CN105190590B - For managing the method and system of data and/or for the service of equipment - Google Patents

For managing the method and system of data and/or for the service of equipment Download PDF

Info

Publication number
CN105190590B
CN105190590B CN201480024191.3A CN201480024191A CN105190590B CN 105190590 B CN105190590 B CN 105190590B CN 201480024191 A CN201480024191 A CN 201480024191A CN 105190590 B CN105190590 B CN 105190590B
Authority
CN
China
Prior art keywords
module
access
particular device
agency
services
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201480024191.3A
Other languages
Chinese (zh)
Other versions
CN105190590A (en
Inventor
爱德华·K·Y·荣格
罗伊斯·A·莱维恩
理查德·T·洛德
罗伯特·W·洛德
马克·A·马拉默德
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Elwha LLC
Original Assignee
Elwha LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US13/781,194 external-priority patent/US10216957B2/en
Application filed by Elwha LLC filed Critical Elwha LLC
Publication of CN105190590A publication Critical patent/CN105190590A/en
Application granted granted Critical
Publication of CN105190590B publication Critical patent/CN105190590B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS

Abstract

The method and system implemented is calculated, the data of the application including obtaining one or more protection parts in relation to being configured to access specific device, the application is configured to provide one or more services;At least one of one or more services have been completed in detection application and application maintains the access to one or more protection parts of specific device;It presents and shows to have completed one or more services and using the information for maintaining the access to one or more protection parts of specific device;And for promoting that circuit of the option to interrupt the access using one or more protection parts to specific device is presented.Apart from the above, in terms of describing other in claims, attached drawing and text.

Description

For managing the method and system of data and/or for the service of equipment
Any and all female case, the grandmother's case, great-grandfather of earlier application and related application and earlier application and related application All themes of the application of female case etc. (including any prior claims) by reference with these themes with herein simultaneously Consistent degree is incorporated herein invariably.
Background
This application involves data services.
Summary of the invention
In one or more aspects, a kind of method includes but is not limited to: obtaining and related is configured to access specific device The data of the application of one or more protection part, the application are configured to provide one or more services;Detection application is It is completed at least one of one or more services and application is maintained to one or more protection parts of specific device Access;It presents and shows to have completed one or more services and using the one or more protection parts maintained to specific device Access information;And promote that option is presented to interrupt the access using one or more protection parts to specific device. In addition to the above, it constitutes in claims, attached drawing and text of disclosed a part set forth herein and describes other In terms of method.
In one or more aspects, one or more related systems can be limited to the patentability according to 35U.S.C.101 Implement in the machines of Sexual Themes, material composition or manufacture system.One or more related systems can include but is not limited to be used for Circuit and/or programming in terms of the method that implementation is mentioned above.Circuit and/or programming can be in fact arranged to according to being Unite designer design alternative and be limited to realize the method side being mentioned above according to the patentability theme of 35U.S.C.101 Any combination of the hardware in face, software and/or firmware.
In one or more aspects, a kind of system includes but is not limited to: related being configured to access specific dress for obtaining The device of the data of the application for the one or more protection parts set, the application are configured to provide one or more services; For detect using completed at least one of one or more services and application maintain to one of specific device or The device of the access of multiple protection parts;Show to have completed one or more services for rendering and application is maintained to specific The device of the information of the access of one or more protection parts of device;And for promoting that option is presented to interrupt using to spy Determine the device of the access of one or more protection parts of device.In addition to the above, set forth herein disclosed one is constituted In terms of describing other systems in partial claims, attached drawing and text.
In one or more aspects, a kind of system includes but is not limited to: related being configured to access specific dress for obtaining The circuit of the data of the application for the one or more protection parts set, the application are configured to provide one or more services; For detect using completed at least one of one or more services and application maintain to one of specific device or The circuit of the access of multiple protection parts;Show to have completed one or more services for rendering and application is maintained to specific The circuit of the information of the access of one or more protection parts of device;And for promoting that option is presented to interrupt using to spy Determine the circuit of the access of one or more protection parts of device.Apart from the above, disclosed a part set forth herein is constituted Claims, describe other systems in attached drawing and text in terms of.
In one or more various methods, a kind of computer program product, the signal including the one or more instructions of carrying Bearing medium, one or more of instructions include but is not limited to: for obtain in relation to be configured to access specific device one One or more instructions of the data of the application of a or multiple protections part, the application are configured to provide one or more clothes Business;At least one of one or more services have been completed and using one maintained to specific device for detecting to apply Or one or more instructions of the access of multiple protection parts;Show to have completed one or more services for rendering and answer With the one or more instructions for the information for maintaining the access to one or more protection parts of specific device;And for promoting Option is presented to interrupt and instruct using the one or more of access of one or more protection parts to specific device.Except above-mentioned Except, it constitutes in claims, attached drawing and text of disclosed a part set forth herein and describes other computer programs In terms of product.
In one or more various aspects, device is defined by computational language, so that described device includes: to order for obtaining One or more interchain physics in relation to being configured to access the data of the application of one or more protection parts of specific device Machine, the application are configured to provide one or more services;It orders and has completed one or more clothes for detecting application At least one of business and application maintain one or more chains of the access to one or more protection parts of specific device Between physical machine;It orders and shows to have completed one or more services for rendering and using one maintained to specific device Or one or more interchain physical machines of the information of the access of multiple protection parts;And order for promote present option with Interrupt one or more interchain physical machines of access of the application to one or more protection parts of specific device.
Apart from the above, in the text of such as disclosure (for example, claims and/or specific embodiment) and/or In terms of various other methods and/or system and/or program product are illustrated and described in the introduction of attached drawing.
Above content is to summarize and therefore may include the simple of details to talk about, summarize, include and/or omit;Therefore, ability Field technique personnel should understand that this general introduction is merely illustrative, and not be intended to be construed as limiting in any way.Pass through ginseng According to specific embodiment, corresponding attached drawing and/or introduction set forth herein will make equipment and/or method described herein and/ Or other aspects, features and advantages of other themes become apparent.
Detailed description of the invention
In order to which embodiment is more fully understood, it is described below presently in connection with attached drawing reference.In different figures using identical Label usually indicate similar or identical project, unless the context indicates otherwise.Specific embodiment, drawings and claims Exemplary embodiment described in book is not intended to limit.The spirit or scope for not departing from subject matter disclosed herein the case where Under, it can use other embodiments, and other modifications can be carried out.
Figure 1A shows the high level block diagram of exemplary environments 100 according to the embodiment.
Figure 1B shows the high level block diagram of the personal device 120 according to the embodiment to work in exemplary environments 100.
Fig. 1 C shows the personal device 120 according to the embodiment to work in exemplary embodiment 100' and calculates equipment The high level block diagram of 130A.
Fig. 1 D shows the personal device 120 according to the embodiment to work in exemplary embodiment 100 " and calculates equipment The high level block diagram of 130B.
Fig. 1 E show it is according to the embodiment exemplary embodiment 100 " ' in work personal device 120 and calculating set The high level block diagram of standby 130C.
Fig. 1 F shows according to the embodiment in exemplary embodiment 100 " " in work personal device 120 and calculating set The high level block diagram of standby 130D.
Fig. 2, including Fig. 2A -2C show according to the embodiment 152 in relation to being configured to provide one or more services simultaneously And the one or more particular device protection portion for selectively accessing the processing module 150 of the personal device 120 of Figure 1B are separately won The specific perspective view of the data of the agency of module.
Fig. 3, including Fig. 3 A-3D, the agency for showing according to the embodiment 154 one or more services stops and agency The one or more particular device protection portion for continuing to access the processing module 150 of the personal device 120 of Figure 1B divide detection module Specific perspective view.
Fig. 4, including Fig. 4 A-4C show according to the embodiment 156 and continue proxy access one or more particular device guarantor The instruction of the stopping of module is presented in one or more services of the processing module 150 of the personal device 120 of shield part and Figure 1B Accord with specific perspective view.
Fig. 5, including Fig. 5 A-5D show according to the embodiment 158 and the personal device for stopping proxy access Figure 1B are presented One or more particular devices protection part of 120 processing module 150 promotes the specific perspective view of the option of module.
Fig. 6 is the high-level logic flowchart of process according to the embodiment, for example, work flow diagram 600.
Fig. 7 A is the process according to the alternate embodiments for depicting acquisition data manipulation 602 of one or more embodiments High-level logic flowchart.
Fig. 7 B is the process according to the alternate embodiments for depicting acquisition data manipulation 602 of one or more embodiments High-level logic flowchart.
Fig. 7 C is the process according to the alternate embodiments for depicting acquisition data manipulation 602 of one or more embodiments High-level logic flowchart.
Fig. 8 A is the substitution implementation for depicting detection and completing and continue access operation 604 according to one or more embodiments The high-level logic flowchart of the process of mode.
Fig. 8 B is the substitution implementation for depicting detection and completing and continue access operation 604 according to one or more embodiments The high-level logic flowchart of the process of mode.
Fig. 8 C is the substitution implementation for depicting detection and completing and continue access operation 604 according to one or more embodiments The high-level logic flowchart of the process of mode.
Fig. 8 D is the substitution implementation for depicting detection and completing and continue access operation 604 according to one or more embodiments The high-level logic flowchart of the process of mode.
Fig. 9 A is the process according to the alternate embodiments for depicting presentation information operation 606 of one or more embodiments High-level logic flowchart.
Fig. 9 B is the process according to the alternate embodiments for depicting presentation information operation 606 of one or more embodiments High-level logic flowchart.
Fig. 9 C is the process according to the alternate embodiments for depicting presentation information operation 606 of one or more embodiments High-level logic flowchart.
Figure 10 A is to depict the mistake for the alternate embodiments for promoting presentation to operate 608 according to one or more embodiments The high-level logic flowchart of journey.
Figure 10 B is to depict the mistake for the alternate embodiments for promoting presentation to operate 608 according to one or more embodiments The high-level logic flowchart of journey.
Figure 10 C is to depict the mistake for the alternate embodiments for promoting presentation to operate 608 according to one or more embodiments The high-level logic flowchart of journey.
Figure 10 D is to depict the mistake for the alternate embodiments for promoting presentation to operate 608 according to one or more embodiments The high-level logic flowchart of journey.
Specific embodiment
In the following detailed description, referring to the attached drawing for constituting part of specification.In the accompanying drawings, similar label is usual Similar or identical component or project are identified, unless being otherwise noted in context.Specific embodiment, drawings and claims Described in exemplary embodiment be not intended to limit.The spirit or scope for not departing from subject matter disclosed herein the case where Under, it can use other embodiments, and other modifications can be carried out.
Therefore, according to various embodiments, method, system, circuit, product, the orderly chain of article and the calculating of implementation are calculated Machine program product is designed to (inter alia): provide for obtaining in relation to be configured to access specific device one or The interface of the data of the application of multiple protection parts, the application are configured to provide one or more services;Detection application is It is completed at least one of one or more services and application is maintained to one or more protection parts of specific device Access;It presents and shows to have completed one or more services and using the one or more protection parts maintained to specific device Access information;And promote that option is presented to interrupt the access using one or more protection parts to specific device.
Following claims, the description and the appended drawings can be one or more immediately with operation/function language description Technology, for example, computer one group of operation to be executed.In most cases, those skilled in the art can grasp these Work/function description is understood as the hardware of special configuration (for example, because general purpose computer is once programmed to perform according to from journey The specific function of the instruction of sequence software, in fact it has reformed into special purpose computer).
Importantly, although operations described herein/function description is human thinking it should be understood that still they are not Implement the abstract concept of isolated operation/function from the calculating of these operation/functions.On the contrary, operation/function is indicated for very The specification of complicated computing machine or other devices.According to discussed further below, it is necessary in correct technical background, that is, make For the concrete norm of physical implementation, reading operations/functional language.
Logical operation/function as described herein is the distillation of machine specification or other physical machines that operation/function is specified System, enables the machine specification that otherwise can not be understood to be understood by human thinking.This distillation also allows those skilled in the art In the case where being not limited to the hardware configuration or platform of specific supplier in the hardware configuration of the supplier of many different specifications or The operation/function description of adaptive technique between platform.
Some current technology descriptions can be illustrated (for example, specific embodiment, attached drawing, right with regard to logical operation/function Claim etc.).It is more fully described according to following paragraphs, these logical operation/functions do not indicate abstract concept, but indicate each The static state or sequence specification of kind hardware element.In other words, unless otherwise indicated by context, those skilled in the art grasp logic Work/function is understood as indicating the static state of various hardware elements or sequence specification.Because those skilled in the art can be used for implement with Tool --- high-level programming language (for example, C, java, visual basic) shape disclosed in the technology that operation/function format illustrates A kind of work of tool or very-high-speed hardware description language (" VHDL " is language using verbal description logic circuit) form of formula Tool --- it is the static state of various hardware configurations or the generator of sequence specification, therefore this is genuine.Wide in range term " software " has When the fact that obscuring, still, according to explained below, it is understood to one skilled in the art that being referred to as " software " is Sufficiently complex exchange/specification of orderly matter essential factor is write a Chinese character in simplified form.Term " orderly matter essential factor " also refers to physical computing group Part, for example, the component of electronic logic door, the logic composition of molecular computing, quantum calculation mechanism etc..
For example, high-level programming language be with for example from the practical machine specified of high-level programming language sequential organization, The programming language of strong abstract (for example, the multilevel abstract) of the details such as state, input, output.See, for example, being available from website Http:// en.wikipedia.org/wiki/High-level_programming_language (on June 5th, 2012, Wikipedia 21:00GMT), High-level programming language.For the ease of human intelligible, in many In example, high-level programming language imitates or the symbol of even shared natural language.See, for example, being available from website http: // The Wikipedia of en.wikipedia.org/wiki/Natural_language (in 21:00GMT on June 5th, 2012), Natural language。
Has arguement, because high-level programming language is abstracted using strong (for example, they can imitate or share natural language Symbol), therefore they are " pure intelligence constructions " (for example, " software " computer program or computer programming are to a certain extent It is the intelligence construction that can not be understood, because it can be conceived and be understood by human thinking under high-level abstractions).The argument has been used In function/operation format technical description that characterization is " abstract concept " to a certain extent.In fact, in technical field (example Such as, information and communication technology (ICT)) in be not in this way.
High-level programming language the fact that human intelligible should not be perceived as expressed being to take out using strong abstract As the instruction of concept.In fact, it is understood to one skilled in the art that exactly the opposite is true.If advanced programming language Speech is suitable for implementing tool disclosed in function/operation format technology, then it will be apparent to a skilled person that in office Far from abstract, inaccurate, " fuzzy " or " intelligence " in what significant semantic sense, this tool is certain computer instead The precise sequence specification that can not almost understand of device, a part of the machine by from usually more generally computing machine starting/ Select these parts at any time (for example, clock time) variation and establish.Table between high-level programming language and natural language Face similitude has sometimes obscured this fact.These surface similarities can also cover high-level programming language and implement by building It is vertical/to control many different computing machines finally to execute the fact that valuable work.
Many different computing machines of high-level programming language description are almost unthinkable complexity.Substantially, it is counting Hardware used in machine is calculated usually by being configured to be formed some type of orderly substance of logic gate (for example, conditional electronic It is device (for example, transistor), DNA (DNA), quantum device, mechanical switch, optical element, flow element, pneumatic Element, optical device (for example, interference of light device), molecule etc.) composition.Logic gate be usually can by electrically, mechanically, chemistry Ground otherwise drives to change physical state to establish the physical device of the physical reality of Boolean logic.
Logic gate can be configured to form logic circuit, the logic circuit be usually can by electrically, mechanically, chemistry Ground otherwise drives to establish the physical device of the physical reality of certain logic functions.The type of logic circuit includes Such as the devices such as multiplexer, register, arithmetic logic unit (ALU), computer storage, each type of device can be with In conjunction with the physical device to form another seed type, for example, central processing unit (CPU)-most well known central processing unit is micro- place Manage device.Modern microprocessor includes (and being typically more than 1,000,000,000 more than 100,000,000 logic gates usually in its numerous logic circuit A transistor).See, for example, http://en.wikipedia.org/wiki/Logic_gates (on June 5th, 2012,21: Wikipedia 03GMT), Logic gates.
The logic circuit for forming microprocessor is configured to provide micro-architecture, which will execute and limited by microprocessor Instruction set architecture defined in instruction.Instruction set architecture is to be related to a part of the microprocessor architecture design of programming, including the machine Data type, instruction, register, addressing system, memory architecture, interruption and abnormality processing and external input/output.Referring to Such as http://en.wikipedia.org/wiki/Computer_architecture (21:03GMT on June 5th, 2012) Wikipedia, Computer architecture.
Instruction set architecture includes the specification that programmer may be used in/controlled the machine language of microprocessor.Due to machine Sound instruction can be executed directly by microprocessor, so usually machine language instruction is by binary digit or the word of position Symbol string composition.For example, typical machine language instruction can have many bit lengths (for example, 32,64 or 128 character strings are current General).Typical machine language instruction can (32 refer to using " 11110000101011110000111100111111 " Enable) form.
It is important here that although machine language instruction is written to sequence of binary digits, in reality, these binary systems The specified physical reality of number.For example, if Boolean logic operation is made to become physical reality, machine using certain semiconductors It is that mathematics position " 1 " and " 0 " effectively form the letter specified and apply specific voltage in specific circuit on surface in sound instruction It writes.For example, the specified application of binary number " 1 " (for example, logical one) in some semiconductor technologies, in machine language instruction About+the 5V in specific " route " (for example, metal trace on printed circuit board), and the binary system in machine language instruction Specified about-the 5V being applied on specific " route " of number " 0 " (for example, logical zero).In addition to the voltage of specified machine configuration, These machine language instructions are also selected from a logic gates up to a million of more common machine and activate the logic gate of particular demographic.Cause This, even if being write as a string 0 and 1, also specifies various buildings far from abstract mathematical expression, machine language instruction repertorie Physical machine or physical machine state.
Machine language be usually most people can not understand (for example, examples detailed above is an instruction, and one is a few Per second execute of people's computer instructs more than 2,000,000).See, for example, http://en.wikipedia.org/wiki/ The Wikipedia, Instructions per of Instructions_per_second (on June 5th, 2012,21:04GMT) second.Therefore, being write as the program-of machine language its length may be that up to ten million a machine language instructions-can not understand. Machine language instruction is referred to since mnemonic code rather than directly using the numerical value of machine language instruction in consideration of it, developing and using (for example, in order to execute multiplication operation, programmer's early stage assembler language will abridge " mult " code, and expression is in MIPS machine Binary number " 011000 " in code).Although assembler language initially greatly helps the mankind to control microprocessor and executes work, But as time goes by, the complexity for the work that human needs complete has exceeded the mankind and controls micro- place using only assembler language Manage the ability of device.
In this point, it is noted that needs again and again complete same task, and complete these iterative tasks needs Machine language is identical.In consideration of it, creating compiler.Compiler is using than machine language or assembler language more preferably quilt The statement of human intelligible, such as " add 2+2 and export result ", and by it is human understandable statement be construed to it is complicated, dull and Huge machine language code (for example, numeric string of up to a million 32,64 or 128 bit lengths).Compiler therefore will be high Grade programming language translates into machine language.
The machine language of this compiling as described above is then used as technical specification, which sequentially constructs and make Many difference computing machine compounding practices to complete the tangible and specific work useful to the mankind.For example, as described above, This machine language --- compiled version of high-level language ---, which is served as, selects hardware logic door, specified voltage level, voltage mistake The technical specification of calendar scheduling is crossed, so that completing the work useful to the mankind by hardware.
Therefore, function/operation technical description is in the opinion of those skilled in the art far from abstract concept.On the contrary, this function The technical description of energy/operation is understood as that hardware is advised instead when available tool understands in this field for example, by just having described The human understandable expression of model, complexity and remote anyone understandability of super large part of specificity.Accordingly, ability Field technique personnel are it should be understood that knowledge in view of disclosure herein and those skilled in the art, any this behaviour Work/function technical description is construed as forming the operation of physical reality by the following terms: (a) one or more mutual The physical machine of link;(b) it is configured to establish being linked to each other for the one or more physical machines of order of representation/combinational logic Logic gate;(c) composition logic gate is (for example, the electronic device (for example, transistor), DNA, the quantum device, machinery that are linked to each other Switch, optical element, flow element, pneumatic element, molecule etc.) the orderly substance being linked to each other, the logic gate establishes table Show the physical reality of logic;Or (d) in fact any combination of aforementioned items.In fact, have it is stable, measurable and Changeable any physical object of state can be used for constructing machine based on above-mentioned technical description.For example, Charles Babbage is built The First computer made made of timber and powered by swinging handle.
Therefore, far from abstract concept is interpreted as, function/operation technical description understanding is one by those skilled in that art A or multiple human understandable expressions that can not almost imagine complicated and time sequencing hardware and illustrate.Function/operation Technical description can make it be easy (or to be directed to by the advanced computational language for sharing identical word, structure, phrase etc. with natural language The high-level block diagram of this thing) statement the fact as these function/operation technical descriptions cannot be abstract concept or abstract The instruction of concept purely stated.In fact, according to summarizing herein, it is true really not so in technical field.When passing through this When the available tool of field technical staff is observed, these function/operation technical descriptions are considered as almost imagining complexity Hardware configuration.
According to above-mentioned general introduction, at least two using the reason of function/operation technical description for the use of.Firstly, using function/ The technical description of operation allows from will be in such a way that human thinking is capable of handling (for example, passing through natural imitation language and logic Narration stream) the obtained machine of almost limitless complexity of the hardware element being linked to each other that is described and machine operate.Secondly, making Description with function/operation technical description by offer more or less independently of the hardware component of any specific supplier has Help the theme those skilled in the art understand that described.
Facilitate the theme those skilled in the art understand that described using function/operation technical description, because from above-mentioned Although discussion, which will become apparent from people, not easily promptly to be adapted into many trillion for technical description described in this document A 1 and 0, the horizontal machine code of billions of unilines compilation, millions of a logic gates, thousands of gate arrays or any number of Intermediate abstraction hierarchy.However, if any this low-level technologies description will replace current technology description, this field Technical staff can encounter excessive difficulty when implementation technology discloses, because this low-level technical description is likely to do not having Increase complexity in the case where corresponding beneficial effect (for example, utilizing the hardware of one or more vendor-specifics by description The theme of the agreement of component).Therefore, using function/operation technical description by by technical description from any vendor-specific Hardware component agreement separate and it is helpful to those skilled in the art.
According to above content, logical operation/function described in current technology description represents various orderly substances and wants The static state or sequence specification of element, so that this specification can be understood by human thinking and be suitable for creating numerous hardware configurations.This Logical operation/function described in text should be treated in this way, and only should not scornfully be characterized as abstract concept, because these Specification represented by logical operation/function be presented in such a way that those skilled in the art are understood that and with independently of The mode application that the hardware of specific supplier is implemented.
It would be recognized by those skilled in the art that the prior art have evolved to the hardware of many aspects of system, software and/ Or the degree that firmware implementation only has very little to distinguish;The use of hardware, software and/or firmware is usually (but simultaneously not always In this way, in some contexts, the selection between hardware and software becomes critically important) indicate that the design of cost and efficiency tradeoff is selected It selects.Those skilled in the art will know that in the presence of method described herein and/or system and/or other technologies can be made to play The various carriers (for example, hardware, software and/or firmware) of effect, and preferred carrier can be according to using method and/or system And/or the background of other technologies variation and change.For example, if implementer determine speed and accuracy be it is most important, that Implementer can choose main hardware and/or firmware vehicle;Alternatively, if flexibility is most important, implementer It can choose main Software Implementation;Furthermore alternatively, implementer can choose that be limited to can according to 35USC 101 Some groups of one or more machines of the theme of patent, article combination and the hardware in article of manufacture, software, and/or firmware It closes.Accordingly, there exist several feasible carriers that method described herein and/or equipment and/or other technologies can play a role, They not inherently be better than other because any carrier that will be utilized be depending on will use carrier background selection with And the specific of implementer considers (for example, speed, flexibility or predictability), any one may all change.This field Technical staff will be recognized that the optics aspect of embodiment generallys use optically guiding hardware, software and/or firmware.
In some embodiments as described herein, logic and similar embodiment may include software or other controls Structure.For example, electronic circuit can have the one or more electricity for being constructed and being arranged to carry out various functionality described herein Flow path.In some embodiments, when this medium saves or sends operationally according to manner described herein execution When the detectable instruction of device, one or more media may be configured to the detectable embodiment of load bearing equipment.Some In modification, for example, embodiment may include one relevant to one or more operations as described herein for example, by executing Or multiple instruction reception or conveying and update or modification to existing software or firmware or gate array or programmable hardware.It can Alternatively or cumulatively, in some variations, a kind of embodiment may include specialized hardware, software, fastener components and/or hold Row or the general purpose module for calling personal module.Specification or other embodiments can pass through tangible transmission media as described herein One or more examples are transmitted in other words optionally by packet by being passed in different time via distribution medium It is defeated.
Alternatively or additionally, embodiment may include for enabling, triggering, coordinate, request to cause in other words In fact any feature operation described herein occurs one or many special instruction sequences or calls circuit.In some modifications In, operation herein or other logical descriptions can be expressed as source code and be compiled as executable instruction sequence in other words It is to be called as executable instruction sequence.In some cases, for example, embodiment can be entirely or partly by source code It provides, such as C++ or other code sequences.In other embodiments, using commercially available and/or this field technology The embodiment of source code or other codes, which can be compiled/implement ,/translation/is converted into high level description language (for example, initially real Apply C or C++ programming language description technology, hereafter by programming language embodiment be converted into can logic synthesis language embodiment party Formula, hardware description language embodiment, software design simulation embodiment and/or other similar form of presentation).For example, one A little or all logic statements (for example, computer programming language embodiment) can behave as Verilog class hardware description (example Such as, pass through hardware description language (HDL) and/or VHSIC hardware description language (VHDL)) or can be used for later Establish other circuit models with the physical embodiments of hardware (for example, specific integrated circuit).Those skilled in the art , it will be recognized that how obtaining, configuring and optimizing suitable delivery element or computing element, material supply, cause according to these introductions Dynamic device or other common structures.
It will be understood by those skilled in the art that generally implementing device and/or process and/or system in this field, Then the device implemented these using engineering and/or other practices and/or process and/or the system integration are to more complicated device And/or in process and/or system.That is, at least part of device as described herein and/or process and/or system can It is integrated into other devices and/or process and/or system with the experiment by fair amount.Those skilled in the art will appreciate that It arrives, the example of these other devices and/or process and/or system may include, under background and the suitable situation of application, below Every all or part of devices and/or process and/or system: (a) air transportation (for example, aircraft, rocket, helicopter etc.); (b) ground transport (for example, automobile, truck, locomotive, tank, armored personnel carrier etc.);(c) building is (for example, house, warehouse, do Public room etc.);(d) facility (for example, refrigerator, washing machine, drier etc.);(e) communication system is (for example, network system, phone system System, ip voice system etc.);(f) entity is done business (for example, Internet Service Provider (ISP) enterprise, for example, Comcast Cable, Qwest, Southwestern Bell etc.);Or (g) wire/wireless service entities (for example, Sprint, Cingular, Nextel etc.) etc..
In some cases, even if component is located at outside some range, system or method can also be used in territory.Example Such as, in distributed computing situation, even if the part of system can be located at outside some range (for example, in being located at outside the range After device, server, processor, signal bearing medium, transmission computer, reception computer etc.), it can also use in the range Distributed computing system.
It equally, can also even if the component of system or method is located at outside some range and/or uses outside some range With marketing system in this range or method.In addition, being used to execute at least part of of the system of method in a range Embodiment is not excluded for using the system in another range.
In general sense, it will be appreciated by those skilled in the art that various embodiments described herein can be by following Individually and/or common implementing: various types of Mechatronic Systems with electronic component in extensive range, for example, hardware, soft Part, firmware and/or in fact their any combination, are limited to the theme according to 35U.S.C.101 patentability;Machinery can be assigned Power or the component in extensive range of movement, for example, rigid body, spring body or torsion body, hydraulic device, electromechanical actuators and/or In fact their any combination.Therefore, " Mechatronic Systems " as described herein includes, but are not limited to: with energy converter (for example, causing Dynamic device, motor, piezo-electric crystal, MEMS (MEMS) etc.) circuit that is operably associated, there is at least one discrete circuit Circuit, at least one integrated circuit circuit, at least one specific integrated circuit circuit, formed by computer The universal computing device of program configuration is (for example, by the computer journey at least partly executing method described herein and/or equipment The general purpose computer of sequence configuration, or the computer program by least partly executing method described herein and/or equipment are matched The microprocessor set) circuit, formed storage equipment circuit (for example, various forms of memories are (for example, arbitrary access is deposited Reservoir, flash memory, read-only memory etc.)), it is formed communication equipment (for example, modem, communication switchboard, optoelectronic device etc.) Circuit and/or any non-electrical analog circuit, such as optical analog circuit or other analog circuits are (for example, be based on graphene Circuit).The example that those skilled in the art will also be recognized that Mechatronic Systems includes but is not limited to various consumer electronics systems System, medical instrument and other systems, such as motorized transport systems, factory's automatic system, security system and/or communication/calculating System.It will be understood by those skilled in the art that " electromechanics " used herein is not necessarily limited to electric actuator and machinery The system of both actuators, in addition in addition showing.
It says in a general sense, it will be appreciated by those skilled in the art that can be by hardware in extensive range, software, firmware And/or many aspects as described herein individually and/or jointly implemented of their any combination can regard as by Various types of " circuits " composition.Therefore, " circuit " used herein includes, but are not limited to: having at least one discrete electrical The circuit on road, the circuit at least one integrated circuit, the circuit at least one specific integrated circuit are formed by calculating The universal computing device of machine system configuration is (for example, by the computer at least partly executing method described herein and/or equipment The general purpose computer of program configuration, or the computer program by least partly executing method described herein and/or equipment The microprocessor of configuration) circuit, formed storage equipment (for example, formed memory (for example, random access memory, flash memory, Read-only memory etc.)) circuit, and/or formed communication equipment (for example, modem, communication switchboard, optoelectronic device etc.) Circuit.It will be appreciated by those skilled in the art that theme as described herein may be embodied as analog or digital mode or they Some combinations.
It will be understood by those skilled in the art that at least part of equipment as described herein and/or method can integrate Into image processing system.It will be appreciated by those skilled in the art that typical image processing system generally comprises in following component One or more: the memory of system component shell, video display apparatus, such as volatibility or nonvolatile memory, example Such as microprocessor or the processor of digital signal processor, such as the computational entity of operating system, driver, application program, one A or multiple interactive devices (for example, Trackpad, touch screen, antenna etc.), including feedback loop and control motor are (for example, be used for The feedback for sensing lens position and/or speed, the control motor of required focus is provided for moving distorting lens) control System processed.Image processing system can use suitable commercially available component to implement, for example, usually digital still system and/ Or the element found in digital motion systems.
It will be understood by those skilled in the art that at least part of equipment as described herein and/or method can integrate Into data processing system.It will be appreciated by those skilled in the art that digital processing system generally comprises one in following component It is or multiple: the memory of system component shell, video display apparatus, such as volatibility or nonvolatile memory, such as micro- place Manage the processor of device or digital signal processor, such as the computational entity of operating system, driver, graphic user interface, application Program, one or more interactive devices (for example, Trackpad, touch screen, antenna etc.), and/or including feedback loop and control electricity Machine is (for example, for sensing the feedback of position and/or the feedback of speed, for moving and/or adjusting the control of component and/or quantization Motor) control system.Digital processing system can use suitable commercially available component to implement, for example, usually in digital meter The component found in calculation/communication and/or network calculations communication system.
It will be understood by those skilled in the art that at least part of equipment as described herein and/or method can integrate Into miniature (mote) system.It will be appreciated by those skilled in the art that typical microsystem generally comprises: one or more is deposited Reservoir, for example, volatibility or nonvolatile memory;Processor, for example, microprocessor or digital signal processor;It calculates real Body, such as operating system, user interface, driver, sensor, actuator, application program, one or more interactive device (examples Such as, antenna, USB port, acoustical ports etc.);Control system, including feedback loop and control motor are (for example, for sensing or commenting The feedback for estimating position and/or speed, for moving and/or adjusting the control motor of component and/or quantization).Microsystem can To be implemented using suitable component, for example, these components found in miniature calculating/communication system.The tool of these components Body example includes the micromodule of Intel Corporation and/or Crossbow Corporation and supports hardware, soft Part and/or firmware.
For the purpose of the application, " cloud " calculating can be understood as the meaning described in cloud computing document.For example, cloud meter Calculate the method and/or system that can be transmission calculating capacity and/or memory capacity as service." cloud " also refer to transmission or One or more hardware and or software components of calculating and/or memory capacity are transmitted in help, include but is not limited to be listed below It is one or more: client, application, platform, framework and/or server.Cloud also refers to and client, application, platform, frame Structure and/or the relevant any hardware of server and/or software.For example, cloud and cloud computing also refer to be listed below one Or multiple: computer, processor, storage medium, router, interchanger, modem, virtual machine are (for example, Virtual Service Device), data center, operating system, middleware, firmware, hardware rear end, software rear end and/or software application.What cloud can refer to It is private clound, public cloud, mixed cloud and/or community cloud.Cloud can be the shared pool of configurable computing resource, configurable calculating Resource can be it is disclosed, privately owned, half privately owned, assignable, expansible, flexible, interim, virtual and/or Physics.Cloud or cloud service can be transmitted by the network (for example, mobile communications network and internet) of one or more types.
Cloud as used in this application or cloud service may include be listed below it is one or more: framework is as service (" IaaS "), platform are as service (" PaaS "), software as service (" SaaS's ") and/or desktop as service ("DaaS").As non-exclusive example, Iaas may include, for example, can start, stop, accessing and/or configure virtual clothes Business device and/or storage center (for example, provide one or more processors, memory space and/or Internet resources, example as needed Such as, EMC and Rackspace) one or more virtual servers illustrate.PaaS may include, for example, being deposited in framework (example Such as, client can establish the computing platform and/or solution storehouse of software interface and application from it, for example, Microsoft Azure one or more softwares and/or developing instrument on).SaaS may include, for example, being presided over and can be led to by provider The software of network access is crossed (for example, network can be retained in for the software of application and/or data relevant to software application On, for example, Google Apps, SalesForce).DaaS may include, for example, by network provide the desktop for user, Using, data and/or service (for example, by network, for example, Citrix, provide more application architectures, the application in framework, with answer With relevant data and/or service relevant to application and/or data).It is above-mentioned to refer to being mentioned in this application as " cloud " Or it " system and or method of the type of cloud computing and is not construed as complete or thorough.
It will be appreciated by those skilled in the art that for the purpose of clear concept, component (for example, operation) as described herein, Device, object and it is used as example along with their discussion, and various configuration modifications are all in expection.Therefore, herein The concrete example illustrated and adjoint discussion used is intended to represent their more generally classifications.In general, using any Concrete example is intended to represent its classification, and does not include that specific component (for example, operation), device and object are not to be construed as limiting System.
It is that theme as described herein sometimes illustrates to include in different other assemblies or connected from different other components On different components.It should be appreciated that the framework of this description is only exemplary, and it is in fact possible to implement to obtain phase Many other frameworks of congenerous.On conceptual sense, any component setting for obtaining identical function effectively " associated " makes Required function must be obtained.Therefore, any two component for being herein combined to obtain specific function can be considered as " phase each other Close " to obtain required function, and how ignore framework or intermediate module.Similarly, two components associated in this way It can be considered as and " be operably connected " each other, or the function that " being operatively coupled to " is required with acquisition, and can close in this way Any two component of connection, which can also be considered as, " to be operatively coupled to " each other to obtain required function.It can operationally couple On specific example include, but are not limited to: physically can be matched and/or the component that physically interacts;And/or it is logical Cross component that is that wireless mode can interact, and/or wirelessly interacting;And/or logically interaction and/ Or logically interactive component etc..
In the degree that formal outline headings are presented in this application, it should be appreciated that outline headings are for demonstration Purpose, and different types of theme can discuss in entire application (for example, can retouch under process/operation title Device/structure is stated, process/operation can be discussed under structure/prelude;And/or the description of single title can be horizontal Across two or more topic headings).Therefore, it is used for the purpose of the purpose of demonstration simultaneously using formal outline headings in this specification And it is not intended to be limited in any form.
In entire application, give with bracket, abbreviation " such as " or both example and enumerate.Unless otherwise clear Illustrate, these examples and enumerating be only exemplary rather than in detail.In most cases, each example and each is enumerated Combination will can't afford.Therefore, using smaller illustrative list and example, focus on the understanding that claim is provided rather than Limit the range of these claims.
For the term of substantially any plural number used herein and/or odd number, those skilled in the art can be according to upper and lower Plural number is understood singularization and/or odd number understanding pluralizes by the mode that text and/or application are suitble to.For clear mesh , do not illustrate the replacement of various singular/plurals specially herein.
It will be appreciated by those skilled in the art that for the purpose of clear concept, component (for example, operation) as described herein, Device, object and it is used as example along with their discussion, and envisions various configuration modifications all in expection.Therefore, originally Illustrated concrete example used herein and adjoint discussion are intended to represent their more generally classifications.In general, using Any concrete example is intended to represent its classification, and does not include that specific component (for example, operation), device and object are not to be construed as Limitation.
Although (such as in Fig. 1) and other positions are illustrated/are described as the people individually illustrated to user 105 herein Object, it will be appreciated that those skilled in the art that user 105 can represent one or more human users, robotic user (for example, computational entity) and/or substantially any combination of them are (for example, one or more robot agents can help to use Family), unless the context otherwise requires.It will be understood by those skilled in the art that in general, user can regard " transmission as Person " and/or other take entity as the term (when these terms used herein) of guiding, opposite feelings unless the context Shape.
In some cases, one or more components be properly termed as herein " being configured to ", " passing through ... configuration ", " can be configured to ", " operationally/operatively with ", " suitable for/may be adapted to ", " energy ", " can follow/follow " etc..This field skill Art personnel are, it will be recognized that these terms (for example, " being configured to ") generally comprise active state component and/or inactive state group Part and/or standby mode component, unless the context otherwise requires.
In known systems, equipment relevant to one or more users, for example, mobile phone, tablet computer, notebook are electric Brain, desktop computer, automobile, game system, household electrical appliances etc. can collect the data of relevant user.Third party can need these data. In other embodiments, the method and system for the user data collected the following describe management by one or more equipment, this A little user data may also to be not user entity it is useful, and these entities may not have permission to access these data.
Referring to Fig. 1, Fig. 1 illustrates exemplary environment 100, basis is can be implemented in wherein one or more personal devices 120 Method, system, circuit, product and the computer program product and framework of various embodiments.As shown in Figure 1A, one or more People's equipment 120, one or more service providers 170, one or more services developers 160 and one or more calculating equipment 30 can be communicated by one or more communication networks 140.In one embodiment, service provider 170 can have individual One or more services that equipment 120 may wish to.In one embodiment, calculating equipment 130 (can be and remotely-or locally take Business device or distributed server group) can manage by personal device 120 it is passive or initiatively collect, store, control, access, Limitation, monitoring ... under control, consult, check, verifying, certification, authorization, operation, update, change, filtering or otherwise The data of effect.In one embodiment, as discussed in more detail herein, it calculates on the accessible personal device 120 of equipment 130 Some or all of data.In another embodiment, the only a part on the accessible personal device 120 of equipment 130 is calculated Data.In other embodiment again, the revision of the data on the accessible personal device 120 of equipment 130 is calculated.Specifically Ground is said, in one embodiment, calculates the accessible data being stored on personal device 120 of equipment 130, but with anonymity side Formula.
In one embodiment, one or more services can be provided to personal device 120 by calculating equipment 130.At one In embodiment, providing for one or more services with the partial data that is stored and/or is collected by personal device 120 or can own The access authority of data is condition.In one embodiment, calculate equipment 130 can receive from service provider 170 and/or One or more services of services developers 160, and can choose one or more received services for rendering to individual Equipment 120.In one embodiment, the data from personal device 120 can be with one or more 170 kimonos of service provider Business developer 160 is shared.In one embodiment, data from personal device 120 can with services developers 160 and/ Or service provider 170 is shared anonymous before.
Personal device 120 is shown referring again to Figure 1A, Figure 1A.Personal device 120 can be by one or more users Operation or the portable or non-portable electronic device with one or more user-associations.Personal device 120 is illustrated as and user 105 interactions.As described above, user 105 can be personal or crowd or imitate other entities of user's operation.In some embodiments In, user 105 can be the device of computer or computer control.Personal device 120 can be (but are not limited to) cellular handset, Network mobile phone, smart phone, tablet computer, music player, intercom, radio station, usb driver, portable solid state driver, Portable disc type hard disk drive, earphone, is worn augmented reality equipment (for example, augmented reality glasses and/or headphone) Formula earphone, audio/video devices, media player, TV, projection screen, flat screen, display, clock, household electrical appliances are (such as micro- Wave furnace, convection oven, kitchen range, refrigerator, refrigerator-freezer), navigation system (for example, global positioning system (" GPS ") system), medical alert Device, long-range control, peripheral equipment, electronic safe, electronic lock, electronic safety system, video camera, personal video recording Device, personal audio recordings device etc..
Referring again to Figure 1A, personal device 120 may include operating system 124.In this case, computing system 124 Finger is considered as the core of equipment or any hardware, software, firmware or the their combination on basis.For example, directly being handed over hardware Mutual application is considered a part of operating system.In some embodiments, operating system 124 can be FPGA, print Printed circuit board or other non-wireless means.In one embodiment, operating system 124 may include one or more Google Various implementation schemes of Windows, Linux of iOS, Microsoft of Android, Apple etc..In some embodiments, it grasps Making system 124 may include the root menu for one or more TVs, stereo system, media player etc..Some In embodiment, operating system 124 can be " master " screen of device.
Referring again to Figure 1A, in one embodiment, personal device 120 may include user interface 123.User interface 123 may include that user 105 is allowed to interact and interact for personal device 120 with user 105 any with personal device 120 Hardware, software, firmware and their combination.In some embodiments, user interface 123 may include monitor, screen, touch Screen, liquid crystal display (" LCD ") screen, light emitting diode (" LED ") screen, loudspeaker, microphone, earphone, keyboard, keypad, Touch tablet, mouse, trace ball, remote controler, button group, microphone, video camera, camera, charge-coupled device (" CCD ") member Part, photoelectric cell etc..
Referring again to Figure 1A, in some embodiments, personal device 120 may include device memory 126.In some realities It applies in example, device memory 126 may include memory, random access memory (" RAM "), read-only memory (" ROM "), dodge It deposits, is hard disk drive, the media based on disk, the media based on CD, magnetic memory, optical memory, volatile memory, non- Any combination of volatile memory and they.In some embodiments, device memory 126 can be different from such as network Equipment on it is available or separated by the equipment of the available equipment of radio etc.For example, in networked system, it may There are many personal device 120, the device memory 126 of these personal devices is located at a few feet aways of potential range or in overseas Central server.
Referring again to Figure 1A, in some embodiments, device memory 126 may include one or more protection data 126A and unprotected data 126B.And not all embodiment includes every kind or both of protection data or unprotected data, but It is that there may be protection data 126A and unprotected data 126B in one or more embodiments.Protection data 126A can wrap Any data are included, maintain the data, a at least partly controlled including the data that are stored on personal device 120, personal device 120 The monitoring of people's equipment 120 provides the data etc. of monitoring capability, needs some form of authorization to access these data.Authorization can be with With any form and it is related to any subelement, including the inside and outside subelement of equipment.For example, in one embodiment In, protection data 126A may include that at least one run on the computing device applies not available data.For another example, at one In embodiment, protection data 126A can be used at any time for an application, and apply for another in specific time It can use, or can be used when the first application is without using data.In one embodiment, protection data 126A includes that must award The data of data 126A are protected in power application (for example, microsoft operation system authorization or user identifier are set as true) to access.
In one embodiment, protection data 126A includes the user of such as user 105 etc until user 105 verifies him The data that can just see of identity (such as passing through Password Input or bio-identification).In one embodiment, data are protected 126A is not limited to equipment, and is not transmitted to any other system not under the directly controlling of personal device 120.In a reality It applies in example, protection data 126A is not limited to personal device 120, and is only originated from personal device 120 or utilizes the origin of user 105 Protection data 126A is read using can permit.In one embodiment, personal device 120 is modified or for protection to be modified Data 126A, so at least part of change or blurring protection data 126A.In one embodiment, personal device 120 Allow that data 126A is protected to be transmitted in the case where external entity will be changed or blurring at least part protects data 126A To external entity.
Referring again to Figure 1A, in one embodiment, personal device 120 may include device memory 126, in some realities It applies in example, device memory 126 may include unprotected data 126B.In one embodiment, unprotected data 126B does not have Protection or limitation.In another embodiment, unprotected data 126B have protection or limitation, but compare protection data 126B by To less protection and/or limitation.In one embodiment, broadcast or unprotected data are propagated otherwise in request 126B.In one embodiment, since equipment designs or other factors, the entity outside personal device 120, which can not access, not to be protected Data 126B is protected, but unprotected data 126B is not protected specifically to prevent one or more other than personal device 120 A entity accesses.
Referring again to Figure 1A, in one embodiment, personal device 120 may include device interface component 128.At one In embodiment, device interface component 128 includes any component for allowing equipment and its environmental interaction.For example, in one embodiment In, device interface component 128 includes one or more sensors, for example, camera, microphone, accelerometer, thermometer, satellite Positioning system (SPS) sensor, barometer, humidity sensor, compass, gyroscope, magnetometer, pressure sensor, oscillation inspection Survey device, optical sensor, Inertial Measurement Unit (IMU), touch sensor, touch sensor, flexible transducer, MEMS (MEMS), radio station, including radio station, transmitter, receiver, transmitter, broadcasting equipment etc..In one embodiment, equipment Interface module 128 can also include one or more user's interface units, for example, user interface 122 is (for example, although individually retouch Draw, in some embodiments, user interface 122 can be any kind of device interface component 128), and in some implementations In example, including one or more users input receiving unit and component is presented in output.
Referring again to Figure 1A, in one embodiment, device interface component 128 may include protection component 128A.Protection Component 128A may include that any interface module 128 is needed in some non-limiting examples for having enumerated interface module before this Some form of authorization and/or proof are to access data.Authorization can have any form and be related to any subelement, including The inside and outside subelement of equipment.In one embodiment, protection component 128A is similar to protection data 126A.For example, In one embodiment, personal device 120 (for example, smart phone) can have 12 applications run on smart phone.? In one embodiment, 6 accessible protection component 128A (for example, alignment sensor) in these applications, and other 6 It cannot access.It in some embodiments, is to protect a part of component 128A by the data that protection component 128A is collected.One In a little embodiments, become protection data 126A by the data that protection component 128A is collected.In some embodiments, certain times Become protection data 126A by the data that protection component 128A is collected, or there is no the time.In some embodiments, protection group A part that the data that part 128A is collected can be protection component 128A continues special time amount (for example, two weeks), then changes It at unprotected data or is not considered as the data being protected or not protected data.In some embodiments, any People can protect component 128A in specific time and/or environment access.For example, protection component 128A (for example, radio station) can Accessed between 7 points to 8 points in the afternoon for any entity, and specific entity and/or application can be only supplied in other times Access.In some embodiments, protection component 128A (for example, image collection assembly) can be when meeting one or more conditions It is accessed for any entity, these conditions can be related to or not be related to protection of component 128A or personal device 120, for example, as individual When equipment 120 is in specific position.
Referring again to Figure 1A, in some embodiments, calculating equipment 130 may include personal device interface module 132.? In some embodiments, personal device interface module 132 can be communicated with one or more personal devices 120.In some embodiments In, personal device interface module 132 can receive from the received data 131 of personal device 120.The personal device data of acquisition 131 may include any data collected in any way from personal device 120.In some embodiments, calculating equipment 30 can To request the data from personal device 120.In some embodiments, calculating equipment 130 can receive on schedule from a The data of people's equipment 120.In some embodiments, when some condition is fulfilled, calculating equipment 130 can be retrieved sets from individual Standby 120 data.In some embodiments, personal device 120 is just in broadcast data, and calculates equipment 130 and collect broadcast Data.In some embodiments, the broadcast of personal device 120, which only calculates equipment 130, can use the data of (for example, decryption, explanation etc.). In some embodiments, personal device 120 can be used one or more communication networks 140 and send the personal device data obtained 131, to equipment 30 is calculated, will be described in more detail herein.
Referring again to Figure 1A, in some embodiments, the personal device data 131 of acquisition can be anonymous data 131A. In one embodiment, anonymous data refers to the data that can not uniquely determine data source.In some embodiments, data source can To refer to personal device 120, for example, unique identifier, for example, MAC Address.In some embodiments, data source can refer to By using power, using or with equipment other relationships (for example, user name, the title of user or user social insurance or its His identifier or network address or identity) user 105 associated with the data.It is noted that in some embodiments, equipment It can identify data source (for example, identity of personal device 120), i.e., send data since the attribute of data transmission determines, But data source cannot be inferred by data itself, in this case, in some embodiments, this data still by It is considered anonymous data 131A.
Anonymous data 131A may include the data for having been removed unique identifying information, or has hidden, obscures, made not It determines, to obscure, shield, pretend, covering up, hiding, covering, concealing, encoding, decoding or otherwise change unique knowledge The data of other information.In some embodiments, received anonymous data 131A never includes unique identifying information.In some implementations In example, anonymous data 131A can partly or non-uniquely identify its source, for example, user 105 or anonymous data come from Personal device 120.In some embodiments, additional information can be used, for example, look-up table, scattered table or other known Algorithm extracts unique identifying information from anonymous data 131A.It in some embodiments, can be in the feelings for not using additional information Unique identifying information is derived from anonymous data 131A under condition.In some embodiments, once data are in its anonymous format, with regard to nothing Method retrieves unique identifying information from anonymous data 131A.
In one embodiment, the personal device data 131 of acquisition may include non-anonymous data 131B.In some implementations In example, non-anonymous data 131B can explicitly or implicitly identify data source.In some embodiments, data source can be with Refer to personal device 120, for example, unique identifier, for example, MAC Address.In some embodiments, data source can refer to logical Cross the right to use, using or with equipment other relationships (for example, user name, the title of user or user social insurance or other Identifier or network address or identity) user 105 associated with the data.
Referring to Figure 1A -1D, data anonymous system and method are illustrated.Although these system and method are illustrated as calculating A part of equipment 130, but this is used for the purpose of facilitating diagram.In one embodiment, data go anonymization information to store The one or more of module 135, data anonymous device module 134A and data obfuscation module 134B can be located at personal device 120 In.In one embodiment, these modules can directly be interacted with device memory 126.In one embodiment, such as Figure 1A institute Show, calculating equipment 130 may include converting non-anonymous data 131B during the more detailed description of C to Fig. 1 D referring to Fig.1 At the data anonymous module 134A of anonymization data.In one embodiment, according to anonymization type, there may be for making to hide Nameization data go back into the additional data of non-anonymous data (for example, look-up table).In some this embodiments, additional number According to, such as anonymization data are gone, it can store and gone in anonymization information storage module 135 in data.
Referring again to Figure 1A -1D, in one embodiment, calculating equipment 130 may include data obfuscation module 134B. For example, in one embodiment, data obfuscation module 134B can make non-anonymous data 131B fuzzy, it is similar to data anonymous Device module 134A.For example, in one embodiment, data obfuscation module 134B can use data mask.Implement at one In example, data obfuscation module 134B can be obscured by addition, for example, by increasing mistake in genuine identification information Identification information so that from genuine identification information can not distinguish mistake identification information.Number can be lacked in some embodiments According to removing anonymization information storage module 135, data anonymous device module 134A and data obfuscation module 134B.
Referring again to Figure 1A, in some embodiments, calculating equipment 130 may include services developers interface module 136. Services developers interface module 136 can be communicated for example by communication network 140 with services developers 160.In particular, one In a embodiment, services developers interface module 136 can provide the limited information of the personal device data 131 in relation to obtaining. In one embodiment, for example, services developers interface module 136 can provide the information in relation to the data type collected to clothes Be engaged in developer 160.In one embodiment, for example, services developers interface module 136 can provide the data in relation to collection Summarize the information of brief introduction to services developers 160.In one embodiment, services developers 160 can receive these information simultaneously And it for example determines to develop what type of service using development decision-making module 162.
Referring again to Figure 1A, in some embodiments, calculating equipment 130 may include service provider interface module 138. In one embodiment, service provider interface module 138 can be for example logical by communication network 140 and service provider 170 Letter.
In one embodiment, service provider interface module 138 may include data permission management module 138A.One In a embodiment, data permission management module 138A can keep tracking which service has the right which personal device number accessed According to.For example, in one embodiment, service 172A can have permission certain anonymous data 131A.For another example, in one embodiment In, service 172B can have permission the data for having already passed through data anonymous device 134A processing.
Referring again to Figure 1A, in one embodiment, service provider interface module 138 may include information on services module 138B.In one embodiment, information on services module 138B may include a series of services provided from service provider 170, So that these information can be for transmission to personal device 120.In one embodiment, calculate equipment 130 can request when or It detects and information on services module is presented to personal device 120 when personal device 120 may be interested in one or more services The one or more services enumerated in 138B.
Referring again to Figure 1A, in one embodiment, service provider 170 can provide service to personal device 120.? In one embodiment, these equipment can be transmitted directly to personal device 120.In one embodiment, service provider 170 with Personal device 120 has limited communication or does not communicate, and communicates through intermediary (for example, calculating equipment 130) processing. In one embodiment, the service and data calculated between the processing service provider 170 of equipment 130 and personal device 120 is transmitted, So that protect data 126A and component 128A is protected to influence from service provider 170, but service provider 170 still can be with Service is provided, for example, service 172A and service 172B, gives personal device 120.In one embodiment, service provider 170 wraps The list of service management module 174 is included, which maintains to be presented to the service list for calculating equipment 130, example Such as, the information in relation to various services is maintained with the information on services module 138B for allowing to calculate equipment 130.
In various embodiments, communication network 140 may include one or more local area networks (LAN), wide area network (WAN), Metropolitan Area Network (MAN) (MAN), Wireless LAN (WLAN), personal area network (PAN), worldwide interoperability for microwave accesses (WiMAX), Public switch telephone network (PTSN), General Packet Radio Service (GPRS) network, cellular network etc..Communication network 140 can be with It is the combination of cable network, wireless network or cable network and wireless network.It is noted that as herein and used in attached drawing " communication network " refers to can be interactively with each other or not interactively with each other and can intentionally or unintentionally connect in some embodiments It works in order to the one or more communication networks communicated between one or more entities.
Referring now to Fig. 1 C, embodiment may include personal device 120A and personal device 120B.Personal device 120A can To generate non-anonymous data 144A, and personal device 120B can produce non-anonymous data 144B.Non-anonymous data 144A and Non-anonymous data 144B can for transmission to calculating equipment 130A, the calculating equipment can be calculate equipment 130 non-exclusive and Non-limiting example.In one embodiment, calculating equipment 130A may include data anonymous device module 134A.Implement at one In example, data anonymous device module 134A may include irreversible Anonymizing module 137A, which generates irreversible Anonymous data had been removed the data of identification for example, in an example.In one embodiment, data anonymous device mould Block 134A may include set Anonymizing module 137B, which can use non-anonymous data 144A and non-anonymous number According to 144B and the general anonymous data summarized is established, as shown in Figure 1 C.In one embodiment, data anonymous device module 134A It may include reversible Anonymizing module 137C, which can be used privately owned look-up table 135A thus by non-anonymous number According to being converted into anonymous data.In one embodiment, privately owned look-up table 135A can store goes anonymous information to store mould in data In block 135.
Referring again to Fig. 1 D, in one embodiment, calculating equipment 130B can have data anonymous device 134A, the data Anonymizer can use anonymization function 132A, as shown in figure iD.For example, private mark method, perturbation side can be used in anonymous function Method, DataFly algorithm, top-down specialized and/or Mondarian multidimensional K- are anonymous, as non-limiting and non-exclusive Example.In another embodiment, data obfuscation module 134B obscures non-anonymous data.In one embodiment, obscuring can Completed with being added to actual identification data by will appear to phase Sihe seemingly believable " mistake " data so that hereafter without Method determines truthful data simply by look at data.In one embodiment, anonymous data can be by service provider interface mould Block 38 thereby executing part of service, or determines which service can be used for one using to provide data to service provider 170 Or multiple personal devices 120.
Example shown in Fig. 1 C and 1D is only that how can implement the example of data anonymous device, and be not intended to limit Or it excludes.There are many other technologies for being used for anonymization data, refer to some of technologies herein.
Referring now to Fig. 1 E, Fig. 1 E shows concern service provider 170 and calculates the implementation of the invention of equipment 130C Example.Calculating equipment 130C can receive the data from one or more equipment, and these data can anonymization, or Person can not have anonymization or can obscure.In one embodiment, calculating equipment 130C can be from one or more The received data of equipment generate fuzzy data, either from one or more equipment it is directly received or from another source it is indirect It is received.In one embodiment, received data can be obscured by calculating equipment 130C, even if received data are anonymous Change.In another embodiment, additional step can not executed to anonymization before this or fuzzy data by calculating equipment 130C.
Referring again to Fig. 1 E, in one embodiment, calculating equipment 130C can be requested can be in one or more equipment One or more services 190 of upper execution.One or more services 190 can independently be executed by one or more equipment, or One or more parts that person can be executed by calculating equipment 130C in order to service.Calculating equipment 130C can request service to mention One or more services that one or more equipment can be presented to are provided for quotient 170.In one embodiment, equipment is calculated 130C can transmit fuzzy data 185 to service provider 170.This transmission can be carried out by any type of network, For example, communication network 140 (being not shown in fig. ie).In one embodiment, service provider 170 can be with calculating equipment 130C is integrated.In one embodiment, service provider 170 and calculating equipment 130C can be by the controls of single entity.
Referring again to Fig. 1 E, in one embodiment, service provider 170 can receive fuzzy data 185.Fuzzy data 185 can be any form, as described in several examples herein.The purpose of example shown in Fig. 1 E and the following drawings is only In order to make it easy to understand, and should not regard as and can thoroughly or exclusive in a manner of fuzzy data enumerate.For example, one In a embodiment, by the way that irreversible anonymous data 185A can be obscured from data-removal apparatus source-information, so that not being available Irreversible anonymous data 185A restores data.It, can be in order to obtain the source device information to form irreversible anonymous data 185A Retrieve the copy of derived data.For example, in one embodiment, calculating equipment 130C and can store leads to irreversible anonymous data The independent copy of the data of 185A, existence anduniquess identifies facility information in the copy saved by calculating equipment 130C.
In one embodiment, fuzzy data 185 may include reversible anonymous data 185B.Data 185B is not limited to specific The format of type, but show simple example.In instances, the equipment mark of one or more personal device 120A and 120B Know symbol, for example, 00123 and 00124, it is converted into new identifier XYZ and YYZ (for example, as shown in Figure 1 C), is implemented at one In example, this can be with the identity 00123 and 00124 of 170 facility for study of prevention service provider.In one embodiment, Ke Yitong It crosses and one or more algorithms, look-up table, key, encryption key, hash function etc. are provided are converted into reversible anonymous data 185B The data of unique identification one or more equipment.
In one embodiment, fuzzy data 185 may include general anonymous data 185C.In one embodiment, this The data of seed type may include that any format summarizes data, these summarize data and provide the letter in relation to one or more equipment Breath, but the one or more equipment for leading to summary information are not identified especially.For example, general anonymous data 185C may include this A little data, such as " being found to have 35 equipment greater than 20 contact persons in the contact list " or more specific data, such as " such as 35 smart phones of the Apple iPhone 4S of operation iOS 6.0 have more than 2.0Gb remaining space, in contact person More than 20 contact persons are found to have in list ".
Referring again to Fig. 1 E, in one embodiment, service provider 170 can receive fuzzy data 185, such as Fig. 1 E institute Show.In one embodiment, service provider 170 may include fuzzy data analysis module 173.Fuzzy data analysis module 173 can receive fuzzy data 185 and be determined one or more services using fuzzy data 185 or be can be used in fuzzy number According to the service of the type for the equipment quoted in 185.Fuzzy data analysis module 173 can be it is completely automatic, or at this It can have some human interferences in the process.In one embodiment, fuzzy data analyzer 173 can be from several different meters Calculate equipment 130C and obtain fuzzy data 185, these fuzzy datas can permit service provider 170 more efficiently provide it is a kind of or A variety of services.In one embodiment, service provider 170 may include service management module 174.Service management module 174 It may include existing service analysis module 174A and new service generation module 174B.Existing service analysis module 174A and New service generation module 174B can together or work independently, and with or without the use of fuzzy data analysis module 173, with Fuzzy data determines whether existing service meets determining requirement based on the received.If there is no this service, then newly Service generation module 174B can be by requesting, requesting human interference (for example, people writes the journey of new service by third party Sequence) generate new service, or new service can be automatically generated.
In one embodiment, service provider 170 may include service transmission module 175, which can To transmit one or more services 186 back to equipment 130C is calculated, for example, back to receiving module 138B, this clothes are serviced Business receiving module can be a part of service provider interface module 138 in one embodiment.In various embodiments, one Denier executes one or more operations relative to one or more services 186 are received, and de-fuzzy data 187, which can be, can make mould The data of 185 deblurring of data are pasted, de-fuzzy data 187 can be transferred to service provider 170, for example, being transferred to clothes The data deblurring module 176 of business provider 170.In one embodiment, de-fuzzy data 187 and 185 knot of fuzzy data It closes to obtain the data of deblurring.In another embodiment, de-fuzzy data 187 do not need to be combined with fuzzy data 185 To obtain the data of deblurring.In one embodiment, de-fuzzy can be transmitted when receiving one or more services 186 Data 187.In another embodiment, it can be executed before transmitting de-fuzzy data 187 and be related to one or more services 186 one or more operations, such as propose one or more services to one or more equipment.In one embodiment, such as The certain amount of user of fruit is without using one or more services 186, then de-fuzzy number can not be transmitted by calculating equipment 130C According to 187.
Referring now to Fig. 1 F, Fig. 1 F is shown such as exemplary embodiment 100 " " shown in the embodiment of the present invention.For example, Fig. 1 F shows the calculating equipment 130D interacted with personal device 120.In one embodiment, equipment 130D reception is calculated to come from The device data 188 of personal device 120.Although Fig. 1 F shows this transmission directly from personal device 120, one In a embodiment, calculating equipment 130D can receive the device data 188 from any source, and the source includes third equipment, leads to Communication network, social network sites, device manufacturer etc..In one embodiment, equipment 130D is calculated for the monitoring of device data 188 one A or multiple personal devices 120.In one embodiment, it calculates equipment 130D and is directed to the device data in relation to personal device 120 The one or more other sources of 188 monitorings.
In one embodiment, device data 188 may include the data that personal device 120 has been collected.In a reality It applies in example, device data 188 can the modified user with the identity of obscuring device 120 or equipment 120.In one embodiment In, device data 188 is not blurred.In one embodiment, device data 188 can be about being stored in equipment 120 or The data that person is otherwise controlled by personal device 120, rather than the real data of the control by personal device 120. For example, as shown in fig. 1F, personal device 120 may include protection data 126A, protection data can wrap in one embodiment Include last 30 position of the access of personal device 120.In one embodiment, device data 188 may include that individual sets Last 30 position of standby 120 access.In another embodiment, device data 188 may include personal device 120 There is the instruction of 30 device locations in memory.In one embodiment, device data 188 may include personal device There is the instruction of 30 device locations in 120 memory, and 20 in these positions are logical with calculating equipment 130D The entity of letter has given expression to interested position.
Referring again to Fig. 1 F, in one embodiment, calculating equipment 130D may include personal device interface module 132. Personal device interface module 132 may include data value monitoring modular 132A.In one embodiment, data value monitoring modular It is valuable information (for example, position data or showing equipment on New Year's Day that 132A, which can receive related which type of data, Position data etc. of the eve in Times Square), and have for personal device 120 and be evaluated as valuable data and number One or more equipment and other positions can be monitored according to the one or more instructions whether being protected.In one embodiment In, personal device interface module may include the facility information receiving module 132B for being configured to receiving device data 188.Equipment Data 188 can have any number of format, as described above, and non-limiting in the example as further provided herein Shown in example.
Referring again to Fig. 1 F, in one embodiment, calculating equipment 130D may include equipment monitoring module 132C.One In a embodiment, equipment monitoring module 132C can monitor one or more personal devices 120 by any monitoring technology.One In a embodiment, equipment monitoring module 132C may include that can be configured to back report with specific time interval to equipment Software relevant to personal device 120, hardware or the firmware of monitoring modular 132C.In one embodiment, equipment monitoring module 132C can monitor personal device 120 by one or more 140 (not shown) of communication network, and can be with personal device 120 direct communications.In one embodiment, equipment monitoring module 132C can monitor personal device 120, example by indirect mode Such as, the other equipment or system that can be used by personal device 120.
Referring again to Fig. 1 F, in one embodiment, personal device interface module 132 may include service providing module 132D.For example, as previously mentioned, one or more services can be required by calculating equipment 130D.These services can be presented to Personal device 120 gives user for rendering, or for about whether receiving the automatic decision of service.In one embodiment, one Kind or a variety of services 188 can require access protection data (for example, protection data 126A of personal device 120) or one or more A protection component (for example, protection component 128A of personal device 120) or both.In one embodiment, equipment 130D is calculated The user 105 of personal device 120 can be presented in order to pass through personal device 120 for one or more services.
The more detailed description of personal device 120 is shown referring again to Figure 1B, Figure 1B.In one embodiment, personal Equipment 120 may include processor 110.Processor 110 may include one or more microprocessors, central processing unit (" CPU "), graphics processor (" GPU "), physical processing unit, digital signal processor, network processing unit, floating point processor etc. Deng.In some embodiments, processor 110 can be server.In some embodiments, processor 110 can be distribution Core processor.Although processor 110 is as the single processor of a part of single personal device 120, processor 110 can To be distributed across the multiprocessor of one or more equipment 120, these processors can with or be not configured to work together.Place Reason device 110 is illustrated as executing computer-readable instruction, to execute said one or multiple operations, and as Fig. 6,7A-7C, Shown in 8A-8D, 9A-9C and 10A-10D.In some embodiments, processor 110 is designed to be configured to according to processing module 150 operations, the processing module 150 may include 152 in relation to being configured to provide one or more services and selectively visiting Ask one or more particular device protection portion separately win the data of the agency of module, 154 one or more services agency stop Continue to access one or more particular device protection portion with agency and divides that detection module, 156 to continue proxy access one or more special Locking equipment protection part and one or more service the indicator that module stops is presented and 158 stop proxy access one or Multiple particular device protections part promotes the one or more of the data of the presentation of the option of module.
Referring again to Figure 1B, in one embodiment, personal device 120 may include device memory 126.In some realities It applies in example, memory 126 may include one or more storage equipment, read-only memory (ROM), programmable read only memory (PROM), Erasable Programmable Read Only Memory EPROM (EPROM), buffer memory are (for example, random access memory (RAM), sudden strain of a muscle Deposit, synchronous RAM (SRAM), dynamic random access memory (DRAM)) and/or other kinds of storage equipment It is one or more.In some embodiments, memory 126 can be located at single website.In some embodiments, memory 126 can be located at multiple websites, including website away from each other.
Referring again to Figure 1B, in one embodiment, personal device 120 may include protection component 128A and unprotected group Part 128B, referring again to Figure 1A.Referring again to Figure 1B, protecting component 128A may include one or more components, and each Component can be hardware, software, firmware, data structure, class, API, the data of any format, link, pointer or other data or Reference, interface or their any combination of position etc..Similarly, unprotected component 128B may include one or more groups Part.In one embodiment, interface module 128 also may include one or more optional components, including assemblies monitor module 128C, equipment monitoring module 128D, using monitoring modular 128E and/or security module 128F.According to embodiment, these are optional Module may exist or be not present.Their presence is not necessary.For example, in one embodiment, component detection module 128C may exist, and can track which entity is accessing various protection component 128A.In another embodiment, may be used To omit assemblies monitor module 128C.
Referring again to Figure 1B is arrived, in one embodiment, interface module 128 may include equipment monitoring module 128D.If Standby monitoring modular 128D can be with one or more states of monitoring device, for example, which application is located in memory, which is applied Which resource of equipment can be used, or can track using statistics, utilize statistics etc..Equipment monitoring module 128D can be supervised The equipment for being in various level details is surveyed, for example, in whole equipment level, in application level, in process level, in resource water It is flat, or in interface level or the similar level of any combination of these or details.
Referring again to Figure 1B, in one embodiment, interface module 128 may include using monitoring modular 128E.Using Monitoring modular 128E can be a part of a part of application, hard coded or the operating system being hardwired in equipment, or It can be being used alone of running in the prospect or background of equipment.It can be with one in monitoring device using monitoring modular 128E Using, one group of application or all applications.The many aspects of one or more application can be monitored using monitoring modular 128E, such as Purposes, utilization, the resource used etc..
Referring again to Figure 1B, in one embodiment, interface module 128 may include security module 128F.Security module 128F can with one or more level of access of the multiple portions of monitoring device, for example, using, component, interface, memory block, mould Block etc..In one embodiment, security module 128F can only monitor level of security and report.In another embodiment, pacify Full module 128F can execute other function, for example, the safety of one or more parts is visited in modification level of security or removal The secure access asked or accessed from one or more parts.
It individually or with any combination can include in various embodiments or can exclude assemblies monitor module completely 128C, equipment monitoring module 128D, using each of monitoring modular 128E and security module 128F.
152 are illustrated in relation to being configured to provide one or more services and selectively visiting referring now to Fig. 2, Fig. 2 Ask one or more particular device protection portion separately win the data of the agency of module illustrative embodiments.As shown in Fig. 2, In various alternate embodiments and embodiment, 152 in relation to being configured to provide one or more services and selectively accessing One or more particular device protection portion separately win the data of the agency of module may include one or more sub- logic module.Example Such as, as shown in Fig. 2, for example, Fig. 2A, in some embodiments, module 152 may include one of following data or a variety of: 202 separately win in relation to being configured to provide one or more services and selectively accessing one or more particular device protection portion The existing data of the agency of module, 204 related be configured to provide one or more services and selectively access one A or multiple particular device protection portion separately win the data of the installation condition of the agency of module, 206 related are configured to provide one Kind or a variety of services and selectively access one or more particular device protection portion separately win the user of the agency of module swashs Data living, 208 are in relation to being configured to provide the one or more clothes for requiring to access one or more particular devices protections part Be engaged in and selectively access one or more particular device protection portion separately win the agency of module data (for example, some It may include 210 in relation to being configured to provide needed for accessing one or more particular device protections part one in embodiment Or the display of multiple cycle efficienies service and selectively access one or more particular device protection portion separately win module from The data of driving efficiency monitoring agency), 212 related be configured to provide one or more services from particular device module is received And the data and 214 of the agency of one or more particular device protections part are selectively accessed by scanning particular device Module is obtained about to be configured to provide one or more services and selectively access one or more particular devices and protect Protect the data of the agency of part.
Referring again to Fig. 2, for example, Fig. 2 B, in some embodiments, module 152 may include one of the following or more Kind: 216 be obtained about from operating system module be configured to provide it is one or more service and selectively access one Or multiple particular devices protect the data of the agency of part, 218 to protect part of module related from one or more particular devices It is configured to provide one or more services and selectively accesses by protecting part mould to one or more particular devices The data of the agency of one or more particular devices protection part of block and/or one or more transmission of monitoring, 220 come from The related of one or more particular device logs is configured to provide one or more services and selective access one or more A particular device protection portion separately win the data of the agency of module and 222 agency executed it is one or more service and after The continuous detectable indicator for accessing one or more particular device protection portion and dividing the agency of detection module.
Referring again to Fig. 2, such as Fig. 2 C, as it appears from the above, in some embodiments, module 152 may include 224 agencies It is terminated and is related to executing the activity of one or more services and continues access one or more after terminating activity detection module The detectable indicator of a particular device protection part.In some embodiments, module 224 may include that 226 agencies are whole Only it is related to executing the activity of one or more services and at the end of at least part detection by analysis particular device module Only continue the detectable indicator for accessing one or more particular device protections part after activity, 228 agencies have terminated and related to And the end for executing the activity of one or more services and being detected in the report at least partly using particular device module to issue Only continue the detectable indicator for accessing one or more particular device protections part after activity, 230 agencies have terminated and related to And it executes the activity of one or more services and is passing through the data analyzed one or more particular devices and protect part of module Flow the detectable indicator for continuing to access one or more particular devices protections part after the termination activity of detection, 232 and Agency has terminated the activity for being related to executing one or more services and has at least partly set using one or more is specific Continue that access is one or more specific to be set after the termination activity of the report detection of the monitor agent publication of standby protection part of module The detectable indicator of standby protection part.In some embodiments, module 232 may include that 234 agencies have terminated and are related to holding The activity of the one or more services of row and at least partly using the base of one or more particular devices protection part of module Continue to access one or more particular device protection portion after the termination activity for the report detection that the monitor agent of kernel is issued The detectable indicator divided.
Stop referring now to the agency that Fig. 3, Fig. 3 illustrate 154 one or more services and agency continues access one Or multiple particular device protection portion divide the illustrative embodiments of detection module.As shown in figure 3, in various alternative embodiments In embodiment, the agency of 154 one or more services stops and agency continues to access one or more particular device protections Part detection module may include one or more sub- logic modules.For example, as shown in Fig. 3 (for example, Fig. 3 A), in some implementations In example, module 154 may include that the notice of the stopping of 302 one or more service receiving modules and 304 agencies continue access one A or multiple particular device protection portion divide the one or more of the notice of receiving module.In some embodiments, module 302 can be with Including 306 from the notice of the stoppings of the received one or more services of proxy module and 308 from particular device operating system module The one or more of the expiry notification of received one or more services.In some embodiments, module 304 can include with 310 Continue to access one or more particular device protections part from the received agency of one or more particular devices protection part of module Notice, 312 continue to access the logical of one or more particular devices protections part from the received agency of protection apparatus assembly module Know and 316 continue to access the one of the notice of one or more particular device protections part from the received agency of notification agent module It is a or multiple.In some embodiments, module 312 may include 314 from as one or more particular devices protection part mould The received agency of the protection apparatus assembly of a part of block continues to access the notice of one or more particular device protections part.
Referring again to Fig. 3, for example, Fig. 3 B, in some embodiments, module 154 may include 318 terminations one or more Agent operation is surveyed with executing one or more service detection modules and the one or more particular device protection portion sortings of 320 access The one or more of agency's prevention of the stopping of module.In some embodiments, module 320 may include 322 by particular device The agency that detection module accesses the stopping that one or more particular device protection portion sortings are surveyed prevents and 324 is specific by being presented to The agency for the stopping that the particular device output access one or more particular device protection portion sorting of equipment user's monitoring modular is surveyed Prevention.
Referring again to Fig. 3, for example, Fig. 3 C, in some embodiments, module 154 may include 326 one or more services It obtains indicator that the agency of module stops and 328 agencies continues to access one or more particular device protection portion and separately win to obtain mould The one or more of the indicator of block.In some embodiments, module 328 may include one or more of lower list: 330 By the agency that particular device state monitoring modular obtains continue to access one or more particular devices protect part indicator, 332 continue to access one or more particular devices protections part by the agency that monitor agent level of access data module obtains Indicator, 334 access the agency that data module obtains by monitoring particular device and continue to access one or more particular devices guarantors Protect part indicator, 336 by monitoring attempt to access agency that one or more particular devices protect part of module to obtain after It is continuous to access the agency that one or more particular devices protect the indicator of part and 338 obtain by executing Agent Analysis module Continue to access the indicator that one or more particular devices protect part.
Referring again to Fig. 3, for example, Fig. 3 D, in some embodiments, module 154 may include one in lower list or Multiple: the agency of 340 one or more services stops and agency continues to access one or more particular device protection portion sortings surveys Module, 342 it is one or more look for friend service look for friend act on behalf of stop and look for friend agency continue access particular device connection The notice based on agency of the stopping of list detection module and one or more services and 346 agencies continue access one Kind or a variety of particular device protection portion divide the notice of receiving module.In some instances, module 342 may include 344 completing Particular device contacts list in one or more entities for listing look for the friend to act on behalf of positioning and one or more look for The stopping and friend agency is looked for continue access spy after the positioning and identification of one or more entity detection modules that friend services Locking equipment contacts list.In some embodiments, module 346 may include following one or more: 348 is one or more The notice based on agency of the stopping of service and continue to access the base that one or more particular device protection portion divide receiving module Continue access one or more in the notice of agency, the notice based on agency of the stopping of one or more services and 350 agencies A particular device protection portion divides the notice based on particular device protection part of receiving module.
156 continuation proxy access one or more particular devices protection part and one are illustrated referring now to Fig. 4, Fig. 4 The exemplary embodiment of the indicator of the stopping of module is presented in a or multiple services.As shown in figure 4, in the embodiment party of various substitutions In formula and embodiment, 156, which continue proxy access one or more particular device, protects part and one or more services to present The indicator of the stopping of module may include one or more sub- logic modules.For example, as shown in figure 4, for example, Fig. 4 A, one In a little embodiments, module 156 may include one of the following or a variety of: 402 are presented in particular device output precision module Continue proxy access one or more particular device protection part and one or more services stopping vision present, The 408 continuation proxy access one or more particular device protection parts and 410 presented to entity relevant to particular device One or more service present modules stoppings indicators, continue proxy access one or more particular device protection part with And one or more services are presented the notices of the stoppings of modules and 412 continue agency's visit by what particular device module was shown Ask the visual notification of the stopping of one or more particular device protections part and one or more services.In some embodiments In, module 402 may include that the 404 continuation proxy access tablet device positioning presented in particular device output precision module pass The vision of the stopping of sensor and one or more services is presented.In some embodiments, module 404 may include 406 in spy The trip of the continuation proxy access tablet device alignment sensor and children's highway that present in locking equipment output precision module assists The vision of the stopping of service is presented.In some embodiments, module 412 may include 414 aobvious by particular device screen module That shows continues the notification icon of the stopping of proxy access one or more particular device protection part and one or more services.
Referring again to Fig. 4, for example, Fig. 4 B, in some embodiments, module 156 may include one of the following terms or Multiple: 416 have continued the lists of one or more agencies of proxy access one or more particular device protection part and Stop one or more indicators that one or more of one or more agencies of module are presented in one or more services; 418 descriptions continue the report of proxy access one or more particular device protection part and whether show one or more services The report of module is stopped obtaining;420 instruction particular devices, which are presented, continues the protection of proxy access one or more particular device The indicator of the stopping of part and one or more service modules;And 422 change agency present with show to continue agency visit Ask the stopping of one or more particular device protections part and one or more service modules.In some embodiments, module 422 may include the one or more of the following terms: the color that 424 visions for changing agency are presented is to show to continue proxy access The agency of the stopping of one or more particular device protections part and one or more service modules and 426 changes will Show to continue proxy access one or more particular device to select agency for the one or more steps that user executes and protect The stopping of shield part and one or more service modules.In some embodiments, module 426 may include 428 increase requirements Show to continue proxy access one or more particular device to select agency for one or more steps performed by the user The stopping of protection part and one or more service modules.
Referring again to Fig. 4, for example, Fig. 4 C, in some embodiments, module 156 may include 430 changes to show to continue The behaviour that the agency of the stopping of proxy access one or more particular device protection part and one or more service modules is presented Make the relative position in system.
Stop referring now to the agency that Fig. 5, Fig. 5 illustrate 158 one or more services and agency continues access one Or multiple particular device protection portion divide the illustrative embodiments of detection module.As shown in figure 5, in various alternative embodiments In embodiment, the agency of 158 one or more services stops and agency continues to access one or more particular device protections Part detection module may include one or more sub- logic modules.For example, as shown in figure 5, for example, Fig. 5 A, in some implementations In example, module 158 may include appointing for 502 stopping proxy access one or more particular devices protection equipment component indicating module The presentation of option and 508 is for stopping the optional choosing of proxy access one or more particular device protection part presentation module It is one or more.In some embodiments, module 502 may include 504 being used to indicate the module of particular device to stop Proxy access one or more particular device protects the presentation of the option of equipment component indicating module.In some embodiments In, module 504 may include 506 be used to indicate the module of particular device with stop proxy access one or more particular device guarantor Protect the presentation of the optional user-selectable options of equipment component indicating module.In some embodiments, module 508 may include The 510 stopping proxy access one or more particular devices for being presented to the protection part access control part of particular device module are protected Protect the option of part.
Referring again to Fig. 5, for example, Fig. 5 B, in some embodiments, module 158 may include that 512 indicating equipments stop generation The presentation and 518 for managing the option of user setting for accessing one or more particular devices protections part promotion module give The relevant entity of particular device, which is presented, stops the optional choosing that proxy access one or more particular device protection part promotes module Presentation it is one or more.In some instances, module 512 may include 514 before agent operation indicating equipment stop Only proxy access one or more particular device protection part promotes the presentation and 516 of the option of the user setting of module Indicating equipment stopping proxy access one or more particular device protection part promotes the user of module to set before agency obtains The presentation of standby option it is one or more.
Referring again to Fig. 5, for example, Fig. 5 C, in some embodiments, module 158 may include 520 stopping proxy access one The optional option of a or multiple particular device protection part display modules, the protection of 522 proxy access one or more particular devices Portion ends module, 530 promote module stopping proxy access one or more particular device to protect part by disabling agency The presentation of option and 532 is by removing agency's promotion module stopping proxy access one or more particular device protection portion Point option presentation it is one or more.In some embodiments, module 520 may include the multiple agencies of 524 stoppings The optional option of (including agency) to the access of one or more particular devices protection part display module.In some embodiments In, module 522 may include that one or more access of 526 one or more agency (including agency) classes are one or more specific Each access one or more particular device of equipment protection portion ends module and 528 one or more agencies protect part Terminate module.
Referring again to Fig. 5, for example, Fig. 5 D, in some embodiments, module 158 may include 534 for establishing agency's visit The presentation and 546 for asking the option of the limitation of one or more particular device protections part promotion module are required for continuing Proxy access one or more particular device protection part promotes one kind of the presentation of the option of the data anonymous of module Or it is a variety of.In some embodiments, module 534 may include that proxy access one or more particular device guarantor is rebuild in 536 requirements The presentation for the option that shield part promotes the express authorization of module to access, 538 settings, which allow to act on behalf of, rebuilds access one or more A particular device protection part promotes the presentation of the option of the limitation of the number of module and 542 foundation that reconstruction is allowed to act on behalf of Access the one or more of the presentation of the option of the prerequisite of one or more particular device protections part promotion module. In some embodiments, module 538 may include 540 settings allow during special time period agency rebuild access one or Multiple particular device protections part promotes the presentation of the option of the limitation of the number of module.In some embodiments, module 542 may include 544 establish specific position as allow rebuild proxy access one or more particular device protection part promote The presentation of the option of the prerequisite of module.
It is a series of flow charts for describing embodiment below.For easy understanding, flow chart is organized such that initially Flow chart by exemplary embodiment present embodiment, hereafter after flow chart present alternative embodiment and/or The extension of initial flowchart is as the sub-component operation established on the flow chart that one or more early stages are presented or add-on assemble Operation.It will be appreciated by those skilled in the art that utilize herein presentation mode (for example, with present the embodiment of example and Hereafter provide subsequent flow add and/or the presentation of the flow chart of other details starts) allow generally for various processes The rapidly and easily understanding of embodiment.In addition, this field designer is it will be further understood that presentation side used herein Formula also well makes the example for itself becoming modularization and/or Object-oriented Programming Design.
In addition, in Fig. 6, and in attached drawing hereafter, various operations can be described in such a way that frame covers frame.These are retouched State the optional example that the operation that may indicate that in inside casing may include the operating procedure illustrated in one or more outline borders Embodiment.It will be appreciated, however, that inside casing operation can regard the independent operation separated to related outline border as, and can phase The operation of every other diagram is executed in any order, or may be performed simultaneously.Furthermore these are grasped shown in Fig. 6-10 Other operations made and be described herein can be executed by at least one that machine, product or article combine.
Following instance is provided merely as the explanation of various embodiments how can be implemented.Following instance is all not intended to limit System, and all examples enumerated herein can be in conjunction with the part of other examples enumerated herein, until these combinations are in logic On consistent degree invariably.Because of space constraints, can implement not writing out each example when the example every time.Therefore, unless separately Clearly state outside, each example should be understood to include instant example before and after each of enumerate other examples, and It can be in conjunction with any or all part of other examples.Each example is not intended to limit single claim or in groups right It is required that but the illustrations of one or more embodiments how can be implemented.The following contents, which must not be understood as limiting any right, to be wanted The exhaustive list that one or more claimed embodiments how can be implemented sought or enumerate.
Operation 600 is shown referring now to Fig. 6, Fig. 6, which may include that description is obtained in relation to being configured to visit Ask that the operation 602 of the data of the application of one or more protection parts of particular device, the application are configured to provide one kind Or a variety of services.For example, Fig. 1, for example, Figure 1B, shows 152 in relation to being configured to provide one or more services and selecting Access to property one or more particular device protection portion separately win the agency of module data, the particular device protection portion separately wins Module obtains and (obtains, receives from list or other data structures, calculating, selecting, or receiving information in relation to inference, execute Calculating is to find inference, retrieval shows the data of inference, receive notice, reception obtains the information of inference, either by people or certainly Dynamic process, or participate in being notified, any movement or transaction of reasoning or deduction, including but not limited to not no feelings of absolute belief Shape, including may and/or other threshold values) related be configured to access (for example, sending and receiving order, receiving and Data check the data gone to and arrived etc.) particular device (for example, cellular phone, smart phone, IP phone, VOIP phone, Telephone receiver, microphone, camera (for example, video camera, Still Camera, digital camera etc.), earphone, earpiece, screen, display Device, TV, game system, receiver (for example, audio/video receiver), media player is (for example, DVD player, blue light Player, CD Player, MP3 player, cassette tape player), tablet device, netbook computer, laptop, road By device, wireless router, bridge, the network equipment, server, desktop computer, personal computer, individual calculus thermomechanical components (example Such as, RAM, hard disk drive, video card, etc.), personal navigation system, Vehicular navigation system, motor vehicles, motor vehicles sound equipment, Motor vehicles control system, motor vehicles communication system (for example, OnStar), household electrical appliances, security system is (for example, household safe system System), electronic security device (for example, electronic safe, safety door system, door-locking system), sound system, loudspeaker, remote controler (for example, universal remote control or appliance remote control), radio, two-way radio, intercom, ham radio, metal detection Device, radar detedtor, weather station, robot (for example, Roomba), dust catcher, wearable article, the personal effects, enhancing are existing Product in kind, " intelligence " clothes, the glasses etc. with augmented reality) one or more protection parts (for example, either virtual , physics, opposite, absolute, dynamic or it is static any structure such as limit, be programmable, changeable, at least one Physically apply demand to access the part, no matter this requirement is cumbersome or heavy, no matter and this requirement is consistent It is application, always applying or applied in AD HOC) application (for example, one or more hardware, software, firmware, The set in API, Internet resources, library etc.) data (for example, Apply Names, application type, application any property or attribute, be It is no limited by application, equipment or third party, whether be general or local etc.), the application be configured to provide (for example, Take help to execute at least part of one or more steps of one or more services) it is one or more service (for example, setting Any group of any part of any task or any task or task that standby or equipment combines another equipment that can execute It closes, may include the interaction of people, or can not include the interaction of people, and may be required in equipment and be local or remote from equipment One or more resources, and may include hardware, software, firmware, the portion for being stored in any component, module, part or equipment Divide data that are upper or being operated by it, including but not limited to, hardware, software, application, Application Programming Interface (" API "), one or more A virtual machine, one or more dynamic read library (" DLL "), one or more relational databases, one or more GUI frame, Any part of one or more COM structure memories or any other equipment controlled by equipment, for example, cloud resource etc.).
Referring again to Fig. 6, operation 600 may include operation 604, which depicts detection application and completed one At least one and application of kind or a variety of services maintains the one or more of access particular device to protect parts.For example, Fig. 1, For example, Figure 1B, the agency for showing 154 one or more services stops and agency continues to access one or more particular devices Protection portion divides detection module, the particular device protection portion divide detection module detection application (for example, one or more hardware, software, The set in firmware, API, Internet resources, library etc.) it has completed (for example, using such a point: observer's whole or portion is reached Point ground sums up with the help of application has completed at least one task) at least one and application of one or more services Maintain one or more protection parts of (for example, application access level does not change according to aforementioned completion) access particular device (for example, either virtual, physics, opposite, absolute, dynamic or it is static limit, be programmable, changeable etc. appoint What structure applies demand physically to access the part at least one, no matter this requirement is cumbersome or heavy, and Though this require be unanimously apply, it is always applying or apply in AD HOC).
Referring again to Fig. 6, operation 600 may include operation 606, which depicts presentation and show to have completed one Kind or a variety of services and application maintain the information of the one or more protection parts of access particular device.Such as.Fig. 1, for example, Figure 1B, shows 156 continuation proxy access one or more particular devices protection part and mould is presented in one or more services The indicator of the stopping of block, the service are presented module and present (for example, for example, visually may not be shown or be promoted with any medium It has been shown that, the one or more of participating user feel or are connected with inhuman entity) show to have completed one or more services And application maintains the information of the access to one or more protection parts of particular device.
Referring again to Fig. 6, operation 600 may include operation 608, which, which depicts promotion and present, stops application pair The option of the access of one or more protection parts of particular device.Such as.Fig. 1, for example, Figure 1B, shows 158 stoppings agency The option that one or more particular device protections part promotes module is accessed, particular device protection part promotes module to promote Presented into (for example, executing the one or more operations for helping to execute or completing to present) (such as by vision and non-vision connect Any combination of mouth is shown) stop (for example, stopping, or in stopped process, or attempting to stop, hit or miss, no matter being somebody's turn to do Stopping whether being interim or permanent) options of one or more protection parts of application access particular device are (for example, non-must The optional interface wanted).
Fig. 7 A-7C depicts the various embodiments of operation 602, and operation 602 describes acquisition in relation to being configured to access The data of the application of one or more protection parts of particular device, the application are configured to provide one kind according to the embodiment Or a variety of services.Referring now to Fig. 7 A, operation 602 may include operation 702, which describes acquisition in relation to being configured At the existing data of the application of one or more protection parts of access particular device, the application is configured to provide one kind Or a variety of services.For example, Fig. 2, for example, Fig. 2A, shows 202 in relation to being configured to provide one or more services and selecting Access to property one or more particular device protection portion separately win the agency of module existing data, the particular device protection portion Separately win to obtain one or more guarantors of the module acquisition in relation to being configured to access particular device (for example, network-enabled digital camera) The existing data of the application (for example, report from device operating system) of shield part (for example, image data), the application It is configured to provide one or more services (for example, picture tag service).
Referring again to Fig. 7 A, operation 602 may include operation 704, which describes acquisition in relation to being configured to visit Ask the data of the installation of the application of one or more protection parts of particular device, the application is configured to provide a kind of or more Kind service.For example, Fig. 2, for example, Fig. 2A, shows 204 and related be configured to provide one or more services and selectively Access one or more particular device protection portion separately win the installation condition of the agency of module data, the particular device protection portion Separately win to obtain one or more protecting of the module acquisition in relation to being configured to access particular device (for example, smartwatch of user's wearing) The installation of shield part (for example, blood glucose monitor) is (for example, the application memory on the memory of equipment remotely-or locally, Huo Zhe The foundation of interface between device operating system and application, for example, user's mechanism that can activate application is provided, for example, when using Family from application shop selection can download application when) data, the application be configured to provide it is one or more service (for example, Picture tag service).
Referring again to Fig. 7 A, operation 602 may include operation 706, which describes acquisition in relation to being configured to visit Ask the user activated data of the application of one or more protection parts of particular device, the application is configured to provide one kind Or a variety of services.For example, Fig. 2, for example, Fig. 2A, shows 206 in relation to being configured to provide one or more services and selecting Property access one or more particular device protection portion separately win the agency of module user activated data, the particular device protect Shield part obtains module and obtains one or more protection parts in relation to being configured to access particular device (for example, smart television) The application (for example, internet using application) of (for example, network communication components) user's activation (such as user executes, for example, with Family is to equipment, such as the operating system instruction of smart television, to run program, for example, internet uses monitoring service) number According to the application is configured to provide one or more services (for example, the service for the content that monitoring is watched online).
Referring again to Fig. 7 A, operation 602 may include operation 708, which describes acquisition in relation to being configured to visit Ask the data of the application of one or more protection parts of particular device, the application is configured to provide requirement and accesses specific set One or more services of standby one or more protection parts.For example, Fig. 2, for example, Fig. 2A, shows 208 in relation to being configured The one or more services for accessing one or more particular devices protections part and selectively access one are required at offer Or multiple particular device protection portion separately win the agency of module data, the particular device protection portion separately win module obtain it is related Being configured to access particular device, (for example, such as smart phone, and picture deposits a part that support is particular device, because special Locking equipment controls it, and checks, modifies, changes, increases, subtracts and deletes as a part for depositing support for example, executing One or more abilities of one or more files) one or more protection parts (for example, being stored in cloud network storage Picture deposit support) application (for example, picture upload application) data, the application be configured to provide requirement access one or One or more services (for example, picture upload service) of multiple particular device protections part.
Referring again to Fig. 7 A, operation 708 may include operation 710, which depicts acquisition in relation to being configured to visit Ask the data of the bicycle efficiency application of the alignment sensor of particular device, the bicycle efficiency application is configured to specific The user of equipment provides one or more cycling efficiency statistics after carrying the equipment when cycling, described to ride voluntarily Vehicle cycle efficieny statistical data requires to use alignment sensor.For example, Fig. 2, for example, Fig. 2A, shows 210 in relation to being configured to One or more cycling efficiency displays needed for accessing one or more particular device protections part are provided to service and select Access to selecting property one or more particular device protection portion separately win the bicycle efficiency monitor agent of module data, this is specific Equipment protection part obtains module and obtains in relation to being configured to access particular device (for example, tying up the monitoring in bicycle handlebar on hand Equipment) alignment sensor bicycle efficiency application data (for example, obtain load application memory in position), institute Bicycle efficiency application is stated to be configured to after the user of particular device carries the equipment when cycling (for example, ride connection The bicycle of the equipment) one or more cyclings efficiency statistics (for example, height change hourly) are provided, it is described Cycling efficiency statistics require using alignment sensor (for example, the equipment can be able to use three-dimensional triangulation measurement, and And it is noted that can have other modes to measure height change, for example, by altimeter, but the equipment can not have Altimeter, or can choose using three-dimensional position triangulation).
Referring again to Fig. 7 A, operation 602 may include operation 712, which describes reception from particular device Show the data that there is the application for the one or more protection parts for being configured to access particular device, the application is configured to One or more services are provided.For example, Fig. 2, for example, Fig. 2A, shows 212 in relation to being configured to provide one or more services And the data for selectively accessing the agency from the received one or more particular device protections part of particular device module, should Particular device shows to exist from particular device (for example, cellular smart mobile phone) reception is configured to access particular device (for example, setting The list for the number that standby telephony feature calls in last seven days) one or more protection parts application (for example, in the presence of Using, or link or other relative indicators of application) data (for example, application consumes one or more device resources, example Such as, processor power, fixation or random access memory, Internet resources or using one or more sensors and/or input/ The indicator that the device operating system of output interface generates), the application be configured to provide one or more services (for example, Use pattern generator service).
Referring again to Fig. 7 A, operation 602 may include operation 714, which describes scanning particular device to determine quilt Be configured to the identity of the applications of one or more protection parts of access particular device, the application be configured to provide it is a kind of or A variety of services.For example, Fig. 2, for example, Fig. 2 B, shows 214 and be obtained about by scanning particular device module and be configured to mention For the data of the agency of one or more services and selectively access one or more particular devices protections part, this is specific EM equipment module scanning (for example, one or more parts to equipment (including memory) execute any kind of analysis, if Other scannings of fixed or movable and, for example, circuit, sensor, input/output interface etc., and further include that scanning is received Collection related equipment data, for example, registry file or remote journal file) particular device with determination be configured to access spy One or more protection parts of locking equipment (for example, video camera that Wi-Fi is enabled) are (for example, user is appointed as the figure of " privately owned " The particular category of piece) application (for example, picture enhancing service) identity (for example, the title of application or the information of related application Or internal code name, for example, process identifier number), the application is configured to provide one or more services.
Referring again to Fig. 7 B, operation 602 may include operation 716, which describes the operation system from particular device System obtains the data of the application of one or more protection parts in relation to being configured to access particular device, and the application is configured At the one or more services of offer.For example, Fig. 2, for example, Fig. 2 B, shows 216 and is obtained about from operating system module and matched It is set to and one or more services and the selectively data of the agency of access one or more particular devices protections part is provided, The operating system module obtains related from the operating system (for example, iOS) of particular device (such as tablet computer, for example, iPad) Be configured to access one or more protection parts of particular device (such as tablet computer, for example, iPad) application (for example, ATM search application) data, the application be configured to provide it is one or more service (for example, search user present bit Set nearest ATM).
Referring again to Fig. 7 B, operation 602 may include operation 718, which describes monitoring and be sent to and/or come Data from one or more protection parts of particular device, including be sent to and/or from being configured to access particular device One or more protection parts applications data.For example, Fig. 2, for example, Fig. 2 B, show 218 by being sent to and/or The related of one or more transmission of monitoring from one or more particular devices protection part of module is configured to provide one kind Or the data of a variety of agencies for servicing and selectively accessing one or more particular devices protections part, the particular device are protected Protect part of module monitoring (for example, all or part of of data being received, for example, a data packet in every ten data packets) hair It is sent to and/or one or more protection parts from particular device (for example, onboard navigation system) is (for example, GPS positioning is tracked Device) data, including be sent to and/or from be configured to access one of particular device (for example, onboard navigation system) or The data of the application (for example, gas station's gas price compares application) of multiple protection parts.
Referring again to Fig. 7 B, operation 602 may include operation 720, which describes one of reception particular device Or multiple usage logs, the usage log include one or more protection parts in relation to being configured to access particular device The use information of one or more application.For example, Fig. 2, for example, Fig. 2 B, shows 220 and is configured to provide one kind from related Or it a variety of services and selectively accesses one or more particular device protection portion and separately wins to obtain one or more of the agency of module The data of a particular device log, the particular device protection portion separately win module receive particular device (for example, the intelligent hand of user Machine) one or more usage logs (for example, looking for log of friend's application access equipment contacts list every time), the use Log includes one or more protection parts (example in relation to being configured to access particular device (for example, smart phone of user) Such as, the contacts list of user) one or more application (for example, using look for friend apply and may be related to the equipment Zero or more other application frequency and/or look for friend application access user smart phone multiple portions (for example, Be stored on smart phone or the frequency of the available contacts list of smart phone) log) use information.
Referring again to Fig. 7 B, operation 602 may include operation 722, which depicts detection application and executed one At least one and application of kind or a variety of services maintains the one or more of access particular device to protect parts.For example, Fig. 2, For example, Fig. 2 B, shows 222 agencies and has executed one or more services and continued to access one or more particular devices guarantors The detectable indicator of part detection module is protected, which divides detection module detection application (for example, speech synthesis Using) execute at least one of one or more services (for example, sound that user is covered up when communicating with telephone plant) simultaneously And application maintains one or more protection parts of access particular device (for example, telephone system that VoIP is enabled) (for example, equipment Microphone).
Referring now to Fig. 7 C, operation 602 may include operation 724, which depicts detection in application execution one kind Or it terminates after at least one at least part of a variety of services and has been set using maintenance access is specific after termination Standby one or more protection parts.For example, Fig. 2, such as Fig. 2 B, show 224 agencies terminated be related to executing it is a kind of or The activity of a variety of services and continuing after terminating activity detection module accesses one or more particular devices protections part Detectable indicator, termination activity detection module detection are executing one or more services (for example, being mounted on home computer On with notice children surf the web content internet using monitoring service) at least one at least part after application It is terminated (for example, stopping, provisionally or until reactivation etc.) and application maintains access particular device (example after termination Such as, home computer) one or more protection parts (for example, the website column of the browser access operated on computers Table).
Referring again to Fig. 7 C, operation 724 may include operation 726, which depicts by checking particular device At least part of memory detects after at least one at least part of the one or more services of application execution It terminates and application maintains to access one or more protection parts of particular device after termination.For example, Fig. 2, such as Fig. 2 B, It shows 226 agencies and has terminated the activity for being related to executing one or more services and by analysis particular device module Continue to access the detectable indicator that one or more particular devices protect part after the termination activity of at least part detection, Memory (such as the operation application of memory that the particular device module passes through detection particular device (for example, home computer) A part of deposit) at least part executing one or more services (for example, allow user have meal) at least to detect It has terminated after a part using (for example, calorie consumption tracker) and has been set using maintenance access is specific after termination The standby one or more protection parts database of how many calorie (such as in various foods).
Referring again to Fig. 7 C, operation 724 may include operation 728, which depicts by receiving from storage prison The report detection for surveying application has terminated simultaneously after at least one at least part of the one or more services of application execution And application maintains one or more protection parts of access particular device after termination.For example, Fig. 2, such as Fig. 2 C, it shows 228 agencies have terminated the activity for being related to executing one or more services and at least partly particular device module have been used to send out Continue to access the detectable indicator that one or more particular devices protect part after the termination activity of the report detection of cloth, it should Particular device module by receive from memory monitoring application report come detect execute it is one or more service (for example, The positioning service of soda water vending machine) at least part after application terminated and using maintaining access special after termination One or more protection parts (for example, alignment sensor) of locking equipment.
Referring again to Fig. 7 C, operation 724 may include operation 730, which depicts detection in application execution one kind Or it is terminated after at least one at least part of a variety of services and particular device is flowed to and/or come from by monitoring The data flows of one or more protection parts detect using the one or more for maintaining access particular device after termination Protect part.For example, Fig. 2, such as Fig. 2 C, it shows 230 agencies and has terminated the activity for being related to executing one or more services And continue to visit after the termination activity by the data-flow detection for analyzing one or more particular devices protection part of module Ask the detectable indicator of one or more particular device protections part, particular device protection part of module detection is held in application It has terminated and has monitored after at least one at least part of the one or more services of row and flowed to and/or set from specific The data flow of standby one or more protection parts accesses particular device (for example, user using maintenance after termination to detect Tablet device) one or more protection parts.
Referring again to Fig. 7 C, operation 724 may include operation 732, which depicts detection in application execution one kind Or it is terminated after at least one at least part of a variety of services and has come from the monitoring application of protection part by receiving Report detection application maintain one or more protection parts of access particular device after termination.For example, Fig. 2, such as scheme 2C shows 232 agencies and has terminated the activity for being related to executing one or more services and at least partly used one Or continue access one after the termination activity of the report detection of the monitor agent publication of multiple particular device protection part of module Or the detectable indicator of multiple particular devices protection part, particular device protection part of module detection execute it is a kind of or more At least one of kind service (for example, the possible interested concert of the user for the selection of music equipment that user based on equipment listens) At least part after application (for example, the use based on equipment (such as media player) or the equipment including media player The music that family is listened collects concert information and selects the application of the possible interested concert of the user of equipment) it has terminated And (such as it can be a part of operating system, or can be and individually answer by receiving the monitoring application from protection part With) report detection application after termination maintain access particular device (for example, media player or operation music player answer Computer or other equipment) one or more protection parts (music playlist that user establishes).
Referring again to Fig. 7 C, operation 732 may include operation 734, which depicts detection in application execution one kind Or it is terminated after at least one at least part of a variety of services and has monitored one or more protect by receiving to come from The report detection application for protecting the device operating system of part maintains one or more protections of access particular device after termination Part.For example, Fig. 2, such as Fig. 2 C, show 234 agencies terminated the activity for being related to executing one or more services and At least partly using the report of the monitor agent publication based on kernel of one or more particular device protection part of module Continue to access the detectable indicator that one or more particular devices protect part, the particular device after the termination activity of detection The detection of protection part of module is in the one or more services of application execution (for example, monitoring subjective situation to detect the clothes of medical emergency Business) at least one at least part after terminated and by receiving from the one or more protection parts of monitoring Device operating system is (for example, the Android by equipment supplier's modification run in the equipment of equipment supplier's manufacture operates system System) report detection application maintain one or more protection parts of access particular device after termination.
Fig. 8 A-8D depicts the various embodiments of operation 604 according to the embodiment, which depicts detection and answer With the one or more protection portion for having completed at least one of one or more services and application maintenance access particular device Point.Referring now to Fig. 8 A, operation 604 may include operation 802, the operation 802 depict reception application completed it is a kind of or At least one notice of a variety of services.For example, Fig. 3, for example, Fig. 3 A, shows 302 one or more service receiving modules The notice of stopping, which, which receives, has completed one or more services using (for example, self-driving travel intended application) At least one notice (for example, notification received data packet) of (for example, auxiliary plan self-driving travel).
Referring again to Fig. 8 A, operation 604 may include operation 804, which depicts reception application and maintain access special The notice of one or more protection parts of locking equipment.For example, Fig. 3, for example, Fig. 3 A, shows 304 agencies and continues access one Or multiple particular device protection portion divide the notice of receiving module, the particular device protection portion divide receiving module receive application (for example, Video-game enhancing application) it maintains to access one of particular device (for example, video game system, for example, Nintendo Wii) Or the notice (for example, the electric pulse for causing machine state to change) of multiple protection parts (for example, video card buffer memory).
Referring again to Fig. 8 A, operation 802 may include operation 806, which depicts from application and received application Complete at least one notice of one or more services.For example, Fig. 3, for example, Fig. 3 A, shows 306 and receives from proxy module One or more services stopping notice, the proxy module from application receive apply (for example, wireless network strength analysis) At least one notice (example of one or more services (for example, available wireless network of analysis user's connection) is completed Such as, indicator is received).
Referring again to Fig. 8 A, operation 802 may include operation 808, which depicts receives from device operating system Using at least one notice for having completed one or more services.For example, Fig. 3, for example, Fig. 3 A, 308 are shown from specific The notice of the stopping of the received one or more services of device operating system module, the particular device operating system module is from equipment Operating system (for example, self-defining operation system of equipment supplier's modification) has received application (for example, speech processing applications) Complete the notice of at least one of one or more services (for example, pre-processing from the received voice command of user).
Referring again to Fig. 8 A, operation 804 may include operation 810, the operation 810 depict from one of particular device or Multiple protection portion taps receive the notice that application maintains one or more protection parts of access particular device.For example, Fig. 3, for example, Fig. 3 A shows 310 and continues to access one or more spies from the received agency of one or more particular devices protection part of module Locking equipment protects the notice of part, which protects part of module from particular device (for example, Windows phone, example Such as, Nokia Lumia) one or more protection parts (for example, accelerometer of equipment) receive application (for example, sensing The impact early warning application of equipment is protected when will impact) maintain the one of access particular device (for example, Windows phone) The notice of a or multiple protection parts (for example, accelerometer).
Referring again to Fig. 8 A, operation 804 may include operation 812, which depicts to receive from apparatus assembly and apply Maintain the notice of one or more protection parts of access particular device.For example, Fig. 3, for example, Fig. 3 A, shows 312 from protection The received agency of apparatus assembly module continues to access the notice of one or more particular device protections part, the protection apparatus assembly Module from apparatus assembly (for example, from hardware implement apply monitoring assembly) receive application maintain access particular device (for example, for Answer quotient's special intelligent mobile phone) one or more protection parts notices.
Referring again to Fig. 8 A, operation 812 may include operation 814, which depicts from one as particular device The apparatus assembly of a part of a or multiple protections part receives one or more protection portion that application maintains access particular device The notice divided.For example, Fig. 3, for example, Fig. 3 A, shows 314 from one as one or more particular devices protection part of module The received agency of partial protection apparatus assembly continues to access the notice of one or more equipment protection parts, which protects Part of module is protected from one or more protection parts as particular device (such as laptop) (for example, the protection of equipment Part includes sensor and determines which kind of entity just in the monitor for the sensor of access sensors, alternatively, another In one embodiment, segment of the protection portion of equipment point including memory, and be designed to check the segment of memory and Identification accessing or attempting access memory segment one or more entities application) apparatus assembly receive application tie up Hold the notice of one or more protection parts of access particular device.
Referring again to Fig. 8 A, operation 804 may include operation 816, which depicts from having accessed particular device The notice applications of one or more protection parts receive the one or more protection parts that application maintains access particular devices Notice.For example, Fig. 3, for example, Fig. 3 A, shows 316 agencies and continue access and set from the received one or more of notification agent module The notice of standby protection part, the notification agent module is from the one or more for having accessed particular device (for example, tablet device) Protection part notice application (for example, at least one purpose be at least one entity and equipment at least part it is true Which kind of fixed entity is just in the application of what part of access equipment) receive application (for example, the service of photo face recognition) maintenance visit Ask the notice of one or more protection parts of particular device (for example, image acquiring sensor).
Referring now to Fig. 8 B, operation 604 may include operation 818, which depicts detection application and completed one Kind or at least one of a variety of services.For example, Fig. 3, for example, Fig. 3 B, shows 318 termination one or more agent operations to hold Row one or more service detection module, service detection module detection application (for example, running mileage tracks application program) is Completed at least the one of one or more services (for example, service of a part of tracking running how many mileage as training program) Kind.
Referring again to Fig. 8 B, operation 604 may include operation 820, which depicts reception application and maintain access special The notice of one or more protection parts of locking equipment.For example, Fig. 3, for example, Fig. 3 B, it is specific to show 320 pairs of one or more The agency of the stopping of the access of equipment protection part detection module prevents, which divides detection module to receive application (for example, running mileage tracking application) maintains access (for example, after user has shown that running terminates, using still accessing Alignment sensor) particular device (for example, exercise aiding apparatus) one or more protection parts (for example, alignment sensor) Notice.
Referring again to Fig. 8 B, operation 820 may include operation 822, which describes one of observation particular device Or one or more states of multiple portions are to determine that at least one of one or more services has been completed in application.For example, figure 3, for example, Fig. 3 B, shows 322 visits to one or more particular devices protection part detected by particular device monitoring modular The agency for the stopping asked prevents, particular device monitoring modular observation (for example, the data in relation to one or more states are received, Or the report in relation to one or more states is received, or be inserted into the communication line between two components, or virtual insertion two Contact or interface between, or between serving as two or more components, sensor, interface, user etc.) particular device One or more states of one or more parts of (for example, smart phone) are (for example, status information, for example, environmental factor dependence And/or environmental factor dependence information) to determine that one or more clothes have been completed in application (for example, processor use of monitoring service) At least one of business.
Referring again to Fig. 8 B, operation 820 may include operation 824, which describes one by particular device Or one or more outputs that multiple output precision observations are presented to the user.For example, Fig. 3, for example, Fig. 3 B, shows 324 by being in Now part is protected to access one or more particular devices to the particular device output detection of particular device user monitor module Stopping agency prevention, the particular device user monitor module observation (for example, receive the number in relation to one or more states According to, or the report in relation to one or more states is received, or be inserted into the communication line between two components, or be virtually inserted into two Contact or interface between a application, or between serving as two or more components, sensor, interface, user etc.) by specific One or more output precisions of equipment (for example, video game system and associated peripheral, for example, TV and controller) The one or more that (for example, LED light, touch screen, LCD screen, loudspeaker, earphone, touch feedback button etc.) is presented to the user It exports (for example, vision, the sense of hearing, output of tactile or other forms).
Referring now to Fig. 8 C, operation 604 may include operation 826, which depicts reception application and completed one Kind or at least one notice of a variety of services.For example, Fig. 3, for example, Fig. 3 C, shows 326 one or more services and obtains mould The indicator that the agency of block stops, the service obtain module reception and have completed one using (for example, network connection management application) Kind or at least one notice of a variety of services (for example, being that the user of downloading film is requested to find high-efficiency network).
Referring again to Fig. 8 C, operation 604 may include operation 828, which depicts detection application and maintain access special One or more protection parts of locking equipment.For example, Fig. 3, for example, Fig. 3 C, shows 328 agencies and continues access one or more Particular device protection portion separately win module indicator, the particular device protection portion separately win module detection application (for example, network Connection management application) it maintains to access one or more of particular device (for example, smart phone, tablet computer, laptop etc.) A protection part (for example, input/output stream of network controller).
Referring again to Fig. 8 C, operation 828 may include operation 830, which depicts one of observation particular device Or one or more states of multiple portions are to determine that application maintains one or more protection parts of access particular device.Example Such as, Fig. 3, for example, Fig. 3 C, shows 330 and continue access one by the agency that particular device state detects monitoring modular acquisition Or the indicator of multiple particular device protections part, the particular device state detect monitoring modular observation particular device (for example, public The network user of department and the personal portfolio of employee) one or more parts one or more states with determine application maintain Access one or more protection parts of particular device (for example, network computer in corporate networks corporate environment).
Referring again to Fig. 8 C, operation 828 may include operation 832, and it is related to particular device which depicts reading One or more level of access data, the level of access statistics indicate that application one or more level of access.For example, figure 3, for example, Fig. 3 C, shows 332 and continues access one or more by the agency that monitor agent level of access data module obtains Particular device protects the indicator of part, which reads one or more related with particular device Level of access data are (for example, be allowed for list or the institutes such as various sensors and/or segment of the level of access of various applications Need level of access list), the level of access statistics indicate that application one or more level of access (such as, if come Self-application side or protection part side, and whether specially refer to applying or as application group or a part of application class).
Referring again to Fig. 8 C, operation 828 may include operation 834, which depicts the one of reading and particular device The relevant access data of a or multiple protection portion point, the access is statistics indicate that the one or more that can access protection part is real Body, which includes one or more application.For example, Fig. 3, for example, Fig. 3 C, it is special by monitoring to show 334 The agency that locking equipment access data module obtains continues to access the indicator of one or more particular device protections part, this is specific Equipment accesses data module and reads and the relevant access number of one or more protection portion of particular device (for example, desktop computer) point According to (for example, in relation to access one or more components, application, memory segment, data of section etc.), the access statistics indicate that Can access protection part one or more entities (for example, people, application, using class, developer, operating system etc.), this Or multiple entities include one or more application.
Referring again to Fig. 8 C, operation 828 may include operation 836, which depicts one of monitoring particular device Or one or more access rights of multiple protection parts are to determine that application maintains one or more protection portion of access particular device Point.For example, Fig. 3, for example, Fig. 3 C, shows 336 and protects part of module by the one or more particular devices of monitoring trial access The agency of acquisition continues to access the indicator of one or more particular device protections part, which protects part of module prison Survey particular device (for example, cellular communication apparatus) protection part (for example, velocity sensor) one or more access rights with Determine that application (for example, location tracking equipment) maintains one or more protection parts of access particular device (for example, velocity pick-up Device).
Referring again to Fig. 8 C, operation 828 may include operation 838, which depicts one or more of analysis application A feature is to determine that application maintains one or more protection parts of access particular device.For example, Fig. 3, for example, Fig. 3 C, shows 338 continue to access the instruction of one or more particular devices protections part by executing the agencies that Agent Analysis module obtains Symbol, the one or more features of Agent Analysis module analysis application are (for example, level, API level, interface water in source code Equality, if directly processing application or processing relevant information) to determine that application maintains access particular device (for example, smart phone) One or more protection parts.
Referring again to Fig. 8 D, operation 604 may include operation 840, which, which depicts detection, applies and complete one kind Or one or more protection parts of at least one particular device of access later of a variety of services.For example, Fig. 3, for example, Fig. 3 D, The agency for showing 340 one or more services stops and agency especially accesses one or more particular device protection portion sortings Module is surveyed, which divides detection module detection application (for example, the positioning service of soda water vending machine) complete (for example, positioning and/or providing to user has apart from nearest after at least one at one or more services The guide of the soda water vending machine of Sunkist Orange stock) access one of particular device (for example, smart phone) Or multiple protection parts (for example, alignment sensor).
Referring again to Fig. 8 D, operation 604 may include operation 842, which depicts detection and looked for friend's application It completes that friend is looked for service and friend's application is looked for maintain the contacts list of access storage on a particular device.For example, Fig. 3, example Such as, Fig. 3 D, show 342 it is one or more look for that friend services look for friend to act on behalf of stopping and to look for friend agency to continue access special Locking equipment contacts list detection module, particular device contacts list detection module detection look for friend's application to complete to look for Friend services and looks for friend's application that access is maintained to be stored in particular device (for example, having is including laptop, desktop Between brain, tablet device and several equipment of smart phone share shared contacts list smart phone) on contact person List.
Referring again to Fig. 8 D, operation 842 may include operation 844, which depicts detection and looked for friend's application Positioning stores the one or more entities listed in contacts list on a particular device and knows to the user of particular device The one or more entities not positioned, and looking for friend to apply is being that user positions and identifies in contacts list and lists Contacts list is accessed after one or more entities.For example, Fig. 3, for example, Fig. 3 D, show 344 completion particular device The one or more entities listed in contacts list look for friend act on behalf of positioning and it is one or more look for friend service stop Only and friend agency is looked for continue to access particular device contact person after the positioning and identification of one or more entity detection modules List, entity detection module detection are looked in the located contacts list being stored on particular device of friend's application and being listed One or more entities and one or more entities that positioning is identified to the user of particular device, and friend is looked for apply It is positioned for user and identifies that the one or more entities listed in contacts list access contacts list later.
Referring again to Fig. 8 D, operation 604 may include operation 846, which depicts from application and received application It completes at least one notice of one or more services and receives one or more the protecting using maintenance access particular device Protect the notice of part.For example, Fig. 3, for example, Fig. 3 D, shows the notice based on agency of the stopping of 346 one or more services And agency continues to access the notice that one or more particular device protection portion divide receiving module, particular device protection portion tap Receive module from application (for example, music assorting application) receive application completed one or more services at least one (for example, By equipment record or from network download a piece of music classification) notice and receive application (for example, music assorting application) One or more protection parts of maintenance access particular device are (for example, storing the part of the memory of music or for recording sound Happy microphone) notice (for example, from operating system or from protection part or from another application).
Referring again to Fig. 8 D, operation 846 may include operation 848, which depicts from application and received application Complete at least one notice of one or more services and from application receive application maintain one of access particular device or The notice of multiple protection parts.For example, Fig. 3, for example, Fig. 3 D, show the stopping of 348 one or more services based on agency Notice and continue to access the notice based on agency that one or more particular device protection portion divide receiving module, this is specific to set Standby protection portion divides receiving module to complete one or more services from application (for example, walking mileage tracker) reception application The notice of at least one (for example, using showing that it is being closed, or completed discrete tasks) and receive application (example Such as, walking mileage tracker) maintain the one or more of access particular device (for example, portable pedometer device) to protect parts The notice of (for example, pedometer).
Referring again to Fig. 8 D, operation 846 may include operation 850, which depicts from application and received application It completes at least one notice of one or more services and taps from one or more protection portion of particular device to receive application Maintain the notice of one or more protection parts of access particular device.For example, Fig. 3, for example, Fig. 3 D, show 350 it is a kind of or The notice based on agency of the stopping of a variety of services and agency, which continue to access one or more particular device protection portion taps, to receive The notice based on particular device protection part of module, the particular device protection portion divide receiving module from application (for example, tracking is worked as The hiking path status of the availability in specific hiking path tracks application under the conditions of preclimax) reception application (for example, The hiking path status of the availability in specific hiking path tracks application under tracking current weather conditions) it has completed At least one of one or more services notifies and taps receipts notice from one or more protection portion of particular device.
Fig. 9 A-9C depicts the various embodiments of operation 606 according to the embodiment, which depicts presentation table The bright information for having completed one or more services and one or more protection parts of application maintenance access particular device.It is existing Referring to Fig. 8 A, operation 606 may include operation 902, which depicts the vision on the display of particular device and present It has completed one or more services and application maintains to access the information of one or more protection parts of particular device.Example Such as, Fig. 4, for example, Fig. 4 A, shows continuation proxy access one or more that 402 are presented in particular device output precision module The vision of the stopping of a particular device protection part and one or more services is presented, which exists It is presented on the display (for example, screen) of particular device and has completed one or more services and application (for example, wireless network Intensive analysis device) maintain the vision of one or more protection parts of access particular device (for example, tablet device) that (example is presented Such as, graphic icons are notified).
Referring now to Fig. 9 A, operation 902 may include operation 904, which depicts the display in particular device Upper presentation has completed one or more services and has been configured to provide the application maintenance access plate of one or more services The vision of the alignment sensor of equipment is presented.For example, Fig. 4, for example, Fig. 4 A, shows 404 in particular device output precision module The vision of the stopping for continuing proxy access tablet device alignment sensor and one or more services of upper presentation is presented, the spy Locking equipment output precision module is presented on the display of particular device (for example, smart phone) has completed one or more clothes It is engaged in and the application for being configured to provide one or more services maintains the vision of the alignment sensor of access tablet device to present (for example, the stop element of sensor being presented, for example, being used for the letter " GPS " of alignment sensor in stop element).
Referring now to Fig. 9 A, operation 904 may include operation 906, which depicts the display in particular device Upper presentation has completed trip's ancillary service of children's highway and the application of trip's ancillary service for being configured to provide children's highway The vision of the alignment sensor of access tablet device is maintained to present.For example, Fig. 4, for example, Fig. 4 A, shows 406 in particular device What is presented in output precision module continues trip's ancillary service of proxy access tablet device alignment sensor and children's highway The vision of stopping is presented, which is presented on the display of particular device has completed children's highway Trip's ancillary service and be configured to provide children's highway trip's ancillary service application maintain access tablet device positioning The vision of sensor is presented.
Referring again to Fig. 9 A, operation 606 may include operation 908, which depicts user's presentation table to equipment The bright information for having completed one or more services and one or more protection parts of application maintenance access particular device.Example Such as, Fig. 4, for example, Fig. 4 A, it is one or more special to show the continuation proxy access that 408 are presented to the entity for being related to particular device The indicator of the stopping of module is presented in locking equipment protection part and one or more services, which is presented module to equipment The one or more protection portion for showing to have completed one or more services and application maintenance access particular device are presented in user The information divided.
Referring again to Fig. 9 A, operation 606 may include operation 910, the operation 910 depict presentation completed it is a kind of or A variety of services and application maintain the notice of one or more protection parts of access particular device.For example, Fig. 4, for example, figure 4A, shows 410 continuation proxy access one or more particular devices protection part and module is presented in one or more services Stopping notice, the service present module presentation has completed it is one or more service (for example, public lavatory searcher take Business) and one or more protections of particular device (for example, smart phone) are accessed partially (for example, GPS location biography using maintenance Sensor) notice.
Referring again to Fig. 9 A, operation 606 may include operation 912, which depicts shows on a particular device It is completed one or more services and application maintains to access the notice of one or more protection parts of particular device.For example, Fig. 4, for example, Fig. 4 A, shows 412 and protected by the continuation proxy access one or more particular device that particular device module is shown The visual notification of the stopping of shield part and one or more services, the particular device module is in particular device (for example, plate is set It is standby) on show completed one or more services (for example, picture classification is at directory service) and application maintain access it is specific The notice of one or more protection parts (for example, image data of picture) of equipment (for example, tablet device).
Referring now to Fig. 9 A, operation 912 may include operation 914, which depicts on the screen of particular device Display shows to have completed one or more services and application maintains to access one or more protection parts of particular device Icon.For example, Fig. 4, for example, Fig. 4 A, show continuation proxy access one that 414 are shown by particular device screen module or The notification icon of the stopping of multiple particular device protections part and one or more services, the particular device screen module is in spy It is shown on the screen of locking equipment (for example, tablet device) and has completed one or more services (for example, being designed to based on equipment The music and device location of broadcasting find the service of concert in the region of user) and application maintenance access particular device One or more protection parts of (for example, tablet device) are (for example, the list of the song of storage on a user device, Yi Jishe The broadcasting frequency of standby tracking) icon.
Referring now to Fig. 9 B, operation 606 may include operation 916, which depicts presentation and maintain access is specific to set The list of the one or more applications of standby one or more protection parts and show one or more application which Complete one or more services.For example, Fig. 4, for example, Fig. 4 B, shows 416 continuation proxy access one or more particular devices It protects the list of one or more agencies of part and stops one or more agencies that module is presented in one or more services One or more one or more indicators, which, which is presented module and presents, maintains access particular device (for example, plate is set It is standby) one or more protection parts (for example, picture database) one or more applications (for example, picture enhancing service (example Such as, go to see red) and the service of picture face recognition) list and show one or more application which completed it is a kind of or A variety of services (for example, enhance one or more pictures and execute face recognition on one or more pictures).
Referring again to Fig. 9 B, operation 606 may include operation 918, which depicts generation and maintain access is specific to set The report of the one or more application of standby one or more protection parts, wherein report shows to apply whether access specific set Standby one or more protection parts are to execute one or more services.For example, Fig. 4, for example, Fig. 4 B, show 418 descriptions after Continuous proxy access one or more particular device protects the report of part and shows whether one or more services have stopped The report of module is obtained, which generates one or more of maintenance access particular device (for example, cellular handset of user) The report of the one or more application (for example, contact person's positioning service) of a protection part (for example, equipment contacts list), Middle report, which is shown, applies the one or more protection parts (example for whether accessing particular device (for example, cellular handset of user) Such as, equipment contacts list) to execute one or more services (for example, whether anyone in identification contacts list be in spy Positioning is set).
Referring again to Fig. 9 B, operation 606 may include operation 920, which depicts instruction particular device to equipment User show to have completed one or more services and application maintains one or more protection parts of access particular device. For example, Fig. 4, for example, Fig. 4 B, shows 420 instruction particular devices and presents and continue proxy access one or more particular device guarantor The indicator of the stopping of shield part and one or more service modules, service module instruction (for example, providing instruction, or are set Set identifier, or lead to one or more subprograms or hardware component activation and/or execution) user's table from particular device to equipment It is bright completed one or more services (for example, music classifier service) and application maintain access one of particular device or The information of multiple protection parts.
Referring again to Fig. 9 B, operation 606 may include operation 922, which depicts the presentation of change application with table Bright application maintains one or more protection parts of access particular device.For example, Fig. 4, for example, Fig. 4 B, showed for 422 change generations Reason is presented to show to continue stopping for proxy access one or more particular device protection part and one or more service module Only, the service module change application (for example, make selection gray alternatively, or icon hovering when change text color, Or on touch screen, when selecting to provide touch feedback when application) presentation (for example, change to user appearance) to show using dimension Hold one or more protection parts of access particular device (for example, tablet device).
Referring again to Fig. 9 B, operation 922 may include operation 924, and it is related to application is executed which depicts change Icon color to show using the one or more protection parts for maintaining access equipment.For example, Fig. 4, for example, Fig. 4 B, shows The vision for having gone out 424 change agencies is presented to show to continue proxy access one or more particular device protection part and one Or the stopping of multiple service modules, the service module change icon relevant to application (for example, self-driving travel intended services) are executed Color to show using the one or more protection parts for maintaining access equipment (for example, smart phone).
Referring again to Fig. 9 B, operation 922 may include operation 926, which depicts the execution of configuration application to want One or more additional steps are sought to show to user using the one or more protection parts for maintaining access equipment.Example Such as, Fig. 4, for example, Fig. 4 B, shows the one or more steps that 426 changes will execute for user to select agency to table The bright stopping for continuing proxy access one or more particular device protection part and one or more service modules, the service mould The execution of block configuration application (for example, the application for executing the service of picture face recognition) is to require one or more additional steps (for example, the dialog box for clicking additional " determining that you want to run this application ") is to show that access is specific to be set using maintaining to user One or more protection parts of standby (for example, tablet device).
Referring again to Fig. 9 B, operation 926 may include operation 928, which depicts the execution of configuration application to want User is asked to interact the additional time with particular device to activate using to show to user using maintenance access particular device One or more protection parts.For example, Fig. 4, for example, Fig. 4 B, shows 428 increases and requires one performed by the user or more A step is partially and one or more to show to continue the protection of proxy access one or more particular device to select agency The stopping of service module, the execution of service module configuration application is to require user to interact additional time (example with particular device Such as, again tap on, or on touch screen with finger drag pattern) so as to activate application (for example, motion tracker application) to Show to user using the one or more protection parts for maintaining access particular device.
Referring again to Fig. 9 B, operation 606 may include operation 930, which depicts to change in operating system and represent The relative position of one or more icons of application is to show to have completed one or more services and application maintenance access One or more protection parts of particular device.For example, Fig. 4, for example, Fig. 4 B, shows 430 changes to show to continue agency and visit Ask that the agency of the stopping of one or more particular device protections part and one or more service modules is presented on operating system Interior relative position, the service module change relative position (example of the one or more icons for representing application in operating system Such as, different window or menu or dedicated menu are moved to) to show to have completed one or more services and apply Maintain one or more protection parts of access particular device (for example, tablet device).
Figure 10 A-10D depicts the various embodiments of operation 608 according to the embodiment, which depicts promotion Using the presentation for the option for stopping the access to one or more protection parts of particular device.Referring now to Figure 10 A, operation 608 may include operation 1002, which depicts instruction particular device to present using stopping to the one of particular device The option of the access of a or multiple protections part.For example, Fig. 5, for example, Fig. 5 A, shows 502 stopping proxy access one or more The presentation of the option of a particular device protection equipment component indicating module, the particular device protect equipment component indicating module Indicate that particular device (for example, Smartphone device) stops so that application (for example, looking for friend's tracker) is presented to particular device (example Such as, Smartphone device) one or more protection parts (for example, being locally stored on cell phone apparatus or extensive from server Multiple Facebook list of friends) access option.
Referring again to Figure 10 A, operation 1002 may include operation 1004, the operation 1004 depict instruction particular device with The option that instruction particular device stops one or more protection parts access of the application to particular device is presented.For example, Fig. 5, example Such as, Fig. 5 A shows 504 and is used to indicate the module of particular device to stop agency to one or more particular devices and protect part The presentation of the option of the access of equipment indicating module, the particular device protect equipment component indicating module to indicate particular device (for example, notebook computing device) is set so that instruction particular device (for example, notebook computing device) stopping application being presented to specific The option of standby one or more protection part (for example, camera) access.
Referring again to Figure 10 A, operation 1004 may include operation 1006, which indicates that particular device is visited to control It asks that a part of the particular device of one or more protection parts of particular device is presented and stops the one of application access particular device The optional option of the user for equipment of a or multiple protections part.For example, Fig. 5, for example, Fig. 5 A, shows 506 for referring to Show that the module of particular device stops proxy access one or more particular device and protects the user of equipment component indicating module optional Optional option, particular device protection equipment component indicating module instruction particular device is presented instruction control access and specific sets A part of the particular device of standby one or more protection parts (for example, alignment sensor) is specific to which application stops access The option that the user for equipment of one or more protection parts of equipment (for example, smart phone) selects.
Referring again to Figure 10 A, operation 608 may include operation 1008, which depicts presentation and stop application visit Ask the option of one or more protection parts of particular device.For example, Fig. 5, for example, Fig. 5 A, shows 508 stopping proxy access The option of module is presented in one or more particular device protections part, and it is special that module instruction is presented in particular device protection part One or more that application (for example, calorie tracking application) stops access particular device (for example, tablet device) is presented in locking equipment The option of a protection part.
Referring again to Figure 10 A, operation 1008 may include operation 1010, which depicts specific to control access One or more of stopping application access particular device is presented in a part of the particular device of one or more protection parts of equipment The option of a protection part.For example, Fig. 5, for example, Fig. 5 A, shows the 510 protection part access for being presented to particular device module The option of the stopping proxy access one or more particular device of control section, the particular device module are special to control access One or more protection parts of locking equipment (for example, device operating system or device core layer or device hardware interface layer) A part of particular device is presented application (for example, speech synthesizer) stops access particular device (for example, smart phone) one The option of a or multiple protections part.
Referring now to Figure 10 B, operation 608 may include operation 1012, which depicts promotion and complete one kind Or stops one or more parts of application access particular device after a variety of services and can configure by the user of particular device The presentation of setting.For example, Fig. 5, for example, Fig. 5 B, shows 512 indicating equipment stoppings proxy access one for user setting Or multiple particular device protections part promotes the presentation of the option of module, particular device protection part promotes module to promote One or more services are completed (for example, closing in 5 prime ministers that the estimation user found according to the playlist of user may like Song) stop accessing particular device (for example, making playlist part by oneself) later using (for example, relevant musical finds service) The setting (for example, menu setting that the operating system of equipment promotes) that the user of the equipment of one or more parts can configure is in It is existing.
Referring again to Figure 10 B, operation 608 may include operation 1014, which depicts promotion and complete one kind Or the user by particular device of one or more parts of stopping application access particular device answers in operation after a variety of services With the presentation of setting configurable before.For example, Fig. 5, for example, Fig. 5 B, show 514 before agent operation indicating equipment stop Only proxy access one or more particular device protection part promotes the presentation of the option of the user setting of module, this is specific Equipment protection part promotes module to promote to stop after completing one or more services using (for example, the service of picture face recognition) One or more protection parts of particular device (for example, computer, smart phone or tablet device) are only accessed (for example, image Acquire sensor) equipment (for example, control access sensors, for example, the physics of image acquiring sensor or alignment sensor is opened Close, for example, soft key or hard wired buttons, switch, key, knob etc.) the setting that can configure before operation application of user be in It is existing.
Referring again to Figure 10 B, operation 608 may include operation 1016, which depicts promotion and complete one kind Or the user by particular device of one or more parts of stopping application access particular device sets specific after a variety of services The standby upper presentation for receiving the setting that can configure before application.For example, Fig. 5, for example, Fig. 5 B, shows 516 before agency obtains Indicating equipment stops the option of the user setting of proxy access one or more particular device protection part promotion module It presents, particular device protection part promotes module to promote after completing one or more services (for example, friend is looked for service) Using the particular device (for example, tablet device) for the one or more parts for stopping access particular device (for example, tablet device) The presentation of setting (for example, the broadcast box checked on " user option " screen of device operating system) that can configure of user.
Referring again to Figure 10 B, operation 608 may include operation 1018, which depicts promotion to particular device User the options that application stops one or more protection parts of access particular device are presented.For example, Fig. 5, for example, Fig. 5 B, It shows 518 and is presented to entity relevant to particular device and stop proxy access one or more particular device protection part promotion The option of module, the particular device protect part that module is promoted to promote (to help allowed or complete presentation for example, executing One or more operation) present to the user of particular device (for example, smart phone) (such as by vision and non-vision section Any combination is shown) using one of (for example, mileage tracking application of riding) stopping access particular device (for example, smart phone) Or the option of multiple protection parts.
Referring now to Figure 10 C, operation 608 may include operation 1020, which depicts special using access is stopped The display of the optional option of one or more protection parts of locking equipment.For example, Fig. 5, for example, Fig. 5 C, showed for 520 stopping generations Reason accesses the optional option of one or more particular device protection part display modules, which protects part display module Display application (for example, running mileage tracker) stopping access particular device (for example, wearable intelligent clothing, for example, can chase after Socks that track mileage and/or detection bubble are formed to) one or more protection parts (for example, alignment sensor) Optional option (for example, saying phrase " you want to stop access " to user by loudspeaker, and waits user to pass through microphone It responds).
Referring again to Figure 10 C, operation 608 may include operation 1022, which, which depicts, is receiving stopping access Using the one or more protection parts for stopping access particular device when the selection of option.For example, Fig. 5, for example, Fig. 5 C, shows 522 proxy access one or more particular devices protect portion ends modules, and particular device protection portion ends module exists Stop application (for example, blood glucose level monitor application) when receiving the selection for stopping Access Options to particular device (for example, using belt Blood/sweat the sampler for the probe that bundle connect physically and with smart phone) one or more parts of protecting Access.
Referring again to Figure 10 C, operation 1020 may include operation 1024, which depicts display and stop more than one The optional choosing of one or more protection parts of a application (application including executing one or more services) access particular device ?.For example, Fig. 5, for example, Fig. 5 C, shows the multiple agencies of 524 stoppings (including agency) and accesses one or more particular devices guarantors The optional option of shield part display module, the more than one application of particular device protection part display module display stopping (including Execute the application of one or more services (for example, ATM finds service)) particular device is accessed (for example, the ATM that bank provides connects Jaws equipment) one or more protection parts (for example, bank account information) optional options (for example, display has text " you Want stop access, Yes/No " dialog box).
Referring again to Figure 10 C, operation 1022 may include operation 1026, which, which depicts, is receiving stopping access Stop including the access using class to one or more protection parts of particular device applied when the selection of option.For example, figure 5, for example, Fig. 5 C, the class for showing one or more agencies that 526 include agency protects part to one or more particular devices The access of module is terminated, it includes answering which, which protects portion ends module to stop when receiving the selection for stopping Access Options, Application class is (for example, all applications of manufacture " Apple company " or " weight-reducing used is applied " or " had more than 50Mb's Using " or " all applications that user is appointed as 5 level securities level " or " device manufacturer is appointed as the institute of 5 level securities level Have application " or all applications of alignment sensor " access " or " all applications of access equipment contacts list " or " most All applications obtained in 50 days afterwards " etc.) access particular device one or more protection parts.
Referring again to Figure 10 C, operation 1022 may include operation 1028, which, which depicts, is receiving stopping application Stop all applications pair present on particular device when accessing the selection of the option of one or more protection parts of particular device The access of one or more protection parts of particular device.For example, Fig. 5, for example, Fig. 5 C, shows 528 one or more agencies Each access one or more particular device protect portion ends module, the particular device protection portion ends module receiving The selection of option is to stop particular device (example when stopping application access (for example, access protection part, for example, alignment sensor) Such as, tablet device) present on all application access particular devices (for example, tablet device) one or more protection parts (for example, alignment sensor).
Referring again to Figure 10 C, operation 608 may include operation 1030, which depicts promotion presentation disabling and answer Option protects parts to stop accessing the one or more of particular device.For example, Fig. 5, for example, Fig. 5 C, shows 530 Being presented by the option that disabling agency promotes module to stop proxy access one or more particular device protection part is in It is existing, the agency promote module promote (for example, executing one or more operations that auxiliary executes or complete to present) present (for example, Showed by any combination of vision and non-vision interface) it disables (for example, preventing the component of user or another application or equipment Operated) application (for example, 4G network speed measurement application) to stop accessing particular device (for example, augmented reality glasses) one The option of a or multiple protection parts (for example, 4G radio).
Referring again to Figure 10 C, operation 608 may include operation 1032, which depicts promotion presentation removal and answer Option protects parts to stop accessing the one or more of particular device.For example, Fig. 5, for example, Fig. 5 C, shows 532 It is in for act on behalf of the option for promoting module stopping proxy access one or more particular device to protect part by removal It is existing, the agency promote module promote (for example, executing one or more operations that auxiliary executes or complete to present) present (for example, Showed by any combination of vision and non-vision interface) removal application (for example, from memory removal application, or removal storage One or more links and/or pointer in device to application site) to stop accessing particular device (for example, smart phone) The option of one or more protection part (for example, loudspeaker output).
Referring again to Figure 10 D, operation 608 may include operation 1034, which depicts promotion presentation and be implemented with Close the option of one or more limitations of one or more protection parts of application access particular device.For example, Fig. 5, for example, figure 5D shows the 534 optional choosings for promoting the limitation of module for establishing proxy access one or more particular device protection part The presentation of item, particular device protection part promote module to promote (for example, execution auxiliary executes or complete one or more presented A operation) the related application of (for example, showing by any combination of vision and non-vision interface) implementation is presented (for example, farm is counted Draw application) one or more protection parts of particular device (for example, smart phone) are accessed (for example, serving as the figure of optical sensor As acquisition sensor) one or more limitations (for example, limitation, condition, reduction, regulations etc.) options.
Referring again to Figure 10 D, operation 1034 may include operation 1036, which depicts when using trial access One or more protection portion timesharing of particular device promote that the one or more protection portion for requiring authorization access particular device are presented The option divided.For example, Fig. 5, for example, Fig. 5 D, it is one or more special for requiring express authorization to rebuild proxy access to show 536 Locking equipment protection part promote module option presentation, the particular device protection part promote module when using (for example, Garden planning application) it attempts to access one or more protection portion timesharing promotion (example of particular device (for example, household weather station) Such as, one or more operations that auxiliary executes or auxiliary completion is presented are executed) it requires to authorize access (for example, leading to level of access Change to the horizontal operation for allowing to access) one or more protection parts (example of particular device (for example, household weather station) Such as, barometer) option presentation (for example, being showed by any combination of vision and non-vision interface).
Referring again to Figure 10 D, operation 1034 may include operation 1038, which, which depicts promotion and present to limit, permits Perhaps the option of the number of one or more protection parts of application access particular device.For example, Fig. 5, for example, Fig. 5 D, shows 538 for be arranged allow to act on behalf of rebuild access one or more particular devices protection part promote module number limit it is optional The presentation of option, particular device protection part promote module to promote (for example, execution auxiliary executes or auxiliary completes the one of presentation A or multiple operations) present (such as show by any combination in vision and non-vision section) limitation permission application access it is specific The option of the number of one or more protection parts of equipment (for example, tablet device).
Referring again to Figure 10 D, operation 1038 may include operation 1040, which depicts promotion presentation and be limited in Allow the option of the number of one or more protection parts of application access particular device during special time period.For example, Fig. 5, For example, Fig. 5 D, show 540 for be arranged allow the agency during special time period to rebuild to one or more particular devices guarantor Shield part promotes the presentation of the option of the number limitation of the access of module, and particular device protection part promotes module to promote (executing or assist to complete the one or more operations presented for example, executing auxiliary) presentation (such as pass through vision and non-vision section Any combination in face is shown) be limited in special time period during (for example, during the period that user is appointed as practice periods) permit Perhaps using one or more protection parts of (for example, motion tracker) access particular device (for example, the caloric burn of storage Data) number option.
Referring again to Figure 10 D, operation 1034 may include operation 1042, and it is related fair which depicts promotion setting Perhaps when application accesses the presentation of the option of one or more conditions of one or more protection parts of particular device.For example, Fig. 5, for example, Fig. 5 D, shows 542 foundation and protect part to promote mould one or more particular devices for allowing to rebuild agency The presentation of the option of the prerequisite of the access of block, particular device protection part promote module to promote (for example, executing auxiliary The one or more operations for helping execution or auxiliary to complete to present) it presents (for example, passing through any combination of vision and non-vision interface Show) it is arranged in relation to allowing to apply the one or more protections for when accessing particular device (for example, cellular smart cell phone apparatus) Partially (for example, position data) one or more conditions (for example, only when equipment is traveled beyond 30 miles per hours per hour, for example, Show equipment on the rolling stock, position data could be accessed) option.
Referring again to Figure 10 D, operation 1042 may include operation 1044, which depicts promotion limitation when specific Equipment allows the presentation of the option of the number of one or more protection parts of application access particular device when being located at specific position. For example, Fig. 5, for example, Fig. 5 D, show 544 for establish for allowing reconstruction specific position as proxy access one or more A particular device protection part promotes the presentation of the option of the prerequisite of module, and particular device protection part promotes mould Block promotes (auxiliary executes or auxiliary completes the one or more operations presented for example, executing) to present (for example, by vision and non- Any combination of visual interface shows) limitation allow when particular device is located at specific position (for example, Times Square) apply (example Such as, open wireless network detector) particular device is accessed (for example, Portable thermal point device or the honeycomb with Wi-Fi broadcast Cell phone apparatus) one or more protection parts (for example, radio broadcasting) numbers options.
Referring again to Figure 10 D, operation 608 may include operation 1046, which depicts promotion and application is required to make The data anonymous separately won from one or more protection portion of particular device is to maintain the one or more to particular device Protect the presentation of the option of the access of part.For example, Fig. 5, for example, Fig. 5 D, show 546 for require for continuing agency's visit Ask the presentation that one or more particular device protections part promotes the option of the data anonymous of module, which protects Shield part promote module promote present (for example, take one or more steps (for example, operation, subprogram, physical change etc.) with Auxiliary executes) require application to make one or more protection parts from particular device (for example, smart phone) (for example, positioning passes Sensor data) data anonymous (for example, fuzzy, removal, source of change data etc.) that obtains so as to maintain access (for example, In the case where not anonymization, access can be interrupted) options of one or more protection parts of particular device.
Although having illustrated and having described the particular aspects of theme as described herein, it will be understood by the skilled person that It, can be into the case where not departing from theme as described herein and its broad range it is readily apparent that according to the teaching of this article Row change and modification, thus the appended claims will cover within its scope the true spirit that falls into theme as described herein and All such changes and modifications in range.It will be understood by those skilled in the art that be, it is however generally that, term as described herein, And the term especially in the appended claims (for example, main body of the appended claims) is generally intended to become " open (for example, term " includes " should be understood to " including, but are not limited to ", term " having " should be understood to " at least have formula " term Have ", term "comprising" should be understood to " including but not limited to " etc.).
Those skilled in the art will further appreciate that, if the claim statement of certain amount of introducing is intentional Figure, then it is such to be intended to clearly state in the claims, and when this statement is not present, just there is no this It is intended to.For example, following appended claims may include using leading question "at least one" and " one in order to help to understand Or multiple " to introduce claim statement.However, should not be managed using this phraseSolution is at imply notDefinite article "one" Or the claim statement that "an" introduces limits any specific rights requirement stated comprising the claim of this introducing Only include a this statement for claims, in addition when same claim include guidance phrase " one or more " or (for example, "one" and/or "an" should usually manage when the indefinite article of "at least one" and, for example, "one" or "an" Solution is at "at least one" or " one or more ");For the definite article for introducing claim statement using same. In addition, even if the particular number of the claim statement of introducing is clearly described, it will be appreciated by those skilled in the art that this table The quantity that usually should be understood to mean at least to state is stated (for example, the blunt statement of " two statements ", is modified in no other In the case where language, at least two statements or two or more statements are generally meant that).
In addition, when use is similar to these of the agreement of " at least one of A, B and C etc. ", general this knot Structure be it will be understood by those skilled in the art that agreement the meaning (for example, " with A, B and C the system of at least one " can wrap Include but unlimited: only the system of A, the system of only B, the system of only C, have A and B system together, have A and C together be Unite, have B and C system together and/or have the system of A, B and C together etc.).Using similar to " at least one in A, B or C etc. It is a " agreement these in the case of, general this structure be it will be understood by those skilled in the art that agreement the meaning (for example, " tool Have the system of at least one of A, B or C " it can include but is not limited to: the system for there was only A, the system for there was only B, only C's is It unites, has A and B system together, there is A and C system together, having B and C system together and/or have the system of A, B and C together Deng).Those skilled in the art will further appreciate that, in general, indicate two or more options any separation word and/ Or word (either in specification, claims or attached drawing) be to be understood as consider include one of item including Any one or a possibility that including two items, opposite situation unless the context.For example, the phrase of " A or B " is usual A possibility that being understood as that including " A " or " B " or " A and B ".
For the appended claims, it will be understood by those skilled in the art that, the operation stated herein generally can be with It executes in any order.In addition, while in accordance with multiple operating processes are sequentially provided it should be appreciated that Duo Gecao Make to execute according to other sequences in addition to the sequence of explanation, or may be performed simultaneously.The reality of the sequence of this substitution Example may include be overlapped, interlocks, interrupts, reordering, increasing, preparing, supplementing, synchronizing, reversely or other different sequences, unless Context is otherwise indicated.In addition, being not intended to exclude this as " response ", " being related to " or the adjectival term of other past tenses Kind variant, unless context is otherwise indicated.
The application is referred to one or more trade marks, for example, used by a manufacturer or whole seller and for making Text, letter, symbol or the equipment of his or her product discrimination and/or the product for being different from other people.Trade mark used herein Title with such language to be illustrated: that is, understanding their identity, they are different to common description noun, having Fixed and specific meaning, or in many (if not all) situations, with other for the term for not including using trade mark Special mark.In addition, brand name used herein has known and definition meaning in document, but it is not related to that it is needed to know Know one or more business secrets so as to predict they meaning product or compound.What is referred in the present specification is all Trade mark is the property of each owner, and the appearance of trade marks one or more in the present specification will not reduce or with Other modes negatively affect the validity of one or more trade marks.The registration occurred in the present specification or unregistered institute Having trade mark to be assumed includes suitable trade mark, for example, the R of zone circle or bracketed capitalization (for example, [brand name]), Even if these trade marks do not occur by trade mark clearly.As long as referring to product or side using trade mark with describing mode Method, the trade mark just should be understood to represent the corresponding product or method from the date for submitting this patent application.
In this description, can be used term " in embodiment ", " in one embodiment ", " in some embodiments In ", " in several embodiments ", " at least one embodiment ", " in various embodiments " etc..These each terms and All these similar terms should be understood to " at least one embodiment, thereby increases and it is possible to but may not be in all embodiments ", unless separately It clearly states outside.In particular, unless explicitly stated otherwise, as the purpose of these phrases is to provide embodiments of the present invention Non-exclusive and non-limiting example.One, some or many embodiments include one or more things or have one or more The pure statement of a feature does not imply that all embodiments include one or more things or have one or more features, still Do not imply that these embodiments there must be yet.It only refers only to example and should not otherwise understand, unless bright in this way True explanation.

Claims (41)

1. a kind of equipment for data service comprising:
It is configured to obtain and related is configured to provide one or more services and selectively access is one or more specific sets The acquisition module of the data of the agency of standby protection part;
The stopping and the agency for being configured to detect one or more services that the agency provides continue access one or The detection module of multiple particular device protections part;
Be configured to present continuation proxy access one or more particular device protection part that the agency provides and it is a kind of or The presentation module of the indicator of the stopping of a variety of services;And
It is configured to promote the presentation of the option for stopping proxy access one or more of particular device protections part Promotion module.
2. equipment according to claim 1, wherein being configured to obtain in relation to being configured to provide one or more services simultaneously And the acquisition module for selectively accessing the data of the agency of one or more particular device protections part includes:
It is configured to obtain and requires to access the one or more of one or more particular device protections part in relation to being configured to provide Service and selectively access the acquisition module of the data of the agency of one or more of particular device protections part.
3. equipment according to claim 1, wherein being configured to obtain in relation to being configured to provide one or more services simultaneously And the acquisition module for selectively accessing the data of the agency of one or more particular device protections part includes:
It is configured to obtain to be obtained about by the scanning particular device module and is configured to provide one or more services simultaneously And selectively access the acquisition module of the data of the agency of one or more particular device protections part.
4. equipment according to claim 1, wherein being configured to obtain in relation to being configured to provide one or more services simultaneously And the acquisition module for selectively accessing the data of the agency of one or more particular device protections part includes:
It is configured to obtain one or more transmission prisons by arriving and/or protecting from one or more of particular devices part The related of survey is configured to provide one or more services and selectively accesses one or more particular devices protections part Agency data acquisition module.
5. equipment according to claim 1, wherein being configured to obtain described in relation to being configured to provide one or more clothes It is engaged in and selectively the acquisition module of the data of the agency of access one or more particular devices protections part includes:
Be configured to obtain from one or more particular device logs it is related be configured to provide one or more services and Selectively access the acquisition module of the data of the agency of one or more particular device protections part.
6. equipment according to claim 1, wherein being configured to detect stopping for one or more services of agency's offer The detection module for only continuing to access one or more of particular devices protections part with the agency includes:
It is configured to detect the agency and has terminated the activity for being related to executing one or more services and after termination activity Continue to access the detection module of the detectable indicator of one or more particular devices protections part.
7. equipment according to claim 6, wherein being configured to detect the agency and terminated to be related to executing one kind or more The activity of kind service and described can detect for continuing to access one or more particular devices protections part after termination activity The detection module of indicator includes:
It is configured to detect the agency to have terminated the activity for being related to executing one or more services and at least partly made Continue to access one or more particular device protections part after the termination activity for the report detection issued with the particular device Detectable indicator detection module.
8. equipment according to claim 6, wherein being configured to detect the agency and terminated to be related to executing one kind or more The activity of kind service and described can detect for continuing to access one or more particular devices protections part after termination activity The detection module of indicator includes:
It is configured to detect the agency and has terminated the activity for being related to executing one or more services and by described in analysis One or more particular devices protect the termination activity of the data-flow detection of part to continue later, and access one or more is specific to be set The detection module of the detectable indicator of standby protection part.
9. equipment according to claim 6, wherein being configured to detect the agency and terminated to be related to executing one kind or more The activity of kind service and described can detect for continuing to access one or more particular devices protections part after termination activity The detection module of indicator includes:
It is configured to detect the agency to have terminated the activity for being related to executing one or more services and at least partly made Continue to visit after termination activity with the report detection of the monitor agent publication of one or more of particular devices protection part Ask the detection module of the detectable indicator of one or more particular device protections part.
10. equipment according to claim 9 is related to executing one or more clothes wherein being configured to detection agency and having terminated The activity of business and at least partly using one or more of particular devices protection part monitor agent publication report The termination activity for accusing detection continues to access the inspection of the detectable indicator of one or more particular devices protections part later Surveying module includes:
It is configured to detect the agency to have terminated the activity for being related to executing one or more services and at least partly made With the termination activity of the report detection of the monitor agent publication based on kernel of one or more of particular devices protection part Continue to access the detection module of the detectable indicator of one or more particular devices protections part later.
11. equipment according to claim 1, wherein being configured to detect one or more services that the agency provides Stopping and the agency continue to access the detection module of one or more of particular devices protections part and include:
It is configured to receive the receiving module of the notice of the stopping for one or more services that the agency provides;And
It is configured to receive the receiving module acted on behalf of and continue to access the notice of one or more of particular devices protections part.
12. equipment according to claim 11, wherein being configured to receive one or more clothes that the agency provides The receiving module of the notice of the stopping of business includes:
It is configured to receive the receiving module of the notice from the stopping for acting on behalf of received one or more services.
13. equipment according to claim 11, wherein be configured to receive the agency continue to access it is one or more of The receiving module of notice of particular device protection part includes:
Be configured to receive continue to access from point received agency of one or more of particular device protection portion it is one or more The receiving module of the notice of a particular device protection part.
14. equipment according to claim 1, wherein being configured to detect one or more services that the agency provides The stopping and the agency continue to access the detection module of one or more of particular devices protections part and include:
Terminate one that is configured to detect and be taken by least part that the agency executes one or more services Or the termination of one or more agent operation detection modules of the termination of multiple operations;And
Access is configured to detect the agency and has prevented to access the stopping of one or more of particular device protections part One or more particular device protection portion divide detection module stopping agency prevention.
15. equipment according to claim 1, wherein being configured to detect one or more services that the agency provides The stopping and the agency continue to access the detection module of one or more of particular devices protections part and include:
It is configured to obtain the acquisition module of the indicator of agency's stopping of one or more services;And
It is configured to obtain the acquisition module for acting on behalf of the indicator for continuing to access one or more particular devices protections part.
16. equipment according to claim 15, wherein being configured to obtain the agency, to continue access one or more specific The acquisition module of the indicator that equipment protection part obtains module includes:
It is configured to obtain and continues to visit by the agency that the one or more of particular device protection portion of monitoring trial access are separately won Ask the acquisition module of the indicator of one or more particular device protections part.
17. equipment according to claim 15, wherein being configured to obtain the agency, to continue access one or more specific The acquisition module of the indicator of equipment protection part includes:
It is configured to obtain and continues to access one or more particular device protection portion by executing the agency that Agent Analysis module obtains The acquisition module of the indicator divided.
18. equipment according to claim 1, wherein being configured to detect the institute for one or more services that the agency provides Stating the detection module for stopping continuing to access one or more of particular devices protections part with the agency includes:
It is configured to detect the stopping of the agency of one or more services and continues the one or more spies of proxy access The detection module of locking equipment protection part.
19. equipment according to claim 1, wherein being configured to detect the institute for one or more services that the agency provides Stating the detection module for stopping continuing to access one or more of particular devices protections part with the agency includes:
It is one or more that the notice based on agency and agency for being configured to receive the stopping of one or more services continue access Particular device protects the receiving module of the notice of part.
20. equipment according to claim 19, wherein being configured to receive the described of the stopping of one or more services The receiving module that notice and agency based on agency continue to access the notice of one or more particular devices protections part includes:
The notice and agency based on agency for being configured to receive the stopping of one or more services continues access one The receiving module of the notice based on particular device protection part of a or multiple particular device protections part.
21. equipment according to claim 1, wherein be configured to present continuation proxy access one that the agency provides or Multiple particular device protections are partially and the presentation module of the indicator of the stopping of one or more services includes:
It is configured to present and be protected to the continuation proxy access one or more particular device that the entity for being related to the particular device is presented The presentation module of the indicator for the stopping that shield part and one or more services are presented.
22. equipment according to claim 1, wherein be configured to present continuation proxy access one that the agency provides or Multiple particular device protections are partially and the presentation module of the indicator of the stopping of one or more services includes:
It is configured to present and continues proxy access one or more particular device protection part and one or more services The presentation module of the notice of stopping.
23. equipment according to claim 1, wherein be configured to present continuation proxy access one that the agency provides or Multiple particular device protections are partially and the presentation module of the indicator of the stopping of one or more services includes:
It is configured to show the continuation proxy access one or more particular device protection part and one shown by particular device The display module of the visual notification of the stopping of kind or a variety of services.
24. equipment according to claim 1, wherein be configured to present continuation proxy access one that the agency provides or Multiple particular device protections are partially and the presentation module of the indicator of the stopping of one or more services includes:
It is configured to the list in the one or more agencies for having continued proxy access one or more particular device protection part And stopped one or more one or more indicators of one or more agencies of one or more services Module is presented.
25. equipment according to claim 1, wherein be configured to present continuation proxy access one that the agency provides or Multiple particular device protections are partially and the presentation module of the indicator of the stopping of one or more services includes:
It is configured to obtain description and continues the report of proxy access one or more particular device protection part and show described one Kind or a variety of acquisition modules for servicing the report whether stopped.
26. equipment according to claim 1, wherein be configured to present continuation proxy access one that the agency provides or Multiple particular device protections are partially and the presentation module of the indicator of the stopping of one or more services includes:
It is partially and described to be configured to indicate that continuation proxy access one or more particular device protection is presented in the particular device The indicating module of the indicator of the stopping of one or more services.
27. equipment according to claim 1, wherein be configured to present continuation proxy access one that the agency provides or Multiple particular device protections are partially and the presentation module of the indicator of the stopping of one or more services includes:
Change agency is configured to present to show to continue proxy access one or more particular device protection part and described one The change module of the stopping of kind or a variety of services.
28. equipment according to claim 27 is presented wherein being configured to change agency to show to continue proxy access one Or multiple particular devices are protected partially and the change module of the stopping of one or more services includes:
The one or more steps that change will execute for user is configured to show to continue proxy access one to select agency The change module of the stopping of a or multiple particular device protections part and one or more services.
29. equipment according to claim 28, wherein being configured to the one or more steps that change will execute for user With selection agency to show to continue proxy access one or more particular device protection part and one or more clothes The change module of the stopping of business includes:
It is configured to increase and requires to be shown to continue to act on behalf of and be visited to select agency by the one or more steps that the user executes Ask the increase module of the stopping of one or more particular device protections part and one or more services.
30. equipment according to claim 1, wherein being configured to promote to stop that proxy access is one or more of specific sets The promotion module of the presentation for the option that standby protection part promotes includes:
It is configured to indicate that setting for the presentation for the option for stopping proxy access one or more of particular device protections part Standby indicating module.
31. equipment according to claim 1, wherein being configured to promote to stop that proxy access is one or more of specific sets The promotion module of the presentation of the option of standby protection part includes:
It is configured to that the presentation module for the option for stopping proxy access one or more particular device protection part is presented.
32. equipment according to claim 1, wherein being configured to stop the one or more of particular devices guarantors of proxy access The promotion module of presentation for the option for protecting part includes:
It is configured to promote to indicate the user setting of equipment stopping proxy access one or more particular device protection part The promotion module of the presentation of option.
33. equipment according to claim 32, wherein be configured to promote to indicate the equipment stop proxy access one or The promotion module of the presentation of the option of the user setting of multiple particular devices protection part includes:
It is configured to promote to indicate that the equipment stops proxy access one or more particular device protection portion before agent operation The promotion module of the presentation of the option for the user setting divided.
34. equipment according to claim 1, wherein being configured to promote to stop that proxy access is one or more of specific sets The promotion module of the presentation of the option of standby protection part includes:
It is configured to promote to present to entity relevant to the particular device to stop proxy access one or more particular device guarantor Protect the promotion module of the presentation of the option of part.
35. equipment according to claim 1, wherein being configured to promote to stop that proxy access is one or more of specific sets The promotion module of the presentation of the option of standby protection part includes:
It is configured to the display module that display stops the optional option of proxy access one or more of particular device protections part; And
It is configured to terminate the termination module of proxy access one or more particular device protection part.
36. equipment according to claim 35, wherein being configured to access one or more of particular device protections part The termination module of the agency include:
It is configured to terminate the termination of each of one or more agencies for accessing one or more of particular device protections part Module.
37. equipment according to claim 1, wherein being configured to promote to stop that proxy access is one or more of specific sets The promotion module of the presentation of the option of standby protection part includes:
It is configured to promote the option of the limitation for establishing proxy access one or more of particular device protections part Presentation promotion module.
38. the equipment according to claim 37, wherein be configured to promote it is described for establish proxy access it is one or The promotion module of the presentation of the option of the limitation of multiple particular devices protection part includes:
It is configured to promote to allow the agency to rebuild time for accessing one or more of particular devices and protecting part for being arranged The promotion module of the presentation of the option of number limitation.
39. the equipment according to claim 37, wherein being configured to promote one or more of for establishing proxy access The promotion module of presentation of the option of the limitation of particular device protection part includes:
It is configured to promote to establish the prerequisite item for allowing to rebuild proxy access one or more of particular device protections part The promotion module of the presentation of the option of part.
40. equipment according to claim 1, wherein being configured to promote to stop that proxy access is one or more of specific sets The promotion module of the presentation of the option of standby protection part includes:
It is configured to promote to require appointing for the data anonymous for continuing proxy access one or more particular device protection part The promotion module of the presentation of option.
41. a kind of equipment for data service comprising:
One or more universal integrated circuits are configured to receive instruction to be configured to obtain in one or more first specific times Module is obtained, the acquisition module is configured to obtain in relation to being configured to provide one or more services and selectively accessing one The data of the agency of a or multiple particular device protections part:
One or more universal integrated circuits are configured to receive instruction to be configured to examine in one or more second specific times Module is surveyed, the detection module is configured to the stopping for detecting one or more services that the agency provides and the agency continues Access one or more of particular device protections part;
One or more universal integrated circuits are configured to receive instruction to be configured to be in one or more third specific times Existing module, the presentation module, which is configured to present, continues proxy access one or more particular device protection part and the generation The indicator of the stopping of the one or more services provided is provided;And
One or more universal integrated circuits are configured to receive instruction to be configured to promote in one or more 4th specific times Progressive die block, it is described that module is promoted to be configured to promote to stop the optional of proxy access one or more of particular device protections part The presentation of option.
CN201480024191.3A 2013-02-28 2014-02-28 For managing the method and system of data and/or for the service of equipment Expired - Fee Related CN105190590B (en)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US13/781,456 2013-02-28
US13/781,194 2013-02-28
US13/781,194 US10216957B2 (en) 2012-11-26 2013-02-28 Methods and systems for managing data and/or services for devices
US13/781,456 US20140123325A1 (en) 2012-11-26 2013-02-28 Methods and systems for managing data and/or services for devices
PCT/US2014/019562 WO2014134516A1 (en) 2013-02-28 2014-02-28 Managing data and/or services for devices

Publications (2)

Publication Number Publication Date
CN105190590A CN105190590A (en) 2015-12-23
CN105190590B true CN105190590B (en) 2019-04-19

Family

ID=51428860

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201480024191.3A Expired - Fee Related CN105190590B (en) 2013-02-28 2014-02-28 For managing the method and system of data and/or for the service of equipment

Country Status (3)

Country Link
EP (1) EP2962211A4 (en)
CN (1) CN105190590B (en)
WO (1) WO2014134516A1 (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105785957B (en) * 2016-04-29 2019-06-28 广东美的制冷设备有限公司 A kind of internet of things home appliance control method, device, system and router
DK201670581A1 (en) * 2016-06-12 2018-01-08 Apple Inc Device-level authorization for viewing content
CN107491538B (en) * 2017-08-23 2021-01-29 成都安恒信息技术有限公司 Storage process command and parameter value extraction method of DB2 database
US10721360B2 (en) * 2017-10-25 2020-07-21 Idriss YOUSFI Method and device for reducing telephone call costs
US11867533B2 (en) * 2018-02-23 2024-01-09 The Boeing Company Sensing systems and methods
CN111562951B (en) * 2020-05-11 2022-05-03 电子科技大学 Radar application component service implementation method
CN113032491B (en) * 2021-04-07 2023-01-06 工银科技有限公司 Method, device, electronic equipment and medium for realizing static data synchronization

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1543616A (en) * 2001-06-29 2004-11-03 ���ܿ���ϵͳ���޹�˾ Security system and method for computers
CN101002180A (en) * 2004-07-30 2007-07-18 捷讯研究有限公司 Method and system for coordinating client and host security modules
CN101535948A (en) * 2006-11-01 2009-09-16 微软公司 Securing distributed application information delivery
US7873957B2 (en) * 2006-07-27 2011-01-18 Microsoft Corporation Minimizing user disruption during modification operations

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060010047A1 (en) * 2004-07-06 2006-01-12 Oculus Inc Sarbanes-Oxley Anonymous Reporting System
KR20070099200A (en) * 2006-04-03 2007-10-09 삼성전자주식회사 Apparatus for restricting access to application module in mobile wireless device and method of restricting access to application module using the same
US8069209B1 (en) * 2006-06-16 2011-11-29 Openwave Systems Inc. Method for activating and deactivating client-side services from a distant server
US8949421B2 (en) * 2009-07-29 2015-02-03 Teradata Us, Inc. Techniques for discovering database connectivity leaks

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1543616A (en) * 2001-06-29 2004-11-03 ���ܿ���ϵͳ���޹�˾ Security system and method for computers
CN101002180A (en) * 2004-07-30 2007-07-18 捷讯研究有限公司 Method and system for coordinating client and host security modules
US7873957B2 (en) * 2006-07-27 2011-01-18 Microsoft Corporation Minimizing user disruption during modification operations
CN101535948A (en) * 2006-11-01 2009-09-16 微软公司 Securing distributed application information delivery

Also Published As

Publication number Publication date
EP2962211A1 (en) 2016-01-06
EP2962211A4 (en) 2016-11-16
WO2014134516A1 (en) 2014-09-04
CN105190590A (en) 2015-12-23

Similar Documents

Publication Publication Date Title
CN105190590B (en) For managing the method and system of data and/or for the service of equipment
AU2020256380B2 (en) Methods and systems for secure and reliable identity-based computing
DeNardis The Internet in everything
US11507665B2 (en) Methods and systems for secure and reliable identity-based computing
JP7064576B2 (en) Systems and methods for implementing centralized privacy control in decentralized systems
Park et al. CIoT-Net: a scalable cognitive IoT based smart city network architecture
Banos et al. The Mining Minds digital health and wellness framework
CN105408873B (en) System and method for the sampling based on activity of diagnostic data
Van Rijmenam Think bigger: Developing a successful big data strategy for your business
US9825800B2 (en) Methods and systems for managing data
CN110168570A (en) Machine learning virtual sensor process model for multiple sensors
CN106575243A (en) Hypervisor-hosted virtual machine forensics
CN106796627A (en) Method and system for moving the behavioural analysis of equipment behavior based on user role information
Ballard et al. Ibm infosphere streams: Assembling continuous insight in the information revolution
Preuveneers et al. SAMURAI: A batch and streaming context architecture for large-scale intelligent applications and environments
Vuppalapati Building enterprise IoT applications
Xu A system perspective to privacy, security and resilience in mobile applications
Speed et al. Sensing data in the home
Bell et al. What Is the Internet of Things?
Kodys Semantic reasoning for ubiquitous smart living framework for well-being and digital health
Azubuike et al. West African Journal of Industrial & Academic Research Vol. 19 No. 2. April 31, 2018 Engineering Research and Production Page No
Walczak et al. Semantic exploration of distributed ar services
García-Luque et al. Digital Avatars: An Application to eHealth
Woelfel 4.29 Randomized Shared Memory Algorithms
Behan Sensorial Networks embedded in Mobile Devices

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190419