CN103514396B - File/applied program processing method and device on communication terminal - Google Patents
File/applied program processing method and device on communication terminal Download PDFInfo
- Publication number
- CN103514396B CN103514396B CN201310444592.1A CN201310444592A CN103514396B CN 103514396 B CN103514396 B CN 103514396B CN 201310444592 A CN201310444592 A CN 201310444592A CN 103514396 B CN103514396 B CN 103514396B
- Authority
- CN
- China
- Prior art keywords
- file
- event
- operated
- application
- specific
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000004891 communication Methods 0.000 title claims abstract description 104
- 238000012544 monitoring process Methods 0.000 claims abstract description 81
- 238000000034 method Methods 0.000 claims abstract description 36
- 230000001010 compromised effect Effects 0.000 claims abstract description 13
- 230000008859 change Effects 0.000 claims description 30
- 230000009471 action Effects 0.000 claims description 12
- 238000012217 deletion Methods 0.000 claims description 11
- 230000037430 deletion Effects 0.000 claims description 11
- 238000012545 processing Methods 0.000 claims description 7
- 238000010295 mobile communication Methods 0.000 claims description 4
- 238000001914 filtration Methods 0.000 claims description 3
- 230000006870 function Effects 0.000 description 9
- 230000008569 process Effects 0.000 description 7
- 238000012790 confirmation Methods 0.000 description 6
- 238000012546 transfer Methods 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 4
- 230000008901 benefit Effects 0.000 description 3
- 230000009467 reduction Effects 0.000 description 3
- 238000004364 calculation method Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000004422 calculation algorithm Methods 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000001035 drying Methods 0.000 description 1
- 235000013399 edible fruits Nutrition 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012163 sequencing technique Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
Abstract
The invention discloses file/applied program processing method on communication terminal and device, wherein, methods described includes:The event that the event and file/application program that distance to other objects relative movement communicating terminal outside communication terminal changes are operated is monitored;If monitoring the event that file/application program is operated, and the event that the distance changes is monitored in preset time range, then file/the application program operated is defined as to the object for needing to be protected as privacy information;Corresponding protection is performed according to preset privacy preserving operations mode to the file/application program operated to operate, to avoid the file/application program operated compromised.By means of the invention it is possible to be needed on to terminal device during being protected as privacy information, the privacy information of user is more effectively protected.
Description
Technical field
The present invention relates to file/application program protection processing technology field, and in particular to and file on communication terminal/
Applied program processing method and device.
Background technology
Current Intelligent mobile communication terminal(Including mobile phone, tablet personal computer etc.)The function such as take pictures, record a video, recording of providing
Really happy easily adventure in daily life is brought for user, but one is exactly privacy the problem of can not be ignored.Mobile communication
The memory space of terminal is constantly increasing, and the texts such as many pictures, video and recording can be stored in a communication terminal
Part, these multimedia files are usually for a user individual privacy, if communication terminal is obtained by others, these letters
Breath will face compromised risk.
Therefore, in the urgent need to the technical problem that those skilled in the art solve is that:How in terminal called terminal
The information realization protected as privacy information is needed to be effectively protected.
The content of the invention
In view of the above problems, it is proposed that the present invention so as to provide one kind overcome above mentioned problem or at least in part solve on
State the text on the file/applied program processing method and corresponding mobile communication terminal device on the communication terminal of problem
Part/application processing apparatus, can need during being protected as privacy information, more effectively on to terminal device
Protection user privacy information.
According to one aspect of the present invention there is provided file/applied program processing method on a kind of communication terminal,
Including:
The event that changes of distance to other objects relative movement communicating terminal outside communication terminal and
The event that file/application program is operated is monitored;
If monitoring the event that file/application program is operated, and monitor in preset time range described
The event that distance changes, then be defined as needing what is protected as privacy information using the file/application program operated
Object;
Corresponding protection is performed according to preset privacy preserving operations mode to the file/application program operated to operate,
To avoid the file/application program operated compromised.
Alternatively, the distance of other objects relative movement communicating terminal to outside communication terminal changes
Event be monitored, including:
By the interface of the range sensor in communication terminal, obtain that the range sensor detects it is described away from
From the event changed.
Alternatively, the event that the distance changes includes:
The change that the distance of the relatively described communication terminal of other objects draws near, or change from the close-by examples to those far off.
Alternatively, the distance of other objects relative movement communicating terminal to outside communication terminal changes
Event and the event that is operated of file/application program be monitored before also include:
The application program being currently running in communication terminal is monitored;
If the application program being currently running belongs to preset critical applications, start to outside communication terminal
Other objects relative movement communicating terminal the event that changes of distance and the event that is operated of file/application program enter
Row monitoring.
Alternatively, the distance of other objects relative movement communicating terminal to outside communication terminal changes
Event and the event that is operated of file/application program be monitored including:
The event that changes of distance to other objects relative movement communicating terminal outside communication terminal and
The event that new file is created is monitored.
Alternatively, it is described that the event that new file in communication terminal is created is monitored, including:
Event is created to the new file in assigned catalogue in communication terminal to be monitored.
Alternatively, in addition to:
When monitoring the event for creating new file, the file type information of new file is obtained;
If described monitor the event that file/application program is operated, and is monitored in preset time range
The event that the distance changes, then be defined as needing to be protected as privacy information using the file/application program operated
The object of shield, including:
If monitoring creates the event of new file, and the file type of the new file belongs to preset type, and pre-
The event that the distance changes is monitored in the time range put, then is defined as the new file needing to believe as privacy
Cease the object protected.
Alternatively, in addition to:
When monitoring the event that file/application program is operated, the very first time is recorded;
When monitoring the event that the distance changes, recorded for the second time;
If described monitor the event that file/application program is operated, and is monitored in preset time range
The event that the distance changes, then be defined as needing to be protected as privacy information using the file/application program operated
The object of shield, including:
If monitoring the event that file/application program is operated, and the event that the distance changes is monitored, and
Time difference between the very first time and the second time is less than preset time threshold, then by the file operated/apply journey
Sequence is defined as the object for needing to be protected as privacy information.
Alternatively, it is described that the file/application program operated is performed accordingly according to preset privacy preserving operations mode
Protection operation, including:
Deletion action is performed to the file/application program operated;
Or,
According to preset catalogue, the file/application program operated is transferred under preassigned catalogue;
Or,
According to preset password, the file/application program operated is encrypted.
Alternatively, different types of file/different protection mode of operation of application program correspondence.
According to another aspect of the present invention there is provided file/application processing apparatus on a kind of communication terminal,
Including:
Monitoring unit, the distance for other objects outside communication terminal to be relatively moved with communicating terminal becomes
The event that the event and file/application program of change are operated is monitored;
Determining unit, if for monitoring the event that file/application program is operated, and in preset time range
The event that the distance changes inside is monitored, then is defined as needing to believe as privacy using the file/application program operated
Cease the object protected;
Operating unit, for performing phase to the file/application program operated according to preset privacy preserving operations mode
The protection operation answered, to avoid the file/application program operated compromised.
Alternatively, the monitoring unit specifically for:
By the interface of the range sensor in communication terminal, obtain that the range sensor detects it is described away from
From the event changed.
Alternatively, the event that the distance changes includes:
The change that the distance of the relatively described communication terminal of other objects outside communication terminal draws near, or
The change of person from the close-by examples to those far off.
Alternatively, in addition to:
Operation program monitoring unit, for outside communication terminal other objects relatively move communicating terminal away from
Before the event operated from the event and file/application program that change is monitored, in communication terminal just
It is monitored in the application program of operation;
Start unit, if the application program for being currently running belongs to preset critical applications, starts to moving
Event and file/application program that the distance of other objects relative movement communicating terminal outside dynamic communicating terminal changes
The event operated is monitored.
Alternatively, the monitoring unit includes:
First monitoring subelement, the distance for other objects outside communication terminal to be relatively moved with communicating terminal
The event that the event and new file changed is created is monitored.
Alternatively, it is described first monitoring subelement specifically for:
Event is created to the new file in assigned catalogue in communication terminal to be monitored.
Alternatively, in addition to:
Type information acquiring unit, when the event of new file is created for monitoring, obtains the file type letter of new file
Breath;
The determining unit specifically for:
If monitoring creates the event of new file, and the file type of the new file belongs to preset type, and pre-
The event that the distance changes is monitored in the time range put, then is defined as the new file needing to believe as privacy
Cease the object protected.
Alternatively, in addition to:
Very first time recording unit, for when monitoring the event that file/application program is operated, during record first
Between;
Second time recording unit, for monitoring during event that the distance changes, recorded for the second time;
The determining unit specifically for:
If monitoring the event that file/application program is operated, and the event that the distance changes is monitored, and
Time difference between the very first time and the second time is less than preset time threshold, then by the file operated/apply journey
Sequence is defined as the object for needing to be protected as privacy information.
Alternatively, the operating unit includes:
Deletion action subelement, deletion action is performed for the file to being operated/application program;
Or,
Subelement is shifted, for according to preset catalogue, the file/application program operated being transferred to preassigned
Under catalogue;
Or,
Encryption sub-unit operable, for according to preset password, the file/application program operated to be encrypted.
Alternatively, different types of file/different protection mode of operation of application program correspondence.
According to the file/applied program processing method and device on the communication terminal of the present invention, in present invention implementation
In example, the event and file/application program that can be changed to the distance that other objects relatively move communicating terminal are grasped
The event of work is monitored, if it find that file/application program is operated, and monitors other in preset time range
The event that the distance of object relative movement communicating terminal changes, then can be as user to performing privacy preserving operations
Confirmation, therefore can with directly according to preset privacy preserving operations mode to new file perform protection operation.It can be seen that, mistake herein
Cheng Zhong, can confirm whether user is needed to file/application program with directly by way of detecting distance changes operation
Secret protection is carried out, it is user-friendly.And, can be directly according to presetting after user confirms to carry out secret protection
Good protection mode of operation backstage performs specific protection operation, and specific transfer road is selected in interface again without user
Footpath, setting code etc. are operated, and therefore, it can the compromised risk of the private file of further reduction user.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention,
And can be practiced according to the content of specification, and in order to allow above and other objects of the present invention, feature and advantage can
Become apparent, below especially exemplified by the embodiment of the present invention.
Brief description of the drawings
By reading the detailed description of hereafter preferred embodiment, various other advantages and benefit is common for this area
Technical staff will be clear understanding.Accompanying drawing is only used for showing the purpose of preferred embodiment, and is not considered as to the present invention
Limitation.And in whole accompanying drawing, identical part is denoted by the same reference numerals.In the accompanying drawings:
Fig. 1 shows the flow chart of method according to an embodiment of the invention;And
Fig. 2 shows the schematic diagram of an apparatus in accordance with one embodiment of the invention.
Embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although showing the disclosure in accompanying drawing
Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here
Limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure
Complete conveys to those skilled in the art.
In embodiments of the present invention, a application program for running on communication terminal can be provided(For ease of description,
The application program is referred to as " defence program " in the embodiment of the present invention), the defence program can relatively move logical to other objects
The event that the event and file/application program that the distance of news terminal changes are operated is monitored, then according to monitoring
As a result, privacy preserving operations are performed to file/application program.For example, can be monitored to the event for creating new file, such as
Fruit find there is new file to be created, also judge its whether may for user private file, if it is, can be to other objects
The event that the distance of relative movement communicating terminal changes is monitored, if monitoring distance hair in the range of certain time
The event for changing, then can perform protection operation according to preset mode to the file newly created.That is, from user angle
For degree, protection mode of operation can be specified for file/application program in advance, for example, can directly deleted, or file is turned
The target directory position of transfer is moved and preassigns, or, file can also be encrypted and be used when preassigning encryption
Password, etc..So, in a newly-generated file, either file is operated or application program is mounted or is used it
Afterwards, user can just be moved from distant place to receiver with other objects such as hand and cover the range sensor near receiver, or, use
Then the first coverage distance sensor of other objects such as hand leaves gradually so that range sensor is able to detect that other objects are relative
The change that the distance of the communication terminal draws near, or change from the close-by examples to those far off;So, the guarantor of the embodiment of the present invention
This distance change event collected can just be defined as the trigger signal for needing to carry out secret protection by shield program, be come with this
Trigger protection program performs corresponding privacy preserving operations to the file/application program operated.Below to this progress in detail
Introduce.
Referring to Fig. 1, the embodiment of the present invention provide firstly file/application program processing side on a kind of communication terminal
The executive agent of each step just can be previously described defence program in method, this method, in actual applications may also certainly
Realized by way of hardware.This method may comprise steps of:
S101:The event that distance to other objects relative movement communicating terminal outside communication terminal changes
And the event that file/application program is operated is monitored;
When implementing, the event that file/application program is operated can just include the event that new file be created, existing
Event that the mounted event of event that file is edited, application program, application program are used etc..Except to file/should
The event operated with program is monitored, the thing that can also be changed to the distance that other objects relatively move communicating terminal
Part is monitored.When implementing, because communication terminal typically all carries range sensor, for sensing other object phases
To the distance of communication terminal.For example, the range sensor generally plays a role during user takes phone:When with
Mobile phone is put into by family when being conversed in one's ear, and range sensor can sense the event, so that the display screen of mobile phone is closed,
Play the effects such as saving electric energy.And when user removes mobile phone from one's ear, range sensor can also perceive the event, then
The display screen of mobile phone is started automatically, etc..Range sensor is typically mounted near the receiver of communication terminal, certainly
It is probably other positions.Therefore, in embodiments of the present invention, it is possible to use range sensor this dress in communication terminal
Put, the instrument of confirmation is sent as user, be also by other object proximities or away from communication terminal by user
Operation, as user to needing the confirmation of progress privacy preserving operations.If user needs file/application program to being operated
Protected as privacy information, then can be in a period of time before the procedure either afterwards or in operating process, so that it may
To be moved with other objects such as hand from distant place to receiver and cover the range sensor near receiver, or, with other things such as hand
Then body elder generation coverage distance sensor leaves gradually so that range sensor is able to detect that other objects are logical relative to the movement
The change that the distance of news terminal draws near, or change from the close-by examples to those far off.Defence program in the embodiment of the present invention can lead to
The mode such as interface for accessing range sensor is crossed, get that range sensor detects above-mentioned draws near or from the close-by examples to those far off
Event.
In addition, generally, only in some specific application programs operationally, being only possible to that possible needs can be produced
The file protected as privacy information, or the specific application program in itself may belong to and to need to carry out secret protection
Application program.Therefore, the defence program in the embodiment of the present invention can also be to the application journey currently run in communication terminal
Sequence is monitored, if it find that critical applications are currently running, and restarts the adjust the distance event changed and file/should
The event operated with program is monitored, if the application program currently run does not include, there may be the key of private file
Application program, then may not necessarily start the event progress that the adjust the distance event changed and file/application program are operated
Monitoring.Wherein, so-called critical applications can include camera, video recorder, recorder program, JICQ etc.
Deng.Wherein, the API that the program information that detection is currently running can be provided by system is completed, such as in android system
The lower program for obtaining operation program information is as follows:
// obtain system service ActivityManager
ActivityManager manager=(ActivityManager)getSystemService(ACTIVITY_
SERVICE);
// the task stack list being currently running is obtained,
List<RunningTaskInfo>runningTasks=manager.getRunningTasks(1);
The task stack of the current top of // acquisition, i.e. foreground task stack
RunningTaskInforunningTaskInfo=runningTasks.get(0);
The top Activity of // acquisition foreground task stack
ComponentNametopActivity=runningTaskInfo.topActivity;
// obtain the bag name applied
String packageName=topActivity.getPackageName();。
Wherein method getSystemService (), getRunningTasks (), getPackageName () are
The api function that android system is provided.
In order to timely be protected to the file/application program that may belong to privacy of user, in present invention implementation
In example, the event that defence program can be operated by a background process to file/application program first is monitored.Specifically
, in order to realize this monitoring, there can be various ways.For example, under in one way in which, it is possible to use communication terminal
The event sniffer of operating system, the broadcast message that snoop-operations system is sent, by the filtering to system broadcast message, is known
The event that file/application program is operated.That is, background program can be by the event of communication terminal operating system
Monitor, the system message to each generation judges, if type of message is the thing that file/application program is operated
Part, then can therefrom extract the information such as filename, suffix name, the title of the application program operated of the file operated.
For example, under android system, when creating new file, system can send the broadcast of establishment file, and background program can be set
One BroadCastReceiver is monitored and filtered to broadcast, is judged whether to create according to the type of message of broadcast
Build the event of new file.
Or, under another implementation, can also utilize communication terminal operating system Hook Function, to
The event that family file/application program is operated is monitored.That is, during file/application program is by operation, needing
Call the program of correlation to realize the operation to file/application program, in embodiments of the present invention, API hooks can be used
Function, background program can provide Hook Function and call steering Hook Function by original(Generally pass through Modification growth function entrance
Realize address), such Hook Function just results in the information such as the filename of the file operated, suffix name, complete to file/
The information such as filename, application name in the monitoring for the event that application program is operated, and acquisition event.
It should be noted that the catalogue for being used to preserve file in actual applications, in communication terminal typically has a lot,
But may include the private file of user in general only some catalogue, and others catalogue, such as storage system
File etc. will not typically deposit the private file of user in sightless catalogue for a user.Therefore, to creating new file
Event be monitored during, only some specific catalogues can be monitored, monitor this specific catalogue Chinese
Whether the change of part, judgement wherein has new file to be created.For example, this specific catalogue can be the photograph for preserving user
The catalogue of the files such as piece, video.
S102:If monitoring the event that file/application program is operated, and monitored in preset time range
The event that the distance changes, then be defined as needing to be protected as privacy information using the file/application program operated
The object of shield;
If the event that file/application program is operated has been monitored, and it is certain before or after the event
The event that the distance of other objects relative movement communicating terminal changes also is detected in period, then can be by other things
The event that body phase changes to the distance of communication terminal is defined as carrying out file/application program the need for user sends
The trigger event of secret protection, accordingly, it is possible to which this document/application program is defined as to need to be protected as privacy information
Object.
If that is, monitoring the event that file/application program is operated, and also detecting other object phases
The event that distance to communication terminal changes, then also need to determine whether the time pass that the two times occur
System, when only time interval is in certain scope, can just trigger privacy preserving operations.When implementing, when monitor file/
During the event that application program is operated, the very first time is recorded, the distance for monitoring other objects relative movement communicating terminal occurs
During the event of change, recorded for the second time;So, if monitoring the event that file/application program is operated, and it is monitored
The event that the distance of his object relative movement communicating terminal changes, and the time between the very first time and the second time
Difference is less than preset time threshold, then is defined as needing to be protected as privacy information using the file/application program operated
Object.Wherein, the sequencing relation between the very first time and the second time can be without limiting, that is to say, that for
, can be to this document/apply journey when needing to be protected certain file/application program as privacy information for user
Before or after sequence is operated, or even in operating process, the distance to moving closer to communication terminal with other objects
Sensor, or first other objects are covered on range sensor gradually left again, in this, as to protecting what is operated
The confirmation of file/application program.
Wherein, for creating the event of new file, the file/application program operated is defined as need as
Before the object of privacy information protection, can also further it be judged.Specifically when being judged, if being to specific before
Catalogue in create the monitoring that the event of new file is carried out, then catalogue that can be directly according to where new file judges that it belongs to
Need the object as privacy information protection.That is, due to only entering in advance to some there may be the catalogue of private file
Row monitoring, therefore, the new file monitored is all just the file in these specific catalogues, can be defined as needing conduct
The file that privacy information is protected.Otherwise, new file is created even if monitoring, and is also supervised in the range of the regular hour
The event that the distance of other objects relative movement communicating terminal changes has been controlled, need not can also be defined as needing to make
The file protected for privacy information.
Or, while creating event due to monitoring new file, the information such as the suffix name of new file can also be got,
Therefore, the file type information of new file can be analyzed accordingly, and then, it can judge that new file is according to file type information
The no object for needing to be protected as privacy information for user.For example, generally, if it find that file type belongs to figure
The types such as piece, video, audio, then can be determined that to need the object protected as privacy information.
Certainly, in order to further improve the degree of accuracy of judgement, above two mode can also be combined.That is, can be with
Establishment event to new file in some specific catalogues is monitored, if it find that new file is created in specific catalogue,
Suffix name further according to new file determines the file type of new file, if file type belongs to preset particular type again,
It can be probably then the object for needing to be protected as privacy information using the file of the new establishment.
For example, the example in a practical application can be:Start first and apply monitoring service program(Running background), when
The application program related to privacy is detected using monitoring programme(Camera, recorder etc.)During startup, startup file monitoring clothes
Business program(Running background)And distance variation information is obtained by the interface of range sensor(Running background), file monitor program
The establishment event of file under related path is monitored, when there is private file establishment, the very first time is recorded;Monitor other objects
During the event that the distance of relative movement communicating terminal changes, recorded for the second time, compare the difference between two time, when the
Special time threshold value of two times before or after file creation time(Such as 10 seconds)When interior, the protection to private file is performed
Processing operation.
S103:Corresponding protection is performed to the file/application program operated according to preset privacy preserving operations mode
Operation, to avoid the file/application program operated compromised.
Determine a file/application program operated belong to need the object protected as privacy information it
Afterwards, it is possible to which the file that can be newly created according to preset privacy preserving operations mode performs protection operation.
Wherein, the privacy preserving operations of file/application program to being operated can be directly by the file operated/should
Deleted with program;Or can also be that the file/application program that will be operated is shifted, at this point it is possible to be existed by user
The target directory position of transfer is specified when pre-setting;Again or, the file/application program operated can also be added
It is close, and it is possible to password used when specifying encryption when pre-setting by user, etc..It should be noted that due to difference
File/the application program operated under type or different directories may have different severity levels, therefore, it can difference
Different protection modes of operation are set for the file operated under different type or different directories/application program.For example, will
The file of picture category is set to transfer and preserved, and the private file of video class is set into encryption etc..
In a word, in embodiments of the present invention, the distance that other objects relatively move communicating terminal can be changed
The event that event and file/application program are operated is monitored, if it find that file/application program is operated, and
The event that the distance of other objects relative movement communicating terminal changes is monitored in preset time range, then can be by it
As user to performing the confirmations of privacy preserving operations, thus can with directly according to preset privacy preserving operations mode to new text
Part performs protection operation.It can be seen that, in the process, can with directly confirm by way of detecting distance changes operation use
Whether family needs to carry out file/application program secret protection, user-friendly.And confirm to carry out secret protection in user
Afterwards, it directly can perform specific protection according to pre-set protection mode of operation backstage to operate, without user
Select specific transfer path, setting code etc. to operate in interface again, therefore, it can the private file of further reduction user
Compromised risk.
It is corresponding with file/applied program processing method on communication terminal provided in an embodiment of the present invention, this hair
Bright embodiment additionally provides file/application processing apparatus on a kind of communication terminal, referring to Fig. 2, and the device can be with
Including:
Monitoring unit 201, the distance for other objects outside communication terminal to be relatively moved with communicating terminal is sent out
The event that the event and file/application program of changing are operated is monitored;
Determining unit 202, if for monitoring the event that file/application program is operated, and in the preset time
In the range of monitor the event that the distance changes, then file/the application program operated is defined as needing as hidden
The object that personal letter breath is protected;
Operating unit 203, for being performed according to preset privacy preserving operations mode to the file/application program operated
Corresponding protection operation, to avoid the file/application program operated compromised.
Wherein, the monitoring unit specifically for:By the interface of the range sensor in communication terminal, institute is obtained
State the event that the distance that range sensor detects changes.
The event that the distance changes includes:
The change that the distance of the relatively described communication terminal of other objects outside communication terminal draws near, or
The change of person from the close-by examples to those far off.
When implementing, the device can also include:
Operation program monitoring unit, for outside communication terminal other objects relatively move communicating terminal away from
Before the event operated from the event and file/application program that change is monitored, in communication terminal just
It is monitored in the application program of operation;
Start unit, if the application program for being currently running belongs to preset critical applications, starts to moving
Event and file/application program that the distance of other objects relative movement communicating terminal outside dynamic communicating terminal changes
The event operated is monitored.
Wherein, the monitoring unit includes:
First monitoring subelement, the distance for other objects outside communication terminal to be relatively moved with communicating terminal
The event that the event and new file changed is created is monitored.
Wherein it is described first monitoring subelement specifically for:
Event is created to the new file in assigned catalogue in communication terminal to be monitored.
The device can also include:
Type information acquiring unit, when the event of new file is created for monitoring, obtains the file type letter of new file
Breath;
The determining unit specifically for:
If monitoring creates the event of new file, and the file type of the new file belongs to preset type, and pre-
The event that the distance changes is monitored in the time range put, then is defined as the new file needing to believe as privacy
Cease the object protected.
The monitoring unit includes:
Second monitoring subelement, for being edited to the file in communication terminal, application program is mounted or applies
The Action Events that program is used are monitored.
In addition, the device can also include:
Very first time recording unit, for when monitoring the event that file/application program is operated, during record first
Between;
Second time recording unit, for monitoring during event that the distance changes, recorded for the second time;
The determining unit specifically for:
If monitoring the event that file/application program is operated, and the event that the distance changes is monitored, and
Time difference between the very first time and the second time is less than preset time threshold, then by the file operated/apply journey
Sequence is defined as the object for needing to be protected as privacy information.
Wherein, the operating unit includes:
Deletion action subelement, deletion action is performed for the file to being operated/application program;
Or,
Subelement is shifted, for according to preset catalogue, the file/application program operated being transferred to preassigned
Under catalogue;
Or,
Encryption sub-unit operable, for according to preset password, the file/application program operated to be encrypted.
When implementing, different types of file/application program can correspond to different protection modes of operation.
It can be seen that, in embodiments of the present invention, the distance that other objects relatively move communicating terminal can be changed
The event that event and file/application program are operated is monitored, if it find that file/application program is operated, and
The event that the distance of other objects relative movement communicating terminal changes is monitored in preset time range, then can be by it
As user to performing the confirmations of privacy preserving operations, thus can with directly according to preset privacy preserving operations mode to new text
Part performs protection operation.It can be seen that, in the process, can with directly confirm by way of detecting distance changes operation use
Whether family needs to carry out file/application program secret protection, user-friendly.And confirm to carry out secret protection in user
Afterwards, it directly can perform specific protection according to pre-set protection mode of operation backstage to operate, without user
Select specific transfer path, setting code etc. to operate in interface again, therefore, it can the private file of further reduction user
Compromised risk.
Algorithm and display be not inherently related to any certain computer, virtual system or miscellaneous equipment provided herein.
Various general-purpose systems can also be used together with based on teaching in this.As described above, construct required by this kind of system
Structure be obvious.In addition, the present invention is not also directed to any certain programmed language.It is understood that, it is possible to use it is various
Programming language realizes the content of invention described herein, and the description done above to language-specific is to disclose this hair
Bright preferred forms.
In the specification that this place is provided, numerous specific details are set forth.It is to be appreciated, however, that the implementation of the present invention
Example can be put into practice in the case of these no details.In some instances, known method, structure is not been shown in detail
And technology, so as not to obscure the understanding of this description.
Similarly, it will be appreciated that in order to simplify the disclosure and help to understand one or more of each inventive aspect, exist
Above in the description of the exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes
In example, figure or descriptions thereof.However, the method for the disclosure should be construed to reflect following intention:It is i.e. required to protect
The application claims of shield features more more than the feature being expressly recited in each claim.More precisely, such as following
Claims reflect as, inventive aspect is all features less than single embodiment disclosed above.Therefore,
Thus the claims for following embodiment are expressly incorporated in the embodiment, wherein each claim is in itself
All as the separate embodiments of the present invention.
Those skilled in the art, which are appreciated that, to be carried out adaptively to the module in the equipment in embodiment
Change and they are arranged in one or more equipment different from the embodiment.Can be the module or list in embodiment
Member or component be combined into a module or unit or component, and can be divided into addition multiple submodule or subelement or
Sub-component.In addition at least some in such feature and/or process or unit exclude each other, it can use any
Combination is to this specification(Including adjoint claim, summary and accompanying drawing)Disclosed in all features and so disclosed appoint
Where all processes or unit of method or equipment are combined.Unless expressly stated otherwise, this specification(Including adjoint power
Profit requires, made a summary and accompanying drawing)Disclosed in each feature can be by providing the alternative features of identical, equivalent or similar purpose come generation
Replace.
Although in addition, it will be appreciated by those of skill in the art that some embodiments described herein include other embodiments
In included some features rather than further feature, but the combination of the feature of be the same as Example does not mean in of the invention
Within the scope of and form different embodiments.For example, in the following claims, times of embodiment claimed
One of meaning mode can be used in any combination.
The present invention all parts embodiment can be realized with hardware, or with one or more processor run
Software module realize, or realized with combinations thereof.It will be understood by those of skill in the art that can use in practice
Microprocessor or digital signal processor(DSP)Come realize the file on communication terminal according to embodiments of the present invention/
The some or all functions of some or all parts in application program processing equipment.The present invention is also implemented as being used for
Perform some or all equipment or program of device of method as described herein(For example, computer program and calculating
Machine program product).Such program for realizing the present invention can be stored on a computer-readable medium, or can have one
Or the form of multiple signals.Such signal can be downloaded from internet website and obtained, or be provided on carrier signal,
Or provided in any other form.
It should be noted that the present invention will be described rather than limits the invention for above-described embodiment, and ability
Field technique personnel can design alternative embodiment without departing from the scope of the appended claims.In the claims,
Any reference symbol between bracket should not be configured to limitations on claims.Word "comprising" is not excluded the presence of not
Element or step listed in the claims.Word "a" or "an" before element does not exclude the presence of multiple such
Element.The present invention can be by means of including the hardware of some different elements and coming real by means of properly programmed computer
It is existing.In if the unit claim of equipment for drying is listed, several in these devices can be by same hardware branch
To embody.The use of word first, second, and third does not indicate that any order.These words can be explained and run after fame
Claim.
The application can apply to computer system/server, and it can be with numerous other universal or special computing system rings
Border or configuration are operated together.Suitable for the well-known computing system being used together with computer system/server, environment and/
Or the example of configuration includes but is not limited to:Personal computer system, server computer system, thin client, thick client computer, hand
Hold or laptop devices, the system based on microprocessor, set top box, programmable consumer electronics, NetPC Network PC, small-sized meter
Calculation machine Xi Tong ﹑ large computer systems and distributed cloud computing technology environment including any of the above described system, etc..
Computer system/server can be in the computer system executable instruction performed by computer system(Such as journey
Sequence module)General linguistic context under describe.Generally, program module can include routine, program, target program, component, logic, number
According to structure etc., they perform specific task or realize specific abstract data type.Computer system/server can be with
Implement in distributed cloud computing environment, in distributed cloud computing environment, task is by by the long-range of communication network links
Manage what equipment was performed.In distributed cloud computing environment, program module, which can be located at, includes the Local or Remote meter of storage device
On calculation system storage medium.
The invention also discloses file/applied program processing method on A1, a kind of communication terminal, including:
The event that changes of distance to other objects relative movement communicating terminal outside communication terminal and
The event that file/application program is operated is monitored;
If monitoring the event that file/application program is operated, and monitor in preset time range described
The event that distance changes, then be defined as needing what is protected as privacy information using the file/application program operated
Object;
Corresponding protection is performed according to preset privacy preserving operations mode to the file/application program operated to operate,
To avoid the file/application program operated compromised.
A2, the method as described in A1, described other objects to outside communication terminal relatively move communicating terminal
The event that distance changes is monitored, including:
By the interface of the range sensor in communication terminal, obtain that the range sensor detects it is described away from
From the event changed.
A3, the method as described in A1, the event that the distance changes include:
The change that the distance of the relatively described communication terminal of other objects draws near, or change from the close-by examples to those far off.
A4, the method as described in A1, described other objects to outside communication terminal relatively move communicating terminal
The event that the event and file/application program that distance changes are operated also includes before being monitored:
The application program being currently running in communication terminal is monitored;
If the application program being currently running belongs to preset critical applications, start to outside communication terminal
Other objects relative movement communicating terminal the event that changes of distance and the event that is operated of file/application program enter
Row monitoring.
A5, the method as described in A1, described other objects to outside communication terminal relatively move communicating terminal
The event that the event and file/application program that distance changes are operated be monitored including:
The event that changes of distance to other objects relative movement communicating terminal outside communication terminal and
The event that new file is created is monitored.
A6, the method as described in A5, described to be monitored to the event that new file in communication terminal is created, bag
Include:
Event is created to the new file in assigned catalogue in communication terminal to be monitored.
A7, the method as described in A5, in addition to:
When monitoring the event for creating new file, the file type information of new file is obtained;
If described monitor the event that file/application program is operated, and is monitored in preset time range
The event that the distance changes, then be defined as needing to be protected as privacy information using the file/application program operated
The object of shield, including:
If monitoring creates the event of new file, and the file type of the new file belongs to preset type, and pre-
The event that the distance changes is monitored in the time range put, then is defined as the new file needing to believe as privacy
Cease the object protected.
A8, the method as described in A1 to any one of A7, in addition to:
When monitoring the event that file/application program is operated, the very first time is recorded;
When monitoring the event that the distance changes, recorded for the second time;
If described monitor the event that file/application program is operated, and is monitored in preset time range
The event that the distance changes, then be defined as needing to be protected as privacy information using the file/application program operated
The object of shield, including:
If monitoring the event that file/application program is operated, and the event that the distance changes is monitored, and
Time difference between the very first time and the second time is less than preset time threshold, then by the file operated/apply journey
Sequence is defined as the object for needing to be protected as privacy information.
A9, the method as described in A1 to any one of A7, it is described according to preset privacy preserving operations mode to being operated
File/application program performs corresponding protection operation, including:
Deletion action is performed to the file/application program operated;
Or,
According to preset catalogue, the file/application program operated is transferred under preassigned catalogue;
Or,
According to preset password, the file/application program operated is encrypted.
A10, the method as described in A1 to any one of A7, the different protection behaviour of different types of file/application program correspondence
Make mode.
The invention also discloses file/application processing apparatus on B1, a kind of communication terminal, including:
Monitoring unit, the distance for other objects outside communication terminal to be relatively moved with communicating terminal becomes
The event that the event and file/application program of change are operated is monitored;
Determining unit, if for monitoring the event that file/application program is operated, and in preset time range
The event that the distance changes inside is monitored, then is defined as needing to believe as privacy using the file/application program operated
Cease the object protected;
Operating unit, for performing phase to the file/application program operated according to preset privacy preserving operations mode
The protection operation answered, to avoid the file/application program operated compromised.
B2, the device as described in B1, the monitoring unit specifically for:
By the interface of the range sensor in communication terminal, obtain that the range sensor detects it is described away from
From the event changed.
B3, the device as described in B1, the event that the distance changes include:
The change that the distance of the relatively described communication terminal of other objects outside communication terminal draws near, or
The change of person from the close-by examples to those far off.
B4, the device as described in B1, in addition to:
Operation program monitoring unit, for outside communication terminal other objects relatively move communicating terminal away from
Before the event operated from the event and file/application program that change is monitored, in communication terminal just
It is monitored in the application program of operation;
Start unit, if the application program for being currently running belongs to preset critical applications, starts to moving
Event and file/application program that the distance of other objects relative movement communicating terminal outside dynamic communicating terminal changes
The event operated is monitored.
B5, the device as described in B1, the monitoring unit include:
First monitoring subelement, the distance for other objects outside communication terminal to be relatively moved with communicating terminal
The event that the event and new file changed is created is monitored.
B6, the device as described in B5, it is described first monitoring subelement specifically for:
Event is created to the new file in assigned catalogue in communication terminal to be monitored.
B7, the device as described in B5, in addition to:
Type information acquiring unit, when the event of new file is created for monitoring, obtains the file type letter of new file
Breath;
The determining unit specifically for:
If monitoring creates the event of new file, and the file type of the new file belongs to preset type, and pre-
The event that the distance changes is monitored in the time range put, then is defined as the new file needing to believe as privacy
Cease the object protected.
B8, the device as described in B1 to any one of B7, in addition to:
Very first time recording unit, for when monitoring the event that file/application program is operated, during record first
Between;
Second time recording unit, for monitoring during event that the distance changes, recorded for the second time;
The determining unit specifically for:
If monitoring the event that file/application program is operated, and the event that the distance changes is monitored, and
Time difference between the very first time and the second time is less than preset time threshold, then by the file operated/apply journey
Sequence is defined as the object for needing to be protected as privacy information.
B9, the device as described in B1 to any one of B7, the operating unit include:
Deletion action subelement, deletion action is performed for the file to being operated/application program;
Or,
Subelement is shifted, for according to preset catalogue, the file/application program operated being transferred to preassigned
Under catalogue;
Or,
Encryption sub-unit operable, for according to preset password, the file/application program operated to be encrypted.
B10, the device as described in B1 to any one of B7, the different protection behaviour of different types of file/application program correspondence
Make mode.
Claims (18)
1. file/applied program processing method on a kind of communication terminal, including:
The event that the distance for making other objects outside communication terminal relatively move communicating terminal to user changes with
And the event that the file in application-specific/particular category is operated is monitored, the event package that the distance changes
Include:
The change that the distance of the relatively described communication terminal of other objects draws near, or change from the close-by examples to those far off;
If the event that the file in application-specific/particular category is operated is monitored, and in preset time range
The event that the distance changes inside is monitored, then is determined the file in the application-specific/particular category operated
To need the object protected as privacy information;
Corresponding protection is performed to the file in application-specific/particular category according to preset privacy preserving operations mode to grasp
Make, to avoid the file in the application-specific/particular category operated compromised;
Wherein, the event that the file in application-specific/particular category is operated is monitored, including:
Using the event sniffer of the operating system of the communication terminal, the broadcast message that snoop-operations system is sent is led to
The filtering to system broadcast message is crossed, the event that the file in the application-specific/particular category is operated, or profit is known
With the Hook Function of communication terminal operating system, the file in the application-specific/particular category is operated
Event is monitored.
2. the method as described in claim 1, other objects relative movement made to user outside communication terminal is logical
The event that the distance of news terminal changes is monitored, including:
By the interface of the range sensor in communication terminal, the distance hair that the range sensor is detected is obtained
The event for changing.
3. the method as described in claim 1, other objects relative movement made to user outside communication terminal is logical
The event that file in event and application-specific/particular category that the distance of news terminal changes is operated is supervised
Also include before control:
The application program being currently running in communication terminal is monitored;
If the application program being currently running belongs to preset critical applications, start to its outside communication terminal
File quilt in event and application-specific/particular category that the distance of his object relative movement communicating terminal changes
The event of operation is monitored.
4. the method as described in claim 1, other objects relative movement made to user outside communication terminal is logical
The event that file in event and application-specific/particular category that the distance of news terminal changes is operated is supervised
Control includes:
Event and new text that distance to other objects relative movement communicating terminal outside communication terminal changes
The event that part is created is monitored.
5. method as claimed in claim 4, described that the event that new file in communication terminal is created is monitored, bag
Include:
Event is created to the new file in assigned catalogue in communication terminal to be monitored.
6. method as claimed in claim 4, in addition to:
When monitoring the event for creating new file, the file type information of new file is obtained;
If the event that the file monitored in application-specific/particular category is operated, and in the preset time
In the range of monitor the event that the distance changes, then by the file in the application-specific/particular category operated
It is defined as the object for needing to be protected as privacy information, including:
If monitoring creates the event of new file, and the file type of the new file belongs to preset type, and preset
The event that the distance changes is monitored in time range, then is defined as the new file needing to enter as privacy information
The object of row protection.
7. the method as described in claim 1 to any one of claim 6, in addition to:
When the event that the file monitored in application-specific/particular category is operated, the very first time is recorded;Monitor institute
When stating the event that distance changes, recorded for the second time;
If the event that the file monitored in application-specific/particular category is operated, and in the preset time
In the range of monitor the event that the distance changes, then by the file in the application-specific/particular category operated
It is defined as the object for needing to be protected as privacy information, including:
Occur if monitoring the event that the file in application-specific/particular category is operated, and monitoring the distance
Time difference between the event of change, and the very first time and the second time is less than preset time threshold, then will be operated
Application-specific/particular category in file be defined as the object for needing to be protected as privacy information.
8. the method as described in claim 1 to any one of claim 6, described according to preset privacy preserving operations mode pair
File in the application-specific/particular category operated performs corresponding protection operation, including:
Deletion action is performed to the file in application-specific/particular category for being operated;
Or, according to preset catalogue, the file in the application-specific/particular category operated is transferred to predesignated
Catalogue under;
Or, according to preset password, the file in application-specific/particular category for being operated is encrypted.
9. the method as described in claim 1 to any one of claim 6, different types of application-specific/particular category
In the different protection modes of operation of file correspondence.
10. file/application processing apparatus on a kind of communication terminal, including:
Monitoring unit, the distance for making other objects outside communication terminal relatively move communicating terminal to user occurs
The event that file in the event and application-specific/particular category of change is operated is monitored, and the distance occurs
The event of change includes:What the distance of the relatively described communication terminal of other objects outside communication terminal drew near
Change, or change from the close-by examples to those far off, wherein, the event operated to the file in application-specific/particular category is carried out
Monitoring, including:Using the event sniffer of the operating system of the communication terminal, the broadcast that snoop-operations system is sent disappears
Breath, by the filtering to system broadcast message, knows the thing that the file in the application-specific/particular category is operated
Part, or using the Hook Function of communication terminal operating system, to the file quilt in the application-specific/particular category
The event of operation is monitored;
Determining unit, if for monitoring the event that the file in application-specific/particular category is operated, and pre-
The event that the distance changes is monitored in the time range put, then by the application-specific/particular category operated
In file be defined as the object for needing to be protected as privacy information;
Operating unit, for according to preset privacy preserving operations mode in application-specific/particular category for being operated
File perform corresponding protection operation, to avoid the file in the application-specific/particular category operated compromised.
11. device as claimed in claim 10, the monitoring unit specifically for:Passed by the distance in communication terminal
The interface of sensor, the event that the distance that the acquisition range sensor is detected changes.
12. device as claimed in claim 10, in addition to:
Operation program monitoring unit, the distance for other objects outside communication terminal to be relatively moved with communicating terminal is sent out
Before the event that file in the event and application-specific/particular category of changing is operated is monitored, to movement
The application program being currently running in communicating terminal is monitored;
Start unit, if the application program for being currently running belongs to preset critical applications, starts to mobile logical
The event and application-specific that the distance of other objects relative movement communicating terminal outside news terminal changes/specific
The event that file in catalogue is operated is monitored.
13. device as claimed in claim 10, the monitoring unit includes:First monitoring subelement, for mobile communication
The event that the event and new file that the distance of other objects relative movement communicating terminal outside terminal changes are created
It is monitored.
14. device as claimed in claim 13, the first monitoring subelement specifically for:To being specified in communication terminal
New file in catalogue creates event and is monitored.
15. device as claimed in claim 13, in addition to:
Type information acquiring unit, when the event of new file is created for monitoring, obtains the file type information of new file;Institute
State determining unit specifically for:
If monitoring creates the event of new file, and the file type of the new file belongs to preset type, and preset
The event that the distance changes is monitored in time range, then is defined as the new file needing to enter as privacy information
The object of row protection.
16. the device as described in claim 10 to any one of claim 15, in addition to:
Very first time recording unit, for when the event that the file monitored in application-specific/particular category is operated,
Record the very first time;
Second time recording unit, for monitoring during event that the distance changes, recorded for the second time;
The determining unit specifically for:If monitoring the event that the file in application-specific/particular category is operated,
And the time difference between the event that the distance changes, and the very first time and the second time is monitored less than preset
File in the application-specific/particular category operated, then be defined as needing to carry out as privacy information by time threshold
The object of protection.
17. the device as described in claim 10 to any one of claim 15, the operating unit includes:
Deletion action subelement, deletion action is performed for the file in application-specific/particular category to being operated;
Or, subelement is shifted, for according to preset catalogue, by the text in the application-specific/particular category operated
Part is transferred under preassigned catalogue;
Or, encryption sub-unit operable, for according to preset password, to the text in application-specific/particular category for being operated
Part is encrypted.
18. the device as described in claim 10 to any one of claim 15, different types of application-specific/specific mesh
The corresponding different protection mode of operation of file in record.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310444592.1A CN103514396B (en) | 2013-09-23 | 2013-09-23 | File/applied program processing method and device on communication terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310444592.1A CN103514396B (en) | 2013-09-23 | 2013-09-23 | File/applied program processing method and device on communication terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103514396A CN103514396A (en) | 2014-01-15 |
CN103514396B true CN103514396B (en) | 2017-11-03 |
Family
ID=49897103
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310444592.1A Active CN103514396B (en) | 2013-09-23 | 2013-09-23 | File/applied program processing method and device on communication terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103514396B (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105320893B (en) * | 2014-07-30 | 2018-09-28 | 上海斐讯数据通信技术有限公司 | A kind of data prevention method and system applied to mobile terminal |
CN104917603B (en) * | 2014-09-22 | 2019-03-12 | 中兴通讯股份有限公司 | A kind of information security transfer method receives terminal and sends terminal |
CN104852958B (en) * | 2015-04-08 | 2018-10-02 | 苏州大学张家港工业技术研究院 | A kind of monitoring method and device of software operation behavior |
CN105049592B (en) * | 2015-05-27 | 2020-02-14 | 中国科学院信息工程研究所 | Mobile intelligent terminal voice safety protection method and system |
CN107766351B (en) * | 2016-08-16 | 2020-12-25 | 腾讯科技(深圳)有限公司 | File directory identification method and device |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103108085A (en) * | 2013-01-31 | 2013-05-15 | 广东欧珀移动通信有限公司 | Glance prevention method of mobile terminal |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100677352B1 (en) * | 2004-09-09 | 2007-02-02 | 엘지전자 주식회사 | Speaker volume display apparatus and method for portable terminal device |
JP2010246060A (en) * | 2009-04-10 | 2010-10-28 | Hitachi Ltd | Mobile terminal loss prevention system |
US20110013775A1 (en) * | 2009-07-17 | 2011-01-20 | Chih-Lin Hu | System and method of mobile content sharing and delivery in an integrated network environment |
CN101867650A (en) * | 2010-05-21 | 2010-10-20 | 宇龙计算机通信科技(深圳)有限公司 | Method and device for protecting user behavior at operating terminal |
CN101873386A (en) * | 2010-06-13 | 2010-10-27 | 华为终端有限公司 | Mobile terminal and incoming-call prompt method thereof |
CN102480540A (en) * | 2010-11-19 | 2012-05-30 | 英业达股份有限公司 | Mobile telephone and operation method thereof |
CN103164432B (en) * | 2011-12-13 | 2016-03-30 | 联想(北京)有限公司 | Recover method and the mobile terminal of deleted file by mistake |
-
2013
- 2013-09-23 CN CN201310444592.1A patent/CN103514396B/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103108085A (en) * | 2013-01-31 | 2013-05-15 | 广东欧珀移动通信有限公司 | Glance prevention method of mobile terminal |
Also Published As
Publication number | Publication date |
---|---|
CN103514396A (en) | 2014-01-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11328079B2 (en) | System and method of encrypting folder in device | |
US11126716B2 (en) | System security method and apparatus | |
CN103514396B (en) | File/applied program processing method and device on communication terminal | |
CN103617382B (en) | Method for secret protection and its device | |
US20210076212A1 (en) | Recognizing users with mobile application access patterns learned from dynamic data | |
CN104520866B (en) | Method for secret protection and terminal device | |
CN107864065B (en) | Non-buried point data acquisition method, system and computer readable storage medium | |
US9614826B1 (en) | Sensitive data protection | |
US20160109864A1 (en) | Wireless Building Automation | |
KR101878708B1 (en) | Energy management system of smart electric home appliances using security-enhanced residential gateway device | |
KR20170026385A (en) | System for context-based data protection | |
Sadineni et al. | A holistic forensic model for the internet of things | |
CN108293044A (en) | System and method for detecting malware infection via domain name service flow analysis | |
US10791177B2 (en) | System to monitor and control sensor devices | |
CN105530261B (en) | The guard method of privacy information and device | |
JP2017511512A (en) | System and method for preventing variation of subsystem fingerprinting by introducing device fingerprinting | |
CN106791087A (en) | The storage method of information, device and equipment | |
CN103530549B (en) | File/applied program processing method on communication terminal and device | |
US9313218B1 (en) | Systems and methods for providing information identifying the trustworthiness of applications on application distribution platforms | |
CN105659247B (en) | The proactive Threat Management system of context-aware | |
CN103530550B (en) | File/applied program processing method on communication terminal and device | |
CN103916471A (en) | Information display method and device | |
CN106095781A (en) | Malicious websites recognition methods and device | |
CN107358117B (en) | Switching method, electronic equipment and computer storage medium | |
CN104023137A (en) | Mobile terminal, and intelligent encryption method and device of mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20220706 Address after: Room 801, 8th floor, No. 104, floors 1-19, building 2, yard 6, Jiuxianqiao Road, Chaoyang District, Beijing 100015 Patentee after: BEIJING QIHOO TECHNOLOGY Co.,Ltd. Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park) Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd. Patentee before: Qizhi software (Beijing) Co.,Ltd. |