away from the scope of claims.In the claims, any reference symbol between bracket should be configured to limitations on claims.Word " comprises " not to be got rid of existence and is not listed in element or the step in claim.Being positioned at word " " before element or " one " does not get rid of and has a plurality of such elements.The present invention can realize by means of the hardware that includes some different elements and by means of the computing machine of suitably programming.In having enumerated the unit claim of some devices, several in these devices can be to carry out imbody by same hardware branch.The use of word first, second and C grade does not mean any order.Can be title by these word explanations.
The application can be applied to computer system/server, and it can operation together with numerous other universal or special computingasystem environment or configuration.The example of well-known computing system, environment and/or the configuration that is suitable for using together with computer system/server includes but not limited to: personal computer system, server computer system, thin client, thick client computer, hand-held or laptop devices, the system based on microprocessor, Set Top Box, programmable consumer electronics, NetPC Network PC, little type Ji calculate machine Xi Tong ﹑ large computer system and comprise the distributed cloud computing technology environment of above-mentioned any system, etc.
Computer system/server can be described under the general linguistic context of the computer system executable instruction (such as program module) of being carried out by computer system.Usually, program module can comprise routine, program, target program, assembly, logic, data structure etc., and they are carried out specific task or realize specific abstract data type.Computer system/server can be implemented in distributed cloud computing environment, and in distributed cloud computing environment, task is to be carried out by the teleprocessing equipment linked by communication network.In distributed cloud computing environment, program module can be positioned on the Local or Remote computing system storage medium that comprises memory device.
The invention also discloses the file/applied program processing method on A1, a kind of communication terminal, comprising:
Motion state and the operated event of file/application program to communication terminal are monitored;
If monitor the operated event of file/application program, and monitor the preset condition of meeting of communication terminal in preset time range, operated file/application program is defined as to the object that need to be protected as privacy information;
According to preset secret protection mode of operation, operated file/application program is carried out to corresponding protection operation, revealed to avoid operated file/application program.
A2, method as described as A1, the described motion state to communication terminal is monitored, and comprising:
Sensor from described communication terminal obtains the moving parameter information that described sensor detects;
If described moving parameter information meets preset condition, the motion state of described communication terminal meets prerequisite.
A3, method as described as A1, the described motion state to communication terminal and the operated event of file/application program also comprise before monitoring:
The application program of moving in communication terminal is monitored;
If the application program of moving belongs to preset critical applications, start motion state and the operated event of file/application program of communication terminal are monitored.
A4, method as described as A1, the described motion state to communication terminal and the operated event of file/application program are monitored and are comprised:
The event that the motion state of communication terminal and new file are created is monitored.
A5, method as described as A4, describedly monitored the event that in communication terminal, new file is created, and comprising:
New document creation event in assigned catalogue in communication terminal is monitored.
A6, method as described as A4 also comprise:
While monitoring the event that creates new file, obtain the file type information of new file;
Monitor the operated event of file/application program if described; and the motion state that monitors communication terminal in preset time range meets preset condition; operated file/application program is defined as to the object that need to be protected as privacy information, comprises:
If monitoring creates the event of new file; and the file type of described new file belongs to preset type; and the motion state that monitors communication terminal in preset time range meets preset condition, described new file is defined as to the object that need to be protected as privacy information.
A7, method as described as A1 also comprise:
When monitoring the operated event of file/application program, record the very first time;
When the motion state that monitors communication terminal meets preset condition, recorded for the second time;
Monitor the operated event of file/application program if described; and the motion state that monitors communication terminal in preset time range meets preset condition; operated file/application program is defined as to the object that need to be protected as privacy information, comprises:
If monitor the operated event of file/application program; and the motion state of communication terminal meets preset condition; and the mistiming between the described very first time and the second time is less than preset time threshold, operated file/application program is defined as to the object that need to be protected as privacy information.
A8, method as described as A1, describedly monitored the operated event of the file/application program in communication terminal, comprising:
The Action Events that file in communication terminal is edited, application program is mounted or application program is used is monitored.
A9, method as described as A1 to A8 any one, describedly carry out corresponding protection operation according to preset secret protection mode of operation to operated file/application program, comprising:
Operated file/application program is carried out to deletion action;
Perhaps,
According to preset catalogue, operated file/application program is transferred under preassigned catalogue;
Perhaps,
According to preset password, operated file/application program is encrypted.
A10, method as described as A1 to A8 any one, the protection mode of operation that dissimilar file/application program is corresponding different.
The invention also discloses the file/application processing apparatus on B1, a kind of communication terminal, comprising:
Monitoring unit, monitored for the motion state to communication terminal and the operated event of file/application program;
Determining unit, if for monitoring the operated event of file/application program, and the motion state that monitors communication terminal in preset time range meets preset condition, operated file/application program is defined as to the object that need to be protected as privacy information;
Operating unit, carry out corresponding protection operation for the secret protection mode of operation according to preset to operated file/application program, to avoid operated file/application program, revealed.
B2, device as described as B1, described monitoring unit comprises:
Moving parameter information is obtained subelement, for the sensor from described communication terminal, obtains the moving parameter information that described sensor detects;
The condition judgment subelement, if meet preset condition for described moving parameter information, the motion state of described communication terminal meets prerequisite.
B3, device as described as B1 also comprise:
The working procedure monitoring unit, the event be created for the motion state to communication terminal and new file is monitored the application program of moving in communication terminal before being monitored;
Start unit, if belong to preset critical applications for the application program of moving, start the event that the motion state of communication terminal and new file are created and monitored.
B4, device as described as B1, described monitoring unit comprises:
The first monitoring subelement, the event be created for the motion state to communication terminal and new file is monitored.
B5, device as described as B4, described first the monitoring subelement specifically for:
New document creation event in assigned catalogue in communication terminal is monitored.
B6, device as described as B4 also comprise:
The type information acquiring unit, when monitoring the event that creates new file, obtain the file type information of new file;
Described determining unit specifically for:
If monitoring creates the event of new file; and the file type of described new file belongs to preset type; and the motion state that monitors communication terminal in preset time range meets preset condition, described new file is defined as to the object that need to be protected as privacy information.
B7, device as described as B1 also comprise:
Very first time record cell, for when monitoring the operated event of file/application program, record the very first time;
The second time record cell, while for the motion state that monitors communication terminal, meeting preset condition, recorded for the second time;
Described determining unit specifically for:
If monitor the operated event of file/application program; and the motion state of communication terminal meets preset condition; and the mistiming between the described very first time and the second time is less than preset time threshold, operated file/application program is defined as to the object that need to be protected as privacy information.
B8, device as described as B1, described monitoring unit comprises:
The second monitoring subelement, monitored for the Action Events that the file to communication terminal is edited, application program is mounted or application program is used.
B9, device as described as B1 to B8 any one, described operating unit comprises:
The deletion action subelement, for carrying out deletion action to operated file/application program;
Perhaps,
Shift subelement, for the catalogue according to preset, operated file/application program is transferred under preassigned catalogue;
Perhaps,
Encrypt subelement, for the password according to preset, operated file/application program is encrypted.
B10, as the described device of claim B1 to B8 any one, the protection mode of operation that dissimilar file/application program is corresponding different.

Claims (10)

1. file/the applied program processing method on a communication terminal comprises:
Motion state and the operated event of file/application program to communication terminal are monitored;
If monitor the operated event of file/application program, and monitor the preset condition of meeting of communication terminal in preset time range, operated file/application program is defined as to the object that need to be protected as privacy information;
According to preset secret protection mode of operation, operated file/application program is carried out to corresponding protection operation, revealed to avoid operated file/application program.
2. the method for claim 1, the described motion state to communication terminal is monitored, and comprising:
Sensor from described communication terminal obtains the moving parameter information that described sensor detects;
If described moving parameter information meets preset condition, the motion state of described communication terminal meets prerequisite.
3. the method for claim 1, the described motion state to communication terminal and the operated event of file/application program also comprise before monitoring:
The application program of moving in communication terminal is monitored;
If the application program of moving belongs to preset critical applications, start motion state and the operated event of file/application program of communication terminal are monitored.
4. the method for claim 1, the described motion state to communication terminal and the operated event of file/application program are monitored and are comprised:
The event that the motion state of communication terminal and new file are created is monitored.
5. method as claimed in claim 4, describedly monitored the event that in communication terminal, new file is created, and comprising:
New document creation event in assigned catalogue in communication terminal is monitored.
6. file/the application processing apparatus on a communication terminal comprises:
Monitoring unit, monitored for the motion state to communication terminal and the operated event of file/application program;
Determining unit, if for monitoring the operated event of file/application program, and the motion state that monitors communication terminal in preset time range meets preset condition, operated file/application program is defined as to the object that need to be protected as privacy information;
Operating unit, carry out corresponding protection operation for the secret protection mode of operation according to preset to operated file/application program, to avoid operated file/application program, revealed.
7. device as claimed in claim 6, described monitoring unit comprises:
Moving parameter information is obtained subelement, for the sensor from described communication terminal, obtains the moving parameter information that described sensor detects;
The condition judgment subelement, if meet preset condition for described moving parameter information, the motion state of described communication terminal meets prerequisite.
8. device as claimed in claim 6 also comprises:
The working procedure monitoring unit, the event be created for the motion state to communication terminal and new file is monitored the application program of moving in communication terminal before being monitored;
Start unit, if belong to preset critical applications for the application program of moving, start the event that the motion state of communication terminal and new file are created and monitored.
9. device as claimed in claim 6, described monitoring unit comprises:
The first monitoring subelement, the event be created for the motion state to communication terminal and new file is monitored.
10. device as claimed in claim 9, described the first monitoring subelement specifically for:
New document creation event in assigned catalogue in communication terminal is monitored.
CN201310436177.1A 2013-09-23 2013-09-23 Method and device for processing file/application program on mobile communication terminal Pending CN103488942A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310436177.1A CN103488942A (en) 2013-09-23 2013-09-23 Method and device for processing file/application program on mobile communication terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310436177.1A CN103488942A (en) 2013-09-23 2013-09-23 Method and device for processing file/application program on mobile communication terminal

Publications (1)

Publication Number Publication Date
CN103488942A true CN103488942A (en) 2014-01-01

Family

ID=49829157

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310436177.1A Pending CN103488942A (en) 2013-09-23 2013-09-23 Method and device for processing file/application program on mobile communication terminal

Country Status (1)

Country Link
CN (1) CN103488942A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106161095A (en) * 2016-07-15 2016-11-23 北京奇虎科技有限公司 The method for early warning of leaking data and device
CN111343130A (en) * 2018-12-19 2020-06-26 中国移动通信集团辽宁有限公司 Privacy protection method, device and equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101867650A (en) * 2010-05-21 2010-10-20 宇龙计算机通信科技(深圳)有限公司 Method and device for protecting user behavior at operating terminal
CN102480540A (en) * 2010-11-19 2012-05-30 英业达股份有限公司 Mobile telephone and operation method thereof
US20130117839A1 (en) * 2011-10-31 2013-05-09 Steven W. White Method for controlling application usage on a mobile device while the device is in motion
CN103164432A (en) * 2011-12-13 2013-06-19 联想(北京)有限公司 Method of recovering mistakenly-deleted files and mobile terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101867650A (en) * 2010-05-21 2010-10-20 宇龙计算机通信科技(深圳)有限公司 Method and device for protecting user behavior at operating terminal
CN102480540A (en) * 2010-11-19 2012-05-30 英业达股份有限公司 Mobile telephone and operation method thereof
US20130117839A1 (en) * 2011-10-31 2013-05-09 Steven W. White Method for controlling application usage on a mobile device while the device is in motion
CN103164432A (en) * 2011-12-13 2013-06-19 联想(北京)有限公司 Method of recovering mistakenly-deleted files and mobile terminal

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106161095A (en) * 2016-07-15 2016-11-23 北京奇虎科技有限公司 The method for early warning of leaking data and device
CN106161095B (en) * 2016-07-15 2020-09-08 北京奇虎科技有限公司 Early warning method and device for data leakage
CN111343130A (en) * 2018-12-19 2020-06-26 中国移动通信集团辽宁有限公司 Privacy protection method, device and equipment

Similar Documents

Publication Publication Date Title
US8370853B2 (en) Event notification management
CN104268055B (en) The monitoring method and device of a kind of program exception
US20190199732A1 (en) Managed clone applications
US11182478B2 (en) Systems and methods for tracking and recording events in a network of computing systems
US20170004050A1 (en) Systems and methods for automatic synchronization of recently modified data
US9100440B1 (en) Systems and methods for applying data loss prevention policies to closed-storage portable devices
US8595489B1 (en) Grouping and ranking of application permissions
JP2015529913A (en) Information backup method and apparatus
CN103514396A (en) Processing method and device for file / application program on mobile communication terminal
CN103631678A (en) Backup method, restoring method and device for client software
CN109063011B (en) Log processing method, electronic device and computer readable storage medium
CN103678487A (en) Method and device for generating web page snapshot
Tso et al. iPhone social networking for evidence investigations using iTunes forensics
Tamma et al. Practical Mobile Forensics: Forensically investigate and analyze iOS, Android, and Windows 10 devices
US10318272B1 (en) Systems and methods for managing application updates
CN103500106A (en) Method and device for starting application programs in mobile communication terminal
CN104965731A (en) Data processing method and electronic terminal
CN103530550A (en) Method and device for processing document/application program on mobile communication terminal
CN107330322A (en) File safety protection method, device and equipment
WO2016175851A1 (en) Automatic task tracking
CN110298179B (en) Open source framework security vulnerability detection method and device
CN103530549A (en) Method and device for processing document/application program on mobile communication terminal
CN117241276B (en) Detection tool, detection method, detection system and detection equipment for mobile application
WO2024125108A1 (en) On-demand enabling method and apparatus for security aspect of mobile terminal
CN104750805A (en) Information processing method and electronic equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20140101

RJ01 Rejection of invention patent application after publication